Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29/03/2023, 08:21

General

  • Target

    30b4abf0fc4f7f6e961c9a2bd8d65d3033fffa61530ee7d73a8a6bd07b559dd6.exe

  • Size

    1011KB

  • MD5

    e6f9f40156981e16b37ddd06c863d55a

  • SHA1

    7f8df1939c0535fde48ab3f428e5a175d10c4d4c

  • SHA256

    30b4abf0fc4f7f6e961c9a2bd8d65d3033fffa61530ee7d73a8a6bd07b559dd6

  • SHA512

    55c309999d2c27cd6250cfd83b414fa36baa3afe171937549f5379cfe9997ad13889e4f37db38fba8b245b198ee2a2e05021989561bc4eac99d9fcd1222d8682

  • SSDEEP

    24576:XygGweNyw9M+G+Dyz3UKmjh5uhVL4K6Jls4:i3jNywlywLdshVL4K6

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nado

C2

176.113.115.145:4125

Attributes
  • auth_value

    a648e365d8e0df895a84152ad68ffc56

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30b4abf0fc4f7f6e961c9a2bd8d65d3033fffa61530ee7d73a8a6bd07b559dd6.exe
    "C:\Users\Admin\AppData\Local\Temp\30b4abf0fc4f7f6e961c9a2bd8d65d3033fffa61530ee7d73a8a6bd07b559dd6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5682.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5682.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5591.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5591.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0085.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0085.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1612
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9100.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9100.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4120
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0051eY.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0051eY.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w23Vb00.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w23Vb00.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xKHKX31.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xKHKX31.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y39hT94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y39hT94.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:5116
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3400
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5108
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:2776
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:1700
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1568
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:1660
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:3364
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:2036
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:3144
              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                1⤵
                • Executes dropped EXE
                PID:1952

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y39hT94.exe

                Filesize

                235KB

                MD5

                ec37354a733f969df74158e036381cac

                SHA1

                bbe99a8e92a24fbc3a8db46f89be6c7d6bbe0232

                SHA256

                0deda4bc9a3c1ab3b1b36b7f2926dccb84b4c0e71379acbc1696f813faa3a034

                SHA512

                2bb77b014085175b162c3c06028282d2a3dac4d442b23e67313f2d42c22c3f7cb6b076c782c1470eef69d6e233ec40b9f9ead0d5ad8892f07657aa2088834b94

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y39hT94.exe

                Filesize

                235KB

                MD5

                ec37354a733f969df74158e036381cac

                SHA1

                bbe99a8e92a24fbc3a8db46f89be6c7d6bbe0232

                SHA256

                0deda4bc9a3c1ab3b1b36b7f2926dccb84b4c0e71379acbc1696f813faa3a034

                SHA512

                2bb77b014085175b162c3c06028282d2a3dac4d442b23e67313f2d42c22c3f7cb6b076c782c1470eef69d6e233ec40b9f9ead0d5ad8892f07657aa2088834b94

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5682.exe

                Filesize

                827KB

                MD5

                95989d0963c906ced87d3ca8498c9073

                SHA1

                bec39522eb7fa41f45ccbf1b38a6e4357c9cdacb

                SHA256

                fa6b5bd0ddd986e6f29b7c56e610004c3c25b99bd0258894fd3de4499b64fe7c

                SHA512

                340bb0c447e747468a118d8c4776c312e91889214db6c1cb62f1c06d886769b519d1189ef85fb2814336e58561a0e7faa9d6161e07c8b6525d11131df5387808

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5682.exe

                Filesize

                827KB

                MD5

                95989d0963c906ced87d3ca8498c9073

                SHA1

                bec39522eb7fa41f45ccbf1b38a6e4357c9cdacb

                SHA256

                fa6b5bd0ddd986e6f29b7c56e610004c3c25b99bd0258894fd3de4499b64fe7c

                SHA512

                340bb0c447e747468a118d8c4776c312e91889214db6c1cb62f1c06d886769b519d1189ef85fb2814336e58561a0e7faa9d6161e07c8b6525d11131df5387808

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xKHKX31.exe

                Filesize

                175KB

                MD5

                5f8d2bfc4b3bb5ef1c96c9d0b92a6b31

                SHA1

                f3244940190f026f812ed12b19d6b3685e23b3e1

                SHA256

                bf218756f382b8330e1840698a8a78be0682f789770f9e160ddd13178c507138

                SHA512

                6fa04e6d787b6f453dd3ca5b26dd33bbfc67130e779ebbd8cf0945a3845d9d464ed656431788504d6f9547d3494eeff61f736aa1998b8f6c6e23a632b1bb1c5b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xKHKX31.exe

