Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    107s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2023, 10:09

General

  • Target

    e1872ae0abde4536b0fb9c92ec7130acbcd16045ff78ad7335b79414592d3afa.exe

  • Size

    1.0MB

  • MD5

    9d052b5bf43d81161926a6b7960d6ca6

  • SHA1

    628bb641e0c30af1352766f4cfb3839992023c2f

  • SHA256

    e1872ae0abde4536b0fb9c92ec7130acbcd16045ff78ad7335b79414592d3afa

  • SHA512

    18ca24d76243f26a88d86dd87cecccefa2d891b8de32265fbaf0060865eb334705200398af40b196e767fd0571afae9e90abe4ae2ade66193ac73806c8cedb07

  • SSDEEP

    24576:tyr031+u+DvYKM0cmFiTPEhjBz2FunhMRJA96Xm+gEh:IoF+F5nNFibEht2FuG8Im+gE

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

luza

C2

176.113.115.145:4125

Attributes
  • auth_value

    1261701914d508e02e8b4f25d38bc7f9

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1872ae0abde4536b0fb9c92ec7130acbcd16045ff78ad7335b79414592d3afa.exe
    "C:\Users\Admin\AppData\Local\Temp\e1872ae0abde4536b0fb9c92ec7130acbcd16045ff78ad7335b79414592d3afa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7839.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7839.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6365.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4272
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5585.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5585.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu884812.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu884812.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2932
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5917.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5917.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2284
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 1080
              6⤵
              • Program crash
              PID:4976
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dWV74s66.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dWV74s66.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5084
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 1360
            5⤵
            • Program crash
            PID:756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en821873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en821873.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge757995.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge757995.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:5032
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1432
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2328
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:2596
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:3464
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:856
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:376
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1852
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2284 -ip 2284
                1⤵
                  PID:3576
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5084 -ip 5084
                  1⤵
                    PID:4652
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3332

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    7c4b565f38c1da7267a88ea58a618664

                    SHA1

                    44ccffbe1f1c7a276e44c4db7d45495ea34df938

                    SHA256

                    cec37e4f2c81dcdc3db8b3c590036ade399016433234777237d7f11859296748

                    SHA512

                    b91a62cbf63a7479027de3be25724b35727deafe4be32b837694511cf289d1e644da7c523869a42bb966b824d38dcbdc0297cbc58b7037f7dbd15c31101924f1

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    7c4b565f38c1da7267a88ea58a618664

                    SHA1

                    44ccffbe1f1c7a276e44c4db7d45495ea34df938

                    SHA256

                    cec37e4f2c81dcdc3db8b3c590036ade399016433234777237d7f11859296748

                    SHA512

                    b91a62cbf63a7479027de3be25724b35727deafe4be32b837694511cf289d1e644da7c523869a42bb966b824d38dcbdc0297cbc58b7037f7dbd15c31101924f1

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    7c4b565f38c1da7267a88ea58a618664

                    SHA1

                    44ccffbe1f1c7a276e44c4db7d45495ea34df938

                    SHA256

                    cec37e4f2c81dcdc3db8b3c590036ade399016433234777237d7f11859296748

                    SHA512

                    b91a62cbf63a7479027de3be25724b35727deafe4be32b837694511cf289d1e644da7c523869a42bb966b824d38dcbdc0297cbc58b7037f7dbd15c31101924f1

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                    Filesize

                    227KB

                    MD5

                    7c4b565f38c1da7267a88ea58a618664

                    SHA1

                    44ccffbe1f1c7a276e44c4db7d45495ea34df938

                    SHA256

                    cec37e4f2c81dcdc3db8b3c590036ade399016433234777237d7f11859296748

                    SHA512

                    b91a62cbf63a7479027de3be25724b35727deafe4be32b837694511cf289d1e644da7c523869a42bb966b824d38dcbdc0297cbc58b7037f7dbd15c31101924f1

