Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 15:44

General

  • Target

    5b3e160c6d1b865f2cb3bd5c1bd39c7cc3b896e1bebdd9d886f278606db75c24.exe

  • Size

    1.0MB

  • MD5

    08cfbebed9d45e92f60bab072cc8f00c

  • SHA1

    0db77a23d922688f901a7a02b5be14b05559db67

  • SHA256

    5b3e160c6d1b865f2cb3bd5c1bd39c7cc3b896e1bebdd9d886f278606db75c24

  • SHA512

    fb2891dac5bfc0cff6ac02c9458813a6d2f9ebc4756cfeeebfeb6b267113778505f35e46fb2bf22f8f21a42a872fa8b49a6f8126990389aef44301a91d152bd1

  • SSDEEP

    24576:XyDthCpXXqp+ZujWC7WKaEvRF8aK+A+mG6CK2JkNZq:iDthIZ8F7PtZF8V+dmRCFmZ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

gong

C2

193.233.20.33:4125

Attributes
  • auth_value

    16950897b83de3bba9e4de36f06a8c05

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b3e160c6d1b865f2cb3bd5c1bd39c7cc3b896e1bebdd9d886f278606db75c24.exe
    "C:\Users\Admin\AppData\Local\Temp\5b3e160c6d1b865f2cb3bd5c1bd39c7cc3b896e1bebdd9d886f278606db75c24.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina4617.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina4617.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0700.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0700.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina2474.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina2474.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4288
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu158225.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu158225.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4424
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9868.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9868.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:260
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 260 -s 1092
              6⤵
              • Program crash
              PID:336
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmG21s60.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmG21s60.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2608
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 1860
            5⤵
            • Program crash
            PID:4376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en357001.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en357001.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge329528.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge329528.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3912
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4672
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:820
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4316
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4204
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4864
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:2300
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1364
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:2436
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:656
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 260 -ip 260
                1⤵
                  PID:2680
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2608 -ip 2608
                  1⤵
                    PID:2432
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3960
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3800

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    5c9ad15f7c20a66471792573fd2e92e8

                    SHA1

                    f90536cbd208eff25563f72ce8f26942f6cb92fa

                    SHA256

                    aa208f283f93ba0148e554f403d90ff3c0f39c518d921ae7a456c8fb2bcc25f3

                    SHA512

                    bcf96a1d0df74b641d5ee3916fe19a216640439e2c5a287ba0d8fab1d7e39526eb509cc130ed7e9c87152356c14e73f2014c0fc2fab2208bb488e38c731b30c5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    5c9ad15f7c20a66471792573fd2e92e8

                    SHA1

                    f90536cbd208eff25563f72ce8f26942f6cb92fa

                    SHA256

                    aa208f283f93ba0148e554f403d90ff3c0f39c518d921ae7a456c8fb2bcc25f3

                    SHA512

                    bcf96a1d0df74b641d5ee3916fe19a216640439e2c5a287ba0d8fab1d7e39526eb509cc130ed7e9c87152356c14e73f2014c0fc2fab2208bb488e38c731b30c5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    5c9ad15f7c20a66471792573fd2e92e8

                    SHA1

                    f90536cbd208eff25563f72ce8f26942f6cb92fa

                    SHA256

                    aa208f283f93ba0148e554f403d90ff3c0f39c518d921ae7a456c8fb2bcc25f3

                    SHA512

                    bcf96a1d0df74b641d5ee3916fe19a216640439e2c5a287ba0d8fab1d7e39526eb509cc130ed7e9c87152356c14e73f2014c0fc2fab2208bb488e38c731b30c5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    5c9ad15f7c20a66471792573fd2e92e8

                    SHA1

                    f90536cbd208eff25563f72ce8f26942f6cb92fa

                    SHA256

                    aa208f283f93ba0148e554f403d90ff3c0f39c518d921ae7a456c8fb2bcc25f3

                    SHA512

                    bcf96a1d0df74b641d5ee3916fe19a216640439e2c5a287ba0d8fab1d7e39526eb509cc130ed7e9c87152356c14e73f2014c0fc2fab2208bb488e38c731b30c5

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    5c9ad15f7c20a66471792573fd2e92e8

