Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2023, 18:13

General

  • Target

    677472a01d427ebcc0dacb26c7ba105b67476001311ee5623a76fc4e00d175be.exe

  • Size

    1.0MB

  • MD5

    a61101256ad393ce6e08930fdaf7cb10

  • SHA1

    ce839a7585039204c67c14a6d97fb0281bfa120c

  • SHA256

    677472a01d427ebcc0dacb26c7ba105b67476001311ee5623a76fc4e00d175be

  • SHA512

    31eaaa272d71d1688131d1e92ecbe36db1881049e4532b44039bacd060cb930e9fc16a0b96d87348974716b380fcbfafaf6b5c00e97a5126efa74cc6993ad522

  • SSDEEP

    24576:ly4VVHZ08UNOqIDVnDW4G2RV5LjiN9MirDBceD:A4VVHqLNOqID1rG2dglnBce

Malware Config

Extracted

Family

redline

Botnet

daza

C2

77.91.124.251:19065

Attributes
  • auth_value

    0bd5963efefdd6409185423d5ca3439c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\677472a01d427ebcc0dacb26c7ba105b67476001311ee5623a76fc4e00d175be.exe
    "C:\Users\Admin\AppData\Local\Temp\677472a01d427ebcc0dacb26c7ba105b67476001311ee5623a76fc4e00d175be.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3653421.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3653421.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4773757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4773757.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4291503.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4291503.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2212
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6449490.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6449490.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m0545845.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m0545845.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4588
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m0545845.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m0545845.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2620
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3864
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              PID:2984
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4812
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4216
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4260
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:1408
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:N"
                    8⤵
                      PID:1240
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "oneetx.exe" /P "Admin:R" /E
                      8⤵
                        PID:4248
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:1192
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\c3912af058" /P "Admin:N"
                          8⤵
                            PID:4744
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\c3912af058" /P "Admin:R" /E
                            8⤵
                              PID:4980
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:5048
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0317018.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0317018.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1392
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:2004
                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4776

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oneetx.exe.log

                Filesize

                425B

                MD5

                4eaca4566b22b01cd3bc115b9b0b2196

                SHA1

                e743e0792c19f71740416e7b3c061d9f1336bf94

                SHA256

                34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                SHA512

                bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0317018.exe

                Filesize

                284KB

                MD5

                5c04c04a942e58066305053db8b39dc9

                SHA1

                f0f29515d12d00af99bd70d29f214a7802af4eb4

                SHA256

                3cde0da40491672cdeddcb81bd2ef32efda576373cc0a490bfdb4598098ac189

                SHA512

                13bfaf9d07c8d9caeafc22f31279d955f4e6975c0de0ec39431eb30cca23a0cd00898e4c52f726dc4ede732217f9b64f0dfdb6ff9e1abe59851b7ae4945c96e2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0317018.exe

                Filesize

                284KB

                MD5

                5c04c04a942e58066305053db8b39dc9

                SHA1

                f0f29515d12d00af99bd70d29f214a7802af4eb4

                SHA256

                3cde0da40491672cdeddcb81bd2ef32efda576373cc0a490bfdb4598098ac189

                SHA512

                13bfaf9d07c8d9caeafc22f31279d955f4e6975c0de0ec39431eb30cca23a0cd00898e4c52f726dc4ede732217f9b64f0dfdb6ff9e1abe59851b7ae4945c96e2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3653421.exe

                Filesize

                750KB

                MD5

                8681dde4ea6d2865f04246c10690dd68

                SHA1

                6f02da6847ecea73159b93b031375182e5250b54

                SHA256

                6b5eab90584ddd7b206f2ae610aeb01d3bbff1428000f67bd0339f4a5052dd05

                SHA512

                1ea18c65f21c3a290d288b2d5dcb893a6939f27dc661a55d6640ddb766003735a8311b71e39e9a853c10aa3a3291690e5746f26fe5573d3d614630981187fb4f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3653421.exe

