Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    99s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 05:22

General

  • Target

    0584ecbaabc0a844e598c67305efcd50956aedef6fdaafbf2985d8dcac39a168.exe

  • Size

    1.0MB

  • MD5

    35f6c3cef249b3ad0e6c3dbf5cd62a57

  • SHA1

    ed951205a42f7b14a16192578321bf970f40e881

  • SHA256

    0584ecbaabc0a844e598c67305efcd50956aedef6fdaafbf2985d8dcac39a168

  • SHA512

    0c8b82c9fd5a2cde4866e3ef0127b39ed6a70c72ca611da7e31b70e0cd2da2a00bbfaa566c8f6c68527e4b87feefd2a1e5a55cb058d63f983dd6e9b7a9e60753

  • SSDEEP

    24576:hy9hBxvikn+qJ3EFk9LLX8iZgwGoy4iKOaMgU4fvNHtCbd:U9hBhLJ0Fk9LLTPw4iRavtts

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

reiv

C2

193.233.20.33:4125

Attributes
  • auth_value

    5e0113277ad2cf97a9b7e175007f1c55

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0584ecbaabc0a844e598c67305efcd50956aedef6fdaafbf2985d8dcac39a168.exe
    "C:\Users\Admin\AppData\Local\Temp\0584ecbaabc0a844e598c67305efcd50956aedef6fdaafbf2985d8dcac39a168.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3801.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3801.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3886.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3886.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6014.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6014.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4884
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu603517.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu603517.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4412
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8113.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8113.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4448
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dUd42s26.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dUd42s26.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en163887.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en163887.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge593464.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge593464.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3384
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5032
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4992
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:5000
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4976
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4916
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:4944
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:4920
              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                1⤵
                • Executes dropped EXE
                PID:4872

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                4426f372e10f0b33971de5766b448ad6

                SHA1

                957ae6513fb11d4c390ad86388aec44eb90440b5

                SHA256

                e32c11579baa176e4f4efad00af389e6145f56e806a8257de97caf055eb21b20

                SHA512

                6104f1b181366f5879799134342a1553fa57a4bc9260fd1b83892c1068b2126766f8b7aed7d191cbc016ea1dcc898490e34b7f0921ee520de937a03251a26769

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                4426f372e10f0b33971de5766b448ad6

                SHA1

                957ae6513fb11d4c390ad86388aec44eb90440b5

                SHA256

                e32c11579baa176e4f4efad00af389e6145f56e806a8257de97caf055eb21b20

                SHA512

                6104f1b181366f5879799134342a1553fa57a4bc9260fd1b83892c1068b2126766f8b7aed7d191cbc016ea1dcc898490e34b7f0921ee520de937a03251a26769

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                4426f372e10f0b33971de5766b448ad6

                SHA1

                957ae6513fb11d4c390ad86388aec44eb90440b5

                SHA256

                e32c11579baa176e4f4efad00af389e6145f56e806a8257de97caf055eb21b20

                SHA512

                6104f1b181366f5879799134342a1553fa57a4bc9260fd1b83892c1068b2126766f8b7aed7d191cbc016ea1dcc898490e34b7f0921ee520de937a03251a26769

              • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                Filesize

                227KB

                MD5

                4426f372e10f0b33971de5766b448ad6

                SHA1

                957ae6513fb11d4c390ad86388aec44eb90440b5

                SHA256

                e32c11579baa176e4f4efad00af389e6145f56e806a8257de97caf055eb21b20

                SHA512

                6104f1b181366f5879799134342a1553fa57a4bc9260fd1b83892c1068b2126766f8b7aed7d191cbc016ea1dcc898490e34b7f0921ee520de937a03251a26769

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge593464.exe

                Filesize

                227KB

                MD5

                4426f372e10f0b33971de5766b448ad6

                SHA1

                957ae6513fb11d4c390ad86388aec44eb90440b5

                SHA256

                e32c11579baa176e4f4efad00af389e6145f56e806a8257de97caf055eb21b20

                SHA512

                6104f1b181366f5879799134342a1553fa57a4bc9260fd1b83892c1068b2126766f8b7aed7d191cbc016ea1dcc898490e34b7f0921ee520de937a03251a26769

