Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    118s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/03/2023, 07:21

General

  • Target

    c18d8721447fdd190551102864da7fa997250f2878b672dafb2b220026dcd751.exe

  • Size

    1023KB

  • MD5

    dec68136fa165f5b5ebf461dfcd74a5a

  • SHA1

    c66a2d92cf412649bacf06de00f4bfc6359812eb

  • SHA256

    c18d8721447fdd190551102864da7fa997250f2878b672dafb2b220026dcd751

  • SHA512

    05667a002e7a43874f10e2fad81621d594244527c25955f9ea1d69c0e13e11d5cb03312dee15f2f3749d4432e99dbac44b10b866565ae0ecebec6fc48bdbfc4b

  • SSDEEP

    24576:ryX79fr3JJqL1ufU1vijUoQM/f/HsvFqae45UmUv/l:eXZfbJUJKU1qooQMQp5G/

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c18d8721447fdd190551102864da7fa997250f2878b672dafb2b220026dcd751.exe
    "C:\Users\Admin\AppData\Local\Temp\c18d8721447fdd190551102864da7fa997250f2878b672dafb2b220026dcd751.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6898.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6898.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5450.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5450.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1937.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1937.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3832
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8555.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8555.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2320
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7793.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7793.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3168
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSH44s06.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSH44s06.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en968660.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en968660.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge525250.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge525250.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4860
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2240
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5044
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4992
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:1500
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5068
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4968
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3896
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:780
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:3464

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge525250.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge525250.exe

                Filesize

                226KB

                MD5

                8627ebe3777cc777ed2a14b907162224

                SHA1

                06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                SHA256

                319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                SHA512

                9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6898.exe

                Filesize

                841KB

                MD5

                5af1d9a2e1d58efbe1bcb6afc420fdd5

                SHA1

                c05d77500b26026ec515339e1f14d929b0a03b2f

                SHA256

                d4b4f2bf9e143d44bf489eb422c24e5519acd061df99738f32875a792b23a2ce

                SHA512

                be83c688c8199409f798f8416b66fe8892c0a54b8aedc6cd42b0f60d0f192efce8ca1d4d3d2092789b59ec460031e16065359b6f793d65e34d32aca8cddee92f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino6898.exe

                Filesize

                841KB

                MD5

                5af1d9a2e1d58efbe1bcb6afc420fdd5

                SHA1

                c05d77500b26026ec515339e1f14d929b0a03b2f

                SHA256

                d4b4f2bf9e143d44bf489eb422c24e5519acd061df99738f32875a792b23a2ce

                SHA512

                be83c688c8199409f798f8416b66fe8892c0a54b8aedc6cd42b0f60d0f192efce8ca1d4d3d2092789b59ec460031e16065359b6f793d65e34d32aca8cddee92f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en968660.exe

                Filesize

                175KB

                MD5

                581e8f97deca3769f1bc14882c9f26dc

                SHA1

                b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                SHA256

                b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                SHA512

                f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en968660.exe

                Filesize

                175KB

                MD5

                581e8f97deca3769f1bc14882c9f26dc

                SHA1

                b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                SHA256

                b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                SHA512

                f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5450.exe

                Filesize

                699KB

                MD5

                4ab736405e18dd0d15ccaf5c9e48efce

                SHA1

                bf3fd268c07fac09e1339eabcccdb7ce4eb3f78d

                SHA256

                a8b917c0a9fcb978d7d033229a1ca4e176a46ee22bcbbedbbe957fb5580345eb

                SHA512

                9372c2e89f8b99a52e4bb41fbfae11b4644c2b9389900e0208b99e651f25eb53efe1a27b4031c956c59efba7bccb41db3f92f1b322b80e24eaf32eb321b4a6e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino5450.exe

                Filesize

                699KB

                MD5

                4ab736405e18dd0d15ccaf5c9e48efce

                SHA1

                bf3fd268c07fac09e1339eabcccdb7ce4eb3f78d

                SHA256

                a8b917c0a9fcb978d7d033229a1ca4e176a46ee22bcbbedbbe957fb5580345eb

                SHA512

                9372c2e89f8b99a52e4bb41fbfae11b4644c2b9389900e0208b99e651f25eb53efe1a27b4031c956c59efba7bccb41db3f92f1b322b80e24eaf32eb321b4a6e5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSH44s06.exe

                Filesize

                351KB

                MD5

                94ea8b14e8f468843bb82629b28cdcca

                SHA1

                f38867a0f3da1b4258181040d3723849b62fef40

                SHA256

                84474c81a0472188792d8448cc12b1f44abc6617e5da80391091052aed22870c

                SHA512

                695478cdaf005c650ff253065efb7d428c6a89b0d2fc7360de7738988adac20f0e7e4add03ff4a61991a0e5a6513c247eca67f1074925e11bb42d2c12547b6a5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dSH44s06.exe

                Filesize

                351KB

                MD5

                94ea8b14e8f468843bb82629b28cdcca

                SHA1

                f38867a0f3da1b4258181040d3723849b62fef40

                SHA256

                84474c81a0472188792d8448cc12b1f44abc6617e5da80391091052aed22870c

                SHA512

                695478cdaf005c650ff253065efb7d428c6a89b0d2fc7360de7738988adac20f0e7e4add03ff4a61991a0e5a6513c247eca67f1074925e11bb42d2c12547b6a5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1937.exe

                Filesize

                346KB

                MD5

                194559318210e77dd41ec66558eb1c34

                SHA1

                9fdeee4a10b343300b48e8b5023333a623f20b75

                SHA256

                fded8ac29c9042cf4d79dd90208a20e1cfe036ae6673c238e89c898d70d3f8ac

                SHA512

                660c189694c98b036787974d236e707e1f74c4343b495742f09efefe85505890d2ee3562faa02ec2bfacdb9fedd5d43755955dda426b756fb11536cde7067ece