                    SHA1

                    f90536cbd208eff25563f72ce8f26942f6cb92fa

                    SHA256

                    aa208f283f93ba0148e554f403d90ff3c0f39c518d921ae7a456c8fb2bcc25f3

                    SHA512

                    bcf96a1d0df74b641d5ee3916fe19a216640439e2c5a287ba0d8fab1d7e39526eb509cc130ed7e9c87152356c14e73f2014c0fc2fab2208bb488e38c731b30c5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge329528.exe

                    Filesize

                    227KB

                    MD5

                    5c9ad15f7c20a66471792573fd2e92e8

                    SHA1

                    f90536cbd208eff25563f72ce8f26942f6cb92fa

                    SHA256

                    aa208f283f93ba0148e554f403d90ff3c0f39c518d921ae7a456c8fb2bcc25f3

                    SHA512

                    bcf96a1d0df74b641d5ee3916fe19a216640439e2c5a287ba0d8fab1d7e39526eb509cc130ed7e9c87152356c14e73f2014c0fc2fab2208bb488e38c731b30c5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge329528.exe

                    Filesize

                    227KB

                    MD5

                    5c9ad15f7c20a66471792573fd2e92e8

                    SHA1

                    f90536cbd208eff25563f72ce8f26942f6cb92fa

                    SHA256

                    aa208f283f93ba0148e554f403d90ff3c0f39c518d921ae7a456c8fb2bcc25f3

                    SHA512

                    bcf96a1d0df74b641d5ee3916fe19a216640439e2c5a287ba0d8fab1d7e39526eb509cc130ed7e9c87152356c14e73f2014c0fc2fab2208bb488e38c731b30c5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina4617.exe

                    Filesize

                    858KB

                    MD5

                    a32eeef7372a566c0ff664be43493cde

                    SHA1

                    34de1763ba0abadc6ef1388b8377a66e71ea6105

                    SHA256

                    afe322c1ec659900c59e4337c411f006e314e6ca3aff4d820f09b21d79ee599d

                    SHA512

                    d3f362990cc25fc166c6ef00686dddb04179f53fa767eb50c8e25cedba12de815ec41deaeb16cbc577f6248e4280f389288ca9b8d94d5b81e06d3b52b8d46c32

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina4617.exe

                    Filesize

                    858KB

                    MD5

                    a32eeef7372a566c0ff664be43493cde

                    SHA1

                    34de1763ba0abadc6ef1388b8377a66e71ea6105

                    SHA256

                    afe322c1ec659900c59e4337c411f006e314e6ca3aff4d820f09b21d79ee599d

                    SHA512

                    d3f362990cc25fc166c6ef00686dddb04179f53fa767eb50c8e25cedba12de815ec41deaeb16cbc577f6248e4280f389288ca9b8d94d5b81e06d3b52b8d46c32

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en357001.exe

                    Filesize

                    175KB

                    MD5

                    df17ebe39f60cc7ca9c408e16eb05145

                    SHA1

                    b1a4a73797f435bbe6ac846ecebc77e38ef14da4

                    SHA256

                    4a561c2e3b00b7c38065c1d15968d4850096330fcd9d1ffe1c0ddaf5b5eb7b1b

                    SHA512

                    f0c914279cb8909afc4399c4ab64bab2d93755e5acfc5292364204934c8bd21f96fe2f9af081aed17f13174642bb2faa7448662052cbd2b6180f9429979f55d8

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en357001.exe

                    Filesize

                    175KB

                    MD5

                    df17ebe39f60cc7ca9c408e16eb05145

                    SHA1

                    b1a4a73797f435bbe6ac846ecebc77e38ef14da4

                    SHA256

                    4a561c2e3b00b7c38065c1d15968d4850096330fcd9d1ffe1c0ddaf5b5eb7b1b

                    SHA512

                    f0c914279cb8909afc4399c4ab64bab2d93755e5acfc5292364204934c8bd21f96fe2f9af081aed17f13174642bb2faa7448662052cbd2b6180f9429979f55d8

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0700.exe

                    Filesize

                    716KB

                    MD5

                    3d125614073a3af0ea521321d05dc841

                    SHA1

                    76e3a09cf98b3bc5b769c4f5f68f16f3600c49bb

                    SHA256

                    6bb28db7fa8346deeccab7f6c7ec6773b535efc18a012f23a324b6ec9a94c605

                    SHA512

                    8571e323766f48f88f983f47d0fdb9da3a6f0df6f8d3dbff61e33a0dd28f4d4c2318c51fed4bd04ee8fcda1726e7481264206e2be3ba7941e5720038e0dbfd43

