Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 07:45

General

  • Target

    2cead47080339a4cc23f02109c577179866f3401900bf72c8f877177ba9ba29f.exe

  • Size

    1.0MB

  • MD5

    8518c3a296e03f87907f1c1aabbad258

  • SHA1

    d20d97c7cc0393998da224b3d7e8db2777bc7343

  • SHA256

    2cead47080339a4cc23f02109c577179866f3401900bf72c8f877177ba9ba29f

  • SHA512

    11a003735dd4d295ca5b60e44715a7c2a2b9f8e1edbd0b7563d4b02f350e8228a6c023461199c97b52d350b31241d7dd9856303aae02ba128fa11b0b3f72cd08

  • SSDEEP

    24576:+y9Wgq1YGXtGr8l+MzmmiUjfvDdKnAP3hEA3UjQ9QdKBmT9rKo9e/ir:N9XEYow84MEMBKn4ajpdKBS0/i

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

fort

C2

193.233.20.33:4125

Attributes
  • auth_value

    5ea5673154a804d8c80f565f7276f720

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cead47080339a4cc23f02109c577179866f3401900bf72c8f877177ba9ba29f.exe
    "C:\Users\Admin\AppData\Local\Temp\2cead47080339a4cc23f02109c577179866f3401900bf72c8f877177ba9ba29f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1844.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1844.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5459.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5459.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap1760.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap1760.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4620
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3976.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3976.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4464
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1719jR.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1719jR.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w97Mx00.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w97Mx00.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPOxj50.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPOxj50.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04cU34.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04cU34.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3432
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4000
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1352
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:2316
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:2168
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:964
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:4456
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:1988
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4584
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:4424
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:1380

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04cU34.exe

                Filesize

                236KB

                MD5

                5f5f0cbffff40e545c86ec7608074c6e

                SHA1

                020db558c8a52766e5422335e838ad5032e465ec

                SHA256

                0f568f7f6d3b98a28ee0abc30cf03804bea6cd477ebd1706293be8109fc6df81

                SHA512

                8dc3c6a0dfe6b234ae4592bc6146151169007fad4f8c4df470744fa09330f6e0b65866b8071ea5c9671f44132b8f099ba557a6837458b0ef98c373f527822174

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y04cU34.exe

                Filesize

                236KB

                MD5

                5f5f0cbffff40e545c86ec7608074c6e

                SHA1

                020db558c8a52766e5422335e838ad5032e465ec

                SHA256

                0f568f7f6d3b98a28ee0abc30cf03804bea6cd477ebd1706293be8109fc6df81

                SHA512

                8dc3c6a0dfe6b234ae4592bc6146151169007fad4f8c4df470744fa09330f6e0b65866b8071ea5c9671f44132b8f099ba557a6837458b0ef98c373f527822174

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1844.exe

                Filesize

                842KB

                MD5

                dbcacd1d14f9d2a21b715b4a3ae9f996

                SHA1

                d8995741b4b8ca62270d9ded07765f27e63942d5

                SHA256

                03c643186e5f62070dbdec37072d71be445dfb1b6dd930b55b9ebd8161bea7b9

                SHA512

                b8b45614d3a52a70c20ec367131a2b12a402caa2ada97e0dd6f2ea418df1bec421ca8ce1b79e12d0181e3d1a7ff9aa3f8a29fe7709b295161b733588ca9f9a9d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1844.exe

                Filesize

                842KB

                MD5

                dbcacd1d14f9d2a21b715b4a3ae9f996

                SHA1

                d8995741b4b8ca62270d9ded07765f27e63942d5

                SHA256

                03c643186e5f62070dbdec37072d71be445dfb1b6dd930b55b9ebd8161bea7b9

                SHA512

                b8b45614d3a52a70c20ec367131a2b12a402caa2ada97e0dd6f2ea418df1bec421ca8ce1b79e12d0181e3d1a7ff9aa3f8a29fe7709b295161b733588ca9f9a9d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPOxj50.exe

