Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29/03/2023, 06:08

General

  • Target

    70bee557ef45d618a95929c337c85b7a82583be3843d47376cdb026b1867a5a6.exe

  • Size

    1.0MB

  • MD5

    b8d341cf32b34bb88759892cfae3f344

  • SHA1

    15a971da4a8c83390c38607ee13492ffdd95f8a9

  • SHA256

    70bee557ef45d618a95929c337c85b7a82583be3843d47376cdb026b1867a5a6

  • SHA512

    1e059c1eca5e95bb449923cc3e96e9ad481181924f8debedb29338d65efe3c1e8c21da60c3a959227f9211e23f04b9cf4de6548d82db7024ecdc12f0c553c043

  • SSDEEP

    24576:yy4dN9wIq4DZ8ob+RjWJf9OzY56wZtENtlq552s:Z0Z8ob+QJf9OzY5680tl0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nado

C2

176.113.115.145:4125

Attributes
  • auth_value

    a648e365d8e0df895a84152ad68ffc56

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70bee557ef45d618a95929c337c85b7a82583be3843d47376cdb026b1867a5a6.exe
    "C:\Users\Admin\AppData\Local\Temp\70bee557ef45d618a95929c337c85b7a82583be3843d47376cdb026b1867a5a6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0171.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0171.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7608.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7608.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9458.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9458.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4120
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9260.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9260.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4340
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8166xW.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8166xW.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4188
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w80nw98.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w80nw98.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xuONr74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xuONr74.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y05BP49.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y05BP49.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3972
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4416
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:4368
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:4916
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4376
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:5048
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:5032
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4472
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:4104

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y05BP49.exe

                Filesize

                235KB

                MD5

                b77a93d2197acd076f01600883619411

                SHA1

                1913d368cd6b047e7a90594ec0a7f4aa189f50ae

                SHA256

                52b466fe0d6b238722e6ecb61133ef6c9fb16a9a805a8dd55d93fe7566fa2fbc

                SHA512

                12a08e54344b8a355d8a9c5b337c63a8bc3b740f3a5cd75e89c3d3a7669638965f63bdba3c873987754b12461e23725b927270265564809bac1ca163599670f0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y05BP49.exe

                Filesize

                235KB

                MD5

                b77a93d2197acd076f01600883619411

                SHA1

                1913d368cd6b047e7a90594ec0a7f4aa189f50ae

                SHA256

                52b466fe0d6b238722e6ecb61133ef6c9fb16a9a805a8dd55d93fe7566fa2fbc

                SHA512

                12a08e54344b8a355d8a9c5b337c63a8bc3b740f3a5cd75e89c3d3a7669638965f63bdba3c873987754b12461e23725b927270265564809bac1ca163599670f0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0171.exe

                Filesize

                840KB

                MD5

                32b98f4c85e06a61419abbcaf1f87aee

                SHA1

                67c2c498282a2532d5003aa9c6ef4eb6fbf42aef

                SHA256

                39c7d87f3de05d29a77b99444932b5f661f77702cc6d3e5a09bce05512af9f92

                SHA512

                e36a4589bded81f0e038d974592afe217771a0d5da22dd46e15863edb639214896badc6b0f511df6fb6656ce085c79700e6aaf87e7446b211ab40de6b224e43a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0171.exe

                Filesize

                840KB

                MD5

                32b98f4c85e06a61419abbcaf1f87aee

                SHA1

                67c2c498282a2532d5003aa9c6ef4eb6fbf42aef

                SHA256

                39c7d87f3de05d29a77b99444932b5f661f77702cc6d3e5a09bce05512af9f92

                SHA512

                e36a4589bded81f0e038d974592afe217771a0d5da22dd46e15863edb639214896badc6b0f511df6fb6656ce085c79700e6aaf87e7446b211ab40de6b224e43a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xuONr74.exe

                Filesize

                175KB

                MD5

                5e5f1abfd8f120f9a1f3f2b5c01b2d66

                SHA1

                efb7cb8cb1eee9178a3400bb3aa81d06bfb4bf3f

                SHA256

                d5d7671dca393a0a4adee97d91bc4354dcff8c96b67cd878825f7cdedfa0a6ff

                SHA512

                810faf7e984ad9b21cc3e401b5759205b36bd0b200afbf3a15221cfad30f72eaaf201de75222dd541413213c4084d1fa111501b8ae62f818cd6656d33175e170

