Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    106s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2023, 09:30

General

  • Target

    aeb0a0d5ad8006096b1b8a0ecb1d7e830ff2217e9d897d424d5444801159ebb7.exe

  • Size

    1022KB

  • MD5

    ad22e44656d92230a078ec5a6f22be34

  • SHA1

    69c01439bf05e836fafba91cc8c9aca205632733

  • SHA256

    aeb0a0d5ad8006096b1b8a0ecb1d7e830ff2217e9d897d424d5444801159ebb7

  • SHA512

    ecf250efa482fc5006e9bbaac25e25a34534abd9a75c42f7a078714c9b3c531cfd7e5b6ba2479eef8eda9beb1f85c759926a21aaa8bc52bedbb03cbe374e6b85

  • SSDEEP

    24576:pyMtMj0Wrsm5UoumgDjpjm3uj0vrNrAcyZnV2vi:cMS59bspbj0DZy2

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aeb0a0d5ad8006096b1b8a0ecb1d7e830ff2217e9d897d424d5444801159ebb7.exe
    "C:\Users\Admin\AppData\Local\Temp\aeb0a0d5ad8006096b1b8a0ecb1d7e830ff2217e9d897d424d5444801159ebb7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1122.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1122.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9771.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9771.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4224.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4224.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1516
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus4031.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus4031.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4592
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2974.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2974.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3868
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 1012
              6⤵
              • Program crash
              PID:5032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBg27s98.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBg27s98.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4460
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1316
            5⤵
            • Program crash
            PID:4432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en185297.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en185297.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge863936.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge863936.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1196
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4908
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3376
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:1344
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5052
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:688
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4504
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1896
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3868 -ip 3868
                1⤵
                  PID:4076
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4460 -ip 4460
                  1⤵
                    PID:536
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4700

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge863936.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge863936.exe

                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1122.exe

                    Filesize

                    839KB

                    MD5

                    1e597aa9158707af66890e85f2797ed6

                    SHA1

                    d7e46a48fcbc6ff3b5562f691941c7530d79dc64

                    SHA256

                    4f5d89e692aec0a0ffdbf223ac282153f0d3b13648bc4d2a2b93d32ffe9373ac

                    SHA512

                    574702c1969bf8016865e6dd413aa0cb811dbe6a8e82deea59a566900917024623fa7b987d18eb08d02d80a1ae907e0f4e925b370dce7dc0a2482ca476faa260

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino1122.exe

                    Filesize

                    839KB

                    MD5

                    1e597aa9158707af66890e85f2797ed6

                    SHA1

                    d7e46a48fcbc6ff3b5562f691941c7530d79dc64

                    SHA256

                    4f5d89e692aec0a0ffdbf223ac282153f0d3b13648bc4d2a2b93d32ffe9373ac

                    SHA512

                    574702c1969bf8016865e6dd413aa0cb811dbe6a8e82deea59a566900917024623fa7b987d18eb08d02d80a1ae907e0f4e925b370dce7dc0a2482ca476faa260

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en185297.exe

                    Filesize

                    175KB

                    MD5

                    581e8f97deca3769f1bc14882c9f26dc

                    SHA1

                    b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                    SHA256

                    b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                    SHA512

                    f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en185297.exe

                    Filesize

                    175KB

                    MD5

                    581e8f97deca3769f1bc14882c9f26dc

                    SHA1

                    b69eb0b0c175888de0fa1ea7a0a045d69138d18e

                    SHA256

                    b277fd59e05cce33d218d0e9720f041eff2d7a5477b1e2843a6123aad307cd86

                    SHA512

                    f56835f4598bb5b121071373d760facd9173efdfadb741f99e3752c825f558b92922a3813606130ff0ed0f886d2d2858a0412d42284d3a941f0702d08eaec065

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9771.exe

                    Filesize

                    697KB

                    MD5

                    4a55433566fc0636768608520170a4c6

                    SHA1

                    d7640972dc808630fec0fab1f44459fb55f5a5ca

                    SHA256

                    923c7708151fc11b38310069103cfd30df161ed5505585be22b9fd3a2c270bc8

                    SHA512

                    77199d51f216381732635366664fb4eaf03f5eee6ea41f76c0051bd7a3085b06dc9ce09ba91bf1f27e7bd42aabad64e89416a25481316dee7db93c9da2c1345a

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino9771.exe

                    Filesize

                    697KB

                    MD5

                    4a55433566fc0636768608520170a4c6

                    SHA1

                    d7640972dc808630fec0fab1f44459fb55f5a5ca

                    SHA256

                    923c7708151fc11b38310069103cfd30df161ed5505585be22b9fd3a2c270bc8

                    SHA512

                    77199d51f216381732635366664fb4eaf03f5eee6ea41f76c0051bd7a3085b06dc9ce09ba91bf1f27e7bd42aabad64e89416a25481316dee7db93c9da2c1345a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBg27s98.exe

                    Filesize

                    351KB

                    MD5

                    b2d76d2e5ea8f7e76a5ec57c958d7d1d

                    SHA1

                    4c3d3b1d91ce006cbd1dc29a85615fe7eaa26cb4

                    SHA256

                    79e4fe5d8805fea9c824a78bba9ea3794fae89ff1dd2307871e6d5c7e009b04a

                    SHA512

                    2665a1387788f70a557b8d94a7cca827b522c173a0f6e83aec6b13747d027b228987751990992ead8688194cc4be29c3b8bf4799bea1541cc4ca6640f573b476

