Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 15:15

General

  • Target

    63251d54f9e11c673539780b285b4155f75c40771d3c120fe8bf9377ad1bfb6d.exe

  • Size

    1021KB

  • MD5

    40108da7b919385d3fbefc9a59944b78

  • SHA1

    b4c7e2c38a2e682dde4c9bcb83baa5bea1974191

  • SHA256

    63251d54f9e11c673539780b285b4155f75c40771d3c120fe8bf9377ad1bfb6d

  • SHA512

    1295215c1e8b71c80f423371fd8532e906f648fcf54c2132143d2c92ddf758d8786c7996a78a415e280c598943306be9ed132e9eadd16dd685e1fe66ff69f1e5

  • SSDEEP

    24576:Myed4qZWPU7GLTO89m91eK3kMPQgSkhynmF1nQERyfOY5:7ed4qZSm8LFKzPrSznmFrAO

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

gong

C2

193.233.20.33:4125

Attributes
  • auth_value

    16950897b83de3bba9e4de36f06a8c05

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63251d54f9e11c673539780b285b4155f75c40771d3c120fe8bf9377ad1bfb6d.exe
    "C:\Users\Admin\AppData\Local\Temp\63251d54f9e11c673539780b285b4155f75c40771d3c120fe8bf9377ad1bfb6d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8485.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8485.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6542.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6542.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6734.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6734.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1568
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu292580.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu292580.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4040
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1492.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1492.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2836
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnR14s12.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnR14s12.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en288106.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en288106.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge097409.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge097409.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3764
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3420
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4160
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5096
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:5040
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5076
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5012
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:5020
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:5092
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:832
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:768

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d1a5b9748eb28f75f46a25921df972ca

                SHA1

                a72c7bd199536e80fe651a6ebd79267c453893f4

                SHA256

                d86fa001f07f306b8d04ba3b7ec48e042baa7d14a6eac349fc7a9d2720d9e64d

                SHA512

                0bb392f8fafe448c736b379af20df2e5f68c30f13a0d3059cd1287ce5b38f8186d376f999e1b176429aacaf40b0e898f428e3159f5568bd115bd28018c10af6b

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d1a5b9748eb28f75f46a25921df972ca

                SHA1

                a72c7bd199536e80fe651a6ebd79267c453893f4

                SHA256

                d86fa001f07f306b8d04ba3b7ec48e042baa7d14a6eac349fc7a9d2720d9e64d

                SHA512

                0bb392f8fafe448c736b379af20df2e5f68c30f13a0d3059cd1287ce5b38f8186d376f999e1b176429aacaf40b0e898f428e3159f5568bd115bd28018c10af6b

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d1a5b9748eb28f75f46a25921df972ca

                SHA1

                a72c7bd199536e80fe651a6ebd79267c453893f4

                SHA256

                d86fa001f07f306b8d04ba3b7ec48e042baa7d14a6eac349fc7a9d2720d9e64d

                SHA512

                0bb392f8fafe448c736b379af20df2e5f68c30f13a0d3059cd1287ce5b38f8186d376f999e1b176429aacaf40b0e898f428e3159f5568bd115bd28018c10af6b

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d1a5b9748eb28f75f46a25921df972ca

                SHA1

                a72c7bd199536e80fe651a6ebd79267c453893f4

                SHA256

                d86fa001f07f306b8d04ba3b7ec48e042baa7d14a6eac349fc7a9d2720d9e64d

                SHA512

                0bb392f8fafe448c736b379af20df2e5f68c30f13a0d3059cd1287ce5b38f8186d376f999e1b176429aacaf40b0e898f428e3159f5568bd115bd28018c10af6b

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                d1a5b9748eb28f75f46a25921df972ca

                SHA1

                a72c7bd199536e80fe651a6ebd79267c453893f4

                SHA256

                d86fa001f07f306b8d04ba3b7ec48e042baa7d14a6eac349fc7a9d2720d9e64d

                SHA512

                0bb392f8fafe448c736b379af20df2e5f68c30f13a0d3059cd1287ce5b38f8186d376f999e1b176429aacaf40b0e898f428e3159f5568bd115bd28018c10af6b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge097409.exe

