Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    105s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/04/2023, 07:08

General

  • Target

    4f458855682c2dcee02964c827a47a5a5b6e7334a257d9125f3793d20c36495a.exe

  • Size

    977KB

  • MD5

    bc617c40ce13c0b79d90175653b6206c

  • SHA1

    041c0db834623c14a0a78d5f6d86de701bbd69f7

  • SHA256

    4f458855682c2dcee02964c827a47a5a5b6e7334a257d9125f3793d20c36495a

  • SHA512

    e0904f836c26bb21fcd9ffbce84b5b4093e35a1c5e639d0d295ee9048ffdf92a2f9f44ea3c9845d1531d8ddfbf5913bc338190efddc4727f75bd2c2f5a37b603

  • SSDEEP

    12288:fMrjy90drzM442g7BC7J2beKqfss04XlDU02v+5t4juCBcKvNXoE+bsYHv:kyEz/4L8KCss044m5t4juCqKvNoE+5v

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

link

C2

176.113.115.145:4125

Attributes
  • auth_value

    77e4c7bc6fea5ae755b29e8aea8f7012

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f458855682c2dcee02964c827a47a5a5b6e7334a257d9125f3793d20c36495a.exe
    "C:\Users\Admin\AppData\Local\Temp\4f458855682c2dcee02964c827a47a5a5b6e7334a257d9125f3793d20c36495a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3881.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3881.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9527.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9527.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2391.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2391.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:60
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0397.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0397.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2032
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9412wT.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9412wT.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w85bO67.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w85bO67.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xkdSK49.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xkdSK49.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y29NI50.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y29NI50.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3972
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c5d2db5804" /P "Admin:N"&&CACLS "..\c5d2db5804" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3804
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:3416
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3424
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5104
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c5d2db5804" /P "Admin:N"
                    5⤵
                      PID:5108
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c5d2db5804" /P "Admin:R" /E
                      5⤵
                        PID:3216
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4952
              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:5080
              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:664

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y29NI50.exe

                Filesize

                236KB

                MD5

                7d704206ad58911fc8c6b6bea117f621

                SHA1

                b512118404200fa2c2c492b3d80324c73b4e00b7

                SHA256

                30db5adb80c086ed1857bd117d2087cecfdaeac269a6e34b623fcd0cab0421ea

                SHA512

                53f93b885492e52a89a74d1a5f91b10792cda7aa381f51c0a2bcfe692c668592549780fa5bfe73fc4e48b26903eb98a2b3c01ceeea3af731811e912c63c840c0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y29NI50.exe

                Filesize

                236KB

                MD5

                7d704206ad58911fc8c6b6bea117f621

                SHA1

                b512118404200fa2c2c492b3d80324c73b4e00b7

                SHA256

                30db5adb80c086ed1857bd117d2087cecfdaeac269a6e34b623fcd0cab0421ea

                SHA512

                53f93b885492e52a89a74d1a5f91b10792cda7aa381f51c0a2bcfe692c668592549780fa5bfe73fc4e48b26903eb98a2b3c01ceeea3af731811e912c63c840c0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3881.exe

                Filesize

                793KB

                MD5

                64a649b4d02d2eade699b6282c73a535

                SHA1

                ed5c0975f86e651d9a2da84a83da076515a50758

                SHA256

                1d6a6c36ec8671741e005e0ef0a1d83ddc6c69442f34d8bc34173b0f3f271051

                SHA512

                af3c32fcf2f8ad3267ab362addb4f5b71e74f1bdfedf55dd66b566a8ea373516a37c006b6336667c5d4624d061f9678984d4d966729e06a427b4b86fc95dbf4d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap3881.exe

                Filesize

                793KB

                MD5

                64a649b4d02d2eade699b6282c73a535

                SHA1

                ed5c0975f86e651d9a2da84a83da076515a50758

                SHA256

                1d6a6c36ec8671741e005e0ef0a1d83ddc6c69442f34d8bc34173b0f3f271051

                SHA512

                af3c32fcf2f8ad3267ab362addb4f5b71e74f1bdfedf55dd66b566a8ea373516a37c006b6336667c5d4624d061f9678984d4d966729e06a427b4b86fc95dbf4d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xkdSK49.exe

                Filesize

                175KB

                MD5

                27581d2e69880b61d83e22e022baae9a

                SHA1

                054845f7bf6721a8e8b57e824e9314d11df13867

                SHA256

                beb03c614acf11e9e7e208ada1c10a8093cbbd0ba5a5b60faa07c4a50f3722bb

                SHA512

                d489d356bd81d9abc0443b3bedb979de1aeb135ebe860a2e878dbe0eeb083a8886e0eb707f21b3a40e5e0efa72cda1a966f22ca99a2cf18640325329289bdab0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xkdSK49.exe

