Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/04/2023, 00:24

General

  • Target

    b88d79c1f3d3d8b1770f2ab7d8e06c6b69422087759a004933616e73fac96e61.exe

  • Size

    1007KB

  • MD5

    ed5236cdd2cf6233ba14473e13a1d827

  • SHA1

    8b124482ab18d429ccc1f095a2b2eab74cad7b3e

  • SHA256

    b88d79c1f3d3d8b1770f2ab7d8e06c6b69422087759a004933616e73fac96e61

  • SHA512

    b67407f6db0b76ed328824b48d9047effee1e036edd1f45afb34fbf6edd66f305df3465cc2da114c415575cbbf3d202d95ffd5d66c076af76e1a8bd91f27083e

  • SSDEEP

    24576:lyYIfgDGM1IOBu/APy5nNFtExApXZDwvtq3C9VBpZVbM:AYy9Ue/APWNFCxMXZ0X9VBfVb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nord

C2

176.113.115.145:4125

Attributes
  • auth_value

    ebb7d38cdbd7c83cf6363ef3feb3a530

Extracted

Family

amadey

Version

3.69

C2

193.233.20.29/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b88d79c1f3d3d8b1770f2ab7d8e06c6b69422087759a004933616e73fac96e61.exe
    "C:\Users\Admin\AppData\Local\Temp\b88d79c1f3d3d8b1770f2ab7d8e06c6b69422087759a004933616e73fac96e61.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina4177.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina4177.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0775.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5768.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5768.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu777459.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu777459.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4424
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3511.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3511.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dYs08s92.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dYs08s92.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en299523.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en299523.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge532563.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge532563.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4812
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2316
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\550693dc87" /P "Admin:N"&&CACLS "..\550693dc87" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4476
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5032
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:5016
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4924
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5056
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\550693dc87" /P "Admin:N"
                    5⤵
                      PID:5036
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\550693dc87" /P "Admin:R" /E
                      5⤵
                        PID:5028
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4212
              • C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4336

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe

                Filesize

                236KB

                MD5

                17169d7bcb8b3d1ab027bda527df2523

                SHA1

                1a0ce9ee44e0cd012a2944d2796a4ec82ff8ed3e

                SHA256

                2f6d62edf80cdf7558a054765b1fe319fb5c0898abfc6c72d5895b9e58f2c7f6

                SHA512

                86bb059b170159b940a6ac38da5001a7ddc16f431933c37fe4c783c47a99e4dfe3076e45ed2534443d95112bde14822e9d08965374f8b38bea48c728a438c012

              • C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe

                Filesize

                236KB

                MD5

                17169d7bcb8b3d1ab027bda527df2523

                SHA1

                1a0ce9ee44e0cd012a2944d2796a4ec82ff8ed3e

                SHA256

                2f6d62edf80cdf7558a054765b1fe319fb5c0898abfc6c72d5895b9e58f2c7f6

                SHA512

                86bb059b170159b940a6ac38da5001a7ddc16f431933c37fe4c783c47a99e4dfe3076e45ed2534443d95112bde14822e9d08965374f8b38bea48c728a438c012

              • C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe

                Filesize

                236KB

                MD5

                17169d7bcb8b3d1ab027bda527df2523

                SHA1

                1a0ce9ee44e0cd012a2944d2796a4ec82ff8ed3e

                SHA256

                2f6d62edf80cdf7558a054765b1fe319fb5c0898abfc6c72d5895b9e58f2c7f6

                SHA512

                86bb059b170159b940a6ac38da5001a7ddc16f431933c37fe4c783c47a99e4dfe3076e45ed2534443d95112bde14822e9d08965374f8b38bea48c728a438c012