                Filesize

                750KB

                MD5

                8681dde4ea6d2865f04246c10690dd68

                SHA1

                6f02da6847ecea73159b93b031375182e5250b54

                SHA256

                6b5eab90584ddd7b206f2ae610aeb01d3bbff1428000f67bd0339f4a5052dd05

                SHA512

                1ea18c65f21c3a290d288b2d5dcb893a6939f27dc661a55d6640ddb766003735a8311b71e39e9a853c10aa3a3291690e5746f26fe5573d3d614630981187fb4f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m0545845.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m0545845.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m0545845.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4773757.exe

                Filesize

                305KB

                MD5

                92a99e5fd6e18366d9ab3e2cadb4d934

                SHA1

                396aab4e43da576bdd3da9a55bb0a53f76512a2f

                SHA256

                f9691a4a5d6130a72c049b61ed22a4e11bffda15b04a92bfaf91c09aad203fc8

                SHA512

                813fd74d4c5c8e61e315067f66fa33ca4cd3e4e9500535e37862b0d98e2591bb6cafa6f04584a3747aa1c00717e084d4b149a652eed1f2b8c44da7261ace7ada

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4773757.exe

                Filesize

                305KB

                MD5

                92a99e5fd6e18366d9ab3e2cadb4d934

                SHA1

                396aab4e43da576bdd3da9a55bb0a53f76512a2f

                SHA256

                f9691a4a5d6130a72c049b61ed22a4e11bffda15b04a92bfaf91c09aad203fc8

                SHA512

                813fd74d4c5c8e61e315067f66fa33ca4cd3e4e9500535e37862b0d98e2591bb6cafa6f04584a3747aa1c00717e084d4b149a652eed1f2b8c44da7261ace7ada

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4291503.exe

                Filesize

                184KB

                MD5

                b6be2bc01a5c6a08b183ae24425e1581

                SHA1

                e9d95b642e55ee7dd2c7c3b47ceb8ca8633bd3f3

                SHA256

                4c46a368e8f1b60f8d65f47a865733d7386f2971e071143f5821647267ac478e

                SHA512

                b786f0b32ef7afd4cca1fdb9267320c2a9c53320db3c12781a728dd78a69e6eb84a1d1c8582339e43cb95b34bc9ed1fbacc3044ef7f8bd003721003f8599e76c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4291503.exe

                Filesize

                184KB

                MD5

                b6be2bc01a5c6a08b183ae24425e1581

                SHA1

                e9d95b642e55ee7dd2c7c3b47ceb8ca8633bd3f3

                SHA256

                4c46a368e8f1b60f8d65f47a865733d7386f2971e071143f5821647267ac478e

                SHA512

                b786f0b32ef7afd4cca1fdb9267320c2a9c53320db3c12781a728dd78a69e6eb84a1d1c8582339e43cb95b34bc9ed1fbacc3044ef7f8bd003721003f8599e76c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6449490.exe

                Filesize

                145KB

                MD5

                06cee0245097a6588bc2962d87c7debb

                SHA1

                64032e7983213fee83cc235f041f44fd19eb2942

                SHA256

                948542b4929b47a185ec30179f779723d0adcb59e2e3ee8b47f3c5383e849999

                SHA512

                d49a55ee7bb7f291e5173b3ca7b2d96612c8a77ac588de28b9ad5a5b03cb3aadbe865267cfe341d85bba43516f70c06da42bc627ea9a22e1962ed69ba2c0065f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6449490.exe

                Filesize

                145KB

                MD5

                06cee0245097a6588bc2962d87c7debb

                SHA1

                64032e7983213fee83cc235f041f44fd19eb2942

                SHA256

                948542b4929b47a185ec30179f779723d0adcb59e2e3ee8b47f3c5383e849999

                SHA512

                d49a55ee7bb7f291e5173b3ca7b2d96612c8a77ac588de28b9ad5a5b03cb3aadbe865267cfe341d85bba43516f70c06da42bc627ea9a22e1962ed69ba2c0065f