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge593464.exe

                Filesize

                227KB

                MD5

                4426f372e10f0b33971de5766b448ad6

                SHA1

                957ae6513fb11d4c390ad86388aec44eb90440b5

                SHA256

                e32c11579baa176e4f4efad00af389e6145f56e806a8257de97caf055eb21b20

                SHA512

                6104f1b181366f5879799134342a1553fa57a4bc9260fd1b83892c1068b2126766f8b7aed7d191cbc016ea1dcc898490e34b7f0921ee520de937a03251a26769

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3801.exe

                Filesize

                842KB

                MD5

                bdb9d3605bb09b0a8bf7955e39e2af30

                SHA1

                f0697c51c676e6a92b9e2534b96bcd1457896805

                SHA256

                1f5df75c0d7f9a6cd2f36614134a0ecce55762036ac3c71c88cc3f95b4a072c4

                SHA512

                a6ca19f75c03f7cc80234a73299603dfda252d71d4d88c4e753fec1d841959a7680d62fa0f729ed16f90a777682d377b448a42aa1519262921918fffc7ced6c0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina3801.exe

                Filesize

                842KB

                MD5

                bdb9d3605bb09b0a8bf7955e39e2af30

                SHA1

                f0697c51c676e6a92b9e2534b96bcd1457896805

                SHA256

                1f5df75c0d7f9a6cd2f36614134a0ecce55762036ac3c71c88cc3f95b4a072c4

                SHA512

                a6ca19f75c03f7cc80234a73299603dfda252d71d4d88c4e753fec1d841959a7680d62fa0f729ed16f90a777682d377b448a42aa1519262921918fffc7ced6c0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en163887.exe

                Filesize

                175KB

                MD5

                fe0ca3888dbac4f98f03a208601a5f8a

                SHA1

                db5f19d97fa8396b1d0a362fc7b4cedef6ab4a83

                SHA256

                2bb27120fbaf67bb517600b837703600f0033c6610d2c941142b681b12f36e19

                SHA512

                b53d9e629330ddf5f3ccbf7faa33aa653635dea47b31f7f6323f13c0304b36ac1cf5eb8fb1a49af3df645898a9df57f51e7e83fcf184c3b2261c841d041ce409

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en163887.exe

                Filesize

                175KB

                MD5

                fe0ca3888dbac4f98f03a208601a5f8a

                SHA1

                db5f19d97fa8396b1d0a362fc7b4cedef6ab4a83

                SHA256

                2bb27120fbaf67bb517600b837703600f0033c6610d2c941142b681b12f36e19

                SHA512

                b53d9e629330ddf5f3ccbf7faa33aa653635dea47b31f7f6323f13c0304b36ac1cf5eb8fb1a49af3df645898a9df57f51e7e83fcf184c3b2261c841d041ce409

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3886.exe

                Filesize

                699KB

                MD5

                8517f22ee45a36fcd8b7f5d7bf34f448

                SHA1

                1fca4c4f415c0864502ae6d3bb9a8e922b26b59a

                SHA256

                73102c8ed6afed7f2206a2f5762debef2375588237390ab3f29382c0f5ce974e

                SHA512

                ee5d27bce9153fe2e148d46b60045a8f068e8e7be3cbf70612454c7fe77a21c243f0eb01e6ea87df8d4ea507b51cae871eab03f781a5586111d0e1ac1379887f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina3886.exe

                Filesize

                699KB

                MD5

                8517f22ee45a36fcd8b7f5d7bf34f448

                SHA1

                1fca4c4f415c0864502ae6d3bb9a8e922b26b59a

                SHA256

                73102c8ed6afed7f2206a2f5762debef2375588237390ab3f29382c0f5ce974e

                SHA512

                ee5d27bce9153fe2e148d46b60045a8f068e8e7be3cbf70612454c7fe77a21c243f0eb01e6ea87df8d4ea507b51cae871eab03f781a5586111d0e1ac1379887f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dUd42s26.exe

                Filesize

                359KB

                MD5

                3904ec310d7b4aad8a4579881333a796

                SHA1

                4a3a97cb6c7551169947f98ac5d5940efb71b031

                SHA256

                4bca1cc4c20c3429b841a57ebb9cf4a6ed182370f1de7c9d8295a12dc7cb136a

                SHA512

                3a9cb2561af139735676c9ddeb1e7f53629e6435a719063f3a5ad955945c9abdd39cd7176ea44df8b734b288cb243854304ca7f7ee22fdc13ceb0333e100ce4d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dUd42s26.exe

