Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/03/2023, 12:28

General

  • Target

    675ae593816288a4f6f4f63ec43443d4bb9e8bd8e772ed49c9fa8389cbd10fe6.exe

  • Size

    1003KB

  • MD5

    95ea924c8b415b0f24e61a036767da59

  • SHA1

    2fb398469d5e5afeffc742a395dbeeb074f76798

  • SHA256

    675ae593816288a4f6f4f63ec43443d4bb9e8bd8e772ed49c9fa8389cbd10fe6

  • SHA512

    836887e42e76e15a946c37cf3ce6fe30267a1206c38edf305bbe7774a213e745f1d796cf8b384a771cea7188dbdee8f0ce7b99cc25d93de14e0e24d456353ace

  • SSDEEP

    24576:byedMbFDwdUmnDZnzOc7NyjdexE3xjvob+8/Fgsh:OKgtmnDJN7idieebdgs

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

maxi

C2

193.233.20.30:4125

Attributes
  • auth_value

    6e90da232d4c2e35c1a36c250f5f8904

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\675ae593816288a4f6f4f63ec43443d4bb9e8bd8e772ed49c9fa8389cbd10fe6.exe
    "C:\Users\Admin\AppData\Local\Temp\675ae593816288a4f6f4f63ec43443d4bb9e8bd8e772ed49c9fa8389cbd10fe6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5603.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5603.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7532.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7532.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6488.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6488.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4668
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5220.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5220.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4928
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9230.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9230.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEX31s87.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEX31s87.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en508363.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en508363.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge190975.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge190975.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3664
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4416
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1764
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5096
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:5080
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5112
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:772
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:624
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:356
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:608

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge190975.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge190975.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5603.exe

                Filesize

                821KB

                MD5

                4f19302bbe08d6389626a944637ee878

                SHA1

                09ec61d7570ee80a37333942ae14d5d1eb4109d4

                SHA256

                ab24a5e9cc34fea37d67c2d7b9a3478daed64fb90cea57bac88c2e0d954bf763

                SHA512

                3d1321a40cc790343721c996dc8a725046ee93b820a8b0954959fae107e7e5bdd663cb101cae74cd133bb3c0ed2970694d281e030f118cc878bea8e2e2a14c96

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino5603.exe

                Filesize

                821KB

                MD5

                4f19302bbe08d6389626a944637ee878

                SHA1

                09ec61d7570ee80a37333942ae14d5d1eb4109d4

                SHA256

                ab24a5e9cc34fea37d67c2d7b9a3478daed64fb90cea57bac88c2e0d954bf763

                SHA512

                3d1321a40cc790343721c996dc8a725046ee93b820a8b0954959fae107e7e5bdd663cb101cae74cd133bb3c0ed2970694d281e030f118cc878bea8e2e2a14c96

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en508363.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en508363.exe

                Filesize

                175KB

                MD5

                0bad76cd3276f38206bf62a5f6061853

                SHA1

                e7f11197db98b02eff7904e04e7a3f6af5bfd898

                SHA256

                5ee4a25885ee8a675008057b7e76ee78f1e6750bc65f673ba260e95525588504

                SHA512

                41d3b0443e4aed4e5e6b4ed285edd1c675f21dfd5db6ccf66be11150bb60a5fbb68f79f835516bad143fbe12d4dfef46a4c80852d9332afb3db50316d83f4f59

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7532.exe

                Filesize

                679KB

                MD5

                930e537965573b1fa50ac0b9218e3aff

                SHA1

                1fde7571c4589b39ad5935c21bf1b52867dc6745

                SHA256

                d934d9c508715d87c05f41de2319217c38cf863be3dc0ba574713f90454e91a5

                SHA512

                9dfe75f3cc9b9addf395a116f60f8c3d7ae276f798524473025cb19ae42ac7c715c29f2d01f245daae8b3b0ad22f227150c113a99d3298c50d10ed53dd220b8a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino7532.exe

                Filesize

                679KB

                MD5

                930e537965573b1fa50ac0b9218e3aff

                SHA1

                1fde7571c4589b39ad5935c21bf1b52867dc6745

                SHA256

                d934d9c508715d87c05f41de2319217c38cf863be3dc0ba574713f90454e91a5

                SHA512

                9dfe75f3cc9b9addf395a116f60f8c3d7ae276f798524473025cb19ae42ac7c715c29f2d01f245daae8b3b0ad22f227150c113a99d3298c50d10ed53dd220b8a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEX31s87.exe

                Filesize

                468KB

                MD5

                86487e5dbe3175b9ed312c63d3448d20

                SHA1

                d25e579393311c883a10a725d7eb754c6a6818c3

                SHA256

                5e5b09444047405e0c9d31209d586acecd7a7eeaf2a91b0b47c76f86f0e30c48

                SHA512

                d757f766adf61c1ce686e61d79364665086e6db2d0a7f7513064b8f56a0b3412a337c17e9108048e41987b6636176af799e384c2717c0fe05f3220e52c38791c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dEX31s87.exe

                Filesize

                468KB

                MD5

                86487e5dbe3175b9ed312c63d3448d20

                SHA1

                d25e579393311c883a10a725d7eb754c6a6818c3

                SHA256

                5e5b09444047405e0c9d31209d586acecd7a7eeaf2a91b0b47c76f86f0e30c48

                SHA512

                d757f766adf61c1ce686e61d79364665086e6db2d0a7f7513064b8f56a0b3412a337c17e9108048e41987b6636176af799e384c2717c0fe05f3220e52c38791c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6488.exe

