Analysis

  • max time kernel
    123s
  • max time network
    124s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 04:24

General

  • Target

    1803110eace66f762f339c78c01f3a87d2029d20971d155fd02409599cc88e13.exe

  • Size

    1005KB

  • MD5

    48f89f1a6642e2f45ab19a8ccccbbd57

  • SHA1

    361b36063a8f68544f333968c203e3f43cf81193

  • SHA256

    1803110eace66f762f339c78c01f3a87d2029d20971d155fd02409599cc88e13

  • SHA512

    7b6e3d6b3cf3f4b38d0cdbd0274d238fab699831ac06652eba1b47d9d1adfe3b501f92335d6480ba5b56add8b635d4e107b74abc976b66134a28a770260e75d1

  • SSDEEP

    24576:UyNAaCTptLYnvGMm/amadYbZ0mJhm8hag8hY8FBWYH:j2aClqR4aOb2mfLsVBWY

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1803110eace66f762f339c78c01f3a87d2029d20971d155fd02409599cc88e13.exe
    "C:\Users\Admin\AppData\Local\Temp\1803110eace66f762f339c78c01f3a87d2029d20971d155fd02409599cc88e13.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7118.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7118.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6054.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6054.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8641.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8641.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu104537.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu104537.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4316
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4661.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4661.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4204
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dOY13s16.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dOY13s16.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en118550.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en118550.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge875197.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge875197.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4812
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4448
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4408
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5000
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:5084
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5020
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4952
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4288
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4020
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3260
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4704

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Disabling Security Tools

              2
              T1089

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              1
              T1012

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                05945500e6a7c4b81ede73527047be09

                SHA1

                db0b063409898e36cefb5343c7821d8eb0e20a54

                SHA256

                795726fc2b755149c024666b3325dd82e7fad4e9b31d247fe1f2bc1ccc3fe884

                SHA512

                0708ab25526cceae90f37edda577470155b4522af29b03afa02c5abf09fb7c6f1e9170466cdcafc164cbe135e628eea1b155602bbeee63787622e29a8e09aa3f

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                05945500e6a7c4b81ede73527047be09

                SHA1

                db0b063409898e36cefb5343c7821d8eb0e20a54

                SHA256

                795726fc2b755149c024666b3325dd82e7fad4e9b31d247fe1f2bc1ccc3fe884

                SHA512

                0708ab25526cceae90f37edda577470155b4522af29b03afa02c5abf09fb7c6f1e9170466cdcafc164cbe135e628eea1b155602bbeee63787622e29a8e09aa3f

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                05945500e6a7c4b81ede73527047be09

                SHA1

                db0b063409898e36cefb5343c7821d8eb0e20a54

                SHA256

                795726fc2b755149c024666b3325dd82e7fad4e9b31d247fe1f2bc1ccc3fe884

                SHA512

                0708ab25526cceae90f37edda577470155b4522af29b03afa02c5abf09fb7c6f1e9170466cdcafc164cbe135e628eea1b155602bbeee63787622e29a8e09aa3f

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                05945500e6a7c4b81ede73527047be09

                SHA1

                db0b063409898e36cefb5343c7821d8eb0e20a54

                SHA256

                795726fc2b755149c024666b3325dd82e7fad4e9b31d247fe1f2bc1ccc3fe884

                SHA512

                0708ab25526cceae90f37edda577470155b4522af29b03afa02c5abf09fb7c6f1e9170466cdcafc164cbe135e628eea1b155602bbeee63787622e29a8e09aa3f

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                Filesize

                227KB

                MD5

                05945500e6a7c4b81ede73527047be09

                SHA1

                db0b063409898e36cefb5343c7821d8eb0e20a54

                SHA256

                795726fc2b755149c024666b3325dd82e7fad4e9b31d247fe1f2bc1ccc3fe884

                SHA512

                0708ab25526cceae90f37edda577470155b4522af29b03afa02c5abf09fb7c6f1e9170466cdcafc164cbe135e628eea1b155602bbeee63787622e29a8e09aa3f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge875197.exe
                Filesize

                227KB

                MD5

                05945500e6a7c4b81ede73527047be09

                SHA1

                db0b063409898e36cefb5343c7821d8eb0e20a54

                SHA256

                795726fc2b755149c024666b3325dd82e7fad4e9b31d247fe1f2bc1ccc3fe884

                SHA512

                0708ab25526cceae90f37edda577470155b4522af29b03afa02c5abf09fb7c6f1e9170466cdcafc164cbe135e628eea1b155602bbeee63787622e29a8e09aa3f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge875197.exe
                Filesize

