Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 15:24

General

  • Target

    7d47db7a36854dc4b19d699681d331ffec9967065b4c417f27182d1521286cca.exe

  • Size

    1020KB

  • MD5

    ec9b7b8c76c141a26a41baf4a80602da

  • SHA1

    eaed75b2259078d2ce9bf375b6ea8551ad508721

  • SHA256

    7d47db7a36854dc4b19d699681d331ffec9967065b4c417f27182d1521286cca

  • SHA512

    486d8470332e3820a6e599ed07a0a3bf0a265f3caeee041a73b21312601bb742c3320153d81c7e886edb457dea0e308eb0d85185a5ab7dbfe2957f648a081233

  • SSDEEP

    24576:tyaQDWO84jNRq0u1Y1kErP0SlgRYRxf6CDr3DQiOQb1UQQD:IaBObhRC1UPrMIT76CDTDl

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

gong

C2

193.233.20.33:4125

Attributes
  • auth_value

    16950897b83de3bba9e4de36f06a8c05

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d47db7a36854dc4b19d699681d331ffec9967065b4c417f27182d1521286cca.exe
    "C:\Users\Admin\AppData\Local\Temp\7d47db7a36854dc4b19d699681d331ffec9967065b4c417f27182d1521286cca.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2505.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2505.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3422.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3422.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8310.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8310.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4148
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu268617.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu268617.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4196
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2757.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2757.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2084
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dYK40s33.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dYK40s33.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en125333.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en125333.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge621383.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge621383.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4488
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4956
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3776
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5064
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4936
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4912
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1824
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4968
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4960
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4128
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3224

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                762e5336fea879e30482463cfa8c5414

                SHA1

                a9e967b4b11e560abf776b42393cbc92471ed8e5

                SHA256

                18e0dc7248777e0b8e5ac557183043e3590c99ac953e6568c3d817a4e466e5e5

                SHA512

                0b11c91a5469489a7ecaa29fa467c1d6f43383469c11e76f47a8800f8b2403d8b30e261cdf381ab292a1f88b3fea85cb82726fff2d55a229be78c7e19731be50

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                762e5336fea879e30482463cfa8c5414

                SHA1

                a9e967b4b11e560abf776b42393cbc92471ed8e5

                SHA256

                18e0dc7248777e0b8e5ac557183043e3590c99ac953e6568c3d817a4e466e5e5

                SHA512

                0b11c91a5469489a7ecaa29fa467c1d6f43383469c11e76f47a8800f8b2403d8b30e261cdf381ab292a1f88b3fea85cb82726fff2d55a229be78c7e19731be50

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                762e5336fea879e30482463cfa8c5414

                SHA1

                a9e967b4b11e560abf776b42393cbc92471ed8e5

                SHA256

                18e0dc7248777e0b8e5ac557183043e3590c99ac953e6568c3d817a4e466e5e5

                SHA512

                0b11c91a5469489a7ecaa29fa467c1d6f43383469c11e76f47a8800f8b2403d8b30e261cdf381ab292a1f88b3fea85cb82726fff2d55a229be78c7e19731be50

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                762e5336fea879e30482463cfa8c5414

                SHA1

                a9e967b4b11e560abf776b42393cbc92471ed8e5

                SHA256

                18e0dc7248777e0b8e5ac557183043e3590c99ac953e6568c3d817a4e466e5e5

                SHA512

                0b11c91a5469489a7ecaa29fa467c1d6f43383469c11e76f47a8800f8b2403d8b30e261cdf381ab292a1f88b3fea85cb82726fff2d55a229be78c7e19731be50

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                762e5336fea879e30482463cfa8c5414

                SHA1

                a9e967b4b11e560abf776b42393cbc92471ed8e5

                SHA256

                18e0dc7248777e0b8e5ac557183043e3590c99ac953e6568c3d817a4e466e5e5

                SHA512

                0b11c91a5469489a7ecaa29fa467c1d6f43383469c11e76f47a8800f8b2403d8b30e261cdf381ab292a1f88b3fea85cb82726fff2d55a229be78c7e19731be50

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge621383.exe

                Filesize

                227KB

                MD5

                762e5336fea879e30482463cfa8c5414

                SHA1

                a9e967b4b11e560abf776b42393cbc92471ed8e5

                SHA256

                18e0dc7248777e0b8e5ac557183043e3590c99ac953e6568c3d817a4e466e5e5

                SHA512

                0b11c91a5469489a7ecaa29fa467c1d6f43383469c11e76f47a8800f8b2403d8b30e261cdf381ab292a1f88b3fea85cb82726fff2d55a229be78c7e19731be50