                Filesize

                175KB

                MD5

                e92e5780a2cea621e18bb60c483ef095

                SHA1

                f47453f7938c5fc061b9b3ede35297436f435b0f

                SHA256

                cb391329dce424dd3bb2ef51b6888c9e46dba0d91b3a6a603673df40baba127a

                SHA512

                a3a0f9cb29c7494285f3997f255e073d29b1fb1112377b4bca4ff0e9cfb29e43f0ef10c92ca5b2df940e303bdaa9fd45ba4a05572d2d85eae5175b23dfbaff3a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPOxj50.exe

                Filesize

                175KB

                MD5

                e92e5780a2cea621e18bb60c483ef095

                SHA1

                f47453f7938c5fc061b9b3ede35297436f435b0f

                SHA256

                cb391329dce424dd3bb2ef51b6888c9e46dba0d91b3a6a603673df40baba127a

                SHA512

                a3a0f9cb29c7494285f3997f255e073d29b1fb1112377b4bca4ff0e9cfb29e43f0ef10c92ca5b2df940e303bdaa9fd45ba4a05572d2d85eae5175b23dfbaff3a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5459.exe

                Filesize

                700KB

                MD5

                9b6c55a49bc940489b6e3b52f924a9fc

                SHA1

                ded10729c63acdce496954e0f4d1a451b20c94ab

                SHA256

                ec2b46041464d68854093d4bc07b478e4ff7201dbcdd6df9a101ee764c3201ef

                SHA512

                d65939c909ae6713cf103a3caaf3a4daca46d00c5d480c9e651e5dc839a2bb42a2fafa4f165b9bc1cc7d4b27fd7d548ab23d10f8a871b6d13fc75e56a02c25f5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5459.exe

                Filesize

                700KB

                MD5

                9b6c55a49bc940489b6e3b52f924a9fc

                SHA1

                ded10729c63acdce496954e0f4d1a451b20c94ab

                SHA256

                ec2b46041464d68854093d4bc07b478e4ff7201dbcdd6df9a101ee764c3201ef

                SHA512

                d65939c909ae6713cf103a3caaf3a4daca46d00c5d480c9e651e5dc839a2bb42a2fafa4f165b9bc1cc7d4b27fd7d548ab23d10f8a871b6d13fc75e56a02c25f5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w97Mx00.exe

                Filesize

                359KB

                MD5

                3f5b8af6fc0bad889e0daa26218e8653

                SHA1

                64327fa3bddf2d612005d0c0aa6ebf41cac59454

                SHA256

                a92d0f9061dda34530ea9e56e5e74ae4e722264f4d0499b01483002df1b43abb

                SHA512

                057c87311e3e2db42784b073a8d83c328743dca2e4f96930bbeb4a271e13e7c9f229ad08c524861ae15d72674f893c249fa485cfe5389dbef2a76480fbff14c7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w97Mx00.exe

                Filesize

                359KB

                MD5

                3f5b8af6fc0bad889e0daa26218e8653

                SHA1

                64327fa3bddf2d612005d0c0aa6ebf41cac59454

                SHA256

                a92d0f9061dda34530ea9e56e5e74ae4e722264f4d0499b01483002df1b43abb

                SHA512

                057c87311e3e2db42784b073a8d83c328743dca2e4f96930bbeb4a271e13e7c9f229ad08c524861ae15d72674f893c249fa485cfe5389dbef2a76480fbff14c7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap1760.exe

                Filesize

                346KB

                MD5

                964cc1c16b86d485202d778ff8f35696

                SHA1

                d12361de9152dca6517c7587a03e9a4921e3836e

                SHA256

                b37554771791172c4a98e932034b9ac04c232ad838d60568b79b45337ca4ed78

                SHA512

                9caddfb7cb73c916648f905a02cf950c610737b5718194d26cb086f193baeedd8b5cdea36130ae44475356fd360e3c4af93bbf508bb1109e3d121a179c78af8d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap1760.exe

                Filesize

                346KB

                MD5

                964cc1c16b86d485202d778ff8f35696

                SHA1

                d12361de9152dca6517c7587a03e9a4921e3836e

                SHA256

                b37554771791172c4a98e932034b9ac04c232ad838d60568b79b45337ca4ed78

                SHA512

                9caddfb7cb73c916648f905a02cf950c610737b5718194d26cb086f193baeedd8b5cdea36130ae44475356fd360e3c4af93bbf508bb1109e3d121a179c78af8d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3976.exe

