Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 03:14

General

  • Target

    f425bb901bbb8110411e6e735fb15501996e0a5d178df5cda4fe7a592f1febad.exe

  • Size

    893KB

  • MD5

    5934743b44d23a566bc243e76b473317

  • SHA1

    961a4f2f3d790183141de19c84e71494a62c9286

  • SHA256

    f425bb901bbb8110411e6e735fb15501996e0a5d178df5cda4fe7a592f1febad

  • SHA512

    409983978bd72e309338cd678ffc93b6c67579418caa6b6c0998d78260b8fb3595a5b0e88e8aee66497fe03408185e025b07bdf772c2632c46c82a52be50c25e

  • SSDEEP

    12288:FMrIy904hKlqyCILzLYJ7OkBxbY290U8Jyl32b8K+GnyyYPxb0jlHHfReTbuie:9ytgc2YlOM8JL8y3WxAjlpeTb3e

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

amadey

Version

3.68

C2

193.233.20.25/buH5N004d/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f425bb901bbb8110411e6e735fb15501996e0a5d178df5cda4fe7a592f1febad.exe
    "C:\Users\Admin\AppData\Local\Temp\f425bb901bbb8110411e6e735fb15501996e0a5d178df5cda4fe7a592f1febad.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptXY3296oX.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptXY3296oX.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptcY1532rg.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptcY1532rg.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1004
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bedh63gb29.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bedh63gb29.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:624
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 1084
            5⤵
            • Program crash
            PID:4456
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctLw75Mo90.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctLw75Mo90.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk85Uo55Zk88.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk85Uo55Zk88.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3408
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 1428
          4⤵
          • Program crash
          PID:2872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxDq78fz42.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxDq78fz42.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
        "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1916
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1440
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3804
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "ghaaer.exe" /P "Admin:N"
              5⤵
                PID:1340
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "ghaaer.exe" /P "Admin:R" /E
                5⤵
                  PID:3092
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4292
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\46aee2aca4" /P "Admin:N"
                    5⤵
                      PID:4184
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\46aee2aca4" /P "Admin:R" /E
                      5⤵
                        PID:3268
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3276
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 624 -ip 624
                1⤵
                  PID:3012
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3408 -ip 3408
                  1⤵
                    PID:4612
                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3740
                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                    1⤵
                    • Executes dropped EXE
                    PID:512

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    dd0ba71e0dda4ffed7bfb7640dbe4d94

                    SHA1

                    98f55f311abefe9e0555332a4511a6f13af07954

                    SHA256

                    58ea95e8fde82b4bb70d1d27325cb14f06770f5b0bd37e7523b0bf34cb8311ec

                    SHA512

                    4fda3ac1c13a1eca45c5bd233553975f23e48ffae959eb54433377a242b278bae0c416e6a5b97b68aa99811cb16b240707f62ae7bff2adaa51eaad4752ab47e7

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    dd0ba71e0dda4ffed7bfb7640dbe4d94

                    SHA1

                    98f55f311abefe9e0555332a4511a6f13af07954

                    SHA256

                    58ea95e8fde82b4bb70d1d27325cb14f06770f5b0bd37e7523b0bf34cb8311ec

                    SHA512

                    4fda3ac1c13a1eca45c5bd233553975f23e48ffae959eb54433377a242b278bae0c416e6a5b97b68aa99811cb16b240707f62ae7bff2adaa51eaad4752ab47e7

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    dd0ba71e0dda4ffed7bfb7640dbe4d94

                    SHA1

                    98f55f311abefe9e0555332a4511a6f13af07954

                    SHA256

                    58ea95e8fde82b4bb70d1d27325cb14f06770f5b0bd37e7523b0bf34cb8311ec

                    SHA512

                    4fda3ac1c13a1eca45c5bd233553975f23e48ffae959eb54433377a242b278bae0c416e6a5b97b68aa99811cb16b240707f62ae7bff2adaa51eaad4752ab47e7

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    dd0ba71e0dda4ffed7bfb7640dbe4d94

