Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    104s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2023, 10:35

General

  • Target

    a55b6f86b1d25dff030abed77b33284150854419fa744fe4c372e82cc8a7d545.exe

  • Size

    1.3MB

  • MD5

    16ee88c0a24f66f6924d141ed6fed1d5

  • SHA1

    5e2fcd9b5e96d66f76112b76e469c56f94e7a136

  • SHA256

    a55b6f86b1d25dff030abed77b33284150854419fa744fe4c372e82cc8a7d545

  • SHA512

    18a481d0a09760e1bfa995f119519c5eda2c04e42b8bed3f9238cf6d4c4bcd45a5c12c7e109dec2e4c4d718cf5ed32287b0bf599ee78c09af3732dfaaf5e40cf

  • SSDEEP

    24576:ayLAgr3pqgDvvzsbP1QY4B5Pxi/TFJpUxAoWH15+N2GaIJphdaxK:hL5zv72t4vZsTnx/H1QlTo

Malware Config

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a55b6f86b1d25dff030abed77b33284150854419fa744fe4c372e82cc8a7d545.exe
    "C:\Users\Admin\AppData\Local\Temp\a55b6f86b1d25dff030abed77b33284150854419fa744fe4c372e82cc8a7d545.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0835748.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0835748.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0872588.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0872588.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6781124.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6781124.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n0523036.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n0523036.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4316
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o8370407.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o8370407.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2688
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4843769.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4843769.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1039624.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1039624.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4788
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6722418.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6722418.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4848
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:5028
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:2928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0db04712ab7e546a432827c21bddda3d

    SHA1

    1fe86569a896c7a53f107b499f3f335837107094

    SHA256

    5e4915a94d18b573a9f81c73ff027deb45f2387f28fcde00d97a4cc1cfe9eac1

    SHA512

    fd090f6192a20617e772c3ebf6b82f904bdcc3482bf95c8192384c1ff738299eb49b9a814f069fc1016a955bc681a5a15e75f1103eab70adf190242f166d2b2a

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0db04712ab7e546a432827c21bddda3d

    SHA1

    1fe86569a896c7a53f107b499f3f335837107094

    SHA256

    5e4915a94d18b573a9f81c73ff027deb45f2387f28fcde00d97a4cc1cfe9eac1

    SHA512

    fd090f6192a20617e772c3ebf6b82f904bdcc3482bf95c8192384c1ff738299eb49b9a814f069fc1016a955bc681a5a15e75f1103eab70adf190242f166d2b2a

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0db04712ab7e546a432827c21bddda3d

    SHA1

    1fe86569a896c7a53f107b499f3f335837107094

    SHA256

    5e4915a94d18b573a9f81c73ff027deb45f2387f28fcde00d97a4cc1cfe9eac1

    SHA512

    fd090f6192a20617e772c3ebf6b82f904bdcc3482bf95c8192384c1ff738299eb49b9a814f069fc1016a955bc681a5a15e75f1103eab70adf190242f166d2b2a

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    0db04712ab7e546a432827c21bddda3d

    SHA1

    1fe86569a896c7a53f107b499f3f335837107094

    SHA256

    5e4915a94d18b573a9f81c73ff027deb45f2387f28fcde00d97a4cc1cfe9eac1

    SHA512

    fd090f6192a20617e772c3ebf6b82f904bdcc3482bf95c8192384c1ff738299eb49b9a814f069fc1016a955bc681a5a15e75f1103eab70adf190242f166d2b2a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6722418.exe

    Filesize

    229KB

    MD5

    0db04712ab7e546a432827c21bddda3d

    SHA1

    1fe86569a896c7a53f107b499f3f335837107094

    SHA256

    5e4915a94d18b573a9f81c73ff027deb45f2387f28fcde00d97a4cc1cfe9eac1

    SHA512

    fd090f6192a20617e772c3ebf6b82f904bdcc3482bf95c8192384c1ff738299eb49b9a814f069fc1016a955bc681a5a15e75f1103eab70adf190242f166d2b2a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6722418.exe