                Filesize

                12KB

                MD5

                ef1413cebc40b6d2db912952d413680b

                SHA1

                91b2f6660a78e80e3ee8f732748f764087eba566

                SHA256

                9f5bd836f7b4067577a0b6b57aebb0001100edd94d19a084df928a0dbe995a03

                SHA512

                a9078e71d37b643c82b7aa50fe556b8b92c3683016e9f19a036c47ac9c48789d18cb84a098db8a6656834856de84783ce9be7bcd69bedba6c8ffb0780e6f845d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3976.exe

                Filesize

                12KB

                MD5

                ef1413cebc40b6d2db912952d413680b

                SHA1

                91b2f6660a78e80e3ee8f732748f764087eba566

                SHA256

                9f5bd836f7b4067577a0b6b57aebb0001100edd94d19a084df928a0dbe995a03

                SHA512

                a9078e71d37b643c82b7aa50fe556b8b92c3683016e9f19a036c47ac9c48789d18cb84a098db8a6656834856de84783ce9be7bcd69bedba6c8ffb0780e6f845d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1719jR.exe

                Filesize

                300KB

                MD5

                e06abaa99526cfb02fc1448fdeb79d3a

                SHA1

                5bda9dc7845c1aaae367dc7aaddd187938e3df77

                SHA256

                35719b4d224c8ea512804c7264980fbac87e37ac69ec5eaa005266cbdd6bb5ab

                SHA512

                3c6a17d552f74430bb7f35c1b0b4529d391eb963855df0ca64a242b23c3175f5c64983b12c4f14ab38ced336fe16936e0675662dd45123f0c16e16802d96a36b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1719jR.exe

                Filesize

                300KB

                MD5

                e06abaa99526cfb02fc1448fdeb79d3a

                SHA1

                5bda9dc7845c1aaae367dc7aaddd187938e3df77

                SHA256

                35719b4d224c8ea512804c7264980fbac87e37ac69ec5eaa005266cbdd6bb5ab

                SHA512

                3c6a17d552f74430bb7f35c1b0b4529d391eb963855df0ca64a242b23c3175f5c64983b12c4f14ab38ced336fe16936e0675662dd45123f0c16e16802d96a36b

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                5f5f0cbffff40e545c86ec7608074c6e

                SHA1

                020db558c8a52766e5422335e838ad5032e465ec

                SHA256

                0f568f7f6d3b98a28ee0abc30cf03804bea6cd477ebd1706293be8109fc6df81

                SHA512

                8dc3c6a0dfe6b234ae4592bc6146151169007fad4f8c4df470744fa09330f6e0b65866b8071ea5c9671f44132b8f099ba557a6837458b0ef98c373f527822174

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                5f5f0cbffff40e545c86ec7608074c6e

                SHA1

                020db558c8a52766e5422335e838ad5032e465ec

                SHA256

                0f568f7f6d3b98a28ee0abc30cf03804bea6cd477ebd1706293be8109fc6df81

                SHA512

                8dc3c6a0dfe6b234ae4592bc6146151169007fad4f8c4df470744fa09330f6e0b65866b8071ea5c9671f44132b8f099ba557a6837458b0ef98c373f527822174

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                5f5f0cbffff40e545c86ec7608074c6e

                SHA1

                020db558c8a52766e5422335e838ad5032e465ec

                SHA256

                0f568f7f6d3b98a28ee0abc30cf03804bea6cd477ebd1706293be8109fc6df81

                SHA512

                8dc3c6a0dfe6b234ae4592bc6146151169007fad4f8c4df470744fa09330f6e0b65866b8071ea5c9671f44132b8f099ba557a6837458b0ef98c373f527822174

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                5f5f0cbffff40e545c86ec7608074c6e

                SHA1

                020db558c8a52766e5422335e838ad5032e465ec

                SHA256

                0f568f7f6d3b98a28ee0abc30cf03804bea6cd477ebd1706293be8109fc6df81

                SHA512

                8dc3c6a0dfe6b234ae4592bc6146151169007fad4f8c4df470744fa09330f6e0b65866b8071ea5c9671f44132b8f099ba557a6837458b0ef98c373f527822174