                Filesize

                337KB

                MD5

                a139dcdca20718b558d90a095a2cfcbc

                SHA1

                1f79374e7ad8599ce00f318b9afd51bd81964060

                SHA256

                2ac6234cf9069c2ff173fca3f1c472b21a93c20564c7ef96b7bfd650a9a640ac

                SHA512

                ee7c41e570aaccd7ea9746f61c46ceb00c4fc171e5b5fbc9b2a9a437ff525f8592c3b018644ffeb5c22ce133464638fabdc5144a3373d659b25e979145c11c1f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino6488.exe

                Filesize

                337KB

                MD5

                a139dcdca20718b558d90a095a2cfcbc

                SHA1

                1f79374e7ad8599ce00f318b9afd51bd81964060

                SHA256

                2ac6234cf9069c2ff173fca3f1c472b21a93c20564c7ef96b7bfd650a9a640ac

                SHA512

                ee7c41e570aaccd7ea9746f61c46ceb00c4fc171e5b5fbc9b2a9a437ff525f8592c3b018644ffeb5c22ce133464638fabdc5144a3373d659b25e979145c11c1f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5220.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus5220.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9230.exe

                Filesize

                412KB

                MD5

                2081fa70ef0fc599d0552a916ef7ea61

                SHA1

                f1d9fc5a7a14c59948423a626e10aabde76c2c1c

                SHA256

                4f0115db0dd0dcd59efcba3c9a0532bfc001b687553971d403fc794d6282c199

                SHA512

                daf5aa679fb2ea49e377f27462930f7ce47e986465614a29490552587ba3c14e4da31abb2e5f12c196d9578c7821e7a7f45def075889ea3acb8b44d3369d96da

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9230.exe

                Filesize

                412KB

                MD5

                2081fa70ef0fc599d0552a916ef7ea61

                SHA1

                f1d9fc5a7a14c59948423a626e10aabde76c2c1c

                SHA256

                4f0115db0dd0dcd59efcba3c9a0532bfc001b687553971d403fc794d6282c199

                SHA512

                daf5aa679fb2ea49e377f27462930f7ce47e986465614a29490552587ba3c14e4da31abb2e5f12c196d9578c7821e7a7f45def075889ea3acb8b44d3369d96da

              • memory/3100-162-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-188-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-160-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/3100-164-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-166-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-168-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-170-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-172-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-174-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-176-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-178-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-180-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-182-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-161-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-186-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-184-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/3100-189-0x0000000000400000-0x00000000004E7000-memory.dmp

                Filesize

                924KB

              • memory/3100-190-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/3100-191-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/3100-193-0x0000000000400000-0x00000000004E7000-memory.dmp

                Filesize

                924KB

              • memory/3100-158-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/3100-159-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/3100-157-0x00000000004F0000-0x000000000051D000-memory.dmp

                Filesize

                180KB

              • memory/3100-156-0x00000000024B0000-0x00000000024C8000-memory.dmp

                Filesize

                96KB

              • memory/3100-155-0x0000000004D20000-0x000000000521E000-memory.dmp

                Filesize

                5.0MB

              • memory/3100-154-0x0000000002160000-0x000000000217A000-memory.dmp

                Filesize

                104KB

              • memory/4524-200-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/4524-1113-0x0000000005330000-0x000000000536E000-memory.dmp

                Filesize

                248KB

              • memory/4524-207-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-209-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-211-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-213-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-215-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-217-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-219-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-221-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-223-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-225-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-227-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-229-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-231-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-233-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-235-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-237-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-1110-0x0000000005790000-0x0000000005D96000-memory.dmp

                Filesize

                6.0MB

              • memory/4524-1111-0x00000000051D0000-0x00000000052DA000-memory.dmp

                Filesize

                1.0MB

              • memory/4524-1112-0x0000000005310000-0x0000000005322000-memory.dmp

                Filesize

                72KB

              • memory/4524-205-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-1114-0x0000000005480000-0x00000000054CB000-memory.dmp

                Filesize

                300KB

              • memory/4524-1115-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/4524-1116-0x0000000005610000-0x00000000056A2000-memory.dmp

                Filesize

                584KB

              • memory/4524-1117-0x00000000056B0000-0x0000000005716000-memory.dmp

                Filesize

                408KB

              • memory/4524-1118-0x00000000064A0000-0x0000000006516000-memory.dmp

                Filesize

                472KB

              • memory/4524-1119-0x0000000006530000-0x0000000006580000-memory.dmp

                Filesize

                320KB

              • memory/4524-1121-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/4524-1122-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/4524-1123-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/4524-1124-0x00000000066F0000-0x00000000068B2000-memory.dmp

                Filesize

                1.8MB

              • memory/4524-1125-0x00000000068D0000-0x0000000006DFC000-memory.dmp

                Filesize

                5.2MB

              • memory/4524-1126-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/4524-198-0x00000000023D0000-0x0000000002416000-memory.dmp

                Filesize

                280KB

              • memory/4524-199-0x0000000000710000-0x000000000075B000-memory.dmp

                Filesize

                300KB

              • memory/4524-202-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/4524-204-0x0000000002450000-0x000000000248E000-memory.dmp

                Filesize

                248KB

              • memory/4524-203-0x0000000004B30000-0x0000000004B40000-memory.dmp

                Filesize

                64KB

              • memory/4524-201-0x0000000002450000-0x0000000002494000-memory.dmp

                Filesize

                272KB

              • memory/4900-1134-0x0000000005050000-0x0000000005060000-memory.dmp

                Filesize

                64KB

              • memory/4900-1133-0x0000000004F20000-0x0000000004F6B000-memory.dmp

                Filesize

                300KB

              • memory/4900-1132-0x00000000004E0000-0x0000000000512000-memory.dmp

                Filesize

                200KB

              • memory/4928-148-0x00000000003A0000-0x00000000003AA000-memory.dmp

                Filesize

                40KB