    Filesize

    229KB

    MD5

    0db04712ab7e546a432827c21bddda3d

    SHA1

    1fe86569a896c7a53f107b499f3f335837107094

    SHA256

    5e4915a94d18b573a9f81c73ff027deb45f2387f28fcde00d97a4cc1cfe9eac1

    SHA512

    fd090f6192a20617e772c3ebf6b82f904bdcc3482bf95c8192384c1ff738299eb49b9a814f069fc1016a955bc681a5a15e75f1103eab70adf190242f166d2b2a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0835748.exe

    Filesize

    1.1MB

    MD5

    a3ffd7b5956daf2a3ebcd8402ee1cd08

    SHA1

    7fb17854e6c481d43492666acdd34985f7af3e06

    SHA256

    7f6fcd7ba6365873e9619b8c8e99fe0de9751a071780d1e19e13d6580115222d

    SHA512

    d708467a250331ec264203307804102fc4ebd9330ed6968afa17712802d741733adbe4109038f921bbe53938f047a7ae757f8b048694170410a5c4c093062026

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0835748.exe

    Filesize

    1.1MB

    MD5

    a3ffd7b5956daf2a3ebcd8402ee1cd08

    SHA1

    7fb17854e6c481d43492666acdd34985f7af3e06

    SHA256

    7f6fcd7ba6365873e9619b8c8e99fe0de9751a071780d1e19e13d6580115222d

    SHA512

    d708467a250331ec264203307804102fc4ebd9330ed6968afa17712802d741733adbe4109038f921bbe53938f047a7ae757f8b048694170410a5c4c093062026

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1039624.exe

    Filesize

    547KB

    MD5

    510de8d7df6a415b5135eda4682031d4

    SHA1

    5dbee02052bad591a388ee51130fcd498025efab

    SHA256

    0a056cbb88c2051337c0331af38e7f80ed7169874df76acef4afee2b15fc2f62

    SHA512

    09b8b30345cc3729e4ad1963daae64c40ac9475c0220cc15b430e07c623d66319da868d72e2ce8e7796364df91f89f09a45b5f9c115bdff2bbbf0100a4b192f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1039624.exe

    Filesize

    547KB

    MD5

    510de8d7df6a415b5135eda4682031d4

    SHA1

    5dbee02052bad591a388ee51130fcd498025efab

    SHA256

    0a056cbb88c2051337c0331af38e7f80ed7169874df76acef4afee2b15fc2f62

    SHA512

    09b8b30345cc3729e4ad1963daae64c40ac9475c0220cc15b430e07c623d66319da868d72e2ce8e7796364df91f89f09a45b5f9c115bdff2bbbf0100a4b192f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0872588.exe

    Filesize

    621KB

    MD5

    95b947e324006952056f8ac69ed0d41b

    SHA1

    9316472d25a0d9ddadabbbe1e0214961be715f50

    SHA256

    76e31b258fdeb743b7946334f45c07f3b8ba0b8aa8a9cdc89f98c0899409794e

    SHA512

    267fb6879572dbaa8dd85a20eab66e42ba9f2812649eaf4541eaa2afa1f447e62c91faafd1e51b9d68398e807d64902ce31bbf1fb49a57ec2f90a3fb3c39f6de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0872588.exe

    Filesize

    621KB

    MD5

    95b947e324006952056f8ac69ed0d41b

    SHA1

    9316472d25a0d9ddadabbbe1e0214961be715f50

    SHA256

    76e31b258fdeb743b7946334f45c07f3b8ba0b8aa8a9cdc89f98c0899409794e

    SHA512

    267fb6879572dbaa8dd85a20eab66e42ba9f2812649eaf4541eaa2afa1f447e62c91faafd1e51b9d68398e807d64902ce31bbf1fb49a57ec2f90a3fb3c39f6de

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4843769.exe

    Filesize

    175KB

    MD5

    cc3616c65df946bf27fbf6c2e379385f

    SHA1

    2dc7d9e5456e713ab396d7d8f7c4f5ccb762cc23

    SHA256

    9d0dec95136cb07751817e0204427c23c6b75959e05a1e52964aa82414e579a1

    SHA512

    ff42cc7d61512c754a7f6188d07cd95a7ff928a2b353d096765d59a13e0043c4920020d6d99b5d1f0b06e3295a8c1c5603411763bf72b0de22ddf9959bb7e5a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4843769.exe