                Filesize

                227KB

                MD5

                d1a5b9748eb28f75f46a25921df972ca

                SHA1

                a72c7bd199536e80fe651a6ebd79267c453893f4

                SHA256

                d86fa001f07f306b8d04ba3b7ec48e042baa7d14a6eac349fc7a9d2720d9e64d

                SHA512

                0bb392f8fafe448c736b379af20df2e5f68c30f13a0d3059cd1287ce5b38f8186d376f999e1b176429aacaf40b0e898f428e3159f5568bd115bd28018c10af6b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge097409.exe

                Filesize

                227KB

                MD5

                d1a5b9748eb28f75f46a25921df972ca

                SHA1

                a72c7bd199536e80fe651a6ebd79267c453893f4

                SHA256

                d86fa001f07f306b8d04ba3b7ec48e042baa7d14a6eac349fc7a9d2720d9e64d

                SHA512

                0bb392f8fafe448c736b379af20df2e5f68c30f13a0d3059cd1287ce5b38f8186d376f999e1b176429aacaf40b0e898f428e3159f5568bd115bd28018c10af6b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8485.exe

                Filesize

                839KB

                MD5

                b22fce0fb0ca016a8a8abb00c04f8a7e

                SHA1

                a1847e7bfc5fafc02b8b1ef274872fc664857eeb

                SHA256

                c332a10aa3f9130949142254af693aec09d8a1d2e46aa38b917cda9de8ca341d

                SHA512

                0a55a81514e1eed0013c33cc65ff93547588fdb9020d0809c20cbe2427d520c7dd47dbb5ce5e41afa416c112cd6250862eb9b7d501f2242d828e43711c424edd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8485.exe

                Filesize

                839KB

                MD5

                b22fce0fb0ca016a8a8abb00c04f8a7e

                SHA1

                a1847e7bfc5fafc02b8b1ef274872fc664857eeb

                SHA256

                c332a10aa3f9130949142254af693aec09d8a1d2e46aa38b917cda9de8ca341d

                SHA512

                0a55a81514e1eed0013c33cc65ff93547588fdb9020d0809c20cbe2427d520c7dd47dbb5ce5e41afa416c112cd6250862eb9b7d501f2242d828e43711c424edd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en288106.exe

                Filesize

                175KB

                MD5

                7db79deadc0bafe3bd501bfa274eb265

                SHA1

                863c6b33bc9a086830b180cb93eaa552dbf35fba

                SHA256

                61b9bd03c44049f60352e466096e52ee022ce28c4386a9a690e33157a519caaa

                SHA512

                cd4e11481f3a94e7606b5bec616ee7ed4b998e9d0f5dde8d2443879b55c151e458afdb009d52d93a8e4a6adbf404af2ad0dcf9ddc100d6a1ae28c50d57af12e9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en288106.exe

                Filesize

                175KB

                MD5

                7db79deadc0bafe3bd501bfa274eb265

                SHA1

                863c6b33bc9a086830b180cb93eaa552dbf35fba

                SHA256

                61b9bd03c44049f60352e466096e52ee022ce28c4386a9a690e33157a519caaa

                SHA512

                cd4e11481f3a94e7606b5bec616ee7ed4b998e9d0f5dde8d2443879b55c151e458afdb009d52d93a8e4a6adbf404af2ad0dcf9ddc100d6a1ae28c50d57af12e9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6542.exe

                Filesize

                697KB

                MD5

                b079e8a1eb9eeec7033c4f5c190da46b

                SHA1

                b5463867d8a2eba3ccf9f7ed77b08a1f2aff9ace

                SHA256

                34e72b7f44c960653f4c4817b340cce3ad7c4add10a854a71745a0713ae59dca

                SHA512

                548a82eb3157e017b61740337d6ea7e2e3f2656d55ccf7a16bee5df515adcb5c08b5e8254a9ef535d31887de99856b9424bd678e62d7df1d1f26d82190f00445

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6542.exe

                Filesize

                697KB

                MD5

                b079e8a1eb9eeec7033c4f5c190da46b

                SHA1

                b5463867d8a2eba3ccf9f7ed77b08a1f2aff9ace

                SHA256

                34e72b7f44c960653f4c4817b340cce3ad7c4add10a854a71745a0713ae59dca

                SHA512

                548a82eb3157e017b61740337d6ea7e2e3f2656d55ccf7a16bee5df515adcb5c08b5e8254a9ef535d31887de99856b9424bd678e62d7df1d1f26d82190f00445

