Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    109s
  • max time network
    113s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/03/2023, 12:42

General

  • Target

    4b19b0b195f918f90ce0fe97c4a77e685454bcab4a1bb96b797cc9d477ca348e.exe

  • Size

    989KB

  • MD5

    3cdaeb609598f57f199730caa3dc71ad

  • SHA1

    77b5eb0bb03add9878262bdffb4e1e34f1e7cf12

  • SHA256

    4b19b0b195f918f90ce0fe97c4a77e685454bcab4a1bb96b797cc9d477ca348e

  • SHA512

    0d166350fed5e047620a1dcbd032050b1d8684f19e3897de7109b5ebfee9ce0854bafcef0b7b655c46773fc822431aea85d3a0b54b8c04a170ab8ff71aa21a15

  • SSDEEP

    24576:KyDI35rzBYdEzsd/9FvKttBZD8vfvtu42yMY98OrkoR:RDsYSavnFN3gOgo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

lino

C2

176.113.115.145:4125

Attributes
  • auth_value

    ac19251c9237676a0dd7d46d3f536e96

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b19b0b195f918f90ce0fe97c4a77e685454bcab4a1bb96b797cc9d477ca348e.exe
    "C:\Users\Admin\AppData\Local\Temp\4b19b0b195f918f90ce0fe97c4a77e685454bcab4a1bb96b797cc9d477ca348e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0818.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0818.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4298.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4298.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2508.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2508.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3236
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2343.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2343.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5076
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6662yh.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6662yh.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4476
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w11Jm24.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w11Jm24.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xhHDV00.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xhHDV00.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y89lh08.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y89lh08.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4428
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4360
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c5d2db5804" /P "Admin:N"&&CACLS "..\c5d2db5804" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4384
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4292
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4288
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:5080
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5068
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c5d2db5804" /P "Admin:N"
                    5⤵
                      PID:5064
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c5d2db5804" /P "Admin:R" /E
                      5⤵
                        PID:5108
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4904
              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:5040

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y89lh08.exe

                Filesize

                236KB

                MD5

                2f222b74f23999a18c17dd1c16c0caa9

                SHA1

                0b5d8d4a796e1a3b4b6c0a84f3b6f17a2af33d40

                SHA256

                bdc85210d201b3ccfc55ead6b29ff3bb5dfa1d19374c1f5b52531df1d2a0cddc

                SHA512

                4e697f419de4271bed0fa678fbf2122da7ff5ba86035d5f90120ea025ea236439b9218bf1834d753bb757592d049259d55a5963307fc89ee8b9112a851a5209d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y89lh08.exe

                Filesize

                236KB

                MD5

                2f222b74f23999a18c17dd1c16c0caa9

                SHA1

                0b5d8d4a796e1a3b4b6c0a84f3b6f17a2af33d40

                SHA256

                bdc85210d201b3ccfc55ead6b29ff3bb5dfa1d19374c1f5b52531df1d2a0cddc

                SHA512

                4e697f419de4271bed0fa678fbf2122da7ff5ba86035d5f90120ea025ea236439b9218bf1834d753bb757592d049259d55a5963307fc89ee8b9112a851a5209d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0818.exe

                Filesize

                805KB

                MD5

                0191e169928969ac48e423d8a893ecf9

                SHA1

                d1d09ccff0c659616843b31014aa177c178d0e58

                SHA256

                64c528857d9a9e27c5f2079fd82768484b7fb62307fe4ff0abc6f49eff8bd062

                SHA512

                ba47313563366d3e83f0bb06f3da9d6b9e45f4cb0a177bc15b4ca9eab40b086685d185660c1e833262c39aec3763863788427206088e491751290c9c3cbfe254

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0818.exe

                Filesize

                805KB

                MD5

                0191e169928969ac48e423d8a893ecf9

                SHA1

                d1d09ccff0c659616843b31014aa177c178d0e58

                SHA256

                64c528857d9a9e27c5f2079fd82768484b7fb62307fe4ff0abc6f49eff8bd062

                SHA512

                ba47313563366d3e83f0bb06f3da9d6b9e45f4cb0a177bc15b4ca9eab40b086685d185660c1e833262c39aec3763863788427206088e491751290c9c3cbfe254