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge621383.exe

                Filesize

                227KB

                MD5

                762e5336fea879e30482463cfa8c5414

                SHA1

                a9e967b4b11e560abf776b42393cbc92471ed8e5

                SHA256

                18e0dc7248777e0b8e5ac557183043e3590c99ac953e6568c3d817a4e466e5e5

                SHA512

                0b11c91a5469489a7ecaa29fa467c1d6f43383469c11e76f47a8800f8b2403d8b30e261cdf381ab292a1f88b3fea85cb82726fff2d55a229be78c7e19731be50

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2505.exe

                Filesize

                838KB

                MD5

                5db2c85b00089a33965d2448eaa40d46

                SHA1

                29ed23a114000f35e4a2d4a6f28a448ddef923f2

                SHA256

                da3c94b35cbc3bc53b66eadf2288694ea9ed36947f998bd0c17b220db26313dd

                SHA512

                3412783009a84b89b459f1adf656c2e26a2448c4add129f947509c7aba2f49074d97c005ecf7151596fa15e8611dc1f3d7d903ca4fc00193be8aaa8ada92aab3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina2505.exe

                Filesize

                838KB

                MD5

                5db2c85b00089a33965d2448eaa40d46

                SHA1

                29ed23a114000f35e4a2d4a6f28a448ddef923f2

                SHA256

                da3c94b35cbc3bc53b66eadf2288694ea9ed36947f998bd0c17b220db26313dd

                SHA512

                3412783009a84b89b459f1adf656c2e26a2448c4add129f947509c7aba2f49074d97c005ecf7151596fa15e8611dc1f3d7d903ca4fc00193be8aaa8ada92aab3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en125333.exe

                Filesize

                175KB

                MD5

                ad79093b557c25a09ac1fe78e10bf826

                SHA1

                b5c1b65a7c250b9a7645e36021a3adde4f23833b

                SHA256

                d5103e712bb2545179a24c43c8807b690863023d96b636478001bf0043b65812

                SHA512

                d2f4c6edf372583cef712f317689ac909b7ae73beec8573e4b1e316daefd2f5881c9b88e36cadbdbb2b1d6d31cae6e36520df55e2608bf301937ce02582d0b52

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en125333.exe

                Filesize

                175KB

                MD5

                ad79093b557c25a09ac1fe78e10bf826

                SHA1

                b5c1b65a7c250b9a7645e36021a3adde4f23833b

                SHA256

                d5103e712bb2545179a24c43c8807b690863023d96b636478001bf0043b65812

                SHA512

                d2f4c6edf372583cef712f317689ac909b7ae73beec8573e4b1e316daefd2f5881c9b88e36cadbdbb2b1d6d31cae6e36520df55e2608bf301937ce02582d0b52

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3422.exe

                Filesize

                696KB

                MD5

                b0d2b2b9d5bd32cbff45de84ad9eab66

                SHA1

                87cf764e8bae29a74fca6771576a258bc3985ace

                SHA256

                034f64cd8b4b935d961a2beaa3353f7821554027ca3d93514f55b9b087dba985

                SHA512

                2c0e434d5b0aa800dce7d65f7484762091b4cee8a656d76dd8a2d6ced5111f79a39596cf7c8658cc29e4a66e05bd3738c54d8b30756d3ef0e6a364208a89cf4c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3422.exe

                Filesize

                696KB

                MD5

                b0d2b2b9d5bd32cbff45de84ad9eab66

                SHA1

                87cf764e8bae29a74fca6771576a258bc3985ace

                SHA256

                034f64cd8b4b935d961a2beaa3353f7821554027ca3d93514f55b9b087dba985

                SHA512

                2c0e434d5b0aa800dce7d65f7484762091b4cee8a656d76dd8a2d6ced5111f79a39596cf7c8658cc29e4a66e05bd3738c54d8b30756d3ef0e6a364208a89cf4c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dYK40s33.exe

                Filesize

                350KB

                MD5

                2b4a97fc63630e5ce2886ea554e26d6a

                SHA1

                8c6cc4baa51e79bf3de7754707d4e38810f0544d

                SHA256

                151578fa9910f11d538634cd80ddbbcf35c9a8d8de8d8640bbd9e354ff7a47ab

                SHA512

                200d625bc06184644b80193f14dbde949b69bef04c5080ffbf4846cdafd616040c7f6c84e799ab6ea12687155d358e76c54f1c5e294fda390b7962c41bb63e8a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dYK40s33.exe