                Filesize

                175KB

                MD5

                27581d2e69880b61d83e22e022baae9a

                SHA1

                054845f7bf6721a8e8b57e824e9314d11df13867

                SHA256

                beb03c614acf11e9e7e208ada1c10a8093cbbd0ba5a5b60faa07c4a50f3722bb

                SHA512

                d489d356bd81d9abc0443b3bedb979de1aeb135ebe860a2e878dbe0eeb083a8886e0eb707f21b3a40e5e0efa72cda1a966f22ca99a2cf18640325329289bdab0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9527.exe

                Filesize

                651KB

                MD5

                c3ab6d3ce96d84d7599cea2447887562

                SHA1

                79cfb3516d2ebf6d3106d26355bdb8374ec2a47e

                SHA256

                cedc9055ac81cfe219e1f8cb1f4e7aef20a549a527bb1e1282287de2d7e9cee6

                SHA512

                97bd9afb15b34312072dfe18784a46433f4210df034534873a56808474d77f0ffbbc96fd804c6f1a89c7576fe20e9a9cd310865d385e4e661c052dd64f907afb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9527.exe

                Filesize

                651KB

                MD5

                c3ab6d3ce96d84d7599cea2447887562

                SHA1

                79cfb3516d2ebf6d3106d26355bdb8374ec2a47e

                SHA256

                cedc9055ac81cfe219e1f8cb1f4e7aef20a549a527bb1e1282287de2d7e9cee6

                SHA512

                97bd9afb15b34312072dfe18784a46433f4210df034534873a56808474d77f0ffbbc96fd804c6f1a89c7576fe20e9a9cd310865d385e4e661c052dd64f907afb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w85bO67.exe

                Filesize

                295KB

                MD5

                45c9b8baf39cb6a6496b452c034c0e1f

                SHA1

                5b8aa61f2c03d2dd178e0daf653858469e71ee24

                SHA256

                89af5ad81b7756641fb601328c15528cd81c994ac3f894c2771e45ebf8f7c3bb

                SHA512

                5fbda44be6f04aedc21d56d615f7c5c857fd723091e02d3c66724920bf033a49504e0468eae24690090223537b54ded6f90796f85dfc22e08c2dfcd65178f092

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w85bO67.exe

                Filesize

                295KB

                MD5

                45c9b8baf39cb6a6496b452c034c0e1f

                SHA1

                5b8aa61f2c03d2dd178e0daf653858469e71ee24

                SHA256

                89af5ad81b7756641fb601328c15528cd81c994ac3f894c2771e45ebf8f7c3bb

                SHA512

                5fbda44be6f04aedc21d56d615f7c5c857fd723091e02d3c66724920bf033a49504e0468eae24690090223537b54ded6f90796f85dfc22e08c2dfcd65178f092

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2391.exe

                Filesize

                322KB

                MD5

                c99b08cea2850dc774d898d121507770

                SHA1

                9ada5666d9b83633dbdbb0c2bbe02a4f7ab309b4

                SHA256

                05d0337db889e6f9ee6afb29394f8d26d0e35c45669a23d21d97e23da38e4935

                SHA512

                e2ab0108abb60f8d81abc3d259db0c6b42741e567790f4ff3e8b322a204ade311beaf1678537114e28339faaf235218cdf80ae7e809c7fc7cc0f2bafd578a52c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2391.exe

                Filesize

                322KB

                MD5

                c99b08cea2850dc774d898d121507770

                SHA1

                9ada5666d9b83633dbdbb0c2bbe02a4f7ab309b4

                SHA256

                05d0337db889e6f9ee6afb29394f8d26d0e35c45669a23d21d97e23da38e4935

                SHA512

                e2ab0108abb60f8d81abc3d259db0c6b42741e567790f4ff3e8b322a204ade311beaf1678537114e28339faaf235218cdf80ae7e809c7fc7cc0f2bafd578a52c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0397.exe

                Filesize

                14KB

                MD5

                43f9e352db2cb0e1184faa2a9540c79c

                SHA1

                355efde93e1c7fae398d2b4eda803f1f8fee19eb

                SHA256

                f6d904b614e2c72363b0376a50565b3d98339e80c859aeae79612878bd92d4d5

                SHA512

                4eef20ab9de4213dd40d9e370d85181fc76b9ab8a05895a726450e700e83d0d9a636b1661e19bd0d29cbf952053c92683bc377a4ca485d39c2a5db3e22b376a4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0397.exe