                Filesize

                359KB

                MD5

                3904ec310d7b4aad8a4579881333a796

                SHA1

                4a3a97cb6c7551169947f98ac5d5940efb71b031

                SHA256

                4bca1cc4c20c3429b841a57ebb9cf4a6ed182370f1de7c9d8295a12dc7cb136a

                SHA512

                3a9cb2561af139735676c9ddeb1e7f53629e6435a719063f3a5ad955945c9abdd39cd7176ea44df8b734b288cb243854304ca7f7ee22fdc13ceb0333e100ce4d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6014.exe

                Filesize

                346KB

                MD5

                9bd010a7e9799a0e6e8ef9adaa60a5cb

                SHA1

                c38b820573122026d4838d72ab7f24f175007fe4

                SHA256

                154f915990e6126d22634cd2615b464c86c2f5d420aadf3dd4488f0af62ce670

                SHA512

                6bab28206782287eee4204c2118079866ab5b3fa7f85dc9c05e82cb43766c249c68782b8fab2ebbd16d5e5a4c358f4dcb6b685509d7833b55ce378c9e43e728c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6014.exe

                Filesize

                346KB

                MD5

                9bd010a7e9799a0e6e8ef9adaa60a5cb

                SHA1

                c38b820573122026d4838d72ab7f24f175007fe4

                SHA256

                154f915990e6126d22634cd2615b464c86c2f5d420aadf3dd4488f0af62ce670

                SHA512

                6bab28206782287eee4204c2118079866ab5b3fa7f85dc9c05e82cb43766c249c68782b8fab2ebbd16d5e5a4c358f4dcb6b685509d7833b55ce378c9e43e728c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu603517.exe

                Filesize

                12KB

                MD5

                893392084b653859a026ab269a29784c

                SHA1

                d1e4ee69b91c71b392fd03f862711ca1e2aae80c

                SHA256

                0163732e696d36b9714cafb23954712bfb9646e6eb2e5ce047cb1d6c908af6ad

                SHA512

                1b0edaaed51a0e6cd8f624e816b26af0d301b76741c328db2532e0e725f12b4e488034291da1cc09fc55b7aab9e9e93de9c1fa9cca084d48fe22edb144dff8e9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu603517.exe

                Filesize

                12KB

                MD5

                893392084b653859a026ab269a29784c

                SHA1

                d1e4ee69b91c71b392fd03f862711ca1e2aae80c

                SHA256

                0163732e696d36b9714cafb23954712bfb9646e6eb2e5ce047cb1d6c908af6ad

                SHA512

                1b0edaaed51a0e6cd8f624e816b26af0d301b76741c328db2532e0e725f12b4e488034291da1cc09fc55b7aab9e9e93de9c1fa9cca084d48fe22edb144dff8e9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8113.exe

                Filesize

                300KB

                MD5

                1c91205dca75bdf96aa5dda2cf6b361c

                SHA1

                79d77cbb17a71a35b3dda68696b446f5eba3a50e

                SHA256

                18c574423f716c856ceb9ca568bc15f4813e29314929767a6a8e3347b00b25ef

                SHA512

                04b87b73c5cebdecf34acce19a8d4cdd4d12c7c2f03cec374536fb16bd7b9cae7f9985150405b6cb8f35f3f6dff9471c9ed73ccdef407dc5eb80ea843d17dfe4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8113.exe

                Filesize

                300KB

                MD5

                1c91205dca75bdf96aa5dda2cf6b361c

                SHA1

                79d77cbb17a71a35b3dda68696b446f5eba3a50e

                SHA256

                18c574423f716c856ceb9ca568bc15f4813e29314929767a6a8e3347b00b25ef

                SHA512

                04b87b73c5cebdecf34acce19a8d4cdd4d12c7c2f03cec374536fb16bd7b9cae7f9985150405b6cb8f35f3f6dff9471c9ed73ccdef407dc5eb80ea843d17dfe4

