Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    75s
  • max time network
    79s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/03/2023, 00:35

General

  • Target

    9c5a74ada439a0938e4ff2d44dcd299ecdb4b5328d3eae882a11d612acbf2708.exe

  • Size

    1.2MB

  • MD5

    f1257bbe951db4461f6db7f3f17e586e

  • SHA1

    0abedae176b8b47d8bb469b7296c65179056a89f

  • SHA256

    9c5a74ada439a0938e4ff2d44dcd299ecdb4b5328d3eae882a11d612acbf2708

  • SHA512

    011dbd1fbd7643b14aaff02743bbc497373d519fbd2706117c7219d254d6fef9defcb2edb58c5b71cb034228df2c541a9543c7b09e1362d91123f04f84df16b3

  • SSDEEP

    12288:pMrFy90MxrVgA65oHrBvAyh3+OKmN4w+qLabTFc7ty9bTrRNvYnDfx15LHMmudBI:cy5hVCe6n9bhc7w9f3ExfMddBrKPbL

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

durov

C2

193.56.146.11:4162

Attributes
  • auth_value

    337984645d237df105d30aab7013119f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 15 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c5a74ada439a0938e4ff2d44dcd299ecdb4b5328d3eae882a11d612acbf2708.exe
    "C:\Users\Admin\AppData\Local\Temp\9c5a74ada439a0938e4ff2d44dcd299ecdb4b5328d3eae882a11d612acbf2708.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plqK12XY74.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plqK12XY74.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plCV11sT49.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plCV11sT49.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plOm62Or52.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plOm62Or52.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pltd48Ua89.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pltd48Ua89.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3100
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGC25OT28.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGC25OT28.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5080
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caxO41dX77.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caxO41dX77.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4144
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diMN79pD54.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diMN79pD54.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:328
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esIR87Ji36.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esIR87Ji36.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuIG5380kN15.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuIG5380kN15.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\griT99li07.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\griT99li07.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\griT99li07.exe

    Filesize

    175KB

    MD5

    a3d1bd2c8d8e07333c7d3fce9a8af865

    SHA1

    b93e4472d24549b01f216f2550d0237df8c678ef

    SHA256

    e5337bad38119e06a7f8d6b6346bbd7c88d0ab52dd92ca0596ca7cc08c29abcf

    SHA512

    39e7f845d3c7dd38827148ac3778696fff7f6714d03fa9abd210a9709c470c82d808fa862dc0fd4a96199f0bec9de805bba214565a7d3e5a96f9c7a9e4c15cf3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\griT99li07.exe

    Filesize

    175KB

    MD5

    a3d1bd2c8d8e07333c7d3fce9a8af865

    SHA1

    b93e4472d24549b01f216f2550d0237df8c678ef

    SHA256

    e5337bad38119e06a7f8d6b6346bbd7c88d0ab52dd92ca0596ca7cc08c29abcf

    SHA512

    39e7f845d3c7dd38827148ac3778696fff7f6714d03fa9abd210a9709c470c82d808fa862dc0fd4a96199f0bec9de805bba214565a7d3e5a96f9c7a9e4c15cf3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plqK12XY74.exe

    Filesize

    1.0MB

    MD5

    a1e6e7ffc0f042858fbd61bfb53368b9

    SHA1

    caf41424fe275d2c25adc4d5e62f25b2180fa3c2

    SHA256

    4f355947a9ef20746243e07c315e771e339460b55eda091bd6a831b9ab4595a4

    SHA512

    2584a504e629d5cddc20f24d7a67a62a6c6285b67b52f6196df32e9e2471950f96c97dc55701c0b0d3b880352a015e8a5022986b372d760da0245b2cbb12d75b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plqK12XY74.exe

    Filesize

    1.0MB

    MD5

    a1e6e7ffc0f042858fbd61bfb53368b9

    SHA1

    caf41424fe275d2c25adc4d5e62f25b2180fa3c2

    SHA256

    4f355947a9ef20746243e07c315e771e339460b55eda091bd6a831b9ab4595a4

    SHA512

    2584a504e629d5cddc20f24d7a67a62a6c6285b67b52f6196df32e9e2471950f96c97dc55701c0b0d3b880352a015e8a5022986b372d760da0245b2cbb12d75b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuIG5380kN15.exe

    Filesize

    11KB

    MD5

    1c420bd47a6d502fc547a339e9106b86

    SHA1

    8d7de1494bd7114b5b9873d909a8af8d7e5fcdd4

    SHA256

    dc6650de954640548640046f7b28e5bdb4d76088ad69b9a92c2dca357c17fb9e

    SHA512

    5d4141dfdf1b6d355ad2cb37bd021106661880b9cc05899bd0a4c7a0bdf05e76ec2366b2da1a2fbd572c442c8ac8d7bc70a22bb8ed845704f5ee3c390c10944f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuIG5380kN15.exe