                Filesize

                14KB

                MD5

                43f9e352db2cb0e1184faa2a9540c79c

                SHA1

                355efde93e1c7fae398d2b4eda803f1f8fee19eb

                SHA256

                f6d904b614e2c72363b0376a50565b3d98339e80c859aeae79612878bd92d4d5

                SHA512

                4eef20ab9de4213dd40d9e370d85181fc76b9ab8a05895a726450e700e83d0d9a636b1661e19bd0d29cbf952053c92683bc377a4ca485d39c2a5db3e22b376a4

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9412wT.exe

                Filesize

                237KB

                MD5

                1e6721ebabf4fb50263b5a9ac6106ea0

                SHA1

                546c9ece8737a5674f8571a9f9b28761a8cd9a52

                SHA256

                abe351579c3972b945dbcd3beed0acc064b1c3106f82e8292240edd724c6d130

                SHA512

                b0eab24d4db061daf676efc28a1b8c0d0190aae4cffe0188900d7914768b25d7349405ab80920e7207df05b6b48f4466283462ca32c4d02bfe130e3df06d2345

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9412wT.exe

                Filesize

                237KB

                MD5

                1e6721ebabf4fb50263b5a9ac6106ea0

                SHA1

                546c9ece8737a5674f8571a9f9b28761a8cd9a52

                SHA256

                abe351579c3972b945dbcd3beed0acc064b1c3106f82e8292240edd724c6d130

                SHA512

                b0eab24d4db061daf676efc28a1b8c0d0190aae4cffe0188900d7914768b25d7349405ab80920e7207df05b6b48f4466283462ca32c4d02bfe130e3df06d2345

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                7d704206ad58911fc8c6b6bea117f621

                SHA1

                b512118404200fa2c2c492b3d80324c73b4e00b7

                SHA256

                30db5adb80c086ed1857bd117d2087cecfdaeac269a6e34b623fcd0cab0421ea

                SHA512

                53f93b885492e52a89a74d1a5f91b10792cda7aa381f51c0a2bcfe692c668592549780fa5bfe73fc4e48b26903eb98a2b3c01ceeea3af731811e912c63c840c0

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                7d704206ad58911fc8c6b6bea117f621

                SHA1

                b512118404200fa2c2c492b3d80324c73b4e00b7

                SHA256

                30db5adb80c086ed1857bd117d2087cecfdaeac269a6e34b623fcd0cab0421ea

                SHA512

                53f93b885492e52a89a74d1a5f91b10792cda7aa381f51c0a2bcfe692c668592549780fa5bfe73fc4e48b26903eb98a2b3c01ceeea3af731811e912c63c840c0

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                7d704206ad58911fc8c6b6bea117f621

                SHA1

                b512118404200fa2c2c492b3d80324c73b4e00b7

                SHA256

                30db5adb80c086ed1857bd117d2087cecfdaeac269a6e34b623fcd0cab0421ea

                SHA512

                53f93b885492e52a89a74d1a5f91b10792cda7aa381f51c0a2bcfe692c668592549780fa5bfe73fc4e48b26903eb98a2b3c01ceeea3af731811e912c63c840c0

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                7d704206ad58911fc8c6b6bea117f621

                SHA1

                b512118404200fa2c2c492b3d80324c73b4e00b7

                SHA256

                30db5adb80c086ed1857bd117d2087cecfdaeac269a6e34b623fcd0cab0421ea

                SHA512

                53f93b885492e52a89a74d1a5f91b10792cda7aa381f51c0a2bcfe692c668592549780fa5bfe73fc4e48b26903eb98a2b3c01ceeea3af731811e912c63c840c0

              • C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe

                Filesize

                236KB

                MD5

                7d704206ad58911fc8c6b6bea117f621

                SHA1

                b512118404200fa2c2c492b3d80324c73b4e00b7

                SHA256

                30db5adb80c086ed1857bd117d2087cecfdaeac269a6e34b623fcd0cab0421ea

                SHA512

                53f93b885492e52a89a74d1a5f91b10792cda7aa381f51c0a2bcfe692c668592549780fa5bfe73fc4e48b26903eb98a2b3c01ceeea3af731811e912c63c840c0

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                6a4c2f2b6e1bbce94b4d00e91e690d0d