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xuONr74.exe

                Filesize

                175KB

                MD5

                5e5f1abfd8f120f9a1f3f2b5c01b2d66

                SHA1

                efb7cb8cb1eee9178a3400bb3aa81d06bfb4bf3f

                SHA256

                d5d7671dca393a0a4adee97d91bc4354dcff8c96b67cd878825f7cdedfa0a6ff

                SHA512

                810faf7e984ad9b21cc3e401b5759205b36bd0b200afbf3a15221cfad30f72eaaf201de75222dd541413213c4084d1fa111501b8ae62f818cd6656d33175e170

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7608.exe

                Filesize

                698KB

                MD5

                c7c8e2de1d6cf579710915980d1f5984

                SHA1

                03c19f82317217065a7968b85e7198a4449046ae

                SHA256

                0aa4d184c3e6476d29b94d98c237f470d8c8cb86f7e9e44e1001a188b736c961

                SHA512

                def3ee9ac27d33dcfd2f1d69789fc2836842178bdce1df40e45db6ea5e83e65a18be96472136720696add0013f560f1b313bf37c08bf2464ee09f36ae91640b7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7608.exe

                Filesize

                698KB

                MD5

                c7c8e2de1d6cf579710915980d1f5984

                SHA1

                03c19f82317217065a7968b85e7198a4449046ae

                SHA256

                0aa4d184c3e6476d29b94d98c237f470d8c8cb86f7e9e44e1001a188b736c961

                SHA512

                def3ee9ac27d33dcfd2f1d69789fc2836842178bdce1df40e45db6ea5e83e65a18be96472136720696add0013f560f1b313bf37c08bf2464ee09f36ae91640b7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w80nw98.exe

                Filesize

                345KB

                MD5

                dcefd55f49f415016fed6e93869e45f7

                SHA1

                a4da1e831e91d6394b61ff5dd71733997b445d54

                SHA256

                1f960c7f1f97413ad58a3a4abd61b7069405a21fd0faa5e33bdddfb05d6b38c0

                SHA512

                b97466c22515e771470c6d2ee602b73bde0514ed0446358b6c84a63d4b0216bc3d572a192eddc20bec5b3c24c14175fcf50108fec10e83efc02574009250d294

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w80nw98.exe

                Filesize

                345KB

                MD5

                dcefd55f49f415016fed6e93869e45f7

                SHA1

                a4da1e831e91d6394b61ff5dd71733997b445d54

                SHA256

                1f960c7f1f97413ad58a3a4abd61b7069405a21fd0faa5e33bdddfb05d6b38c0

                SHA512

                b97466c22515e771470c6d2ee602b73bde0514ed0446358b6c84a63d4b0216bc3d572a192eddc20bec5b3c24c14175fcf50108fec10e83efc02574009250d294

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9458.exe

                Filesize

                346KB

                MD5

                3bedbc3681a75522841d2276abd84cf0

                SHA1

                26da3ebeac54e9c068de9052fd4082e66a241ee2

                SHA256

                a894c311c3f0b9521b8a8ce9049f2d2e7755b32629aaba67217f0cf06a946489

                SHA512

                3ff7a23350f671d1b94e2706ad55bd3ba9819213cb6cee29a967c4ba7c92016d1a9724afccd93fc978117ba677684019869e8f66204d43d2dda5c05fa33d94a5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9458.exe

                Filesize

                346KB

                MD5

                3bedbc3681a75522841d2276abd84cf0

                SHA1

                26da3ebeac54e9c068de9052fd4082e66a241ee2

                SHA256

                a894c311c3f0b9521b8a8ce9049f2d2e7755b32629aaba67217f0cf06a946489

                SHA512

                3ff7a23350f671d1b94e2706ad55bd3ba9819213cb6cee29a967c4ba7c92016d1a9724afccd93fc978117ba677684019869e8f66204d43d2dda5c05fa33d94a5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9260.exe