              • C:\Users\Admin\AppData\Local\Temp\550693dc87\oneetx.exe

                Filesize

                236KB

                MD5

                17169d7bcb8b3d1ab027bda527df2523

                SHA1

                1a0ce9ee44e0cd012a2944d2796a4ec82ff8ed3e

                SHA256

                2f6d62edf80cdf7558a054765b1fe319fb5c0898abfc6c72d5895b9e58f2c7f6

                SHA512

                86bb059b170159b940a6ac38da5001a7ddc16f431933c37fe4c783c47a99e4dfe3076e45ed2534443d95112bde14822e9d08965374f8b38bea48c728a438c012

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge532563.exe

                Filesize

                236KB

                MD5

                17169d7bcb8b3d1ab027bda527df2523

                SHA1

                1a0ce9ee44e0cd012a2944d2796a4ec82ff8ed3e

                SHA256

                2f6d62edf80cdf7558a054765b1fe319fb5c0898abfc6c72d5895b9e58f2c7f6

                SHA512

                86bb059b170159b940a6ac38da5001a7ddc16f431933c37fe4c783c47a99e4dfe3076e45ed2534443d95112bde14822e9d08965374f8b38bea48c728a438c012

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge532563.exe

                Filesize

                236KB

                MD5

                17169d7bcb8b3d1ab027bda527df2523

                SHA1

                1a0ce9ee44e0cd012a2944d2796a4ec82ff8ed3e

                SHA256

                2f6d62edf80cdf7558a054765b1fe319fb5c0898abfc6c72d5895b9e58f2c7f6

                SHA512

                86bb059b170159b940a6ac38da5001a7ddc16f431933c37fe4c783c47a99e4dfe3076e45ed2534443d95112bde14822e9d08965374f8b38bea48c728a438c012

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina4177.exe

                Filesize

                823KB

                MD5

                9b8e6156ab498ce4331503f8f648d600

                SHA1

                2f4409b3d8937e6e8af812260804efc7cd0fa83e

                SHA256

                894cddc1100a79f14bec047b462a170d06110964bd243e48046d03440102ca3e

                SHA512

                db8b3578d1bb47042bc6c6b1df28bc3844b3b7f7b287db356e75afb0f27e93eae7522c58a0804d5c57942f1d0abb3fc891ef56c36e6ea9cbeb2a5e55e7039300

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina4177.exe

                Filesize

                823KB

                MD5

                9b8e6156ab498ce4331503f8f648d600

                SHA1

                2f4409b3d8937e6e8af812260804efc7cd0fa83e

                SHA256

                894cddc1100a79f14bec047b462a170d06110964bd243e48046d03440102ca3e

                SHA512

                db8b3578d1bb47042bc6c6b1df28bc3844b3b7f7b287db356e75afb0f27e93eae7522c58a0804d5c57942f1d0abb3fc891ef56c36e6ea9cbeb2a5e55e7039300

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en299523.exe

                Filesize

                175KB

                MD5

                ec8af6c4473a90f2c67b27d8762bcb06

                SHA1

                a29f10284d7b0a1d7131f21abac8f51fcced4c36

                SHA256

                0e99c3b7ad5d4c0b9060ba6a9e5a051ad53fb984162b636291c1ec543a006588

                SHA512

                bf8cef02e8c4c5d9bf7f2214aeda7334beb6a506ed5c7855b14e94c1e0b416cd3562aaaad6868d25eb5d2d89cf39f04b6c006586512069ac71f3fb9a1f1f83e8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en299523.exe

                Filesize

                175KB

                MD5

                ec8af6c4473a90f2c67b27d8762bcb06

                SHA1

                a29f10284d7b0a1d7131f21abac8f51fcced4c36

                SHA256

                0e99c3b7ad5d4c0b9060ba6a9e5a051ad53fb984162b636291c1ec543a006588

                SHA512

                bf8cef02e8c4c5d9bf7f2214aeda7334beb6a506ed5c7855b14e94c1e0b416cd3562aaaad6868d25eb5d2d89cf39f04b6c006586512069ac71f3fb9a1f1f83e8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0775.exe

