Analysis

  • max time kernel
    97s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2023, 22:17

General

  • Target

    2dbfde14c5d725010212cd759f5f38a2ac2fe84c520b7eb68f55e617973ae6a4.exe

  • Size

    1019KB

  • MD5

    2fae675397d909e5aaa2acd46a4bf85f

  • SHA1

    6d93d08d3e6d4ff73896332bf77ff6cee532f830

  • SHA256

    2dbfde14c5d725010212cd759f5f38a2ac2fe84c520b7eb68f55e617973ae6a4

  • SHA512

    52f3efde2f771e9f4b2d90f387887f0c6ab1051a72d82f9c8be166cef639641b854deaf80d56da6be31d2b68098ae77f30acc69a61994094f00f4d1ba8a68845

  • SSDEEP

    24576:Gy96j8jCLD/UMqm/6DzXR96fE9oFr8quMTi/FzzkXgeS:V96j8OLD/ULXT8E9KIqubZzH

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dbfde14c5d725010212cd759f5f38a2ac2fe84c520b7eb68f55e617973ae6a4.exe
    "C:\Users\Admin\AppData\Local\Temp\2dbfde14c5d725010212cd759f5f38a2ac2fe84c520b7eb68f55e617973ae6a4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1450.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1450.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9106.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9106.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3430.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3430.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0618.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0618.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:524
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4799.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4799.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4076
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 1104
              6⤵
              • Program crash
              PID:4244
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyk23s15.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyk23s15.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4988
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 1804
            5⤵
            • Program crash
            PID:2756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en997778.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en997778.exe
        3⤵
        • Executes dropped EXE
        PID:1100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge917435.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge917435.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4736
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1152
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1796
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3348
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4748
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3416
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3612
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:3780
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3068
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4076 -ip 4076
                1⤵
                  PID:4464
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4988 -ip 4988
                  1⤵
                    PID:1488
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4896

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge917435.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge917435.exe

                          Filesize

                          226KB

                          MD5

                          8627ebe3777cc777ed2a14b907162224

                          SHA1

                          06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                          SHA256

                          319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                          SHA512

                          9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1450.exe

                          Filesize

                          837KB

                          MD5

                          e2c34be7eee9d6b1dd0fe279cbe1c0cd

                          SHA1

                          49eca261ed09c4926eb10d850ebc6278f5ae097d

                          SHA256

                          a48917cfaff284a6511b34d4b2c0d5a2fda4919a7f70596d2c4d9152afb3c3e2

                          SHA512

                          460f7f882ecd5a6be98639cece18e0c6f5848911c9b019238833e746f75901c956feea8f29ec5fdecdc4c4f1395aa1d9608fc650207f63165cd04c024c9721bf

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1450.exe

                          Filesize

                          837KB

                          MD5

                          e2c34be7eee9d6b1dd0fe279cbe1c0cd

                          SHA1

                          49eca261ed09c4926eb10d850ebc6278f5ae097d

                          SHA256

                          a48917cfaff284a6511b34d4b2c0d5a2fda4919a7f70596d2c4d9152afb3c3e2

                          SHA512

                          460f7f882ecd5a6be98639cece18e0c6f5848911c9b019238833e746f75901c956feea8f29ec5fdecdc4c4f1395aa1d9608fc650207f63165cd04c024c9721bf

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en997778.exe

                          Filesize

                          175KB

                          MD5

                          581e8f97deca3769f1bc14882c9f26dc

                          SHA1

                          b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                          SHA256

                          b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                          SHA512

                          f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9106.exe

                          Filesize

                          694KB

                          MD5

                          32ad1eeff8c729e1bf7f98e391b62459

                          SHA1

                          046fdd28d8857408a923dda57e738b13f583e282

                          SHA256

                          764339107891d0c8adddf1474befcd4a13b10700577de1913a0c35fc9e9d1637

                          SHA512

                          82790cdf44e3c9e1a5155333e4c9fe9eb62c07a0107cb37a1d0363bc7e345358279aefc32e643efdf53cae03baa5b5eaef699665f34340739f045204c8341acb

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9106.exe

                          Filesize

                          694KB

                          MD5

                          32ad1eeff8c729e1bf7f98e391b62459

                          SHA1

                          046fdd28d8857408a923dda57e738b13f583e282

                          SHA256

                          764339107891d0c8adddf1474befcd4a13b10700577de1913a0c35fc9e9d1637

                          SHA512

                          82790cdf44e3c9e1a5155333e4c9fe9eb62c07a0107cb37a1d0363bc7e345358279aefc32e643efdf53cae03baa5b5eaef699665f34340739f045204c8341acb

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyk23s15.exe

                          Filesize

                          349KB

                          MD5

                          6db82f3456c08b6e8747622cae703853

                          SHA1

                          7e78d3e3da83f09233efa97cc0d96f7e747c1a36

                          SHA256

                          b88bbcb4b8ef436b50e8e0d973c4d49fc5d92f4c48947c12ee40b377e699496e

                          SHA512

                          24cfbb84134bc5ba9cf62e90ae25cf252b059a4aa58abca081585f1f9f3fd65aba30fe21dd7149b8cb7435a74fb10d25524872d582b1a3b4638c010f0399fea4

