Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/03/2023, 08:23

General

  • Target

    ed1bbcfc7e524428eb73a4ee482885304ed8c27b47de57c14ab2cb9d134409ee.exe

  • Size

    857KB

  • MD5

    a5221f848fc3513b93d189b1b0b8c318

  • SHA1

    db4d01f3c3143b84c72ecfae1d1cb4a2943ea8e0

  • SHA256

    ed1bbcfc7e524428eb73a4ee482885304ed8c27b47de57c14ab2cb9d134409ee

  • SHA512

    9cdfdd592cb582386c93ee7f1f711919258ca0cfbc547b9c14a6bf1b061f21de8fc13cf2f38743a3ea1b988bb4b3956b9c7c6e1386d71076216d64e425358392

  • SSDEEP

    12288:LMrvy90YijVZVUuBhNFNeEYLckEZxup9njrqhUYCIr+qyM0wNmqdqPoAEifYh:wyVijHVUQHeEUemp9jrqhUEjtKoAEl

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

amadey

Version

3.68

C2

193.233.20.25/buH5N004d/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed1bbcfc7e524428eb73a4ee482885304ed8c27b47de57c14ab2cb9d134409ee.exe
    "C:\Users\Admin\AppData\Local\Temp\ed1bbcfc7e524428eb73a4ee482885304ed8c27b47de57c14ab2cb9d134409ee.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptwV0587gi.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptwV0587gi.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptnE1000Fk.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptnE1000Fk.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beVa42Ps67.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beVa42Ps67.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4796
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctEa74Ih06.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctEa74Ih06.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk71ht85SW74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk71ht85SW74.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxWk74yg17.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxWk74yg17.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
        "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3200
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3488
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5016
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "ghaaer.exe" /P "Admin:N"
              5⤵
                PID:4984
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "ghaaer.exe" /P "Admin:R" /E
                5⤵
                  PID:3404
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3892
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\46aee2aca4" /P "Admin:N"
                    5⤵
                      PID:2984
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\46aee2aca4" /P "Admin:R" /E
                      5⤵
                        PID:3284
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4340
              • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                1⤵
                • Executes dropped EXE
                PID:3164
              • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe
                1⤵
                • Executes dropped EXE
                PID:4284

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                Filesize

                235KB

                MD5

                d7a402e768a52059c4192abdf8dbb3d9

                SHA1

                bdef685338fa6371f92f7180fb01f9e92a6a5bf0

                SHA256

                a39d49b7eb69344d177dfd349960faa0fd5527e93ecf2f1b7ac5fb18158dff02

                SHA512

                047b74aef78eaf29f4c68b9c79567a358a11927fe4c04c54dabce842b3c0c356d411b544026ac32ef15951a890b7c792b30d116d133c820ab737e3d079086be9

              • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                Filesize

                235KB

                MD5

                d7a402e768a52059c4192abdf8dbb3d9

                SHA1

                bdef685338fa6371f92f7180fb01f9e92a6a5bf0

                SHA256

                a39d49b7eb69344d177dfd349960faa0fd5527e93ecf2f1b7ac5fb18158dff02

                SHA512

                047b74aef78eaf29f4c68b9c79567a358a11927fe4c04c54dabce842b3c0c356d411b544026ac32ef15951a890b7c792b30d116d133c820ab737e3d079086be9

              • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                Filesize

                235KB

                MD5

                d7a402e768a52059c4192abdf8dbb3d9

                SHA1

                bdef685338fa6371f92f7180fb01f9e92a6a5bf0

                SHA256

                a39d49b7eb69344d177dfd349960faa0fd5527e93ecf2f1b7ac5fb18158dff02

                SHA512

                047b74aef78eaf29f4c68b9c79567a358a11927fe4c04c54dabce842b3c0c356d411b544026ac32ef15951a890b7c792b30d116d133c820ab737e3d079086be9

              • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                Filesize

                235KB

                MD5

                d7a402e768a52059c4192abdf8dbb3d9

                SHA1

                bdef685338fa6371f92f7180fb01f9e92a6a5bf0

                SHA256

                a39d49b7eb69344d177dfd349960faa0fd5527e93ecf2f1b7ac5fb18158dff02

                SHA512

                047b74aef78eaf29f4c68b9c79567a358a11927fe4c04c54dabce842b3c0c356d411b544026ac32ef15951a890b7c792b30d116d133c820ab737e3d079086be9

              • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe

                Filesize

                235KB

                MD5

                d7a402e768a52059c4192abdf8dbb3d9

                SHA1

                bdef685338fa6371f92f7180fb01f9e92a6a5bf0

                SHA256

                a39d49b7eb69344d177dfd349960faa0fd5527e93ecf2f1b7ac5fb18158dff02

                SHA512

                047b74aef78eaf29f4c68b9c79567a358a11927fe4c04c54dabce842b3c0c356d411b544026ac32ef15951a890b7c792b30d116d133c820ab737e3d079086be9

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxWk74yg17.exe

                Filesize

                235KB

                MD5

                d7a402e768a52059c4192abdf8dbb3d9

                SHA1

                bdef685338fa6371f92f7180fb01f9e92a6a5bf0

                SHA256

                a39d49b7eb69344d177dfd349960faa0fd5527e93ecf2f1b7ac5fb18158dff02

                SHA512

                047b74aef78eaf29f4c68b9c79567a358a11927fe4c04c54dabce842b3c0c356d411b544026ac32ef15951a890b7c792b30d116d133c820ab737e3d079086be9

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxWk74yg17.exe

                Filesize

                235KB

                MD5

                d7a402e768a52059c4192abdf8dbb3d9

                SHA1

                bdef685338fa6371f92f7180fb01f9e92a6a5bf0

                SHA256

                a39d49b7eb69344d177dfd349960faa0fd5527e93ecf2f1b7ac5fb18158dff02

                SHA512

                047b74aef78eaf29f4c68b9c79567a358a11927fe4c04c54dabce842b3c0c356d411b544026ac32ef15951a890b7c792b30d116d133c820ab737e3d079086be9

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptwV0587gi.exe

                Filesize

                670KB

                MD5

                e39db1f363fdae4459f8c50510ea982e

                SHA1

                9debc45b410ec1c115819b80950a2f54c522b59d

                SHA256

                073edb8ed03f704dbc7a7034af2bf5aab878b70cf08dc3d804f8450b0c6ea9e2

                SHA512

                c11bc17c948ed565052bcbc3a1bcf8bd5d88d6df43bdc5274506c5bc4b74334b2b87298779785eb04148a7693cebca139a8265a6aa0b95ee6708caac1b9935cf

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptwV0587gi.exe

                Filesize

                670KB

                MD5

                e39db1f363fdae4459f8c50510ea982e

                SHA1

                9debc45b410ec1c115819b80950a2f54c522b59d

                SHA256

                073edb8ed03f704dbc7a7034af2bf5aab878b70cf08dc3d804f8450b0c6ea9e2

                SHA512

                c11bc17c948ed565052bcbc3a1bcf8bd5d88d6df43bdc5274506c5bc4b74334b2b87298779785eb04148a7693cebca139a8265a6aa0b95ee6708caac1b9935cf

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk71ht85SW74.exe

                Filesize

                309KB

                MD5

                c399447de03079c2f5c1482ddeb1706b

                SHA1

                dbeaa79a4b8e1190fc5c054b408948631dac089c

                SHA256

                afce08c2456f2f7a0ca5d02fca432a29b387b7f1d6fb1d58c6fc6da96749f7d7

                SHA512

                3f7001cfb7e54a471786f96c6788858718b867cdcd9c2caabd19018f74228461bcfa45211c11e5a541fdb4fd6c4ff0c330e6b6c8734304d670fc393072480b3c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk71ht85SW74.exe

                Filesize

                309KB

                MD5

                c399447de03079c2f5c1482ddeb1706b

                SHA1

                dbeaa79a4b8e1190fc5c054b408948631dac089c

                SHA256

                afce08c2456f2f7a0ca5d02fca432a29b387b7f1d6fb1d58c6fc6da96749f7d7

                SHA512

                3f7001cfb7e54a471786f96c6788858718b867cdcd9c2caabd19018f74228461bcfa45211c11e5a541fdb4fd6c4ff0c330e6b6c8734304d670fc393072480b3c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptnE1000Fk.exe