    Filesize

    175KB

    MD5

    cc3616c65df946bf27fbf6c2e379385f

    SHA1

    2dc7d9e5456e713ab396d7d8f7c4f5ccb762cc23

    SHA256

    9d0dec95136cb07751817e0204427c23c6b75959e05a1e52964aa82414e579a1

    SHA512

    ff42cc7d61512c754a7f6188d07cd95a7ff928a2b353d096765d59a13e0043c4920020d6d99b5d1f0b06e3295a8c1c5603411763bf72b0de22ddf9959bb7e5a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6781124.exe

    Filesize

    418KB

    MD5

    0699015244b836835342516f182f02da

    SHA1

    14731d17d7cd3882f48f03d1347c6be57cc56bdf

    SHA256

    826f5851b6470242a060b16bfa3a6ef182ab660203087301e32c10ba451682d9

    SHA512

    f2735681efe1558d485f12328bb167349e955e74761714653e4c5258f9fba2aef80627409dcf4d32d685637e0666099e073d9c0803d1d24eab6ff989f42fc3e3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6781124.exe

    Filesize

    418KB

    MD5

    0699015244b836835342516f182f02da

    SHA1

    14731d17d7cd3882f48f03d1347c6be57cc56bdf

    SHA256

    826f5851b6470242a060b16bfa3a6ef182ab660203087301e32c10ba451682d9

    SHA512

    f2735681efe1558d485f12328bb167349e955e74761714653e4c5258f9fba2aef80627409dcf4d32d685637e0666099e073d9c0803d1d24eab6ff989f42fc3e3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n0523036.exe

    Filesize

    361KB

    MD5

    c72191bfe6ca150921b4b888654b25d6

    SHA1

    bf103180ecc973ff4900187926794edd01e84e34

    SHA256

    c9c08cb8fa1dc3ac6773cc11fb6b73cadd07886d67fa066f1ae868347946dd7f

    SHA512

    9ef126ce71b9d94295c6ad94d2a3e3895d9e3752953b1d610524dc761c02b891d71f892082c76c945d0c56d2ef810c4cdb8e1eb27ae63dfa50e10b997344e335

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n0523036.exe

    Filesize

    361KB

    MD5

    c72191bfe6ca150921b4b888654b25d6

    SHA1

    bf103180ecc973ff4900187926794edd01e84e34

    SHA256

    c9c08cb8fa1dc3ac6773cc11fb6b73cadd07886d67fa066f1ae868347946dd7f

    SHA512

    9ef126ce71b9d94295c6ad94d2a3e3895d9e3752953b1d610524dc761c02b891d71f892082c76c945d0c56d2ef810c4cdb8e1eb27ae63dfa50e10b997344e335

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o8370407.exe

    Filesize

    136KB

    MD5

    3fe04a0d4fd577ba6c615b9a95b46190

    SHA1

    47d39758b2d3dc31e50ffe200a2c3037dc2dbd68

    SHA256

    50961a4767d58dae6aabb67262216a547a7659b1865acb957efce1b6cc3da468

    SHA512

    21fc59e763a5d243433cf5683c25510660a08bef244becaef8600a196eb3d6f2ec55abc1ee267829fe8577b77e46d266aea9dfde9d485dcaaa1a60251b5c4dd4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o8370407.exe

    Filesize

    136KB

    MD5

    3fe04a0d4fd577ba6c615b9a95b46190

    SHA1

    47d39758b2d3dc31e50ffe200a2c3037dc2dbd68

    SHA256

    50961a4767d58dae6aabb67262216a547a7659b1865acb957efce1b6cc3da468

    SHA512

    21fc59e763a5d243433cf5683c25510660a08bef244becaef8600a196eb3d6f2ec55abc1ee267829fe8577b77e46d266aea9dfde9d485dcaaa1a60251b5c4dd4

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    7070d754b720fe5162742116d8683a49