                Filesize

                175KB

                MD5

                5f8d2bfc4b3bb5ef1c96c9d0b92a6b31

                SHA1

                f3244940190f026f812ed12b19d6b3685e23b3e1

                SHA256

                bf218756f382b8330e1840698a8a78be0682f789770f9e160ddd13178c507138

                SHA512

                6fa04e6d787b6f453dd3ca5b26dd33bbfc67130e779ebbd8cf0945a3845d9d464ed656431788504d6f9547d3494eeff61f736aa1998b8f6c6e23a632b1bb1c5b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5591.exe

                Filesize

                684KB

                MD5

                6846a770b0caf8654f020837246f25f2

                SHA1

                67ff2cd20bb3fd880b11e4f72b9d7a393e1ec7fa

                SHA256

                b82a9d632098b4015fb0d9fb257b25ce8a6cf55efdb5c008a5230d44ccdcd3ee

                SHA512

                53277625f212c4fc4118f16570aa172125b1c87f915a56fcf62e7869c8216b3a3438647591f41f056fe9b84c104a39b8f1b7159cde78f94f31f2932a3b9accb8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5591.exe

                Filesize

                684KB

                MD5

                6846a770b0caf8654f020837246f25f2

                SHA1

                67ff2cd20bb3fd880b11e4f72b9d7a393e1ec7fa

                SHA256

                b82a9d632098b4015fb0d9fb257b25ce8a6cf55efdb5c008a5230d44ccdcd3ee

                SHA512

                53277625f212c4fc4118f16570aa172125b1c87f915a56fcf62e7869c8216b3a3438647591f41f056fe9b84c104a39b8f1b7159cde78f94f31f2932a3b9accb8

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w23Vb00.exe

                Filesize

                345KB

                MD5

                bb9d375668602ebe5a01325cb0eb5601

                SHA1

                e38ba4d8091a98a273eea639a0d79e43b43cd83a

                SHA256

                956fa7bfe1e4b4df3235fdd04176dfaba3d6d07eb0da3af92c5d3ff1f1dd6c56

                SHA512

                b7650f0061b2ba39e4fe9eb36187ef9afee10190cdd6e79942fbfa82f5a6193600308b605ec736dee08c64702ca7ac70208e1d9bed684478ad442d38a540a9e2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w23Vb00.exe

                Filesize

                345KB

                MD5

                bb9d375668602ebe5a01325cb0eb5601

                SHA1

                e38ba4d8091a98a273eea639a0d79e43b43cd83a

                SHA256

                956fa7bfe1e4b4df3235fdd04176dfaba3d6d07eb0da3af92c5d3ff1f1dd6c56

                SHA512

                b7650f0061b2ba39e4fe9eb36187ef9afee10190cdd6e79942fbfa82f5a6193600308b605ec736dee08c64702ca7ac70208e1d9bed684478ad442d38a540a9e2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0085.exe

                Filesize

                333KB

                MD5

                493c5701c18abcdfe4c0c2a33d819569

                SHA1

                295380df1646aafeab240ece39d5751d042a273c

                SHA256

                a4cba76eb5f49ec5d58251af6768cd6429c32936e06dac3a9aa1c84b51b35175

                SHA512

                068f809d0e3e02f50fb9cd7c5dc149bb50e3859b3adc76b8566c0a470d277f226fd853499b53bb90c9370efe7d8422ca05aa5b4b4a7b089c93975e1542f1ff6e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0085.exe

                Filesize

                333KB

                MD5

                493c5701c18abcdfe4c0c2a33d819569

                SHA1

                295380df1646aafeab240ece39d5751d042a273c

                SHA256

                a4cba76eb5f49ec5d58251af6768cd6429c32936e06dac3a9aa1c84b51b35175

                SHA512

                068f809d0e3e02f50fb9cd7c5dc149bb50e3859b3adc76b8566c0a470d277f226fd853499b53bb90c9370efe7d8422ca05aa5b4b4a7b089c93975e1542f1ff6e