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge757995.exe

                    Filesize

                    227KB

                    MD5

                    7c4b565f38c1da7267a88ea58a618664

                    SHA1

                    44ccffbe1f1c7a276e44c4db7d45495ea34df938

                    SHA256

                    cec37e4f2c81dcdc3db8b3c590036ade399016433234777237d7f11859296748

                    SHA512

                    b91a62cbf63a7479027de3be25724b35727deafe4be32b837694511cf289d1e644da7c523869a42bb966b824d38dcbdc0297cbc58b7037f7dbd15c31101924f1

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge757995.exe

                    Filesize

                    227KB

                    MD5

                    7c4b565f38c1da7267a88ea58a618664

                    SHA1

                    44ccffbe1f1c7a276e44c4db7d45495ea34df938

                    SHA256

                    cec37e4f2c81dcdc3db8b3c590036ade399016433234777237d7f11859296748

                    SHA512

                    b91a62cbf63a7479027de3be25724b35727deafe4be32b837694511cf289d1e644da7c523869a42bb966b824d38dcbdc0297cbc58b7037f7dbd15c31101924f1

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7839.exe

                    Filesize

                    847KB

                    MD5

                    b2748020d8470a11c3c157221af5b09d

                    SHA1

                    fa1832c845d23d0c2011846e747fb592f6d52f96

                    SHA256

                    32f8d388ff5bd9a002eb1843eb4d88655a5e8df6f217cd483aefb425f78f04c9

                    SHA512

                    ff814eec4adb9bb66a331c1302aff7a8d96ac6d710488546c58c0db5f48400db97c844fd2522415d3d4b7a6069ace2ce47826a083e12cb5b0791ee8822090017

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7839.exe

                    Filesize

                    847KB

                    MD5

                    b2748020d8470a11c3c157221af5b09d

                    SHA1

                    fa1832c845d23d0c2011846e747fb592f6d52f96

                    SHA256

                    32f8d388ff5bd9a002eb1843eb4d88655a5e8df6f217cd483aefb425f78f04c9

                    SHA512

                    ff814eec4adb9bb66a331c1302aff7a8d96ac6d710488546c58c0db5f48400db97c844fd2522415d3d4b7a6069ace2ce47826a083e12cb5b0791ee8822090017

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en821873.exe

                    Filesize

                    175KB

                    MD5

                    438274becd1d693975e568caf19734a9

                    SHA1

                    0538421a4739a043d045e34f5ae89189d0db4e63

                    SHA256

                    2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7

                    SHA512

                    6cd0653f9f9a8efc04afdfd73ab1fece3684a4a6a93a4a74abda685dd2a18ed3db195ecfa35e33455204af3321bd293e50d28a26c0634a6e20dadfba8228bb56

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en821873.exe

                    Filesize

                    175KB

                    MD5

                    438274becd1d693975e568caf19734a9

                    SHA1

                    0538421a4739a043d045e34f5ae89189d0db4e63

                    SHA256

                    2fef2269b229f5f0e47be63b7f635ca40184345384c1bff32a8ce7678a3c18a7

                    SHA512

                    6cd0653f9f9a8efc04afdfd73ab1fece3684a4a6a93a4a74abda685dd2a18ed3db195ecfa35e33455204af3321bd293e50d28a26c0634a6e20dadfba8228bb56

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6365.exe

                    Filesize

                    705KB

                    MD5

                    e6868a3c68566932f15f49c0941249c1

                    SHA1

                    6feacb580d723ed7ffbccc43db6a2af4504deeea

                    SHA256

                    e69eb0ed3038babe2e752710292c4e7fdc1e5b3f667eb946ee847b1771142f4a

                    SHA512

                    83fb100f0be9fb5491d7b664aa08a1865919d55cf736050ee6c972fc7d0f4533a75b8321950b9a394365ee83d5453f2788ab90a9cefd56a78ed3bdbb18ff100e