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0700.exe

                    Filesize

                    716KB

                    MD5

                    3d125614073a3af0ea521321d05dc841

                    SHA1

                    76e3a09cf98b3bc5b769c4f5f68f16f3600c49bb

                    SHA256

                    6bb28db7fa8346deeccab7f6c7ec6773b535efc18a012f23a324b6ec9a94c605

                    SHA512

                    8571e323766f48f88f983f47d0fdb9da3a6f0df6f8d3dbff61e33a0dd28f4d4c2318c51fed4bd04ee8fcda1726e7481264206e2be3ba7941e5720038e0dbfd43

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmG21s60.exe

                    Filesize

                    366KB

                    MD5

                    d39bd19c0d94022fba203fe86bda0034

                    SHA1

                    e4eca1c115ca546dd4735e9745d4c2024729a6f6

                    SHA256

                    ab36d3209fffd6bd15623f9a5fa0b59e6505d492c84470586531e4b7b2747aa2

                    SHA512

                    57dcb4c32eb34b88c35920a687fcc7e94aa9510a62ac488e89b8be111be76ddec54311dc21a940785549ba7426f0f4f38b464a1cfade02677982ceb46788c0be

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dmG21s60.exe

                    Filesize

                    366KB

                    MD5

                    d39bd19c0d94022fba203fe86bda0034

                    SHA1

                    e4eca1c115ca546dd4735e9745d4c2024729a6f6

                    SHA256

                    ab36d3209fffd6bd15623f9a5fa0b59e6505d492c84470586531e4b7b2747aa2

                    SHA512

                    57dcb4c32eb34b88c35920a687fcc7e94aa9510a62ac488e89b8be111be76ddec54311dc21a940785549ba7426f0f4f38b464a1cfade02677982ceb46788c0be

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina2474.exe

                    Filesize

                    354KB

                    MD5

                    fb3d2a4ee8131cc0c0c619c06d54ce86

                    SHA1

                    697bf90a0a0d75f9eeec5031cc25bb605ffa703b

                    SHA256

                    47c9215074cc9c713988352dce0d0d604b5decc30c3cd191da474c64be88f2b1

                    SHA512

                    e7fbecdd76c60c33a455984f783c2357f2c5d89689ec1eda056c5fcc7cce985a30ef22d311f0d5ac420d19e9d71ff64426596ff484141a0dca593ffc1f826b8e

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina2474.exe

                    Filesize

                    354KB

                    MD5

                    fb3d2a4ee8131cc0c0c619c06d54ce86

                    SHA1

                    697bf90a0a0d75f9eeec5031cc25bb605ffa703b

                    SHA256

                    47c9215074cc9c713988352dce0d0d604b5decc30c3cd191da474c64be88f2b1

                    SHA512

                    e7fbecdd76c60c33a455984f783c2357f2c5d89689ec1eda056c5fcc7cce985a30ef22d311f0d5ac420d19e9d71ff64426596ff484141a0dca593ffc1f826b8e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu158225.exe

                    Filesize

                    12KB

                    MD5

                    5439cdbea1d9b33d7a59908dec2e3e56

                    SHA1

                    8ed52859077c0e55931a554e74a67a22e00877f2

                    SHA256

                    c8f6dbf3da261654ec68f1db0f8ec1744ee38917886889eda1b477a3aa1d6bbe

                    SHA512

                    ab128cf19944ce93fcbe872ebe6de8bdd3ff60bc5648100c21c6eed1cfd591badb6d6ae796c0c2b91f618d19c6c5671d7561bfcde2a1e7c5b0c2fc5eb503735d

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu158225.exe

                    Filesize

                    12KB

                    MD5

                    5439cdbea1d9b33d7a59908dec2e3e56

                    SHA1

                    8ed52859077c0e55931a554e74a67a22e00877f2

                    SHA256

                    c8f6dbf3da261654ec68f1db0f8ec1744ee38917886889eda1b477a3aa1d6bbe

                    SHA512

                    ab128cf19944ce93fcbe872ebe6de8bdd3ff60bc5648100c21c6eed1cfd591badb6d6ae796c0c2b91f618d19c6c5671d7561bfcde2a1e7c5b0c2fc5eb503735d