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9100.exe

                Filesize

                12KB

                MD5

                4aa6522ab39a93a366e9913e6569dc6d

                SHA1

                72bb130a0013c9a4aa937e67cde244125bb14515

                SHA256

                3c52bbb97dc2582e759c91b37b6fb5c8d6320426b36c995df0de1d3001cc5af4

                SHA512

                f577b7d0ada0dba9f5eda77dacef94637254e94f522e580b881a51a2995dd97a4a669c3d0de027879db7e5f2f2c823032d45d76cd17a81b3ffc117f6f35ce79d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9100.exe

                Filesize

                12KB

                MD5

                4aa6522ab39a93a366e9913e6569dc6d

                SHA1

                72bb130a0013c9a4aa937e67cde244125bb14515

                SHA256

                3c52bbb97dc2582e759c91b37b6fb5c8d6320426b36c995df0de1d3001cc5af4

                SHA512

                f577b7d0ada0dba9f5eda77dacef94637254e94f522e580b881a51a2995dd97a4a669c3d0de027879db7e5f2f2c823032d45d76cd17a81b3ffc117f6f35ce79d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0051eY.exe

                Filesize

                263KB

                MD5

                15731579508c0e83a7c912b3e0e24ab7

                SHA1

                592ede5f135be57ec021168de09757d0d94065d1

                SHA256

                f4fbadab79e1d809f2e564d44574665af51cf23e00102e7566a7074aa458d9e7

                SHA512

                ffd09d9b7870d9f66c34212081812807b05998c0a89d0f631d3e1ca2ccff5f4387301d3810b4ea7ea12980248983acbaf975a89014911dcdce1d8a077d39cfda

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0051eY.exe

                Filesize

                263KB

                MD5

                15731579508c0e83a7c912b3e0e24ab7

                SHA1

                592ede5f135be57ec021168de09757d0d94065d1

                SHA256

                f4fbadab79e1d809f2e564d44574665af51cf23e00102e7566a7074aa458d9e7

                SHA512

                ffd09d9b7870d9f66c34212081812807b05998c0a89d0f631d3e1ca2ccff5f4387301d3810b4ea7ea12980248983acbaf975a89014911dcdce1d8a077d39cfda

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                ec37354a733f969df74158e036381cac

                SHA1

                bbe99a8e92a24fbc3a8db46f89be6c7d6bbe0232

                SHA256

                0deda4bc9a3c1ab3b1b36b7f2926dccb84b4c0e71379acbc1696f813faa3a034

                SHA512

                2bb77b014085175b162c3c06028282d2a3dac4d442b23e67313f2d42c22c3f7cb6b076c782c1470eef69d6e233ec40b9f9ead0d5ad8892f07657aa2088834b94

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                ec37354a733f969df74158e036381cac

                SHA1

                bbe99a8e92a24fbc3a8db46f89be6c7d6bbe0232

                SHA256

                0deda4bc9a3c1ab3b1b36b7f2926dccb84b4c0e71379acbc1696f813faa3a034

                SHA512

                2bb77b014085175b162c3c06028282d2a3dac4d442b23e67313f2d42c22c3f7cb6b076c782c1470eef69d6e233ec40b9f9ead0d5ad8892f07657aa2088834b94

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                ec37354a733f969df74158e036381cac

                SHA1

                bbe99a8e92a24fbc3a8db46f89be6c7d6bbe0232

                SHA256

                0deda4bc9a3c1ab3b1b36b7f2926dccb84b4c0e71379acbc1696f813faa3a034

                SHA512

                2bb77b014085175b162c3c06028282d2a3dac4d442b23e67313f2d42c22c3f7cb6b076c782c1470eef69d6e233ec40b9f9ead0d5ad8892f07657aa2088834b94

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                ec37354a733f969df74158e036381cac

                SHA1

                bbe99a8e92a24fbc3a8db46f89be6c7d6bbe0232

                SHA256

                0deda4bc9a3c1ab3b1b36b7f2926dccb84b4c0e71379acbc1696f813faa3a034

                SHA512

                2bb77b014085175b162c3c06028282d2a3dac4d442b23e67313f2d42c22c3f7cb6b076c782c1470eef69d6e233ec40b9f9ead0d5ad8892f07657aa2088834b94

              • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                Filesize

                235KB

                MD5

                ec37354a733f969df74158e036381cac

                SHA1

                bbe99a8e92a24fbc3a8db46f89be6c7d6bbe0232

                SHA256

                0deda4bc9a3c1ab3b1b36b7f2926dccb84b4c0e71379acbc1696f813faa3a034

                SHA512

                2bb77b014085175b162c3c06028282d2a3dac4d442b23e67313f2d42c22c3f7cb6b076c782c1470eef69d6e233ec40b9f9ead0d5ad8892f07657aa2088834b94