                    SHA1

                    98f55f311abefe9e0555332a4511a6f13af07954

                    SHA256

                    58ea95e8fde82b4bb70d1d27325cb14f06770f5b0bd37e7523b0bf34cb8311ec

                    SHA512

                    4fda3ac1c13a1eca45c5bd233553975f23e48ffae959eb54433377a242b278bae0c416e6a5b97b68aa99811cb16b240707f62ae7bff2adaa51eaad4752ab47e7

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                    Filesize

                    235KB

                    MD5

                    dd0ba71e0dda4ffed7bfb7640dbe4d94

                    SHA1

                    98f55f311abefe9e0555332a4511a6f13af07954

                    SHA256

                    58ea95e8fde82b4bb70d1d27325cb14f06770f5b0bd37e7523b0bf34cb8311ec

                    SHA512

                    4fda3ac1c13a1eca45c5bd233553975f23e48ffae959eb54433377a242b278bae0c416e6a5b97b68aa99811cb16b240707f62ae7bff2adaa51eaad4752ab47e7

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxDq78fz42.exe

                    Filesize

                    235KB

                    MD5

                    dd0ba71e0dda4ffed7bfb7640dbe4d94

                    SHA1

                    98f55f311abefe9e0555332a4511a6f13af07954

                    SHA256

                    58ea95e8fde82b4bb70d1d27325cb14f06770f5b0bd37e7523b0bf34cb8311ec

                    SHA512

                    4fda3ac1c13a1eca45c5bd233553975f23e48ffae959eb54433377a242b278bae0c416e6a5b97b68aa99811cb16b240707f62ae7bff2adaa51eaad4752ab47e7

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxDq78fz42.exe

                    Filesize

                    235KB

                    MD5

                    dd0ba71e0dda4ffed7bfb7640dbe4d94

                    SHA1

                    98f55f311abefe9e0555332a4511a6f13af07954

                    SHA256

                    58ea95e8fde82b4bb70d1d27325cb14f06770f5b0bd37e7523b0bf34cb8311ec

                    SHA512

                    4fda3ac1c13a1eca45c5bd233553975f23e48ffae959eb54433377a242b278bae0c416e6a5b97b68aa99811cb16b240707f62ae7bff2adaa51eaad4752ab47e7

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptXY3296oX.exe

                    Filesize

                    706KB

                    MD5

                    bf500f783b1bad50b79e77d1a4308b13

                    SHA1

                    d3400c8f7bcfd37488004b5beb60c376f3f76d2d

                    SHA256

                    96b4bc48c91ac1fae1d1d6c755589a0ee8b381122c4c85ccc1581e8d098bc60b

                    SHA512

                    001265a420ba95a10864b2a50fe482bc64ec81797eb20739d6ee5fb5a89a4e306ec08fe5e05aff8a0b255c26ff7a7effefec4f4080dbaf0e04ba586481af4b81

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptXY3296oX.exe

                    Filesize

                    706KB

                    MD5

                    bf500f783b1bad50b79e77d1a4308b13

                    SHA1

                    d3400c8f7bcfd37488004b5beb60c376f3f76d2d

                    SHA256

                    96b4bc48c91ac1fae1d1d6c755589a0ee8b381122c4c85ccc1581e8d098bc60b

                    SHA512

                    001265a420ba95a10864b2a50fe482bc64ec81797eb20739d6ee5fb5a89a4e306ec08fe5e05aff8a0b255c26ff7a7effefec4f4080dbaf0e04ba586481af4b81

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk85Uo55Zk88.exe

                    Filesize

                    410KB

                    MD5

                    4a99afd6ed76b99078df204b18a8b896

                    SHA1

                    f31f5bc1af96226972ccb4f09f31e951bf8c8c50

                    SHA256

                    ef798a02a3eb5140e2cf2f4a5cc1baa245c94df5a355e26fb5e1371f7f832473

                    SHA512

                    79d7fe86efd6624e78af1bdd89713ccf1a0de364ce87a1b1faa904643d5efe003e2083134cd99f78dde26c4587cee6fa8fa02153cbd24a452c49a1e95d94c6d4