                Filesize

                12KB

                MD5

                fa96e847178070c9394964356d916f3d

                SHA1

                2437a2e27c981e2a8821f5b91668387bc2152a24

                SHA256

                ad46b6158d4261eb391aece57355e70905ceff6fa1291a33d7ac287568680807

                SHA512

                0bb814d3b73934ca3c52e0349923d96fddd8c7ba3e2cbf2ee0bc9ca2feb5acccf18db4d5937495bad5047bd3906f4c769796a79c4bcb0645db04d236355e074a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9260.exe

                Filesize

                12KB

                MD5

                fa96e847178070c9394964356d916f3d

                SHA1

                2437a2e27c981e2a8821f5b91668387bc2152a24

                SHA256

                ad46b6158d4261eb391aece57355e70905ceff6fa1291a33d7ac287568680807

                SHA512

                0bb814d3b73934ca3c52e0349923d96fddd8c7ba3e2cbf2ee0bc9ca2feb5acccf18db4d5937495bad5047bd3906f4c769796a79c4bcb0645db04d236355e074a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8166xW.exe

                Filesize

                288KB

                MD5

                1b8250afa281953b89fdb85655fee106

                SHA1

                4ec404cbc5275247ca391a561da7f60f196dea8f

                SHA256

                93ab3ff89a0f7e3213f49ca8d5112479c66847280aef4855259d3c2ff705a4f2

                SHA512

                152e816a41aaa1e36405d3bbf7181027731e21906a8ae6f82c2cb1b0af85b6872c8fa5f263381cdbc82353cebbcf14b61e54571ce8b7c7a672ee02978c18df79

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8166xW.exe

                Filesize

                288KB

                MD5

                1b8250afa281953b89fdb85655fee106

                SHA1

                4ec404cbc5275247ca391a561da7f60f196dea8f

                SHA256

                93ab3ff89a0f7e3213f49ca8d5112479c66847280aef4855259d3c2ff705a4f2

                SHA512

                152e816a41aaa1e36405d3bbf7181027731e21906a8ae6f82c2cb1b0af85b6872c8fa5f263381cdbc82353cebbcf14b61e54571ce8b7c7a672ee02978c18df79

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                b77a93d2197acd076f01600883619411

                SHA1

                1913d368cd6b047e7a90594ec0a7f4aa189f50ae

                SHA256

                52b466fe0d6b238722e6ecb61133ef6c9fb16a9a805a8dd55d93fe7566fa2fbc

                SHA512

                12a08e54344b8a355d8a9c5b337c63a8bc3b740f3a5cd75e89c3d3a7669638965f63bdba3c873987754b12461e23725b927270265564809bac1ca163599670f0

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                b77a93d2197acd076f01600883619411

                SHA1

                1913d368cd6b047e7a90594ec0a7f4aa189f50ae

                SHA256

                52b466fe0d6b238722e6ecb61133ef6c9fb16a9a805a8dd55d93fe7566fa2fbc

                SHA512

                12a08e54344b8a355d8a9c5b337c63a8bc3b740f3a5cd75e89c3d3a7669638965f63bdba3c873987754b12461e23725b927270265564809bac1ca163599670f0

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                b77a93d2197acd076f01600883619411

                SHA1

                1913d368cd6b047e7a90594ec0a7f4aa189f50ae

                SHA256

                52b466fe0d6b238722e6ecb61133ef6c9fb16a9a805a8dd55d93fe7566fa2fbc

                SHA512

                12a08e54344b8a355d8a9c5b337c63a8bc3b740f3a5cd75e89c3d3a7669638965f63bdba3c873987754b12461e23725b927270265564809bac1ca163599670f0

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                b77a93d2197acd076f01600883619411

                SHA1

                1913d368cd6b047e7a90594ec0a7f4aa189f50ae

                SHA256

                52b466fe0d6b238722e6ecb61133ef6c9fb16a9a805a8dd55d93fe7566fa2fbc

                SHA512

                12a08e54344b8a355d8a9c5b337c63a8bc3b740f3a5cd75e89c3d3a7669638965f63bdba3c873987754b12461e23725b927270265564809bac1ca163599670f0

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • memory/4188-171-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-191-0x00000000021E0000-0x00000000021F0000-memory.dmp