                SHA1

                f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57

                SHA256

                8b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f

                SHA512

                8c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01

              • memory/2032-147-0x0000000000F10000-0x0000000000F1A000-memory.dmp

                Filesize

                40KB

              • memory/2632-191-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/2632-159-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/2632-171-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-173-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-175-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-177-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-179-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-181-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-183-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-185-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-187-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-188-0x0000000000400000-0x00000000004AA000-memory.dmp

                Filesize

                680KB

              • memory/2632-189-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/2632-190-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/2632-169-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-167-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-157-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/2632-163-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-161-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-160-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-193-0x0000000000400000-0x00000000004AA000-memory.dmp

                Filesize

                680KB

              • memory/2632-158-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/2632-165-0x00000000026C0000-0x00000000026D2000-memory.dmp

                Filesize

                72KB

              • memory/2632-156-0x00000000004F0000-0x000000000051D000-memory.dmp

                Filesize

                180KB

              • memory/2632-155-0x00000000026C0000-0x00000000026D8000-memory.dmp

                Filesize

                96KB

              • memory/2632-154-0x0000000004CC0000-0x00000000051BE000-memory.dmp

                Filesize

                5.0MB

              • memory/2632-153-0x0000000002220000-0x000000000223A000-memory.dmp

                Filesize

                104KB

              • memory/4440-1132-0x0000000000D60000-0x0000000000D92000-memory.dmp

                Filesize

                200KB

              • memory/4440-1134-0x00000000058C0000-0x00000000058D0000-memory.dmp

                Filesize

                64KB

              • memory/4440-1133-0x00000000057A0000-0x00000000057EB000-memory.dmp

                Filesize

                300KB

              • memory/4448-207-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-217-0x0000000004C20000-0x0000000004C30000-memory.dmp

                Filesize

                64KB

              • memory/4448-223-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-225-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-227-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-229-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-231-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-233-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-235-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-237-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-1110-0x0000000005740000-0x0000000005D46000-memory.dmp

                Filesize

                6.0MB

              • memory/4448-1111-0x0000000005130000-0x000000000523A000-memory.dmp

                Filesize

                1.0MB

              • memory/4448-1112-0x0000000004B70000-0x0000000004B82000-memory.dmp

                Filesize

                72KB

              • memory/4448-1113-0x0000000004C20000-0x0000000004C30000-memory.dmp

                Filesize

                64KB

              • memory/4448-1114-0x0000000004B90000-0x0000000004BCE000-memory.dmp

                Filesize

                248KB

              • memory/4448-1115-0x0000000005340000-0x000000000538B000-memory.dmp

                Filesize

                300KB

              • memory/4448-1116-0x0000000005490000-0x00000000054F6000-memory.dmp

                Filesize

                408KB

              • memory/4448-1117-0x0000000006160000-0x00000000061F2000-memory.dmp

                Filesize

                584KB

              • memory/4448-1119-0x0000000006200000-0x0000000006276000-memory.dmp

                Filesize

                472KB

              • memory/4448-1120-0x00000000062A0000-0x00000000062F0000-memory.dmp

                Filesize

                320KB

              • memory/4448-1122-0x0000000004C20000-0x0000000004C30000-memory.dmp

                Filesize

                64KB

              • memory/4448-1121-0x0000000004C20000-0x0000000004C30000-memory.dmp

                Filesize

                64KB

              • memory/4448-1123-0x0000000004C20000-0x0000000004C30000-memory.dmp

                Filesize

                64KB

              • memory/4448-1124-0x0000000004C20000-0x0000000004C30000-memory.dmp

                Filesize

                64KB

              • memory/4448-219-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-221-0x0000000004C20000-0x0000000004C30000-memory.dmp

                Filesize

                64KB

              • memory/4448-220-0x0000000004C20000-0x0000000004C30000-memory.dmp

                Filesize

                64KB

              • memory/4448-215-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-216-0x0000000000640000-0x000000000068B000-memory.dmp

                Filesize

                300KB

              • memory/4448-213-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-211-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-209-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-205-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-203-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-201-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-200-0x0000000002330000-0x000000000236F000-memory.dmp

                Filesize

                252KB

              • memory/4448-199-0x0000000002330000-0x0000000002374000-memory.dmp

                Filesize

                272KB

              • memory/4448-198-0x0000000002120000-0x0000000002166000-memory.dmp

                Filesize

                280KB

              • memory/4448-1125-0x00000000066C0000-0x0000000006882000-memory.dmp

                Filesize

                1.8MB

              • memory/4448-1126-0x0000000006890000-0x0000000006DBC000-memory.dmp

                Filesize

                5.2MB