                Filesize

                681KB

                MD5

                80b34dcac5da523751d37f17adbc0fcd

                SHA1

                481ae4f5bc223df961db12be9b59c0fa09712046

                SHA256

                c47c80d6d714f1fe359e01718610a89a873a8c9d4a65bd1dab540e0af357e3ea

                SHA512

                114410e76102dd94a99c60f36827f425b7d605bcff9f24909f70e84a22a66847277f8011d0a85a0372d2fb77577c5d0df84b2faeffe0f42f462480059113749d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0775.exe

                Filesize

                681KB

                MD5

                80b34dcac5da523751d37f17adbc0fcd

                SHA1

                481ae4f5bc223df961db12be9b59c0fa09712046

                SHA256

                c47c80d6d714f1fe359e01718610a89a873a8c9d4a65bd1dab540e0af357e3ea

                SHA512

                114410e76102dd94a99c60f36827f425b7d605bcff9f24909f70e84a22a66847277f8011d0a85a0372d2fb77577c5d0df84b2faeffe0f42f462480059113749d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dYs08s92.exe

                Filesize

                352KB

                MD5

                6d63e2e7288a8a33c4a86f5662d6b7ea

                SHA1

                be5084be8f88945530caea67c7c12f7cf8d33820

                SHA256

                0d86123cfdd94f3f0f7ac58fda9aeb79cd94623daa60fad0b98d9ba6b2ed54b0

                SHA512

                40fb3bfd082a71c79998e796b94c01da9a2a113ddc45d367ad903bc096c175dfd4be444eebdc0c09d11e084cdd52fdd958a92e7a0117b2fe34b875c78fd20c9c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dYs08s92.exe

                Filesize

                352KB

                MD5

                6d63e2e7288a8a33c4a86f5662d6b7ea

                SHA1

                be5084be8f88945530caea67c7c12f7cf8d33820

                SHA256

                0d86123cfdd94f3f0f7ac58fda9aeb79cd94623daa60fad0b98d9ba6b2ed54b0

                SHA512

                40fb3bfd082a71c79998e796b94c01da9a2a113ddc45d367ad903bc096c175dfd4be444eebdc0c09d11e084cdd52fdd958a92e7a0117b2fe34b875c78fd20c9c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5768.exe

                Filesize

                338KB

                MD5

                a6e8d601613f998c21efdd70ba2e244e

                SHA1

                6864d4a531609adc8db24842d4886c9d911e2c27

                SHA256

                7ad40b98ac7d84419235112b3a70dc7daa7d977354e5441301cfba016e27e746

                SHA512

                87818e491125a97d991103266059ae8d68a8f6fd80775d53af940995df0dc79de9d1b6bc97e84c5d4d4cabc6350710d262456bb3cc54ed59a1fb769a5a41b45b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina5768.exe

                Filesize

                338KB

                MD5

                a6e8d601613f998c21efdd70ba2e244e

                SHA1

                6864d4a531609adc8db24842d4886c9d911e2c27

                SHA256

                7ad40b98ac7d84419235112b3a70dc7daa7d977354e5441301cfba016e27e746

                SHA512

                87818e491125a97d991103266059ae8d68a8f6fd80775d53af940995df0dc79de9d1b6bc97e84c5d4d4cabc6350710d262456bb3cc54ed59a1fb769a5a41b45b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu777459.exe

                Filesize

                14KB

                MD5

                1c8901a325c9f541601b683989161185

                SHA1

                c2a083a44405ab66fbe4746978fdae680f6e9c50

                SHA256

                bfee4ca74d3f7b2fc9f32bd018a7d723db73b73074f0f52aee21990b0537e034

                SHA512

                a2e69ef7e17ead65facf4fe2ee0ef7b70b9ac86e27626b9eaa99df98a5a337b41fd4d440e7dc381986345fae21937fcd00ce631bcf600aa671ba018891e32155