                Filesize

                350KB

                MD5

                2b4a97fc63630e5ce2886ea554e26d6a

                SHA1

                8c6cc4baa51e79bf3de7754707d4e38810f0544d

                SHA256

                151578fa9910f11d538634cd80ddbbcf35c9a8d8de8d8640bbd9e354ff7a47ab

                SHA512

                200d625bc06184644b80193f14dbde949b69bef04c5080ffbf4846cdafd616040c7f6c84e799ab6ea12687155d358e76c54f1c5e294fda390b7962c41bb63e8a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8310.exe

                Filesize

                345KB

                MD5

                e13da3e4dc497b886478d7e337f55011

                SHA1

                962f24089786f38746e1a52ebe6904e3ae65b8a2

                SHA256

                35e6b3ba96bb447db332afd5eedd0b2940a31e089e74c7de86a73aa67a069211

                SHA512

                6ad993fb38f44f26746cd8938d765debf7af89e04727cb53164e77c81e4028613f031b7c872cd67254e37ade093b7f5cfebfe0327371f25e28fd54f45810722d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8310.exe

                Filesize

                345KB

                MD5

                e13da3e4dc497b886478d7e337f55011

                SHA1

                962f24089786f38746e1a52ebe6904e3ae65b8a2

                SHA256

                35e6b3ba96bb447db332afd5eedd0b2940a31e089e74c7de86a73aa67a069211

                SHA512

                6ad993fb38f44f26746cd8938d765debf7af89e04727cb53164e77c81e4028613f031b7c872cd67254e37ade093b7f5cfebfe0327371f25e28fd54f45810722d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu268617.exe

                Filesize

                12KB

                MD5

                fa86f5f6ddee2857c52dac2287d7dd5c

                SHA1

                47c38edc32ef3bb95ca7d6f7e65147ef403bd239

                SHA256

                57fb1843180fa70925050815a17e20f393a0a5656e78527c23a34c67a94029fd

                SHA512

                e16fd8e9e9fbd5e1a6aedd83122fa9af3d27b4feddf8f46cade4c4aa74b24a78206f75f1cbb286253de1c487738d8fad3da5cc45d0c8570a96ec1df77664d2e8

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu268617.exe

                Filesize

                12KB

                MD5

                fa86f5f6ddee2857c52dac2287d7dd5c

                SHA1

                47c38edc32ef3bb95ca7d6f7e65147ef403bd239

                SHA256

                57fb1843180fa70925050815a17e20f393a0a5656e78527c23a34c67a94029fd

                SHA512

                e16fd8e9e9fbd5e1a6aedd83122fa9af3d27b4feddf8f46cade4c4aa74b24a78206f75f1cbb286253de1c487738d8fad3da5cc45d0c8570a96ec1df77664d2e8

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2757.exe

                Filesize

                292KB

                MD5

                1b905ae82dc20d244ca7fc4b50b076c3

                SHA1

                1d0e5bbc31abc5ea3780a6da0a9b41620360ed85

                SHA256

                e33069fecff46c0d29f7c5e512aab34ee49934fdf9ac990f64da7f3283d74c4e

                SHA512

                6ac344008dfc95750871fd36760e810db697e90452259e87ffb33d1d8a8e8f67727c45fc6cc771e54f5a467951815b9cd940e8d4ce14e070343f48e3c2dcbed6

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2757.exe

                Filesize

                292KB

                MD5

                1b905ae82dc20d244ca7fc4b50b076c3

                SHA1

                1d0e5bbc31abc5ea3780a6da0a9b41620360ed85

                SHA256

                e33069fecff46c0d29f7c5e512aab34ee49934fdf9ac990f64da7f3283d74c4e

                SHA512

                6ac344008dfc95750871fd36760e810db697e90452259e87ffb33d1d8a8e8f67727c45fc6cc771e54f5a467951815b9cd940e8d4ce14e070343f48e3c2dcbed6

              • memory/2084-166-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-182-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-168-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-170-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-172-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-177-0x0000000002830000-0x0000000002840000-memory.dmp

                Filesize

                64KB

              • memory/2084-175-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/2084-181-0x0000000002830000-0x0000000002840000-memory.dmp