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnR14s12.exe

                Filesize

                350KB

                MD5

                1f2a516e4df64f146d6dd404ad8e2b9b

                SHA1

                17bebc7eb56263905934b59258d2595bbc3eae9d

                SHA256

                936397d7ba1b9ab53e193d84e680ca5c41a5ee453fee3a2a1916ab5c759db9a2

                SHA512

                9b13ebb3c7d3355a3c43c39f82be755c4384ed10f6b6b6cfd85c328025349109268239b67af96e4aa12c79ba513582fea8cc5e94a34c13b627c06d1dc77fb4ad

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dnR14s12.exe

                Filesize

                350KB

                MD5

                1f2a516e4df64f146d6dd404ad8e2b9b

                SHA1

                17bebc7eb56263905934b59258d2595bbc3eae9d

                SHA256

                936397d7ba1b9ab53e193d84e680ca5c41a5ee453fee3a2a1916ab5c759db9a2

                SHA512

                9b13ebb3c7d3355a3c43c39f82be755c4384ed10f6b6b6cfd85c328025349109268239b67af96e4aa12c79ba513582fea8cc5e94a34c13b627c06d1dc77fb4ad

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6734.exe

                Filesize

                345KB

                MD5

                00f380e64db20beb2d78b133e435339b

                SHA1

                80ddbda506ae8346611439bfae61c40d711be3ce

                SHA256

                647d13c4f2fd2e96d39b51a8cdb3fa02770d1e7933452bb286cdaa66a929ab25

                SHA512

                9e8d819f5664bc35c9bd11dee50a20c1dbdd0db57ee347c945ef92814ef83e96cbafc7adf05bc80b83a8909d8d5c6561516732de42284c07bb5ad7f89094e309

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6734.exe

                Filesize

                345KB

                MD5

                00f380e64db20beb2d78b133e435339b

                SHA1

                80ddbda506ae8346611439bfae61c40d711be3ce

                SHA256

                647d13c4f2fd2e96d39b51a8cdb3fa02770d1e7933452bb286cdaa66a929ab25

                SHA512

                9e8d819f5664bc35c9bd11dee50a20c1dbdd0db57ee347c945ef92814ef83e96cbafc7adf05bc80b83a8909d8d5c6561516732de42284c07bb5ad7f89094e309

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu292580.exe

                Filesize

                12KB

                MD5

                87bd8e0e1e3481775b9b26188b47c62a

                SHA1

                fa337acd60c070b12d12b090d319583330bdd0bb

                SHA256

                c757b1e5d6574487efc0d83a86f2294853f493fb87312c666451754dc6e6271b

                SHA512

                30f7ac88018ca1f9f081161dfcc8ffa35cecccf14fa46a4cb56d1e7c0e6d7eb5322ce744e9d4a3e70a35c4ea1a293350e51d7e909eea6a4748257df45da9e1fb

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu292580.exe

                Filesize

                12KB

                MD5

                87bd8e0e1e3481775b9b26188b47c62a

                SHA1

                fa337acd60c070b12d12b090d319583330bdd0bb

                SHA256

                c757b1e5d6574487efc0d83a86f2294853f493fb87312c666451754dc6e6271b

                SHA512

                30f7ac88018ca1f9f081161dfcc8ffa35cecccf14fa46a4cb56d1e7c0e6d7eb5322ce744e9d4a3e70a35c4ea1a293350e51d7e909eea6a4748257df45da9e1fb

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1492.exe

                Filesize

                292KB

                MD5

                ab51cdc3faf65f8d0a5e28a9979acdd7

                SHA1

                a1855d8975687382dbaaaa8debfeb594de799921

                SHA256

                2d31b230f13c78f7c2c2f0d11faa07980ccd01045dc3ff81dcf36b8acc193398

                SHA512

                f2ad409c6fecbf67322bbef0b0158ba4334f72c1be0b9edae709229f33a919011fb42f57516ce91ad7502bd4776574f9d5c631c0f9e5409eb5618651ab23105e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor1492.exe