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dBg27s98.exe

                    Filesize

                    351KB

                    MD5

                    b2d76d2e5ea8f7e76a5ec57c958d7d1d

                    SHA1

                    4c3d3b1d91ce006cbd1dc29a85615fe7eaa26cb4

                    SHA256

                    79e4fe5d8805fea9c824a78bba9ea3794fae89ff1dd2307871e6d5c7e009b04a

                    SHA512

                    2665a1387788f70a557b8d94a7cca827b522c173a0f6e83aec6b13747d027b228987751990992ead8688194cc4be29c3b8bf4799bea1541cc4ca6640f573b476

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4224.exe

                    Filesize

                    345KB

                    MD5

                    a993dc6247168e84ce871d47221551b3

                    SHA1

                    20e6a03ecadaab66244199f198ea45ac271f28f6

                    SHA256

                    7f1cf4ffeaade7833e65959cb38bcd263c8efe3315d5546c2bd805311e9ea5ea

                    SHA512

                    cf97a8788eafcbf8a09be339bbae4b00da6fe71171641c8060cc9c5baf4fe70f762a75d063cc30af6f084093a4a4d8acff7b8af299cd2caf8a9ba9907a3f7c13

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino4224.exe

                    Filesize

                    345KB

                    MD5

                    a993dc6247168e84ce871d47221551b3

                    SHA1

                    20e6a03ecadaab66244199f198ea45ac271f28f6

                    SHA256

                    7f1cf4ffeaade7833e65959cb38bcd263c8efe3315d5546c2bd805311e9ea5ea

                    SHA512

                    cf97a8788eafcbf8a09be339bbae4b00da6fe71171641c8060cc9c5baf4fe70f762a75d063cc30af6f084093a4a4d8acff7b8af299cd2caf8a9ba9907a3f7c13

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus4031.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus4031.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2974.exe

                    Filesize

                    293KB

                    MD5

                    cc9af03237a34a64f43e673cd45ec7e8

                    SHA1

                    5c1b9083659eab3482d91cf1ed4968820edbb62b

                    SHA256

                    5140aa81fb9edbd5b6df4c4c909f12198be3d660e9a982db60e2b12113a870e5

                    SHA512

                    8742adb86156585eb7af318b09cfc148702f2bac2ddd8290df7e9df17835399ebf800967b7adb80d3aece8d33d64ef10775dadf985cb5e000e86ef9236f54e5e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor2974.exe

                    Filesize

                    293KB

                    MD5

                    cc9af03237a34a64f43e673cd45ec7e8

                    SHA1

                    5c1b9083659eab3482d91cf1ed4968820edbb62b

                    SHA256

                    5140aa81fb9edbd5b6df4c4c909f12198be3d660e9a982db60e2b12113a870e5

                    SHA512

                    8742adb86156585eb7af318b09cfc148702f2bac2ddd8290df7e9df17835399ebf800967b7adb80d3aece8d33d64ef10775dadf985cb5e000e86ef9236f54e5e

                  • memory/2968-1139-0x0000000005940000-0x0000000005950000-memory.dmp

                    Filesize

                    64KB

                  • memory/2968-1138-0x0000000000DB0000-0x0000000000DE2000-memory.dmp

                    Filesize

                    200KB

                  • memory/3868-178-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-199-0x0000000000400000-0x000000000070C000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/3868-182-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-184-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-186-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-188-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-190-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-192-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-194-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-196-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-198-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-180-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-200-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3868-201-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3868-202-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3868-204-0x0000000000400000-0x000000000070C000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/3868-176-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-174-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-172-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-171-0x0000000004C80000-0x0000000004C92000-memory.dmp

                    Filesize

                    72KB

                  • memory/3868-170-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3868-169-0x0000000004D90000-0x0000000004DA0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3868-168-0x0000000000860000-0x000000000088D000-memory.dmp

                    Filesize

                    180KB

                  • memory/3868-167-0x0000000004DA0000-0x0000000005344000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4460-212-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-226-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-228-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-230-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-232-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-234-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-236-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-238-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-240-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-242-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-285-0x00000000009C0000-0x0000000000A0B000-memory.dmp

                    Filesize

                    300KB

                  • memory/4460-287-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4460-289-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4460-1118-0x0000000005490000-0x0000000005AA8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/4460-1119-0x0000000005B00000-0x0000000005C0A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4460-1120-0x0000000005C40000-0x0000000005C52000-memory.dmp

                    Filesize

                    72KB

                  • memory/4460-1121-0x0000000005C60000-0x0000000005C9C000-memory.dmp

                    Filesize

                    240KB

                  • memory/4460-1122-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4460-1123-0x0000000005F50000-0x0000000005FB6000-memory.dmp

                    Filesize

                    408KB

                  • memory/4460-1124-0x0000000006600000-0x0000000006692000-memory.dmp

                    Filesize

                    584KB

                  • memory/4460-1125-0x00000000066F0000-0x0000000006766000-memory.dmp

                    Filesize

                    472KB

                  • memory/4460-1126-0x0000000006780000-0x00000000067D0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4460-1128-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4460-1129-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4460-1130-0x0000000006C70000-0x0000000006E32000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4460-224-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-222-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-220-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-218-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-216-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-214-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-210-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-209-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

                    Filesize

                    248KB

                  • memory/4460-1131-0x0000000006E40000-0x000000000736C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4460-1133-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4592-161-0x0000000000900000-0x000000000090A000-memory.dmp

                    Filesize

                    40KB