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9868.exe

                    Filesize

                    308KB

                    MD5

                    5162ba86505fd91363c6bfa121b3c002

                    SHA1

                    c0b3fe39f9ea5931cb5edc7429e99eeabf7cfca9

                    SHA256

                    eb62fd841ad8322de0f6bf1c8807572c1980d7a704593fa8daa596ecca6f0127

                    SHA512

                    a6e80455f055e160960766149041e0e9cd1f29316a8b0f7d9a1b571fd612c8b24c81c0a63566d09b11e974dd39bb5084872d88c1cc9c053c7bebea152cb2ece8

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor9868.exe

                    Filesize

                    308KB

                    MD5

                    5162ba86505fd91363c6bfa121b3c002

                    SHA1

                    c0b3fe39f9ea5931cb5edc7429e99eeabf7cfca9

                    SHA256

                    eb62fd841ad8322de0f6bf1c8807572c1980d7a704593fa8daa596ecca6f0127

                    SHA512

                    a6e80455f055e160960766149041e0e9cd1f29316a8b0f7d9a1b571fd612c8b24c81c0a63566d09b11e974dd39bb5084872d88c1cc9c053c7bebea152cb2ece8

                  • memory/260-179-0x0000000004F80000-0x0000000004F90000-memory.dmp

                    Filesize

                    64KB

                  • memory/260-200-0x0000000000400000-0x0000000000710000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/260-178-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-183-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-177-0x0000000004F80000-0x0000000004F90000-memory.dmp

                    Filesize

                    64KB

                  • memory/260-185-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-187-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-189-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-191-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-193-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-197-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-195-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-199-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-181-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-201-0x0000000004F80000-0x0000000004F90000-memory.dmp

                    Filesize

                    64KB

                  • memory/260-202-0x0000000004F80000-0x0000000004F90000-memory.dmp

                    Filesize

                    64KB

                  • memory/260-203-0x0000000004F80000-0x0000000004F90000-memory.dmp

                    Filesize

                    64KB

                  • memory/260-205-0x0000000000400000-0x0000000000710000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/260-175-0x0000000004F80000-0x0000000004F90000-memory.dmp

                    Filesize

                    64KB

                  • memory/260-174-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-173-0x00000000007E0000-0x000000000080D000-memory.dmp

                    Filesize

                    180KB

                  • memory/260-171-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-169-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-168-0x0000000002580000-0x0000000002592000-memory.dmp

                    Filesize

                    72KB

                  • memory/260-167-0x0000000004F90000-0x0000000005534000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/2608-217-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-1124-0x0000000005C60000-0x0000000005C9C000-memory.dmp

                    Filesize

                    240KB

                  • memory/2608-227-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-229-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-231-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-233-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-235-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-237-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-239-0x0000000000720000-0x000000000076B000-memory.dmp

                    Filesize

                    300KB

                  • memory/2608-241-0x0000000004E30000-0x0000000004E40000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-240-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-244-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-243-0x0000000004E30000-0x0000000004E40000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-246-0x0000000004E30000-0x0000000004E40000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-247-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-1120-0x00000000054F0000-0x0000000005B08000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/2608-1121-0x0000000005B10000-0x0000000005C1A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/2608-1122-0x0000000005C40000-0x0000000005C52000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-1123-0x0000000004E30000-0x0000000004E40000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-225-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-1125-0x0000000005F50000-0x0000000005FE2000-memory.dmp

                    Filesize

                    584KB

                  • memory/2608-1126-0x0000000005FF0000-0x0000000006056000-memory.dmp

                    Filesize

                    408KB

                  • memory/2608-1129-0x0000000004E30000-0x0000000004E40000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-1128-0x0000000004E30000-0x0000000004E40000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-1130-0x0000000004E30000-0x0000000004E40000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-1131-0x0000000006710000-0x00000000068D2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/2608-1132-0x00000000068F0000-0x0000000006E1C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/2608-1133-0x0000000004E30000-0x0000000004E40000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-1134-0x0000000007190000-0x0000000007206000-memory.dmp

                    Filesize

                    472KB

                  • memory/2608-1135-0x0000000007220000-0x0000000007270000-memory.dmp

                    Filesize

                    320KB

                  • memory/2608-210-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-211-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-223-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-221-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-215-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-219-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2608-213-0x0000000004D10000-0x0000000004D4E000-memory.dmp

                    Filesize

                    248KB

                  • memory/3652-1142-0x00000000052D0000-0x00000000052E0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3652-1141-0x00000000006A0000-0x00000000006D2000-memory.dmp

                    Filesize

                    200KB

                  • memory/4424-161-0x0000000000230000-0x000000000023A000-memory.dmp

                    Filesize

                    40KB