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk85Uo55Zk88.exe

                    Filesize

                    410KB

                    MD5

                    4a99afd6ed76b99078df204b18a8b896

                    SHA1

                    f31f5bc1af96226972ccb4f09f31e951bf8c8c50

                    SHA256

                    ef798a02a3eb5140e2cf2f4a5cc1baa245c94df5a355e26fb5e1371f7f832473

                    SHA512

                    79d7fe86efd6624e78af1bdd89713ccf1a0de364ce87a1b1faa904643d5efe003e2083134cd99f78dde26c4587cee6fa8fa02153cbd24a452c49a1e95d94c6d4

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptcY1532rg.exe

                    Filesize

                    353KB

                    MD5

                    9593adc2f9a0670b2302c7d4237b942c

                    SHA1

                    bd7a0850929f3d553958c9c936f79bd5e2195772

                    SHA256

                    e8667d46bf71433bde1cc3aa47a67341fbd805fb48565e929052fbe617f437ea

                    SHA512

                    56462a34c49c862052b49d20e1ef087ef3f7bc41ac09603756ec2a56e75c151c8ddc8736bd417988209a484f2c8669078ba4c6d2fe37834766019ed0915e6e00

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptcY1532rg.exe

                    Filesize

                    353KB

                    MD5

                    9593adc2f9a0670b2302c7d4237b942c

                    SHA1

                    bd7a0850929f3d553958c9c936f79bd5e2195772

                    SHA256

                    e8667d46bf71433bde1cc3aa47a67341fbd805fb48565e929052fbe617f437ea

                    SHA512

                    56462a34c49c862052b49d20e1ef087ef3f7bc41ac09603756ec2a56e75c151c8ddc8736bd417988209a484f2c8669078ba4c6d2fe37834766019ed0915e6e00

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bedh63gb29.exe

                    Filesize

                    352KB

                    MD5

                    946e45ca9ca57dbee2abd7de33d70086

                    SHA1

                    9003d342bb7b083b73c7b67e3a8059e1826d9695

                    SHA256

                    aa2990a947b4f237d68abb0193d1da436930d427eced5942132bd24fd0bd3bd9

                    SHA512

                    00743633925a810ce584991704d25034fd3d407838b245d456da54572b3558589acfa5dcbabf9ab09621f143dfc78767cfc979c18346a1e6baa55648405c8c3d

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bedh63gb29.exe

                    Filesize

                    352KB

                    MD5

                    946e45ca9ca57dbee2abd7de33d70086

                    SHA1

                    9003d342bb7b083b73c7b67e3a8059e1826d9695

                    SHA256

                    aa2990a947b4f237d68abb0193d1da436930d427eced5942132bd24fd0bd3bd9

                    SHA512

                    00743633925a810ce584991704d25034fd3d407838b245d456da54572b3558589acfa5dcbabf9ab09621f143dfc78767cfc979c18346a1e6baa55648405c8c3d

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctLw75Mo90.exe

                    Filesize

                    13KB

                    MD5

                    edfaa9815ca76a85d80fdb86864d7e8f

                    SHA1

                    ce526b83a7d0757fdd6e62e7cf95d43533b8f7bd

                    SHA256

                    27f9d7e05c634c1fb45540a94cb92074f7ccef3daf868f66703fddf7d440bf6a

                    SHA512

                    776977a14cbccc0ec7fbb5f12713dd8b8bea0884f184a5f532c16c96d3dcb48a15c4fd5e018bd69580e07b09d7d4fa84e03590acb41ce95530bea02028f77cce

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctLw75Mo90.exe

                    Filesize

                    13KB

                    MD5

                    edfaa9815ca76a85d80fdb86864d7e8f

                    SHA1

                    ce526b83a7d0757fdd6e62e7cf95d43533b8f7bd

                    SHA256

                    27f9d7e05c634c1fb45540a94cb92074f7ccef3daf868f66703fddf7d440bf6a

                    SHA512

                    776977a14cbccc0ec7fbb5f12713dd8b8bea0884f184a5f532c16c96d3dcb48a15c4fd5e018bd69580e07b09d7d4fa84e03590acb41ce95530bea02028f77cce