                227KB

                MD5

                05945500e6a7c4b81ede73527047be09

                SHA1

                db0b063409898e36cefb5343c7821d8eb0e20a54

                SHA256

                795726fc2b755149c024666b3325dd82e7fad4e9b31d247fe1f2bc1ccc3fe884

                SHA512

                0708ab25526cceae90f37edda577470155b4522af29b03afa02c5abf09fb7c6f1e9170466cdcafc164cbe135e628eea1b155602bbeee63787622e29a8e09aa3f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7118.exe
                Filesize

                822KB

                MD5

                d2971833de976415a4651ee3e6ddccce

                SHA1

                c8ae90cee5e9aeb776bcf1f06e68c67e39c3d7d8

                SHA256

                029159eb6d35606a6a8f79ae7352c79a9552af58ccbf28b5dcc5a9d9e42d5e63

                SHA512

                7311829ed7453a692ee360e993fcf148a9107e81f45942515b5bf361c8e9cf19e4deb61f23fc5e7fde8e7ce8c73c7071bd5505e966d6a51f45ef84bd42dd2b3b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7118.exe
                Filesize

                822KB

                MD5

                d2971833de976415a4651ee3e6ddccce

                SHA1

                c8ae90cee5e9aeb776bcf1f06e68c67e39c3d7d8

                SHA256

                029159eb6d35606a6a8f79ae7352c79a9552af58ccbf28b5dcc5a9d9e42d5e63

                SHA512

                7311829ed7453a692ee360e993fcf148a9107e81f45942515b5bf361c8e9cf19e4deb61f23fc5e7fde8e7ce8c73c7071bd5505e966d6a51f45ef84bd42dd2b3b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en118550.exe
                Filesize

                175KB

                MD5

                9118ed66802fbe5ab7c953ce0bf4468d

                SHA1

                f1a628095fcdc3e6225b5a95ede92e5dc94501bc

                SHA256

                c79bfe53b82e1f76fe44dcdcb35ae17121039e9e2b1004b1eb771571cbfa9c09

                SHA512

                033cea26c541c7e5859f3f4bc8b6b64741be360b793305536dea2bc465e529d159be9bba4e5d665258e21817585b6d888e825db62bfff05da24ea48c08582175

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en118550.exe
                Filesize

                175KB

                MD5

                9118ed66802fbe5ab7c953ce0bf4468d

                SHA1

                f1a628095fcdc3e6225b5a95ede92e5dc94501bc

                SHA256

                c79bfe53b82e1f76fe44dcdcb35ae17121039e9e2b1004b1eb771571cbfa9c09

                SHA512

                033cea26c541c7e5859f3f4bc8b6b64741be360b793305536dea2bc465e529d159be9bba4e5d665258e21817585b6d888e825db62bfff05da24ea48c08582175

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6054.exe
                Filesize

                680KB

                MD5

                74130e67be88558328d84068f64cf5cb

                SHA1

                9267138600a9b3c8e02e142ea84599f558456938

                SHA256

                1de91d2bc583c20378a9cbfc7e8075de486209d1e87a72c98cf4da3c03c639a1

                SHA512

                af3f05328b49b0a198599b5038005450ec668e9b33ca1ffcab9bfbaeb1b5ea1f8f218d81b80953137fd7f05af9b060cf2f85bcfcc07d914db0b3d3eea60ded6b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6054.exe
                Filesize

                680KB

                MD5

                74130e67be88558328d84068f64cf5cb

                SHA1

                9267138600a9b3c8e02e142ea84599f558456938

                SHA256

                1de91d2bc583c20378a9cbfc7e8075de486209d1e87a72c98cf4da3c03c639a1

                SHA512

                af3f05328b49b0a198599b5038005450ec668e9b33ca1ffcab9bfbaeb1b5ea1f8f218d81b80953137fd7f05af9b060cf2f85bcfcc07d914db0b3d3eea60ded6b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dOY13s16.exe
                Filesize

                345KB

                MD5

                f74dc08880d1f978877d420c96c9b462

                SHA1

                59a98355f44baab9fecc54186b2f0313331c26c0

                SHA256

                5a5a1f10e64f0d87a37ef9331bf755007eba8a662dcd4f2ac940b76a8e04d369

                SHA512

                34e97b2d311234b4ac45dba9fa188e2264cfb0ebebc98a6aeed179194526efe7b92daca3f9571b1df0fbb0dc8164d11a51d7dde7e25b260271ad407820747ede

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dOY13s16.exe
                Filesize