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xhHDV00.exe

                Filesize

                175KB

                MD5

                0a16bd831cc0cc5af5d4116de9520968

                SHA1

                94720dfe8986b5f95346bcbd8836aa1d98648af1

                SHA256

                1562d460af63ce715fa159b213d18df6f901dbaab771a8d7be8162a874ceaa2c

                SHA512

                268c8e4b4db2d0a50bc7be4a832a816036381d223e01094c503265caf74a43db21d4b98fe0e6c77a7469b7cd4da155cabda18e619b162529f252538f60951d46

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xhHDV00.exe

                Filesize

                175KB

                MD5

                0a16bd831cc0cc5af5d4116de9520968

                SHA1

                94720dfe8986b5f95346bcbd8836aa1d98648af1

                SHA256

                1562d460af63ce715fa159b213d18df6f901dbaab771a8d7be8162a874ceaa2c

                SHA512

                268c8e4b4db2d0a50bc7be4a832a816036381d223e01094c503265caf74a43db21d4b98fe0e6c77a7469b7cd4da155cabda18e619b162529f252538f60951d46

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4298.exe

                Filesize

                663KB

                MD5

                d2e169ebb32042444adb534e22b2af2b

                SHA1

                30c1809474bdd0649e19d831eddf2f50f436bb28

                SHA256

                2370d1772b3a466b666e03cec8817e661fa13978298ff63d17a36f496cc6d26b

                SHA512

                dfe354cf5b65af01f901c3c3cfb95ab94956a99eec406d24f449ddcbf39a5bde8866c2282bb9a28c4c9975e1845e50c04814d68ec09b0ba30e00296bd6b09fe3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4298.exe

                Filesize

                663KB

                MD5

                d2e169ebb32042444adb534e22b2af2b

                SHA1

                30c1809474bdd0649e19d831eddf2f50f436bb28

                SHA256

                2370d1772b3a466b666e03cec8817e661fa13978298ff63d17a36f496cc6d26b

                SHA512

                dfe354cf5b65af01f901c3c3cfb95ab94956a99eec406d24f449ddcbf39a5bde8866c2282bb9a28c4c9975e1845e50c04814d68ec09b0ba30e00296bd6b09fe3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w11Jm24.exe

                Filesize

                334KB

                MD5

                36e54a66c14994adb42523dc81e12992

                SHA1

                a247cf51bcae29df720deb081c57e970768d0d35

                SHA256

                cb333b1793019b9c1c1ccffd775cdd49ec3002a196f1a978cbb48d8aec74e141

                SHA512

                578caa8a78e12a52a5348cb4cf1f5bd6cb7d655858061b54fedc4b50c7e267ca7fa30fe975a3dfe591567c31560fba79c53d21e24de820b0ba6dfa335e7d7877

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w11Jm24.exe

                Filesize

                334KB

                MD5

                36e54a66c14994adb42523dc81e12992

                SHA1

                a247cf51bcae29df720deb081c57e970768d0d35

                SHA256

                cb333b1793019b9c1c1ccffd775cdd49ec3002a196f1a978cbb48d8aec74e141

                SHA512

                578caa8a78e12a52a5348cb4cf1f5bd6cb7d655858061b54fedc4b50c7e267ca7fa30fe975a3dfe591567c31560fba79c53d21e24de820b0ba6dfa335e7d7877

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2508.exe

                Filesize

                329KB

                MD5

                3d46afac29fb27698daa57937764e0a6

                SHA1

                d0bbd0dc705cfb4b5a118e63fea4970040e67a9d

                SHA256

                adf74d28d0e74dd8035a602cd6fcec6e74abf89c27ff77cefae616d690ee6690

                SHA512

                07bae660c5d884ea38c1b90d5070c6ee977bc1891fbb3a22b9f80eeaeb7832b0552bb1663d29cb100cacdb047861241a215089a26722a445e3801d7210b630ad

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2508.exe

                Filesize

                329KB

                MD5

                3d46afac29fb27698daa57937764e0a6

                SHA1

                d0bbd0dc705cfb4b5a118e63fea4970040e67a9d

                SHA256

                adf74d28d0e74dd8035a602cd6fcec6e74abf89c27ff77cefae616d690ee6690

                SHA512

                07bae660c5d884ea38c1b90d5070c6ee977bc1891fbb3a22b9f80eeaeb7832b0552bb1663d29cb100cacdb047861241a215089a26722a445e3801d7210b630ad

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2343.exe

                Filesize

                12KB

                MD5

                f37bfe7f930341fad9b68d937158fa09

                SHA1

                e375456ea5b7f465eb3f054cef55ea52313e7a55

                SHA256

                0f9f21aa0376607b5e79b8ff640d3ecc8421f405132940fceec637c2bf8e4fe4

                SHA512

                c8bcf7d204adcf590703212d716c4afc1cee4a6e9db606c6c9788d0d5ef45e8556aa04a531a06b4337381b4a63025ffd46859f69f9139cb780712f3456354790

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2343.exe

                Filesize

                12KB

                MD5

                f37bfe7f930341fad9b68d937158fa09

                SHA1

                e375456ea5b7f465eb3f054cef55ea52313e7a55

                SHA256

                0f9f21aa0376607b5e79b8ff640d3ecc8421f405132940fceec637c2bf8e4fe4

                SHA512

                c8bcf7d204adcf590703212d716c4afc1cee4a6e9db606c6c9788d0d5ef45e8556aa04a531a06b4337381b4a63025ffd46859f69f9139cb780712f3456354790

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6662yh.exe

                Filesize

                276KB

                MD5

                6c6a3080e892bac226c5bcda7ec38db1

                SHA1

                fddcb3d2d9bad8e05d6ffc7a95cc35c3f47c0f1c

                SHA256

                3d051a08b79cfb6e059472d30952ea6a4236bcc3746d0dc95a90e3c49e5e2a67

                SHA512

                2e83ec962df1b31e6450d614daeb7cc2396f1ed6c08c8f23fa65c62cb246882500ab4bf973f9a653f3a9082c7726fc728fff65c2a2bc8bc46d1e5b89d0cd9404

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6662yh.exe

                Filesize

                276KB

                MD5

                6c6a3080e892bac226c5bcda7ec38db1

                SHA1

                fddcb3d2d9bad8e05d6ffc7a95cc35c3f47c0f1c

                SHA256

                3d051a08b79cfb6e059472d30952ea6a4236bcc3746d0dc95a90e3c49e5e2a67

                SHA512

                2e83ec962df1b31e6450d614daeb7cc2396f1ed6c08c8f23fa65c62cb246882500ab4bf973f9a653f3a9082c7726fc728fff65c2a2bc8bc46d1e5b89d0cd9404

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                2f222b74f23999a18c17dd1c16c0caa9

                SHA1

                0b5d8d4a796e1a3b4b6c0a84f3b6f17a2af33d40

                SHA256

                bdc85210d201b3ccfc55ead6b29ff3bb5dfa1d19374c1f5b52531df1d2a0cddc

                SHA512

                4e697f419de4271bed0fa678fbf2122da7ff5ba86035d5f90120ea025ea236439b9218bf1834d753bb757592d049259d55a5963307fc89ee8b9112a851a5209d

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                2f222b74f23999a18c17dd1c16c0caa9

                SHA1

                0b5d8d4a796e1a3b4b6c0a84f3b6f17a2af33d40

                SHA256

                bdc85210d201b3ccfc55ead6b29ff3bb5dfa1d19374c1f5b52531df1d2a0cddc

                SHA512

                4e697f419de4271bed0fa678fbf2122da7ff5ba86035d5f90120ea025ea236439b9218bf1834d753bb757592d049259d55a5963307fc89ee8b9112a851a5209d

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                2f222b74f23999a18c17dd1c16c0caa9

                SHA1

                0b5d8d4a796e1a3b4b6c0a84f3b6f17a2af33d40

                SHA256

                bdc85210d201b3ccfc55ead6b29ff3bb5dfa1d19374c1f5b52531df1d2a0cddc

                SHA512

                4e697f419de4271bed0fa678fbf2122da7ff5ba86035d5f90120ea025ea236439b9218bf1834d753bb757592d049259d55a5963307fc89ee8b9112a851a5209d

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                2f222b74f23999a18c17dd1c16c0caa9