    Filesize

    11KB

    MD5

    1c420bd47a6d502fc547a339e9106b86

    SHA1

    8d7de1494bd7114b5b9873d909a8af8d7e5fcdd4

    SHA256

    dc6650de954640548640046f7b28e5bdb4d76088ad69b9a92c2dca357c17fb9e

    SHA512

    5d4141dfdf1b6d355ad2cb37bd021106661880b9cc05899bd0a4c7a0bdf05e76ec2366b2da1a2fbd572c442c8ac8d7bc70a22bb8ed845704f5ee3c390c10944f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plCV11sT49.exe

    Filesize

    935KB

    MD5

    7154479d1abf3f60ce269d21807b5ded

    SHA1

    c8d1a5eea4747b71f8ad3252535b88e02c5901af

    SHA256

    c026a0c9a9fa68189aeb5fa7dcdcc67049ef87f4e4b5a6148c04620aa614fa37

    SHA512

    4af74aa326cc0d87a5e09c13e4ed1bc737d4db5ba767f8c52a42c417b877d089aec8730a8fc986b388427715e6b08830bd5b69738f245759915f8e19b451bf38

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plCV11sT49.exe

    Filesize

    935KB

    MD5

    7154479d1abf3f60ce269d21807b5ded

    SHA1

    c8d1a5eea4747b71f8ad3252535b88e02c5901af

    SHA256

    c026a0c9a9fa68189aeb5fa7dcdcc67049ef87f4e4b5a6148c04620aa614fa37

    SHA512

    4af74aa326cc0d87a5e09c13e4ed1bc737d4db5ba767f8c52a42c417b877d089aec8730a8fc986b388427715e6b08830bd5b69738f245759915f8e19b451bf38

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esIR87Ji36.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esIR87Ji36.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plOm62Or52.exe

    Filesize

    666KB

    MD5

    a9cf9ee6c111afe327e0b73ef5e536de

    SHA1

    e0babc9555ff8fa40d39c7b5d61933e29c40f4a6

    SHA256

    7e984f059b75d8715c7437e29b49106f9944741e82d07a4405eeca6a59dd589a

    SHA512

    1cecd82124b7246d645e434bfb97198d850f4bd5de0571609862c2d0e3ff2d97a553b3f97ca54753fca8a246bb8f69a7aca82e6cd422ff4a8d423ad4b51d98c9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plOm62Or52.exe

    Filesize

    666KB

    MD5

    a9cf9ee6c111afe327e0b73ef5e536de

    SHA1

    e0babc9555ff8fa40d39c7b5d61933e29c40f4a6

    SHA256

    7e984f059b75d8715c7437e29b49106f9944741e82d07a4405eeca6a59dd589a

    SHA512

    1cecd82124b7246d645e434bfb97198d850f4bd5de0571609862c2d0e3ff2d97a553b3f97ca54753fca8a246bb8f69a7aca82e6cd422ff4a8d423ad4b51d98c9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diMN79pD54.exe

    Filesize

    246KB

    MD5

    fca7bb7fa17349bcd1e9cbcbbf9a69bd

    SHA1

    1f373b9a657e213d7b12f50f4c91a38b6ca6fdab

    SHA256

    60871084d40a6621437ee47f61d1d50c293b72062fcab966b47c67c47f8b96ad

    SHA512

    ffe4a400a692c1bd76288855a0c7de8c64ac7740bbc5c7ec8a8e5edf60d29b636221cbdfda7bdf4f2cfb26464a8199bec33adde663cbed4664962eb0df20698d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diMN79pD54.exe

    Filesize

    246KB

    MD5

    fca7bb7fa17349bcd1e9cbcbbf9a69bd

    SHA1

    1f373b9a657e213d7b12f50f4c91a38b6ca6fdab

    SHA256

    60871084d40a6621437ee47f61d1d50c293b72062fcab966b47c67c47f8b96ad

    SHA512

    ffe4a400a692c1bd76288855a0c7de8c64ac7740bbc5c7ec8a8e5edf60d29b636221cbdfda7bdf4f2cfb26464a8199bec33adde663cbed4664962eb0df20698d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pltd48Ua89.exe

    Filesize

    391KB

    MD5

    3c692ffec4a83501ea3a5907f10e7205

    SHA1

    e578501d96add4b0d6a72fc9b249b7d7e1afe72e

    SHA256

    75e9686c74856500f92eaeb929f2c1b1feff6a76496853a11c439d5662f141fd

    SHA512

    2b50b777fd21c207cf002b22f7d25df55ccd8e585c4c326e27b81d9754c0748844629d2a882b13e4efd9234cfff088f43f23a5558acd2088e83d697575fe7187

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pltd48Ua89.exe

    Filesize

    391KB

    MD5

    3c692ffec4a83501ea3a5907f10e7205

    SHA1

    e578501d96add4b0d6a72fc9b249b7d7e1afe72e

    SHA256

    75e9686c74856500f92eaeb929f2c1b1feff6a76496853a11c439d5662f141fd

    SHA512

    2b50b777fd21c207cf002b22f7d25df55ccd8e585c4c326e27b81d9754c0748844629d2a882b13e4efd9234cfff088f43f23a5558acd2088e83d697575fe7187