                Filesize

                64KB

              • memory/2084-179-0x0000000002830000-0x0000000002840000-memory.dmp

                Filesize

                64KB

              • memory/2084-178-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-174-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-164-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-184-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-186-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-188-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-189-0x0000000000400000-0x000000000070C000-memory.dmp

                Filesize

                3.0MB

              • memory/2084-191-0x0000000000400000-0x000000000070C000-memory.dmp

                Filesize

                3.0MB

              • memory/2084-162-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-160-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-158-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-157-0x0000000000C80000-0x0000000000C92000-memory.dmp

                Filesize

                72KB

              • memory/2084-156-0x0000000000C80000-0x0000000000C98000-memory.dmp

                Filesize

                96KB

              • memory/2084-155-0x0000000004E40000-0x000000000533E000-memory.dmp

                Filesize

                5.0MB

              • memory/2084-154-0x0000000000980000-0x000000000099A000-memory.dmp

                Filesize

                104KB

              • memory/2360-205-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-1114-0x00000000056F0000-0x0000000005756000-memory.dmp

                Filesize

                408KB

              • memory/2360-211-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-213-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-215-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-217-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-219-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-221-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-223-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-225-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-227-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-229-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-231-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-323-0x00000000007F0000-0x000000000083B000-memory.dmp

                Filesize

                300KB

              • memory/2360-324-0x0000000004FF0000-0x0000000005000000-memory.dmp

                Filesize

                64KB

              • memory/2360-326-0x0000000004FF0000-0x0000000005000000-memory.dmp

                Filesize

                64KB

              • memory/2360-328-0x0000000004FF0000-0x0000000005000000-memory.dmp

                Filesize

                64KB

              • memory/2360-1108-0x0000000005B10000-0x0000000006116000-memory.dmp

                Filesize

                6.0MB

              • memory/2360-1109-0x0000000004EA0000-0x0000000004FAA000-memory.dmp

                Filesize

                1.0MB

              • memory/2360-1110-0x0000000002970000-0x0000000002982000-memory.dmp

                Filesize

                72KB

              • memory/2360-1111-0x0000000004FF0000-0x0000000005000000-memory.dmp

                Filesize

                64KB

              • memory/2360-1112-0x0000000002AA0000-0x0000000002ADE000-memory.dmp

                Filesize

                248KB

              • memory/2360-1113-0x0000000002AF0000-0x0000000002B3B000-memory.dmp

                Filesize

                300KB

              • memory/2360-209-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-1115-0x0000000006420000-0x00000000064B2000-memory.dmp

                Filesize

                584KB

              • memory/2360-1116-0x00000000064C0000-0x0000000006536000-memory.dmp

                Filesize

                472KB

              • memory/2360-1117-0x0000000006540000-0x0000000006590000-memory.dmp

                Filesize

                320KB

              • memory/2360-1119-0x0000000004FF0000-0x0000000005000000-memory.dmp

                Filesize

                64KB

              • memory/2360-1120-0x0000000004FF0000-0x0000000005000000-memory.dmp

                Filesize

                64KB

              • memory/2360-1121-0x0000000004FF0000-0x0000000005000000-memory.dmp

                Filesize

                64KB

              • memory/2360-1122-0x00000000066D0000-0x0000000006892000-memory.dmp

                Filesize

                1.8MB

              • memory/2360-1123-0x00000000068B0000-0x0000000006DDC000-memory.dmp

                Filesize

                5.2MB

              • memory/2360-1124-0x0000000004FF0000-0x0000000005000000-memory.dmp

                Filesize

                64KB

              • memory/2360-196-0x0000000002360000-0x00000000023A6000-memory.dmp

                Filesize

                280KB

              • memory/2360-197-0x0000000002640000-0x0000000002684000-memory.dmp

                Filesize

                272KB

              • memory/2360-198-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-199-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-201-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-207-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/2360-203-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/4196-148-0x0000000000EE0000-0x0000000000EEA000-memory.dmp

                Filesize

                40KB

              • memory/4848-1133-0x00000000057B0000-0x00000000057C0000-memory.dmp

                Filesize

                64KB

              • memory/4848-1132-0x00000000057B0000-0x00000000057C0000-memory.dmp

                Filesize

                64KB

              • memory/4848-1131-0x0000000005610000-0x000000000565B000-memory.dmp

                Filesize

                300KB

              • memory/4848-1130-0x0000000000BD0000-0x0000000000C02000-memory.dmp

                Filesize

                200KB