                345KB

                MD5

                f74dc08880d1f978877d420c96c9b462

                SHA1

                59a98355f44baab9fecc54186b2f0313331c26c0

                SHA256

                5a5a1f10e64f0d87a37ef9331bf755007eba8a662dcd4f2ac940b76a8e04d369

                SHA512

                34e97b2d311234b4ac45dba9fa188e2264cfb0ebebc98a6aeed179194526efe7b92daca3f9571b1df0fbb0dc8164d11a51d7dde7e25b260271ad407820747ede

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8641.exe
                Filesize

                344KB

                MD5

                35907ee865401b6349747033a3ba4b91

                SHA1

                a0d2ffd5921ef2ceb06a199be5674e065ff7ba29

                SHA256

                b1b9fcf9e31116b4bc991913281016046435d5f914a10c844e71c4cc7cf4c24c

                SHA512

                0cfde5aa8e92b153ce519bec59726136d84507c86bd33bb3d76c909bf25d4771ccea23aecfbb05865834f2a55cde8350ef67601ae9f6e813ead1c8b9c981cd95

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina8641.exe
                Filesize

                344KB

                MD5

                35907ee865401b6349747033a3ba4b91

                SHA1

                a0d2ffd5921ef2ceb06a199be5674e065ff7ba29

                SHA256

                b1b9fcf9e31116b4bc991913281016046435d5f914a10c844e71c4cc7cf4c24c

                SHA512

                0cfde5aa8e92b153ce519bec59726136d84507c86bd33bb3d76c909bf25d4771ccea23aecfbb05865834f2a55cde8350ef67601ae9f6e813ead1c8b9c981cd95

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu104537.exe
                Filesize

                11KB

                MD5

                3cb1768049acea810f774e5322411bc2

                SHA1

                e04d19f0127e366611919b226a2e34b7b655299c

                SHA256

                df99b1482b471387ab39fd89a701dd9a7027d1ca8e6970b7e46329d257df369a

                SHA512

                caf238337af1288f8fbf76ba8fa9dfe788828cf1a1185355cdfb7c890fd28be00b02ab923b1d294a8aac3a08ec615d8e9e2e87f44ef6c651d7cd7ea151f6cb76

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu104537.exe
                Filesize

                11KB

                MD5

                3cb1768049acea810f774e5322411bc2

                SHA1

                e04d19f0127e366611919b226a2e34b7b655299c

                SHA256

                df99b1482b471387ab39fd89a701dd9a7027d1ca8e6970b7e46329d257df369a

                SHA512

                caf238337af1288f8fbf76ba8fa9dfe788828cf1a1185355cdfb7c890fd28be00b02ab923b1d294a8aac3a08ec615d8e9e2e87f44ef6c651d7cd7ea151f6cb76

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4661.exe
                Filesize

                291KB

                MD5

                80284939c3fe409ccab4083c29b81653

                SHA1

                28dcf062d65cb8928bb176a8e9953fa42519af7f

                SHA256

                a3feea48e2f98a3c64c915269eac51ba6d3a28ea281254234793f7abaccd9261

                SHA512

                83f29eaf6f8b28fe2b35c99b46d12e413864422b98a3ebea22cdcfcc3cdb2bd8fb5ab8e6809ced9c7f0350498863d5bd03dc70091cd13af85a74c6eeadf96353

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4661.exe
                Filesize

                291KB

                MD5

                80284939c3fe409ccab4083c29b81653

                SHA1

                28dcf062d65cb8928bb176a8e9953fa42519af7f

                SHA256

                a3feea48e2f98a3c64c915269eac51ba6d3a28ea281254234793f7abaccd9261

                SHA512

                83f29eaf6f8b28fe2b35c99b46d12e413864422b98a3ebea22cdcfcc3cdb2bd8fb5ab8e6809ced9c7f0350498863d5bd03dc70091cd13af85a74c6eeadf96353

              • memory/3028-1117-0x0000000006E80000-0x0000000006ECB000-memory.dmp
                Filesize

                300KB

              • memory/3028-1122-0x00000000060A0000-0x00000000060B0000-memory.dmp
                Filesize

                64KB

              • memory/3028-1128-0x00000000060A0000-0x00000000060B0000-memory.dmp
                Filesize

                64KB

              • memory/3028-1127-0x00000000083F0000-0x0000000008440000-memory.dmp
                Filesize

                320KB

              • memory/3028-1126-0x0000000008370000-0x00000000083E6000-memory.dmp
                Filesize

                472KB

              • memory/3028-1125-0x0000000007AD0000-0x0000000007FFC000-memory.dmp
                Filesize