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                223B

                MD5

                94cbeec5d4343918fd0e48760e40539c

                SHA1

                a049266c5c1131f692f306c8710d7e72586ae79d

                SHA256

                48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                SHA512

                4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                16cf28ebb6d37dbaba93f18320c6086e

                SHA1

                eae7d4b7a9636329065877aabe8d4f721a26ab25

                SHA256

                c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                SHA512

                f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

              • memory/1180-1118-0x0000000005BF0000-0x0000000005C82000-memory.dmp

                Filesize

                584KB

              • memory/1180-234-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-1127-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                Filesize

                64KB

              • memory/1180-1126-0x0000000006760000-0x0000000006C8C000-memory.dmp

                Filesize

                5.2MB

              • memory/1180-1125-0x0000000006570000-0x0000000006732000-memory.dmp

                Filesize

                1.8MB

              • memory/1180-1124-0x00000000063F0000-0x0000000006440000-memory.dmp

                Filesize

                320KB

              • memory/1180-1123-0x0000000006350000-0x00000000063C6000-memory.dmp

                Filesize

                472KB

              • memory/1180-1122-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                Filesize

                64KB

              • memory/1180-1121-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                Filesize

                64KB

              • memory/1180-1120-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                Filesize

                64KB

              • memory/1180-1119-0x0000000005C90000-0x0000000005CF6000-memory.dmp

                Filesize

                408KB

              • memory/1180-1116-0x0000000005A60000-0x0000000005AAB000-memory.dmp

                Filesize

                300KB

              • memory/1180-1115-0x0000000005910000-0x000000000594E000-memory.dmp

                Filesize

                248KB

              • memory/1180-1113-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                Filesize

                64KB

              • memory/1180-199-0x00000000021B0000-0x00000000021F6000-memory.dmp

                Filesize

                280KB

              • memory/1180-200-0x00000000023E0000-0x0000000002424000-memory.dmp

                Filesize

                272KB

              • memory/1180-201-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-202-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-204-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-206-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-208-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-210-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-212-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-215-0x00000000004D0000-0x000000000051B000-memory.dmp

                Filesize

                300KB

              • memory/1180-214-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-216-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                Filesize

                64KB

              • memory/1180-218-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                Filesize

                64KB

              • memory/1180-221-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

                Filesize

                64KB

              • memory/1180-219-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-222-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-224-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-226-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-228-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-230-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-232-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-1114-0x00000000058F0000-0x0000000005902000-memory.dmp

                Filesize

                72KB

              • memory/1180-236-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-238-0x00000000023E0000-0x000000000241F000-memory.dmp

                Filesize

                252KB

              • memory/1180-1111-0x00000000051B0000-0x00000000057B6000-memory.dmp

                Filesize

                6.0MB

              • memory/1180-1112-0x00000000057C0000-0x00000000058CA000-memory.dmp

                Filesize

                1.0MB

              • memory/3208-1133-0x00000000003C0000-0x00000000003F2000-memory.dmp

                Filesize

                200KB

              • memory/3208-1135-0x0000000004F00000-0x0000000004F10000-memory.dmp

                Filesize

                64KB

              • memory/3208-1134-0x0000000004E00000-0x0000000004E4B000-memory.dmp

                Filesize

                300KB

              • memory/4120-149-0x0000000000F80000-0x0000000000F8A000-memory.dmp

                Filesize

                40KB

              • memory/4644-171-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-194-0x0000000000400000-0x00000000004B1000-memory.dmp

                Filesize

                708KB

              • memory/4644-192-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4644-190-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4644-189-0x0000000000400000-0x00000000004B1000-memory.dmp

                Filesize

                708KB

              • memory/4644-188-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4644-187-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-185-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-183-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-181-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-179-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-169-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-173-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-193-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4644-177-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-167-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-165-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-163-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-161-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-160-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB

              • memory/4644-159-0x0000000002400000-0x0000000002418000-memory.dmp

                Filesize

                96KB

              • memory/4644-158-0x0000000004BC0000-0x00000000050BE000-memory.dmp

                Filesize

                5.0MB

              • memory/4644-157-0x0000000001FF0000-0x000000000200A000-memory.dmp

                Filesize

                104KB

              • memory/4644-156-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4644-155-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4644-175-0x0000000002400000-0x0000000002412000-memory.dmp

                Filesize

                72KB