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu777459.exe

                Filesize

                14KB

                MD5

                1c8901a325c9f541601b683989161185

                SHA1

                c2a083a44405ab66fbe4746978fdae680f6e9c50

                SHA256

                bfee4ca74d3f7b2fc9f32bd018a7d723db73b73074f0f52aee21990b0537e034

                SHA512

                a2e69ef7e17ead65facf4fe2ee0ef7b70b9ac86e27626b9eaa99df98a5a337b41fd4d440e7dc381986345fae21937fcd00ce631bcf600aa671ba018891e32155

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3511.exe

                Filesize

                294KB

                MD5

                9a063f7cbf7ae6d2252aa6bb13a49615

                SHA1

                7d864c188e2faefa6aa52329e0edcfb90419dda8

                SHA256

                a3c151fbb8c38eed2d81587f90d8df785adca76667b079929923ee48ab62e01b

                SHA512

                f7312acfa8683fdc1d8bb853d718a59a33b8727a440c6c3423720c2cafe2e2926c1bbeb14fcd4e6415156c4dad0bb90bc938059d066a10c12c60bf1b5f5a6b41

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3511.exe

                Filesize

                294KB

                MD5

                9a063f7cbf7ae6d2252aa6bb13a49615

                SHA1

                7d864c188e2faefa6aa52329e0edcfb90419dda8

                SHA256

                a3c151fbb8c38eed2d81587f90d8df785adca76667b079929923ee48ab62e01b

                SHA512

                f7312acfa8683fdc1d8bb853d718a59a33b8727a440c6c3423720c2cafe2e2926c1bbeb14fcd4e6415156c4dad0bb90bc938059d066a10c12c60bf1b5f5a6b41

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                9e9f6b48159690d4916e38b26d8f92cb

                SHA1

                2016224921b0791d3de7d897a520d5d35eb84f34

                SHA256

                7705d3dc3b110aff6fd74fec7d343af5e49a0b7f696c231cc199ffaa6bf07053

                SHA512

                5737c8b7cb3f0a2657ad57811458be04c9852374e9a30b8c25be3bc777e74c2d6b5a8ec07f122b0b79989a25c464d507495b8c9850ba7c52d2104e3adae3dbf4

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                9e9f6b48159690d4916e38b26d8f92cb

                SHA1

                2016224921b0791d3de7d897a520d5d35eb84f34

                SHA256

                7705d3dc3b110aff6fd74fec7d343af5e49a0b7f696c231cc199ffaa6bf07053

                SHA512

                5737c8b7cb3f0a2657ad57811458be04c9852374e9a30b8c25be3bc777e74c2d6b5a8ec07f122b0b79989a25c464d507495b8c9850ba7c52d2104e3adae3dbf4

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                9e9f6b48159690d4916e38b26d8f92cb

                SHA1

                2016224921b0791d3de7d897a520d5d35eb84f34

                SHA256

                7705d3dc3b110aff6fd74fec7d343af5e49a0b7f696c231cc199ffaa6bf07053

                SHA512

                5737c8b7cb3f0a2657ad57811458be04c9852374e9a30b8c25be3bc777e74c2d6b5a8ec07f122b0b79989a25c464d507495b8c9850ba7c52d2104e3adae3dbf4