                Filesize

                292KB

                MD5

                ab51cdc3faf65f8d0a5e28a9979acdd7

                SHA1

                a1855d8975687382dbaaaa8debfeb594de799921

                SHA256

                2d31b230f13c78f7c2c2f0d11faa07980ccd01045dc3ff81dcf36b8acc193398

                SHA512

                f2ad409c6fecbf67322bbef0b0158ba4334f72c1be0b9edae709229f33a919011fb42f57516ce91ad7502bd4776574f9d5c631c0f9e5409eb5618651ab23105e

              • memory/2496-1113-0x0000000005B70000-0x0000000005BBB000-memory.dmp

                Filesize

                300KB

              • memory/2496-227-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-1124-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

                Filesize

                320KB

              • memory/2496-1123-0x0000000006F20000-0x0000000006F96000-memory.dmp

                Filesize

                472KB

              • memory/2496-1122-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/2496-1121-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/2496-1120-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/2496-1119-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/2496-1117-0x0000000006670000-0x0000000006B9C000-memory.dmp

                Filesize

                5.2MB

              • memory/2496-1116-0x00000000064A0000-0x0000000006662000-memory.dmp

                Filesize

                1.8MB

              • memory/2496-1115-0x00000000063C0000-0x0000000006452000-memory.dmp

                Filesize

                584KB

              • memory/2496-1114-0x0000000005D00000-0x0000000005D66000-memory.dmp

                Filesize

                408KB

              • memory/2496-1112-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/2496-1111-0x0000000005A20000-0x0000000005A5E000-memory.dmp

                Filesize

                248KB

              • memory/2496-1110-0x0000000005A00000-0x0000000005A12000-memory.dmp

                Filesize

                72KB

              • memory/2496-1109-0x0000000004DA0000-0x0000000004EAA000-memory.dmp

                Filesize

                1.0MB

              • memory/2496-196-0x0000000002670000-0x00000000026B6000-memory.dmp

                Filesize

                280KB

              • memory/2496-197-0x0000000002830000-0x0000000002874000-memory.dmp

                Filesize

                272KB

              • memory/2496-199-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-198-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-201-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-203-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-205-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-207-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-209-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-211-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-213-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-215-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-217-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-219-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-221-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-223-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-225-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-1108-0x00000000053C0000-0x00000000059C6000-memory.dmp

                Filesize

                6.0MB

              • memory/2496-229-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-231-0x0000000002830000-0x000000000286E000-memory.dmp

                Filesize

                248KB

              • memory/2496-550-0x0000000000800000-0x000000000084B000-memory.dmp

                Filesize

                300KB

              • memory/2496-552-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/2496-556-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/2496-554-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/2836-175-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-157-0x0000000002400000-0x0000000002418000-memory.dmp

                Filesize

                96KB

              • memory/2836-169-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-191-0x0000000000400000-0x000000000070C000-memory.dmp

                Filesize

                3.0MB

              • memory/2836-171-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-165-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-188-0x0000000004D30000-0x0000000004D40000-memory.dmp

                Filesize

                64KB

              • memory/2836-187-0x0000000004D30000-0x0000000004D40000-memory.dmp

                Filesize

                64KB

              • memory/2836-186-0x0000000004D30000-0x0000000004D40000-memory.dmp

                Filesize

                64KB

              • memory/2836-185-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-181-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-183-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-167-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-179-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-189-0x0000000000400000-0x000000000070C000-memory.dmp

                Filesize

                3.0MB

              • memory/2836-173-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-163-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-161-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-154-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/2836-155-0x0000000000950000-0x000000000096A000-memory.dmp

                Filesize

                104KB

              • memory/2836-156-0x0000000004D40000-0x000000000523E000-memory.dmp

                Filesize

                5.0MB

              • memory/2836-159-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-158-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/2836-177-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4040-148-0x0000000000BF0000-0x0000000000BFA000-memory.dmp

                Filesize

                40KB

              • memory/4632-1132-0x0000000005720000-0x0000000005730000-memory.dmp

                Filesize

                64KB

              • memory/4632-1131-0x0000000005610000-0x000000000565B000-memory.dmp

                Filesize

                300KB

              • memory/4632-1130-0x0000000000BD0000-0x0000000000C02000-memory.dmp

                Filesize

                200KB