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino1937.exe

                Filesize

                346KB

                MD5

                194559318210e77dd41ec66558eb1c34

                SHA1

                9fdeee4a10b343300b48e8b5023333a623f20b75

                SHA256

                fded8ac29c9042cf4d79dd90208a20e1cfe036ae6673c238e89c898d70d3f8ac

                SHA512

                660c189694c98b036787974d236e707e1f74c4343b495742f09efefe85505890d2ee3562faa02ec2bfacdb9fedd5d43755955dda426b756fb11536cde7067ece

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8555.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8555.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7793.exe

                Filesize

                293KB

                MD5

                c5d18e0be1a888b0da4532b4f7f4b4ef

                SHA1

                8e0c04b9d18f03f3674cbbbdd89f87a4864d89ec

                SHA256

                e2a94dab9c6aaddf810fd0b04f03af185749f2bc3f84661cbe9a9ad68694525d

                SHA512

                3d8f3128893aca119374e1cd98ff04913a4ed74f057634c619cc2af3ec7e708435746ffa9c70c32e8d19326af6e25463d02fe4ff29793f58a325075a25d3ffc9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7793.exe

                Filesize

                293KB

                MD5

                c5d18e0be1a888b0da4532b4f7f4b4ef

                SHA1

                8e0c04b9d18f03f3674cbbbdd89f87a4864d89ec

                SHA256

                e2a94dab9c6aaddf810fd0b04f03af185749f2bc3f84661cbe9a9ad68694525d

                SHA512

                3d8f3128893aca119374e1cd98ff04913a4ed74f057634c619cc2af3ec7e708435746ffa9c70c32e8d19326af6e25463d02fe4ff29793f58a325075a25d3ffc9

              • memory/2320-148-0x00000000007A0000-0x00000000007AA000-memory.dmp

                Filesize

                40KB

              • memory/3168-167-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-187-0x0000000002710000-0x0000000002720000-memory.dmp

                Filesize

                64KB

              • memory/3168-154-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/3168-169-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-171-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-173-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-175-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-177-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-179-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-181-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-183-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-185-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-186-0x0000000002710000-0x0000000002720000-memory.dmp

                Filesize

                64KB

              • memory/3168-165-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-188-0x0000000002710000-0x0000000002720000-memory.dmp

                Filesize

                64KB

              • memory/3168-189-0x0000000000400000-0x000000000070C000-memory.dmp

                Filesize

                3.0MB

              • memory/3168-191-0x0000000000400000-0x000000000070C000-memory.dmp

                Filesize

                3.0MB

              • memory/3168-163-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-161-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-159-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-158-0x00000000026E0000-0x00000000026F2000-memory.dmp

                Filesize

                72KB

              • memory/3168-157-0x00000000026E0000-0x00000000026F8000-memory.dmp

                Filesize

                96KB

              • memory/3168-156-0x0000000004D80000-0x000000000527E000-memory.dmp

                Filesize

                5.0MB

              • memory/3168-155-0x0000000002370000-0x000000000238A000-memory.dmp

                Filesize

                104KB

              • memory/3592-1130-0x00000000002C0000-0x00000000002F2000-memory.dmp

                Filesize

                200KB

              • memory/3592-1132-0x0000000004E50000-0x0000000004E60000-memory.dmp

                Filesize

                64KB

              • memory/3592-1131-0x0000000004D00000-0x0000000004D4B000-memory.dmp

                Filesize

                300KB

              • memory/3636-203-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-215-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-217-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-219-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-221-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-223-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-225-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-227-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-229-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-231-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-388-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3636-387-0x00000000007F0000-0x000000000083B000-memory.dmp

                Filesize

                300KB

              • memory/3636-391-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3636-394-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3636-1108-0x00000000053F0000-0x00000000059F6000-memory.dmp

                Filesize

                6.0MB

              • memory/3636-1109-0x0000000005A00000-0x0000000005B0A000-memory.dmp

                Filesize

                1.0MB

              • memory/3636-1110-0x0000000005B40000-0x0000000005B52000-memory.dmp

                Filesize

                72KB

              • memory/3636-1111-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3636-1112-0x0000000005B60000-0x0000000005B9E000-memory.dmp

                Filesize

                248KB

              • memory/3636-1113-0x0000000005CB0000-0x0000000005CFB000-memory.dmp

                Filesize

                300KB

              • memory/3636-1114-0x0000000005E40000-0x0000000005ED2000-memory.dmp

                Filesize

                584KB

              • memory/3636-1115-0x0000000005EE0000-0x0000000005F46000-memory.dmp

                Filesize

                408KB

              • memory/3636-1116-0x00000000065A0000-0x0000000006616000-memory.dmp

                Filesize

                472KB

              • memory/3636-1117-0x0000000006640000-0x0000000006690000-memory.dmp

                Filesize

                320KB

              • memory/3636-1119-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3636-1120-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3636-1121-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3636-1122-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3636-213-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-211-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-209-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-207-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-205-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-201-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-199-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-198-0x0000000002760000-0x000000000279E000-memory.dmp

                Filesize

                248KB

              • memory/3636-197-0x0000000002760000-0x00000000027A4000-memory.dmp

                Filesize

                272KB

              • memory/3636-196-0x00000000023B0000-0x00000000023F6000-memory.dmp

                Filesize

                280KB

              • memory/3636-1123-0x0000000007B90000-0x0000000007D52000-memory.dmp

                Filesize

                1.8MB

              • memory/3636-1124-0x0000000007D60000-0x000000000828C000-memory.dmp

                Filesize

                5.2MB