                SHA1

                0b5d8d4a796e1a3b4b6c0a84f3b6f17a2af33d40

                SHA256

                bdc85210d201b3ccfc55ead6b29ff3bb5dfa1d19374c1f5b52531df1d2a0cddc

                SHA512

                4e697f419de4271bed0fa678fbf2122da7ff5ba86035d5f90120ea025ea236439b9218bf1834d753bb757592d049259d55a5963307fc89ee8b9112a851a5209d

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • memory/768-1134-0x0000000000EB0000-0x0000000000EE2000-memory.dmp

                Filesize

                200KB

              • memory/768-1135-0x0000000005780000-0x00000000057CB000-memory.dmp

                Filesize

                300KB

              • memory/768-1136-0x00000000057F0000-0x0000000005800000-memory.dmp

                Filesize

                64KB

              • memory/3872-1117-0x0000000007FE0000-0x000000000802B000-memory.dmp

                Filesize

                300KB

              • memory/3872-234-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-1128-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/3872-1127-0x00000000092F0000-0x0000000009340000-memory.dmp

                Filesize

                320KB

              • memory/3872-1126-0x0000000009270000-0x00000000092E6000-memory.dmp

                Filesize

                472KB

              • memory/3872-1125-0x0000000008C00000-0x000000000912C000-memory.dmp

                Filesize

                5.2MB

              • memory/3872-1124-0x0000000008A20000-0x0000000008BE2000-memory.dmp

                Filesize

                1.8MB

              • memory/3872-1123-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/3872-1122-0x0000000008830000-0x00000000088C2000-memory.dmp

                Filesize

                584KB

              • memory/3872-1121-0x0000000008170000-0x00000000081D6000-memory.dmp

                Filesize

                408KB

              • memory/3872-1120-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/3872-1119-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/3872-1116-0x0000000007E90000-0x0000000007ECE000-memory.dmp

                Filesize

                248KB

              • memory/3872-202-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/3872-203-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/3872-201-0x00000000047D0000-0x0000000004816000-memory.dmp

                Filesize

                280KB

              • memory/3872-200-0x0000000002D90000-0x0000000002DDB000-memory.dmp

                Filesize

                300KB

              • memory/3872-204-0x0000000004A90000-0x0000000004AD4000-memory.dmp

                Filesize

                272KB

              • memory/3872-205-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-206-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-208-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-210-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-212-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-214-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-216-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-218-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-220-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-222-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-224-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-226-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-228-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-230-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-232-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-1114-0x0000000007E70000-0x0000000007E82000-memory.dmp

                Filesize

                72KB

              • memory/3872-237-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/3872-236-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-239-0x0000000004A90000-0x0000000004ACF000-memory.dmp

                Filesize

                252KB

              • memory/3872-1112-0x0000000007710000-0x0000000007D16000-memory.dmp

                Filesize

                6.0MB

              • memory/3872-1113-0x0000000007D30000-0x0000000007E3A000-memory.dmp

                Filesize

                1.0MB

              • memory/3872-1115-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/4476-171-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-158-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4476-175-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-179-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-181-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-195-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

                Filesize

                64KB

              • memory/4476-194-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

                Filesize

                64KB

              • memory/4476-192-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

                Filesize

                64KB

              • memory/4476-190-0x0000000000400000-0x0000000002B73000-memory.dmp

                Filesize

                39.4MB

              • memory/4476-189-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-187-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-185-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-177-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-183-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-193-0x0000000000400000-0x0000000002B73000-memory.dmp

                Filesize

                39.4MB

              • memory/4476-169-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-167-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-165-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-163-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-162-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-161-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

                Filesize

                64KB

              • memory/4476-160-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

                Filesize

                64KB

              • memory/4476-159-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

                Filesize

                64KB

              • memory/4476-173-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

                Filesize

                72KB

              • memory/4476-157-0x0000000004BA0000-0x0000000004BB8000-memory.dmp

                Filesize

                96KB

              • memory/4476-156-0x0000000007130000-0x000000000762E000-memory.dmp

                Filesize

                5.0MB

              • memory/4476-155-0x00000000047E0000-0x00000000047FA000-memory.dmp

                Filesize

                104KB

              • memory/5076-149-0x0000000000C50000-0x0000000000C5A000-memory.dmp

                Filesize

                40KB