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                964KB

                MD5

                28d490fc004bff4e5e088dbc5d9ba408

                SHA1

                419131554049870c7e7649a7c3aaea2f3903d6e5

                SHA256

                2479ab99235c1a89de09c24ce9335601200ace6452798555aca653e23d1db008

                SHA512

                3e3e5bba365464ddad598700367cbf6c43a45416ae17c6c672db0ad776de5f1012548a4b0dd698424aaded488f4abde2119568758b3ed3c4da4684619f095f1c

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/436-193-0x0000000000CA0000-0x0000000000CCA000-memory.dmp

                Filesize

                168KB

              • memory/436-203-0x0000000007190000-0x0000000007352000-memory.dmp

                Filesize

                1.8MB

              • memory/436-202-0x00000000067A0000-0x00000000067F0000-memory.dmp

                Filesize

                320KB

              • memory/436-204-0x0000000007890000-0x0000000007DBC000-memory.dmp

                Filesize

                5.2MB

              • memory/436-201-0x0000000006820000-0x0000000006896000-memory.dmp

                Filesize

                472KB

              • memory/436-205-0x0000000005950000-0x0000000005960000-memory.dmp

                Filesize

                64KB

              • memory/436-194-0x0000000005BC0000-0x00000000061D8000-memory.dmp

                Filesize

                6.1MB

              • memory/436-195-0x0000000005740000-0x000000000584A000-memory.dmp

                Filesize

                1.0MB

              • memory/436-196-0x0000000005670000-0x0000000005682000-memory.dmp

                Filesize

                72KB

              • memory/436-197-0x00000000056D0000-0x000000000570C000-memory.dmp

                Filesize

                240KB

              • memory/436-198-0x0000000005950000-0x0000000005960000-memory.dmp

                Filesize

                64KB

              • memory/436-199-0x00000000059E0000-0x0000000005A46000-memory.dmp

                Filesize

                408KB

              • memory/436-200-0x0000000006590000-0x0000000006622000-memory.dmp

                Filesize

                584KB

              • memory/1392-1160-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1392-249-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-251-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-253-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-255-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-303-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1392-1148-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1392-245-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-247-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-243-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-1159-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1392-241-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-235-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-1161-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1392-239-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-237-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-222-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1392-223-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1392-224-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-227-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-225-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-229-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-231-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/1392-233-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                Filesize

                240KB

              • memory/2212-183-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-173-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-154-0x00000000049F0000-0x0000000004F94000-memory.dmp

                Filesize

                5.6MB

              • memory/2212-155-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-157-0x0000000002440000-0x0000000002450000-memory.dmp

                Filesize

                64KB

              • memory/2212-156-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-159-0x0000000002440000-0x0000000002450000-memory.dmp

                Filesize

                64KB

              • memory/2212-188-0x0000000002440000-0x0000000002450000-memory.dmp

                Filesize

                64KB

              • memory/2212-187-0x0000000002440000-0x0000000002450000-memory.dmp

                Filesize

                64KB

              • memory/2212-186-0x0000000002440000-0x0000000002450000-memory.dmp

                Filesize

                64KB

              • memory/2212-185-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-181-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-179-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-177-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-163-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-175-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-161-0x0000000002440000-0x0000000002450000-memory.dmp

                Filesize

                64KB

              • memory/2212-160-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-171-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-169-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-165-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2212-167-0x0000000002400000-0x0000000002416000-memory.dmp

                Filesize

                88KB

              • memory/2620-221-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2620-308-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2620-212-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2620-215-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2620-216-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/3864-432-0x0000000006F20000-0x0000000006F30000-memory.dmp

                Filesize

                64KB

              • memory/4588-210-0x00000000007B0000-0x00000000008A8000-memory.dmp

                Filesize

                992KB

              • memory/4588-211-0x0000000007530000-0x0000000007540000-memory.dmp

                Filesize

                64KB

              • memory/4776-1190-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/4812-1156-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/4812-1163-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB