Analysis

  • max time kernel
    128s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-03-2023 23:41

General

  • Target

    b812afab30a9d4b73f7140915e808a8c05a5beb175d577dd58874443b85c0f58.exe

  • Size

    1024KB

  • MD5

    e2f1c813c3172f103879fa5713413cb0

  • SHA1

    6828252e191757cfcbec23e25d1fa66a4bb7b12c

  • SHA256

    b812afab30a9d4b73f7140915e808a8c05a5beb175d577dd58874443b85c0f58

  • SHA512

    44d6c170001e685f5f6d1211c8eb978b4b0c75c017b4b23665ef81b7cee17eea18c73ffa0c1a3ca1a9986a25e3969fddd1358a172067f04a279764ec787b6a2d

  • SSDEEP

    12288:TMrEy90Sz5tWRn/KIFcYLZ0mumCSrVHw8FdK4cfmbDiPAqTA/AcadD2TbKCQGK7k:TyLs/KMmcH9STObDrIcaUSVp8SFDFG

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b812afab30a9d4b73f7140915e808a8c05a5beb175d577dd58874443b85c0f58.exe
    "C:\Users\Admin\AppData\Local\Temp\b812afab30a9d4b73f7140915e808a8c05a5beb175d577dd58874443b85c0f58.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0627.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0627.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8809.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8809.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8314.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8314.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2264
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5021.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5021.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2368
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8820.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8820.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGR91s08.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGR91s08.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en167187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en167187.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge550486.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge550486.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4000
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5112
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3364
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4848
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3372
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:3172
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3228
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2936
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:2732
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:5104
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4988
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4996

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge550486.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge550486.exe
                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0627.exe
                Filesize

                842KB

                MD5

                f2361665ee0c2e5db50a1a444f0d8f41

                SHA1

                f94ca24d21c31dfa2998e111dea05f709d93306a

                SHA256

                8048ae256e830fa3a08ef0cfb0930618e43eb800ae2a394264e7b36986fa8b43

                SHA512

                9c1cea4f6391598ce544c44db9640e515730a532f27486b85268ba33096be3a755341b0f71f99fe32ed8284b5bff76eabc5fadc784f10b3610fecc20a0bdd17b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0627.exe
                Filesize

                842KB

                MD5

                f2361665ee0c2e5db50a1a444f0d8f41

                SHA1

                f94ca24d21c31dfa2998e111dea05f709d93306a

                SHA256

                8048ae256e830fa3a08ef0cfb0930618e43eb800ae2a394264e7b36986fa8b43

                SHA512

                9c1cea4f6391598ce544c44db9640e515730a532f27486b85268ba33096be3a755341b0f71f99fe32ed8284b5bff76eabc5fadc784f10b3610fecc20a0bdd17b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en167187.exe
                Filesize

                175KB

                MD5

                581e8f97deca3769f1bc14882c9f26dc

                SHA1

                b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                SHA256

                b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                SHA512

                f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en167187.exe
                Filesize

                175KB

                MD5

                581e8f97deca3769f1bc14882c9f26dc

                SHA1

                b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                SHA256

                b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                SHA512

                f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8809.exe
                Filesize

                699KB

                MD5

                8d695b13b5450c34b94aee3d9f611d2b

                SHA1

                64ff8105f268783a74af939be0fecb956c2bf471

                SHA256

                25ceafb6e6489da81adac9efc0437c0ad4f638701765b3063c25f9aef8302082

                SHA512

                08e2087103f8e8e1f6c99c910c19fd5b650f619096cd710ce932a8f279c115bda5379307056f649cac9faed57d8e789babe1a74953434189209879cac3be9c73

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8809.exe
                Filesize

                699KB

                MD5

                8d695b13b5450c34b94aee3d9f611d2b

                SHA1

                64ff8105f268783a74af939be0fecb956c2bf471

                SHA256

                25ceafb6e6489da81adac9efc0437c0ad4f638701765b3063c25f9aef8302082

                SHA512

                08e2087103f8e8e1f6c99c910c19fd5b650f619096cd710ce932a8f279c115bda5379307056f649cac9faed57d8e789babe1a74953434189209879cac3be9c73

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGR91s08.exe
                Filesize

                358KB

                MD5

                ff5ccfce6e444a292b0b24985c059a4e

                SHA1

                d4bfba8e2c609f3a0e635bec71f7097636205c2d

                SHA256

                88453eac311af54d146a316b76ef6505bd6b625d89b8af4282b400661657e79f

                SHA512

                21547c470bfdd46e02df88670beb71d5b4d5786e97e1749dd899fcab2ad7053f69220ceb5093bd8f821c0aef3b21fa61e876ed5f1f192ee37125ed89abc13bb5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGR91s08.exe
                Filesize

                358KB

                MD5

                ff5ccfce6e444a292b0b24985c059a4e

                SHA1

                d4bfba8e2c609f3a0e635bec71f7097636205c2d

                SHA256

                88453eac311af54d146a316b76ef6505bd6b625d89b8af4282b400661657e79f

                SHA512

                21547c470bfdd46e02df88670beb71d5b4d5786e97e1749dd899fcab2ad7053f69220ceb5093bd8f821c0aef3b21fa61e876ed5f1f192ee37125ed89abc13bb5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8314.exe
                Filesize

                346KB

                MD5

                53a5e82cf1baa03f075712887cfb963a

                SHA1

                fa8cbd8dc4b7c02f54f3115df16285347b5eb14a

                SHA256

                001075a2fc369dd9aa500d4831f2b1b37f45673cd8caf8ec13e407531fa10c5e

                SHA512

                ea6fef537f7f6b70dc4065f9301a8764df2ad592b805f240c342b5f09ba0928ad2472b79a48c083534fa78e56a68210553d6e083fe10f08903653d6c0d24eff9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino8314.exe
                Filesize

                346KB

                MD5

                53a5e82cf1baa03f075712887cfb963a

                SHA1

                fa8cbd8dc4b7c02f54f3115df16285347b5eb14a

                SHA256

                001075a2fc369dd9aa500d4831f2b1b37f45673cd8caf8ec13e407531fa10c5e

                SHA512

                ea6fef537f7f6b70dc4065f9301a8764df2ad592b805f240c342b5f09ba0928ad2472b79a48c083534fa78e56a68210553d6e083fe10f08903653d6c0d24eff9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5021.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5021.exe
                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8820.exe
                Filesize

                300KB

                MD5

                e32c98338f0b5b0f8e788f6a5e4a9c24

                SHA1

                3a5aede7042641e11627ecec9ff7b95c970123c4

                SHA256

                917f89c9ab3d26128f8847aceb4c32ac451d2a2359bbbf418d2fb30ecaf727be

                SHA512

                f8785cae6add81e6fa0a0514cb3e1272f40b5a9a8ff5ca3d9febf8f3cf95b19610e18d1f89b8ebb36288c6330975328df1be00d5093ccb0e08983445aa055fb7

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8820.exe
                Filesize

                300KB

                MD5

                e32c98338f0b5b0f8e788f6a5e4a9c24

                SHA1

                3a5aede7042641e11627ecec9ff7b95c970123c4

                SHA256

                917f89c9ab3d26128f8847aceb4c32ac451d2a2359bbbf418d2fb30ecaf727be

                SHA512

                f8785cae6add81e6fa0a0514cb3e1272f40b5a9a8ff5ca3d9febf8f3cf95b19610e18d1f89b8ebb36288c6330975328df1be00d5093ccb0e08983445aa055fb7

              • memory/2368-145-0x0000000000760000-0x000000000076A000-memory.dmp
                Filesize