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyk23s15.exe

                          Filesize

                          349KB

                          MD5

                          6db82f3456c08b6e8747622cae703853

                          SHA1

                          7e78d3e3da83f09233efa97cc0d96f7e747c1a36

                          SHA256

                          b88bbcb4b8ef436b50e8e0d973c4d49fc5d92f4c48947c12ee40b377e699496e

                          SHA512

                          24cfbb84134bc5ba9cf62e90ae25cf252b059a4aa58abca081585f1f9f3fd65aba30fe21dd7149b8cb7435a74fb10d25524872d582b1a3b4638c010f0399fea4

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3430.exe

                          Filesize

                          344KB

                          MD5

                          232b729029c0bbe8c2a92f6b72d108a1

                          SHA1

                          a605ab7a6f297f9007afb14a9d890737a7518530

                          SHA256

                          f95e8f3bc9ad2aea4f0687714a82971311f57972ed509bb62094403e15d3d176

                          SHA512

                          01a9eb2d0879a20befbc6eec7f64bffb6a8f49c41ed9336ff4f44fa7f97df337fb4eb451c6437bd135fae0bed672a8b939497f4b389ef128b1b24dd4d269bb66

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino3430.exe

                          Filesize

                          344KB

                          MD5

                          232b729029c0bbe8c2a92f6b72d108a1

                          SHA1

                          a605ab7a6f297f9007afb14a9d890737a7518530

                          SHA256

                          f95e8f3bc9ad2aea4f0687714a82971311f57972ed509bb62094403e15d3d176

                          SHA512

                          01a9eb2d0879a20befbc6eec7f64bffb6a8f49c41ed9336ff4f44fa7f97df337fb4eb451c6437bd135fae0bed672a8b939497f4b389ef128b1b24dd4d269bb66

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0618.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus0618.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4799.exe

                          Filesize

                          291KB

                          MD5

                          03260c06485107797ae27142d5c328a4

                          SHA1

                          598aa373160aa403cfdf96300b3903b6de426bf8

                          SHA256

                          c7a53fc7051ffe0afe678d2b141114565afaafac25a7d6940ab4a9f0188b6d06

                          SHA512

                          cfac97ec52e70bd7d0f209297f4ddd625d671d9aba33f204a06bdebf82462f9bf63ba64144c0a0eef5ff7b1ffed58a4c6e71879cb89bfe5a9d74e0a12d8cac59

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4799.exe

                          Filesize

                          291KB

                          MD5

                          03260c06485107797ae27142d5c328a4

                          SHA1

                          598aa373160aa403cfdf96300b3903b6de426bf8

                          SHA256

                          c7a53fc7051ffe0afe678d2b141114565afaafac25a7d6940ab4a9f0188b6d06

                          SHA512

                          cfac97ec52e70bd7d0f209297f4ddd625d671d9aba33f204a06bdebf82462f9bf63ba64144c0a0eef5ff7b1ffed58a4c6e71879cb89bfe5a9d74e0a12d8cac59

                        • memory/524-161-0x0000000000950000-0x000000000095A000-memory.dmp

                          Filesize

                          40KB

                        • memory/4076-179-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-200-0x0000000000400000-0x000000000070C000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/4076-175-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-181-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-183-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-185-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-187-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-189-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-191-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-193-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-195-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-197-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-199-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-177-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-201-0x0000000004D50000-0x0000000004D60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4076-202-0x0000000004D50000-0x0000000004D60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4076-203-0x0000000004D50000-0x0000000004D60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4076-205-0x0000000000400000-0x000000000070C000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/4076-173-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-172-0x0000000004C80000-0x0000000004C92000-memory.dmp

                          Filesize

                          72KB

                        • memory/4076-171-0x0000000004D50000-0x0000000004D60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4076-170-0x0000000004D50000-0x0000000004D60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4076-169-0x0000000004D50000-0x0000000004D60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4076-168-0x0000000000860000-0x000000000088D000-memory.dmp

                          Filesize

                          180KB

                        • memory/4076-167-0x0000000004D60000-0x0000000005304000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/4988-212-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4988-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-226-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-228-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-230-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-232-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-234-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-236-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-238-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-240-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-242-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-244-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-246-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-575-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4988-1120-0x0000000005350000-0x0000000005968000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/4988-1121-0x00000000059C0000-0x0000000005ACA000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4988-1122-0x0000000005B00000-0x0000000005B12000-memory.dmp

                          Filesize

                          72KB

                        • memory/4988-1123-0x0000000005B20000-0x0000000005B5C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4988-1124-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4988-1125-0x0000000005E10000-0x0000000005E76000-memory.dmp

                          Filesize

                          408KB

                        • memory/4988-1126-0x00000000064C0000-0x0000000006552000-memory.dmp

                          Filesize

                          584KB

                        • memory/4988-1127-0x00000000065B0000-0x0000000006626000-memory.dmp

                          Filesize

                          472KB

                        • memory/4988-1128-0x0000000006640000-0x0000000006690000-memory.dmp

                          Filesize

                          320KB

                        • memory/4988-1130-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4988-1131-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4988-1132-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4988-1133-0x0000000006930000-0x0000000006AF2000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/4988-1134-0x0000000006B00000-0x000000000702C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/4988-1135-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4988-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-213-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4988-211-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4988-210-0x0000000000870000-0x00000000008BB000-memory.dmp

                          Filesize

                          300KB