                5.2MB

              • memory/3028-1124-0x00000000078F0000-0x0000000007AB2000-memory.dmp
                Filesize

                1.8MB

              • memory/3028-1123-0x00000000076D0000-0x0000000007762000-memory.dmp
                Filesize

                584KB

              • memory/3028-1121-0x00000000060A0000-0x00000000060B0000-memory.dmp
                Filesize

                64KB

              • memory/3028-1120-0x00000000060A0000-0x00000000060B0000-memory.dmp
                Filesize

                64KB

              • memory/3028-1119-0x0000000007010000-0x0000000007076000-memory.dmp
                Filesize

                408KB

              • memory/3028-1116-0x0000000006D30000-0x0000000006D6E000-memory.dmp
                Filesize

                248KB

              • memory/3028-1115-0x00000000060A0000-0x00000000060B0000-memory.dmp
                Filesize

                64KB

              • memory/3028-1114-0x0000000006D10000-0x0000000006D22000-memory.dmp
                Filesize

                72KB

              • memory/3028-1113-0x0000000006BD0000-0x0000000006CDA000-memory.dmp
                Filesize

                1.0MB

              • memory/3028-1112-0x00000000065B0000-0x0000000006BB6000-memory.dmp
                Filesize

                6.0MB

              • memory/3028-390-0x00000000060A0000-0x00000000060B0000-memory.dmp
                Filesize

                64KB

              • memory/3028-389-0x00000000060A0000-0x00000000060B0000-memory.dmp
                Filesize

                64KB

              • memory/3028-387-0x00000000060A0000-0x00000000060B0000-memory.dmp
                Filesize

                64KB

              • memory/3028-200-0x0000000003A00000-0x0000000003A46000-memory.dmp
                Filesize

                280KB

              • memory/3028-201-0x0000000006000000-0x0000000006044000-memory.dmp
                Filesize

                272KB

              • memory/3028-202-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-203-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-205-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-207-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-209-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-211-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-213-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-215-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-217-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-219-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-221-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-223-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-225-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-227-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-229-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-231-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-233-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-235-0x0000000006000000-0x000000000603F000-memory.dmp
                Filesize

                252KB

              • memory/3028-386-0x0000000001A30000-0x0000000001A7B000-memory.dmp
                Filesize

                300KB

              • memory/3212-1134-0x0000000000610000-0x0000000000642000-memory.dmp
                Filesize

                200KB

              • memory/3212-1136-0x00000000051C0000-0x00000000051D0000-memory.dmp
                Filesize

                64KB

              • memory/3212-1135-0x0000000005050000-0x000000000509B000-memory.dmp
                Filesize

                300KB

              • memory/4204-177-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-174-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-193-0x0000000004CD0000-0x0000000004CE0000-memory.dmp
                Filesize

                64KB

              • memory/4204-190-0x0000000000400000-0x000000000070B000-memory.dmp
                Filesize

                3.0MB

              • memory/4204-166-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-168-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-179-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-187-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-189-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-170-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-183-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-185-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-181-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-192-0x0000000004CD0000-0x0000000004CE0000-memory.dmp
                Filesize

                64KB

              • memory/4204-175-0x0000000004CD0000-0x0000000004CE0000-memory.dmp
                Filesize

                64KB

              • memory/4204-172-0x0000000004CD0000-0x0000000004CE0000-memory.dmp
                Filesize

                64KB

              • memory/4204-164-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-162-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-194-0x0000000004CD0000-0x0000000004CE0000-memory.dmp
                Filesize

                64KB

              • memory/4204-195-0x0000000000400000-0x000000000070B000-memory.dmp
                Filesize

                3.0MB

              • memory/4204-171-0x0000000004CD0000-0x0000000004CE0000-memory.dmp
                Filesize

                64KB

              • memory/4204-160-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-159-0x0000000004C40000-0x0000000004C52000-memory.dmp
                Filesize

                72KB

              • memory/4204-158-0x0000000004C40000-0x0000000004C58000-memory.dmp
                Filesize

                96KB

              • memory/4204-157-0x0000000004CE0000-0x00000000051DE000-memory.dmp
                Filesize

                5.0MB

              • memory/4204-156-0x0000000000A70000-0x0000000000A8A000-memory.dmp
                Filesize

                104KB

              • memory/4204-155-0x00000000001D0000-0x00000000001FD000-memory.dmp
                Filesize

                180KB

              • memory/4316-149-0x00000000005F0000-0x00000000005FA000-memory.dmp
                Filesize

                40KB