    SHA1

    e1e928cacf55633f30125dcf2e7aa6a0e6f4172e

    SHA256

    5eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2

    SHA512

    cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    7070d754b720fe5162742116d8683a49

    SHA1

    e1e928cacf55633f30125dcf2e7aa6a0e6f4172e

    SHA256

    5eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2

    SHA512

    cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/2688-195-0x0000000006EC0000-0x0000000006EFE000-memory.dmp

    Filesize

    248KB

  • memory/2688-196-0x0000000006F00000-0x0000000006F4B000-memory.dmp

    Filesize

    300KB

  • memory/2688-202-0x0000000008880000-0x0000000008A42000-memory.dmp

    Filesize

    1.8MB

  • memory/2688-201-0x00000000080C0000-0x0000000008110000-memory.dmp

    Filesize

    320KB

  • memory/2688-200-0x0000000007D90000-0x0000000007DAE000-memory.dmp

    Filesize

    120KB

  • memory/2688-199-0x0000000007F80000-0x0000000007FF6000-memory.dmp

    Filesize

    472KB

  • memory/2688-203-0x0000000008F80000-0x00000000094AC000-memory.dmp

    Filesize

    5.2MB

  • memory/2688-198-0x0000000007DE0000-0x0000000007E72000-memory.dmp

    Filesize

    584KB

  • memory/2688-191-0x0000000000180000-0x00000000001A8000-memory.dmp

    Filesize

    160KB

  • memory/2688-192-0x0000000007430000-0x0000000007A36000-memory.dmp

    Filesize

    6.0MB

  • memory/2688-193-0x0000000006E60000-0x0000000006E72000-memory.dmp

    Filesize

    72KB

  • memory/2688-194-0x0000000006F90000-0x000000000709A000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-197-0x0000000007220000-0x0000000007286000-memory.dmp

    Filesize

    408KB

  • memory/3784-2429-0x0000000000770000-0x000000000079E000-memory.dmp

    Filesize

    184KB

  • memory/3784-2433-0x00000000028A0000-0x00000000028A6000-memory.dmp

    Filesize

    24KB

  • memory/3784-2442-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/3784-2441-0x000000000A680000-0x000000000A6CB000-memory.dmp

    Filesize

    300KB

  • memory/4108-238-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4108-236-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4108-237-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4316-167-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-152-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

    Filesize

    64KB

  • memory/4316-185-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

    Filesize

    64KB

  • memory/4316-184-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/4316-183-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-181-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-179-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-177-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-150-0x00000000007D0000-0x00000000007FD000-memory.dmp

    Filesize

    180KB

  • memory/4316-187-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/4316-151-0x0000000002390000-0x00000000023AA000-memory.dmp

    Filesize

    104KB

  • memory/4316-165-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-153-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

    Filesize

    64KB

  • memory/4316-154-0x0000000004C90000-0x000000000518E000-memory.dmp

    Filesize

    5.0MB

  • memory/4316-155-0x00000000026F0000-0x0000000002708000-memory.dmp

    Filesize

    96KB

  • memory/4316-156-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-157-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-159-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-161-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-163-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-175-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-173-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-171-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4316-169-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/4788-245-0x0000000004E50000-0x0000000004EB6000-memory.dmp

    Filesize

    408KB

  • memory/4788-2422-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4788-2420-0x0000000005540000-0x0000000005572000-memory.dmp

    Filesize

    200KB

  • memory/4788-348-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4788-345-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4788-344-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4788-342-0x0000000000870000-0x00000000008CC000-memory.dmp

    Filesize

    368KB

  • memory/4788-251-0x0000000004E50000-0x0000000004EB1000-memory.dmp

    Filesize

    388KB

  • memory/4788-249-0x0000000004E50000-0x0000000004EB1000-memory.dmp

    Filesize

    388KB

  • memory/4788-247-0x0000000004E50000-0x0000000004EB1000-memory.dmp

    Filesize

    388KB

  • memory/4788-246-0x0000000004E50000-0x0000000004EB1000-memory.dmp

    Filesize

    388KB

  • memory/4788-244-0x00000000025C0000-0x0000000002628000-memory.dmp

    Filesize

    416KB