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6365.exe

                    Filesize

                    705KB

                    MD5

                    e6868a3c68566932f15f49c0941249c1

                    SHA1

                    6feacb580d723ed7ffbccc43db6a2af4504deeea

                    SHA256

                    e69eb0ed3038babe2e752710292c4e7fdc1e5b3f667eb946ee847b1771142f4a

                    SHA512

                    83fb100f0be9fb5491d7b664aa08a1865919d55cf736050ee6c972fc7d0f4533a75b8321950b9a394365ee83d5453f2788ab90a9cefd56a78ed3bdbb18ff100e

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dWV74s66.exe

                    Filesize

                    380KB

                    MD5

                    c852629be9509c95c4ee99b32ccb3b94

                    SHA1

                    3b0753c6701d1d943e7e43b235b552bf74d2c1f0

                    SHA256

                    68ea03b88ded7dc47e9e7421469270bfe033e7db6cd4859682fee79fcedd120e

                    SHA512

                    ebdff4f4b4cfea56d98e0c68e57d206f0e760a1e924b9ec87f244ea3d1acd854f2824b28c075651eb6134eba54828ddc0d7dc09f801d0193836c60ce482b0281

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dWV74s66.exe

                    Filesize

                    380KB

                    MD5

                    c852629be9509c95c4ee99b32ccb3b94

                    SHA1

                    3b0753c6701d1d943e7e43b235b552bf74d2c1f0

                    SHA256

                    68ea03b88ded7dc47e9e7421469270bfe033e7db6cd4859682fee79fcedd120e

                    SHA512

                    ebdff4f4b4cfea56d98e0c68e57d206f0e760a1e924b9ec87f244ea3d1acd854f2824b28c075651eb6134eba54828ddc0d7dc09f801d0193836c60ce482b0281

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5585.exe

                    Filesize

                    349KB

                    MD5

                    17377a4a0b0a8e998f26c520d9cd8bd0

                    SHA1

                    df664312e777caf40921c970c830c75eac0b3092

                    SHA256

                    769641330d3aafc01457ec590328cf783ff0f942ec6145e6e03071c7c8e49632

                    SHA512

                    9dd6a2345509cb61cc2174da54264e97f62762da05ec95591cc66d13536d2a178b07c9a0957bad102d53303b83e3a76c127dec97573d0fefc314fcd2bd14501d

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5585.exe

                    Filesize

                    349KB

                    MD5

                    17377a4a0b0a8e998f26c520d9cd8bd0

                    SHA1

                    df664312e777caf40921c970c830c75eac0b3092

                    SHA256

                    769641330d3aafc01457ec590328cf783ff0f942ec6145e6e03071c7c8e49632

                    SHA512

                    9dd6a2345509cb61cc2174da54264e97f62762da05ec95591cc66d13536d2a178b07c9a0957bad102d53303b83e3a76c127dec97573d0fefc314fcd2bd14501d

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu884812.exe

                    Filesize

                    11KB

                    MD5

                    cbf47f66638aa1d11e6b2e4bc150f52f

                    SHA1

                    37087a1086dd9728038792f4f9771334581ab3f4

                    SHA256

                    6cb911e03d43e6561f1385abf9c13a1fdaa05cc2e97f0291771bfa5989880131

                    SHA512

                    0142b5659dcca61ca4064a479588c4d730b0a78a457dc9fab5a5d15f744af9a739fe2ff8a7c97a69c7a6e8ddb494ac0d2bb766cbdc1066d4502a7d11487efb2e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu884812.exe

                    Filesize

                    11KB

                    MD5

                    cbf47f66638aa1d11e6b2e4bc150f52f

                    SHA1

                    37087a1086dd9728038792f4f9771334581ab3f4

                    SHA256

                    6cb911e03d43e6561f1385abf9c13a1fdaa05cc2e97f0291771bfa5989880131

                    SHA512

                    0142b5659dcca61ca4064a479588c4d730b0a78a457dc9fab5a5d15f744af9a739fe2ff8a7c97a69c7a6e8ddb494ac0d2bb766cbdc1066d4502a7d11487efb2e