              • memory/2684-1112-0x0000000005410000-0x000000000544E000-memory.dmp

                Filesize

                248KB

              • memory/2684-1119-0x0000000004DF0000-0x0000000004E00000-memory.dmp

                Filesize

                64KB

              • memory/2684-1125-0x0000000004DF0000-0x0000000004E00000-memory.dmp

                Filesize

                64KB

              • memory/2684-1124-0x00000000069B0000-0x0000000006EDC000-memory.dmp

                Filesize

                5.2MB

              • memory/2684-1123-0x00000000067D0000-0x0000000006992000-memory.dmp

                Filesize

                1.8MB

              • memory/2684-1122-0x0000000006670000-0x00000000066C0000-memory.dmp

                Filesize

                320KB

              • memory/2684-1121-0x00000000065F0000-0x0000000006666000-memory.dmp

                Filesize

                472KB

              • memory/2684-1120-0x0000000004DF0000-0x0000000004E00000-memory.dmp

                Filesize

                64KB

              • memory/2684-1118-0x0000000004DF0000-0x0000000004E00000-memory.dmp

                Filesize

                64KB

              • memory/2684-1116-0x0000000005790000-0x00000000057F6000-memory.dmp

                Filesize

                408KB

              • memory/2684-1115-0x00000000056F0000-0x0000000005782000-memory.dmp

                Filesize

                584KB

              • memory/2684-1114-0x0000000004DF0000-0x0000000004E00000-memory.dmp

                Filesize

                64KB

              • memory/2684-1113-0x0000000005560000-0x00000000055AB000-memory.dmp

                Filesize

                300KB

              • memory/2684-1111-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

                Filesize

                72KB

              • memory/2684-1110-0x0000000005300000-0x000000000540A000-memory.dmp

                Filesize

                1.0MB

              • memory/2684-1109-0x0000000005910000-0x0000000005F16000-memory.dmp

                Filesize

                6.0MB

              • memory/2684-236-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-234-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-232-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-197-0x00000000028E0000-0x0000000002926000-memory.dmp

                Filesize

                280KB

              • memory/2684-198-0x0000000004CB0000-0x0000000004CF4000-memory.dmp

                Filesize

                272KB

              • memory/2684-199-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-200-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-202-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-204-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-206-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-208-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-210-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-212-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-214-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-216-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-217-0x00000000007F0000-0x000000000083B000-memory.dmp

                Filesize

                300KB

              • memory/2684-219-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-221-0x0000000004DF0000-0x0000000004E00000-memory.dmp

                Filesize

                64KB

              • memory/2684-220-0x0000000004DF0000-0x0000000004E00000-memory.dmp

                Filesize

                64KB

              • memory/2684-224-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-226-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-223-0x0000000004DF0000-0x0000000004E00000-memory.dmp

                Filesize

                64KB

              • memory/2684-228-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/2684-230-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                Filesize

                248KB

              • memory/4116-1131-0x0000000000180000-0x00000000001B2000-memory.dmp

                Filesize

                200KB

              • memory/4116-1133-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

                Filesize

                64KB

              • memory/4116-1132-0x0000000004BC0000-0x0000000004C0B000-memory.dmp

                Filesize

                300KB

              • memory/4412-147-0x00000000004F0000-0x00000000004FA000-memory.dmp

                Filesize

                40KB

              • memory/4448-187-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-169-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-160-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-161-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-185-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-183-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-181-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-179-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-165-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-177-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-175-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-173-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-171-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-188-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/4448-167-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB

              • memory/4448-159-0x0000000002820000-0x0000000002830000-memory.dmp

                Filesize

                64KB

              • memory/4448-158-0x0000000002820000-0x0000000002830000-memory.dmp

                Filesize

                64KB

              • memory/4448-189-0x0000000002820000-0x0000000002830000-memory.dmp

                Filesize

                64KB

              • memory/4448-190-0x0000000002820000-0x0000000002830000-memory.dmp

                Filesize

                64KB

              • memory/4448-192-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/4448-157-0x0000000002820000-0x0000000002830000-memory.dmp

                Filesize

                64KB

              • memory/4448-156-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4448-155-0x00000000025D0000-0x00000000025E8000-memory.dmp

                Filesize

                96KB

              • memory/4448-154-0x0000000004D90000-0x000000000528E000-memory.dmp

                Filesize

                5.0MB

              • memory/4448-153-0x0000000002270000-0x000000000228A000-memory.dmp

                Filesize

                104KB

              • memory/4448-163-0x00000000025D0000-0x00000000025E2000-memory.dmp

                Filesize

                72KB