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                236KB

                MD5

                5f5f0cbffff40e545c86ec7608074c6e

                SHA1

                020db558c8a52766e5422335e838ad5032e465ec

                SHA256

                0f568f7f6d3b98a28ee0abc30cf03804bea6cd477ebd1706293be8109fc6df81

                SHA512

                8dc3c6a0dfe6b234ae4592bc6146151169007fad4f8c4df470744fa09330f6e0b65866b8071ea5c9671f44132b8f099ba557a6837458b0ef98c373f527822174

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • memory/1696-180-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-186-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-194-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-196-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-197-0x0000000004D40000-0x0000000004D50000-memory.dmp

                Filesize

                64KB

              • memory/1696-198-0x0000000004D40000-0x0000000004D50000-memory.dmp

                Filesize

                64KB

              • memory/1696-199-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/1696-201-0x0000000000400000-0x000000000070E000-memory.dmp

                Filesize

                3.1MB

              • memory/1696-182-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-190-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-188-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-192-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-184-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-178-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-176-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-174-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-172-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-170-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-169-0x0000000002780000-0x0000000002792000-memory.dmp

                Filesize

                72KB

              • memory/1696-168-0x0000000004D50000-0x00000000052F4000-memory.dmp

                Filesize

                5.6MB

              • memory/1696-167-0x0000000000750000-0x000000000077D000-memory.dmp

                Filesize

                180KB

              • memory/3232-223-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-1127-0x0000000002A90000-0x0000000002AA0000-memory.dmp

                Filesize

                64KB

              • memory/3232-235-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-237-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-239-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-366-0x00000000008C0000-0x000000000090B000-memory.dmp

                Filesize

                300KB

              • memory/3232-370-0x0000000002A90000-0x0000000002AA0000-memory.dmp

                Filesize

                64KB

              • memory/3232-371-0x0000000002A90000-0x0000000002AA0000-memory.dmp

                Filesize

                64KB

              • memory/3232-367-0x0000000002A90000-0x0000000002AA0000-memory.dmp

                Filesize

                64KB

              • memory/3232-1116-0x00000000053C0000-0x00000000059D8000-memory.dmp

                Filesize

                6.1MB

              • memory/3232-1117-0x00000000059E0000-0x0000000005AEA000-memory.dmp

                Filesize

                1.0MB

              • memory/3232-1118-0x0000000005B00000-0x0000000005B12000-memory.dmp

                Filesize

                72KB

              • memory/3232-1119-0x0000000002A90000-0x0000000002AA0000-memory.dmp

                Filesize

                64KB

              • memory/3232-1120-0x0000000005B20000-0x0000000005B5C000-memory.dmp

                Filesize

                240KB

              • memory/3232-1121-0x0000000005E10000-0x0000000005EA2000-memory.dmp

                Filesize

                584KB

              • memory/3232-1122-0x0000000005EB0000-0x0000000005F16000-memory.dmp

                Filesize

                408KB

              • memory/3232-1123-0x00000000065E0000-0x00000000067A2000-memory.dmp

                Filesize

                1.8MB

              • memory/3232-1124-0x00000000067B0000-0x0000000006CDC000-memory.dmp

                Filesize

                5.2MB

              • memory/3232-1126-0x0000000002A90000-0x0000000002AA0000-memory.dmp

                Filesize

                64KB

              • memory/3232-233-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-1128-0x0000000002A90000-0x0000000002AA0000-memory.dmp

                Filesize

                64KB

              • memory/3232-1129-0x0000000007040000-0x00000000070B6000-memory.dmp

                Filesize

                472KB

              • memory/3232-1130-0x00000000070D0000-0x0000000007120000-memory.dmp

                Filesize

                320KB

              • memory/3232-231-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-229-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-206-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-207-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-227-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-225-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-221-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-219-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-217-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-215-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-213-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-211-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/3232-209-0x0000000002640000-0x000000000267E000-memory.dmp

                Filesize

                248KB

              • memory/4084-1137-0x00000000057F0000-0x0000000005800000-memory.dmp

                Filesize

                64KB

              • memory/4084-1136-0x0000000000B50000-0x0000000000B82000-memory.dmp

                Filesize

                200KB

              • memory/4464-161-0x0000000000B60000-0x0000000000B6A000-memory.dmp

                Filesize

                40KB