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5917.exe

                    Filesize

                    322KB

                    MD5

                    1319d8a438a532be963e5688c896a4cb

                    SHA1

                    4d87dfcd0089c2f80d6cae5514bb0b8f460fc6f2

                    SHA256

                    9bef0c03aefe69565a327af71ece2b2714494fd866ffe18d68554c1b6946b11d

                    SHA512

                    487c7c8c46c9f1b483ef2e0dc5cb84503603adc496b18b00bf49cad51c9a58503d4e31d6016ee167965c3fab49498d6846a358fba2557b8dbffa78d33436bbd7

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor5917.exe

                    Filesize

                    322KB

                    MD5

                    1319d8a438a532be963e5688c896a4cb

                    SHA1

                    4d87dfcd0089c2f80d6cae5514bb0b8f460fc6f2

                    SHA256

                    9bef0c03aefe69565a327af71ece2b2714494fd866ffe18d68554c1b6946b11d

                    SHA512

                    487c7c8c46c9f1b483ef2e0dc5cb84503603adc496b18b00bf49cad51c9a58503d4e31d6016ee167965c3fab49498d6846a358fba2557b8dbffa78d33436bbd7

                  • memory/1136-1141-0x0000000004E60000-0x0000000004E70000-memory.dmp

                    Filesize

                    64KB

                  • memory/1136-1140-0x0000000000520000-0x0000000000552000-memory.dmp

                    Filesize

                    200KB

                  • memory/2284-183-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-202-0x00000000072A0000-0x00000000072B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2284-177-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-175-0x0000000002C50000-0x0000000002C7D000-memory.dmp

                    Filesize

                    180KB

                  • memory/2284-185-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-187-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-189-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-191-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-193-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-195-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-197-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-199-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-200-0x0000000000400000-0x0000000002B7E000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/2284-181-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-203-0x00000000072A0000-0x00000000072B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2284-204-0x00000000072A0000-0x00000000072B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2284-205-0x0000000000400000-0x0000000002B7E000-memory.dmp

                    Filesize

                    39.5MB

                  • memory/2284-167-0x00000000072B0000-0x0000000007854000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/2284-180-0x00000000072A0000-0x00000000072B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2284-178-0x00000000072A0000-0x00000000072B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2284-176-0x00000000072A0000-0x00000000072B0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2284-173-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-171-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-169-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2284-168-0x0000000007220000-0x0000000007232000-memory.dmp

                    Filesize

                    72KB

                  • memory/2932-161-0x00000000004A0000-0x00000000004AA000-memory.dmp

                    Filesize

                    40KB

                  • memory/5084-210-0x0000000002C60000-0x0000000002CAB000-memory.dmp

                    Filesize

                    300KB

                  • memory/5084-222-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-226-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-228-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-230-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-232-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-234-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-236-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-238-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-240-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-242-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-244-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-246-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-1119-0x00000000078D0000-0x0000000007EE8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/5084-1120-0x0000000007F70000-0x000000000807A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/5084-1121-0x00000000080B0000-0x00000000080C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/5084-1122-0x00000000080D0000-0x000000000810C000-memory.dmp

                    Filesize

                    240KB

                  • memory/5084-1123-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/5084-1125-0x00000000083C0000-0x0000000008452000-memory.dmp

                    Filesize

                    584KB

                  • memory/5084-1126-0x0000000008460000-0x00000000084C6000-memory.dmp

                    Filesize

                    408KB

                  • memory/5084-1128-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/5084-1127-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/5084-1129-0x0000000008B80000-0x0000000008D42000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/5084-1130-0x0000000008D60000-0x000000000928C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/5084-1131-0x0000000009500000-0x0000000009576000-memory.dmp

                    Filesize

                    472KB

                  • memory/5084-224-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-220-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-218-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-216-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-213-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-214-0x0000000007130000-0x000000000716F000-memory.dmp

                    Filesize

                    252KB

                  • memory/5084-212-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/5084-211-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB

                  • memory/5084-1132-0x0000000009590000-0x00000000095E0000-memory.dmp

                    Filesize

                    320KB

                  • memory/5084-1133-0x0000000007210000-0x0000000007220000-memory.dmp

                    Filesize

                    64KB