                Filesize

                335KB

                MD5

                faa7abc3e9c0d5af9769334d735e7c4a

                SHA1

                609dd8cd3cb8a36f3008caa38bdf9a578f767c28

                SHA256

                66a42039b830884f34b9996c9ea4c2726757f087845ac280c4dbf890534f9528

                SHA512

                52e569909e60c07aed335fa3f7c1cde8bf04c9d45d8400e3cf983c639272d91ea1c8f9a201d6dd0873bee06cbb123c49de4a75519694eea8b8392ab04aec01bd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptnE1000Fk.exe

                Filesize

                335KB

                MD5

                faa7abc3e9c0d5af9769334d735e7c4a

                SHA1

                609dd8cd3cb8a36f3008caa38bdf9a578f767c28

                SHA256

                66a42039b830884f34b9996c9ea4c2726757f087845ac280c4dbf890534f9528

                SHA512

                52e569909e60c07aed335fa3f7c1cde8bf04c9d45d8400e3cf983c639272d91ea1c8f9a201d6dd0873bee06cbb123c49de4a75519694eea8b8392ab04aec01bd

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beVa42Ps67.exe

                Filesize

                250KB

                MD5

                e86d6512a605f1fcd0435b9d980a7473

                SHA1

                3c256c47fc1b8d43a2e64ed7463e47301178380d

                SHA256

                4d3feae0f76c5b673ad0b420fb396e931e93d9bf08629742e2f1a47716ad4ad3

                SHA512

                be1b75490e6a8534eaed0ecb8516ad73e95542787d7123ca205ac52a82637abafe7c44479e2d994e10a221c0b7fe193f3c881d660485a0f415246aa70e7b7d78

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\beVa42Ps67.exe

                Filesize

                250KB

                MD5

                e86d6512a605f1fcd0435b9d980a7473

                SHA1

                3c256c47fc1b8d43a2e64ed7463e47301178380d

                SHA256

                4d3feae0f76c5b673ad0b420fb396e931e93d9bf08629742e2f1a47716ad4ad3

                SHA512

                be1b75490e6a8534eaed0ecb8516ad73e95542787d7123ca205ac52a82637abafe7c44479e2d994e10a221c0b7fe193f3c881d660485a0f415246aa70e7b7d78

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctEa74Ih06.exe

                Filesize

                13KB

                MD5

                765ed2f26c88474cd2fbaebad452990c

                SHA1

                d6922cb3a5c92233e07d57b55fa748dce7e644c0

                SHA256

                194a1e09f24014e3f48216fe698993f1126401412fdb6af625dae84c7028dcfc

                SHA512

                95e8d3844112251e1f5010e8848c946a4db8633be7c55c3541adafee3188208c30bf02e4e777f0e4b1d26819a92d1b6cb6b1c1d5c78c387e2199bef1c8b6377b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ctEa74Ih06.exe

                Filesize

                13KB

                MD5

                765ed2f26c88474cd2fbaebad452990c

                SHA1

                d6922cb3a5c92233e07d57b55fa748dce7e644c0

                SHA256

                194a1e09f24014e3f48216fe698993f1126401412fdb6af625dae84c7028dcfc

                SHA512

                95e8d3844112251e1f5010e8848c946a4db8633be7c55c3541adafee3188208c30bf02e4e777f0e4b1d26819a92d1b6cb6b1c1d5c78c387e2199bef1c8b6377b

              • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                Filesize

                89KB

                MD5

                29b9780bb2992d018ae312ed4180a663

                SHA1

                592a993f9518c1ceab3186a8b5007826fa204b60

                SHA256

                b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                SHA512

                988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

              • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                Filesize

                89KB

                MD5

                29b9780bb2992d018ae312ed4180a663

                SHA1

                592a993f9518c1ceab3186a8b5007826fa204b60

                SHA256

                b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                SHA512

                988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

              • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                Filesize

                89KB

                MD5

                29b9780bb2992d018ae312ed4180a663

                SHA1

                592a993f9518c1ceab3186a8b5007826fa204b60

                SHA256

                b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a

                SHA512

                988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d

              • memory/1096-1108-0x0000000005B30000-0x0000000005B7B000-memory.dmp

                Filesize

                300KB

              • memory/1096-218-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-1120-0x0000000006970000-0x0000000006E9C000-memory.dmp