              • memory/4260-1118-0x0000000002370000-0x0000000002380000-memory.dmp

                Filesize

                64KB

              • memory/4260-318-0x0000000000900000-0x000000000094B000-memory.dmp

                Filesize

                300KB

              • memory/4260-1125-0x0000000006AA0000-0x0000000006FCC000-memory.dmp

                Filesize

                5.2MB

              • memory/4260-1124-0x00000000068D0000-0x0000000006A92000-memory.dmp

                Filesize

                1.8MB

              • memory/4260-1123-0x0000000002370000-0x0000000002380000-memory.dmp

                Filesize

                64KB

              • memory/4260-1122-0x0000000006760000-0x00000000067B0000-memory.dmp

                Filesize

                320KB

              • memory/4260-1121-0x00000000066E0000-0x0000000006756000-memory.dmp

                Filesize

                472KB

              • memory/4260-1120-0x0000000002370000-0x0000000002380000-memory.dmp

                Filesize

                64KB

              • memory/4260-1119-0x0000000002370000-0x0000000002380000-memory.dmp

                Filesize

                64KB

              • memory/4260-1117-0x0000000005880000-0x00000000058E6000-memory.dmp

                Filesize

                408KB

              • memory/4260-1116-0x00000000057E0000-0x0000000005872000-memory.dmp

                Filesize

                584KB

              • memory/4260-1114-0x0000000005650000-0x000000000569B000-memory.dmp

                Filesize

                300KB

              • memory/4260-1113-0x0000000002370000-0x0000000002380000-memory.dmp

                Filesize

                64KB

              • memory/4260-197-0x00000000023A0000-0x00000000023E6000-memory.dmp

                Filesize

                280KB

              • memory/4260-198-0x0000000002710000-0x0000000002754000-memory.dmp

                Filesize

                272KB

              • memory/4260-199-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-200-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-202-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-204-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-206-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-208-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-210-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-212-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-214-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-216-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-218-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-220-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-222-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-224-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-226-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-228-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-230-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-232-0x0000000002710000-0x000000000274F000-memory.dmp

                Filesize

                252KB

              • memory/4260-1112-0x0000000005500000-0x000000000553E000-memory.dmp

                Filesize

                248KB

              • memory/4260-319-0x0000000002370000-0x0000000002380000-memory.dmp

                Filesize

                64KB

              • memory/4260-321-0x0000000002370000-0x0000000002380000-memory.dmp

                Filesize

                64KB

              • memory/4260-323-0x0000000002370000-0x0000000002380000-memory.dmp

                Filesize

                64KB

              • memory/4260-1109-0x00000000059C0000-0x0000000005FC6000-memory.dmp

                Filesize

                6.0MB

              • memory/4260-1110-0x00000000053B0000-0x00000000054BA000-memory.dmp

                Filesize

                1.0MB

              • memory/4260-1111-0x00000000054E0000-0x00000000054F2000-memory.dmp

                Filesize

                72KB

              • memory/4424-149-0x0000000000810000-0x000000000081A000-memory.dmp

                Filesize

                40KB

              • memory/4764-170-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-156-0x0000000002660000-0x000000000267A000-memory.dmp

                Filesize

                104KB

              • memory/4764-192-0x0000000000400000-0x00000000007FE000-memory.dmp

                Filesize

                4.0MB

              • memory/4764-190-0x0000000000400000-0x00000000007FE000-memory.dmp

                Filesize

                4.0MB

              • memory/4764-178-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-189-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

                Filesize

                64KB

              • memory/4764-188-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

                Filesize

                64KB

              • memory/4764-187-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

                Filesize

                64KB

              • memory/4764-186-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-172-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-180-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-176-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-174-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-166-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-182-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-155-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4764-184-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-168-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-164-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-162-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-160-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-159-0x0000000004D20000-0x0000000004D32000-memory.dmp

                Filesize

                72KB

              • memory/4764-158-0x0000000004D20000-0x0000000004D38000-memory.dmp

                Filesize

                96KB

              • memory/4764-157-0x0000000004EB0000-0x00000000053AE000-memory.dmp

                Filesize

                5.0MB

              • memory/5112-1133-0x0000000005A00000-0x0000000005A4B000-memory.dmp

                Filesize

                300KB

              • memory/5112-1132-0x0000000005B10000-0x0000000005B20000-memory.dmp

                Filesize

                64KB

              • memory/5112-1131-0x0000000000FC0000-0x0000000000FF2000-memory.dmp

                Filesize

                200KB