                40KB

              • memory/3852-160-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-182-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-162-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-166-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-168-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-170-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-172-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-174-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-176-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-178-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-180-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-164-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-183-0x0000000004E30000-0x0000000004E40000-memory.dmp
                Filesize

                64KB

              • memory/3852-184-0x0000000004E30000-0x0000000004E40000-memory.dmp
                Filesize

                64KB

              • memory/3852-185-0x0000000004E30000-0x0000000004E40000-memory.dmp
                Filesize

                64KB

              • memory/3852-186-0x0000000000400000-0x000000000070E000-memory.dmp
                Filesize

                3.1MB

              • memory/3852-188-0x0000000000400000-0x000000000070E000-memory.dmp
                Filesize

                3.1MB

              • memory/3852-158-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-156-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-155-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/3852-154-0x0000000004C40000-0x0000000004C58000-memory.dmp
                Filesize

                96KB

              • memory/3852-153-0x0000000004E40000-0x000000000533E000-memory.dmp
                Filesize

                5.0MB

              • memory/3852-152-0x0000000002640000-0x000000000265A000-memory.dmp
                Filesize

                104KB

              • memory/3852-151-0x00000000007E0000-0x000000000080D000-memory.dmp
                Filesize

                180KB

              • memory/3860-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-1109-0x0000000005A20000-0x0000000005A5E000-memory.dmp
                Filesize

                248KB

              • memory/3860-208-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-212-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-214-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-216-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-218-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-220-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-222-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-224-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-226-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-228-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-272-0x00000000007F0000-0x000000000083B000-memory.dmp
                Filesize

                300KB

              • memory/3860-273-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                Filesize

                64KB

              • memory/3860-275-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                Filesize

                64KB

              • memory/3860-278-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                Filesize

                64KB

              • memory/3860-1105-0x0000000005300000-0x0000000005906000-memory.dmp
                Filesize

                6.0MB

              • memory/3860-1106-0x0000000005910000-0x0000000005A1A000-memory.dmp
                Filesize

                1.0MB

              • memory/3860-1107-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
                Filesize

                72KB

              • memory/3860-1108-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                Filesize

                64KB

              • memory/3860-206-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-1110-0x0000000005B70000-0x0000000005BBB000-memory.dmp
                Filesize

                300KB

              • memory/3860-1111-0x0000000005D00000-0x0000000005D92000-memory.dmp
                Filesize

                584KB

              • memory/3860-1112-0x0000000005DA0000-0x0000000005E06000-memory.dmp
                Filesize

                408KB

              • memory/3860-1114-0x00000000066E0000-0x0000000006756000-memory.dmp
                Filesize

                472KB

              • memory/3860-1115-0x0000000006760000-0x00000000067B0000-memory.dmp
                Filesize

                320KB

              • memory/3860-1116-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                Filesize

                64KB

              • memory/3860-1117-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                Filesize

                64KB

              • memory/3860-1118-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                Filesize

                64KB

              • memory/3860-1119-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                Filesize

                64KB

              • memory/3860-1120-0x0000000006920000-0x0000000006AE2000-memory.dmp
                Filesize

                1.8MB

              • memory/3860-1121-0x0000000006AF0000-0x000000000701C000-memory.dmp
                Filesize

                5.2MB

              • memory/3860-193-0x0000000002510000-0x0000000002556000-memory.dmp
                Filesize

                280KB

              • memory/3860-194-0x0000000004D00000-0x0000000004D44000-memory.dmp
                Filesize

                272KB

              • memory/3860-196-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-204-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-202-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-198-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/3860-195-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                Filesize

                248KB

              • memory/4324-1129-0x0000000005380000-0x0000000005390000-memory.dmp
                Filesize

                64KB

              • memory/4324-1128-0x0000000005590000-0x00000000055DB000-memory.dmp
                Filesize

                300KB

              • memory/4324-1127-0x0000000000B50000-0x0000000000B82000-memory.dmp
                Filesize

                200KB