                Filesize

                5.2MB

              • memory/1096-1119-0x00000000067A0000-0x0000000006962000-memory.dmp

                Filesize

                1.8MB

              • memory/1096-1118-0x0000000002610000-0x0000000002620000-memory.dmp

                Filesize

                64KB

              • memory/1096-1117-0x0000000006750000-0x00000000067A0000-memory.dmp

                Filesize

                320KB

              • memory/1096-1116-0x00000000066A0000-0x0000000006716000-memory.dmp

                Filesize

                472KB

              • memory/1096-1115-0x0000000002610000-0x0000000002620000-memory.dmp

                Filesize

                64KB

              • memory/1096-1114-0x0000000002610000-0x0000000002620000-memory.dmp

                Filesize

                64KB

              • memory/1096-1113-0x0000000002610000-0x0000000002620000-memory.dmp

                Filesize

                64KB

              • memory/1096-1111-0x0000000005D70000-0x0000000005DD6000-memory.dmp

                Filesize

                408KB

              • memory/1096-1110-0x0000000005CD0000-0x0000000005D62000-memory.dmp

                Filesize

                584KB

              • memory/1096-1109-0x0000000002610000-0x0000000002620000-memory.dmp

                Filesize

                64KB

              • memory/1096-1107-0x00000000059E0000-0x0000000005A1E000-memory.dmp

                Filesize

                248KB

              • memory/1096-1106-0x00000000059C0000-0x00000000059D2000-memory.dmp

                Filesize

                72KB

              • memory/1096-1105-0x0000000005880000-0x000000000598A000-memory.dmp

                Filesize

                1.0MB

              • memory/1096-1104-0x0000000005230000-0x0000000005836000-memory.dmp

                Filesize

                6.0MB

              • memory/1096-192-0x0000000002120000-0x0000000002166000-memory.dmp

                Filesize

                280KB

              • memory/1096-193-0x0000000000670000-0x00000000006BB000-memory.dmp

                Filesize

                300KB

              • memory/1096-195-0x0000000002610000-0x0000000002620000-memory.dmp

                Filesize

                64KB

              • memory/1096-196-0x0000000002400000-0x0000000002444000-memory.dmp

                Filesize

                272KB

              • memory/1096-194-0x0000000002610000-0x0000000002620000-memory.dmp

                Filesize

                64KB

              • memory/1096-198-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-197-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-200-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-202-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-204-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-206-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-208-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-212-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-214-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-210-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-216-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-574-0x0000000002610000-0x0000000002620000-memory.dmp

                Filesize

                64KB

              • memory/1096-220-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-222-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-224-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-226-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-228-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/1096-230-0x0000000002400000-0x000000000243E000-memory.dmp

                Filesize

                248KB

              • memory/4412-186-0x0000000000C10000-0x0000000000C1A000-memory.dmp

                Filesize

                40KB

              • memory/4796-172-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-144-0x0000000004FC0000-0x0000000004FD8000-memory.dmp

                Filesize

                96KB

              • memory/4796-158-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-162-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-156-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-164-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-182-0x0000000000400000-0x0000000000582000-memory.dmp

                Filesize

                1.5MB

              • memory/4796-180-0x0000000002560000-0x0000000002570000-memory.dmp

                Filesize

                64KB

              • memory/4796-179-0x0000000002560000-0x0000000002570000-memory.dmp

                Filesize

                64KB

              • memory/4796-178-0x0000000002560000-0x0000000002570000-memory.dmp

                Filesize

                64KB

              • memory/4796-177-0x0000000000400000-0x0000000000582000-memory.dmp

                Filesize

                1.5MB

              • memory/4796-170-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-160-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-174-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-176-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-166-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-154-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-152-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-150-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-149-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-148-0x0000000002560000-0x0000000002570000-memory.dmp

                Filesize

                64KB

              • memory/4796-147-0x0000000002560000-0x0000000002570000-memory.dmp

                Filesize

                64KB

              • memory/4796-146-0x0000000002560000-0x0000000002570000-memory.dmp

                Filesize

                64KB

              • memory/4796-145-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4796-168-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                Filesize

                72KB

              • memory/4796-143-0x0000000004AC0000-0x0000000004FBE000-memory.dmp

                Filesize

                5.0MB

              • memory/4796-142-0x0000000002180000-0x000000000219A000-memory.dmp

                Filesize

                104KB