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    29b9780bb2992d018ae312ed4180a663

                    SHA1

                    592a993f9518c1ceab3186a8b5007826fa204b60

                    SHA256

                    b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                    SHA512

                    988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • memory/624-172-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-192-0x0000000000400000-0x0000000002BC5000-memory.dmp

                    Filesize

                    39.8MB

                  • memory/624-174-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-176-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-178-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-180-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-182-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-184-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-186-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-187-0x0000000000400000-0x0000000002BC5000-memory.dmp

                    Filesize

                    39.8MB

                  • memory/624-188-0x0000000007460000-0x0000000007470000-memory.dmp

                    Filesize

                    64KB

                  • memory/624-189-0x0000000007460000-0x0000000007470000-memory.dmp

                    Filesize

                    64KB

                  • memory/624-190-0x0000000007460000-0x0000000007470000-memory.dmp

                    Filesize

                    64KB

                  • memory/624-170-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-155-0x0000000002BD0000-0x0000000002BFD000-memory.dmp

                    Filesize

                    180KB

                  • memory/624-168-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-166-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-164-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-162-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-160-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-159-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/624-158-0x0000000007470000-0x0000000007A14000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/624-157-0x0000000007460000-0x0000000007470000-memory.dmp

                    Filesize

                    64KB

                  • memory/624-156-0x0000000007460000-0x0000000007470000-memory.dmp

                    Filesize

                    64KB

                  • memory/1724-196-0x0000000000950000-0x000000000095A000-memory.dmp

                    Filesize

                    40KB

                  • memory/3408-209-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-223-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-225-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-227-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-229-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-231-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-233-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-235-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-488-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

                    Filesize

                    300KB

                  • memory/3408-489-0x0000000004860000-0x0000000004870000-memory.dmp

                    Filesize

                    64KB

                  • memory/3408-491-0x0000000004860000-0x0000000004870000-memory.dmp

                    Filesize

                    64KB

                  • memory/3408-494-0x0000000004860000-0x0000000004870000-memory.dmp

                    Filesize

                    64KB

                  • memory/3408-1112-0x0000000007920000-0x0000000007F38000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/3408-1113-0x0000000007FC0000-0x00000000080CA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/3408-1114-0x0000000008100000-0x0000000008112000-memory.dmp

                    Filesize

                    72KB

                  • memory/3408-1115-0x0000000004860000-0x0000000004870000-memory.dmp

                    Filesize

                    64KB

                  • memory/3408-1116-0x0000000008120000-0x000000000815C000-memory.dmp

                    Filesize

                    240KB

                  • memory/3408-1118-0x0000000004860000-0x0000000004870000-memory.dmp

                    Filesize

                    64KB

                  • memory/3408-1119-0x0000000004860000-0x0000000004870000-memory.dmp

                    Filesize

                    64KB

                  • memory/3408-1120-0x0000000004860000-0x0000000004870000-memory.dmp

                    Filesize

                    64KB

                  • memory/3408-1121-0x0000000004860000-0x0000000004870000-memory.dmp

                    Filesize

                    64KB

                  • memory/3408-1123-0x0000000008560000-0x00000000085F2000-memory.dmp

                    Filesize

                    584KB

                  • memory/3408-1124-0x0000000008600000-0x0000000008666000-memory.dmp

                    Filesize

                    408KB

                  • memory/3408-1125-0x0000000008F50000-0x0000000009112000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/3408-1126-0x0000000009130000-0x000000000965C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/3408-1127-0x000000000AA70000-0x000000000AAE6000-memory.dmp

                    Filesize

                    472KB

                  • memory/3408-221-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-219-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-217-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-215-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-213-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-211-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-207-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-205-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-203-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-202-0x0000000004B70000-0x0000000004BAE000-memory.dmp

                    Filesize

                    248KB

                  • memory/3408-1128-0x000000000AB00000-0x000000000AB50000-memory.dmp

                    Filesize

                    320KB