                Filesize

                64KB

              • memory/4188-167-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-173-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-175-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-177-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-179-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-181-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-183-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-185-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-187-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-189-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-190-0x0000000000400000-0x00000000004B7000-memory.dmp

                Filesize

                732KB

              • memory/4188-169-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-192-0x00000000021E0000-0x00000000021F0000-memory.dmp

                Filesize

                64KB

              • memory/4188-193-0x00000000021E0000-0x00000000021F0000-memory.dmp

                Filesize

                64KB

              • memory/4188-195-0x0000000000400000-0x00000000004B7000-memory.dmp

                Filesize

                732KB

              • memory/4188-155-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4188-165-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-163-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-162-0x0000000002100000-0x0000000002112000-memory.dmp

                Filesize

                72KB

              • memory/4188-161-0x00000000021E0000-0x00000000021F0000-memory.dmp

                Filesize

                64KB

              • memory/4188-160-0x0000000002100000-0x0000000002118000-memory.dmp

                Filesize

                96KB

              • memory/4188-159-0x00000000021E0000-0x00000000021F0000-memory.dmp

                Filesize

                64KB

              • memory/4188-158-0x00000000021E0000-0x00000000021F0000-memory.dmp

                Filesize

                64KB

              • memory/4188-157-0x0000000004A80000-0x0000000004F7E000-memory.dmp

                Filesize

                5.0MB

              • memory/4188-156-0x00000000007F0000-0x000000000080A000-memory.dmp

                Filesize

                104KB

              • memory/4340-149-0x0000000000970000-0x000000000097A000-memory.dmp

                Filesize

                40KB

              • memory/4600-209-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-1120-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4600-221-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-223-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-225-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-227-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-229-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-231-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-233-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-235-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-400-0x00000000005A0000-0x00000000005EB000-memory.dmp

                Filesize

                300KB

              • memory/4600-402-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4600-404-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4600-406-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4600-1112-0x0000000004FE0000-0x00000000055E6000-memory.dmp

                Filesize

                6.0MB

              • memory/4600-1113-0x0000000005670000-0x000000000577A000-memory.dmp

                Filesize

                1.0MB

              • memory/4600-1114-0x00000000057B0000-0x00000000057C2000-memory.dmp

                Filesize

                72KB

              • memory/4600-1115-0x00000000057D0000-0x000000000580E000-memory.dmp

                Filesize

                248KB

              • memory/4600-1116-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4600-1117-0x0000000005920000-0x000000000596B000-memory.dmp

                Filesize

                300KB

              • memory/4600-1119-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4600-219-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-1121-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4600-1122-0x0000000005AB0000-0x0000000005B42000-memory.dmp

                Filesize

                584KB

              • memory/4600-1123-0x0000000005B50000-0x0000000005BB6000-memory.dmp

                Filesize

                408KB

              • memory/4600-1124-0x0000000006260000-0x0000000006422000-memory.dmp

                Filesize

                1.8MB

              • memory/4600-1125-0x0000000006430000-0x000000000695C000-memory.dmp

                Filesize

                5.2MB

              • memory/4600-1126-0x0000000006B90000-0x0000000006C06000-memory.dmp

                Filesize

                472KB

              • memory/4600-1127-0x0000000006C10000-0x0000000006C60000-memory.dmp

                Filesize

                320KB

              • memory/4600-1128-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

                Filesize

                64KB

              • memory/4600-200-0x00000000049C0000-0x0000000004A06000-memory.dmp

                Filesize

                280KB

              • memory/4600-201-0x0000000004A40000-0x0000000004A84000-memory.dmp

                Filesize

                272KB

              • memory/4600-202-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-203-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-217-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-215-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-213-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-211-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-207-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4600-205-0x0000000004A40000-0x0000000004A7F000-memory.dmp

                Filesize

                252KB

              • memory/4792-1138-0x00000000051C0000-0x00000000051D0000-memory.dmp

                Filesize

                64KB

              • memory/4792-1137-0x00000000051C0000-0x00000000051D0000-memory.dmp

                Filesize

                64KB

              • memory/4792-1136-0x0000000005090000-0x00000000050DB000-memory.dmp

                Filesize

                300KB

              • memory/4792-1135-0x0000000000640000-0x0000000000672000-memory.dmp

                Filesize

                200KB