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGC25OT28.exe

    Filesize

    11KB

    MD5

    5ab03e3b5394d268b0b5050e00ee7dd7

    SHA1

    4f8a5a02ce795fd916eac5ef09b118f4260535e4

    SHA256

    f6207c55d9132027b40d2199b6908e935b68aada63ffffb3bfd86d6ba3d97f7f

    SHA512

    82dd88533ac9415ceda6a0123470d1596a15be0200d665c234685335ca0a184d3871200f4bb360d0dbc9190dd3bb2c9b74045f3d8064bc14a2047641c3e1379c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGC25OT28.exe

    Filesize

    11KB

    MD5

    5ab03e3b5394d268b0b5050e00ee7dd7

    SHA1

    4f8a5a02ce795fd916eac5ef09b118f4260535e4

    SHA256

    f6207c55d9132027b40d2199b6908e935b68aada63ffffb3bfd86d6ba3d97f7f

    SHA512

    82dd88533ac9415ceda6a0123470d1596a15be0200d665c234685335ca0a184d3871200f4bb360d0dbc9190dd3bb2c9b74045f3d8064bc14a2047641c3e1379c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGC25OT28.exe

    Filesize

    11KB

    MD5

    5ab03e3b5394d268b0b5050e00ee7dd7

    SHA1

    4f8a5a02ce795fd916eac5ef09b118f4260535e4

    SHA256

    f6207c55d9132027b40d2199b6908e935b68aada63ffffb3bfd86d6ba3d97f7f

    SHA512

    82dd88533ac9415ceda6a0123470d1596a15be0200d665c234685335ca0a184d3871200f4bb360d0dbc9190dd3bb2c9b74045f3d8064bc14a2047641c3e1379c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caxO41dX77.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caxO41dX77.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caxO41dX77.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • memory/328-1098-0x00000000020C0000-0x00000000020DA000-memory.dmp

    Filesize

    104KB

  • memory/328-1099-0x00000000024C0000-0x00000000024D8000-memory.dmp

    Filesize

    96KB

  • memory/328-1128-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/328-1129-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/328-1130-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/328-1131-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1656-2051-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1656-1139-0x00000000024D0000-0x0000000002514000-memory.dmp

    Filesize

    272KB

  • memory/1656-1140-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1656-1142-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1656-1145-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1656-2049-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1656-2052-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1656-2053-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/3344-2065-0x0000000004CC0000-0x0000000004D0B000-memory.dmp

    Filesize

    300KB

  • memory/3344-2063-0x0000000000390000-0x00000000003C2000-memory.dmp

    Filesize

    200KB

  • memory/3344-2064-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/4144-172-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-1089-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4144-206-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-208-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-210-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-212-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-214-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-216-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-218-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-220-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-222-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-224-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-228-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-226-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-230-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-232-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-1075-0x0000000005170000-0x0000000005776000-memory.dmp

    Filesize

    6.0MB

  • memory/4144-1076-0x0000000005780000-0x000000000588A000-memory.dmp

    Filesize

    1.0MB

  • memory/4144-1077-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4144-1078-0x0000000005890000-0x00000000058CE000-memory.dmp

    Filesize

    248KB

  • memory/4144-1079-0x00000000059E0000-0x0000000005A2B000-memory.dmp

    Filesize

    300KB

  • memory/4144-1080-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4144-1082-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4144-1083-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4144-1084-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4144-1085-0x0000000005B70000-0x0000000005BD6000-memory.dmp

    Filesize

    408KB

  • memory/4144-1086-0x0000000006230000-0x00000000062C2000-memory.dmp

    Filesize

    584KB

  • memory/4144-1087-0x0000000006420000-0x00000000065E2000-memory.dmp

    Filesize

    1.8MB

  • memory/4144-1088-0x00000000065F0000-0x0000000006B1C000-memory.dmp

    Filesize

    5.2MB

  • memory/4144-204-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-1090-0x0000000006D90000-0x0000000006E06000-memory.dmp

    Filesize

    472KB

  • memory/4144-1091-0x0000000006E20000-0x0000000006E70000-memory.dmp

    Filesize

    320KB

  • memory/4144-202-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-200-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-198-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-196-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-194-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-192-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-190-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-188-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-186-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-184-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-182-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-180-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-178-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-176-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-174-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-169-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4144-171-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4144-168-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-165-0x0000000000660000-0x00000000006AB000-memory.dmp

    Filesize

    300KB

  • memory/4144-167-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4144-166-0x00000000025E0000-0x000000000261E000-memory.dmp

    Filesize

    248KB

  • memory/4144-164-0x00000000025E0000-0x0000000002624000-memory.dmp

    Filesize

    272KB

  • memory/4144-163-0x0000000004C70000-0x000000000516E000-memory.dmp

    Filesize

    5.0MB

  • memory/4144-162-0x0000000002430000-0x0000000002476000-memory.dmp

    Filesize

    280KB

  • memory/5080-156-0x00000000007F0000-0x00000000007FA000-memory.dmp

    Filesize

    40KB