Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 23:31

General

  • Target

    81a7049723c5bfb73933733f572a2ea72da5ff5a7977d6860a7757d7f30fde12.exe

  • Size

    1.1MB

  • MD5

    cd6200f8204eb169b4b462c6db87557b

  • SHA1

    693a8549e7ed9dffdf024b87784d45debceaae51

  • SHA256

    81a7049723c5bfb73933733f572a2ea72da5ff5a7977d6860a7757d7f30fde12

  • SHA512

    4cbe386a26b23f3375c23cb38edc3145088318f24de95a8147c8c7bd28ebf650175ae2f4ce4d00181a985c6644dc7fcdb3187c45b70e71fd127505699209427f

  • SSDEEP

    12288:YMr4y90x8Tmv3G7wIKSoJH4hE+9isFhGuZ/JCYvs94Pv1P9A3dZxtfeWXd67Zb+u:QyFTaW77e42/sFrcYvPSvx0Od67ZRt

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

durov

C2

193.56.146.11:4162

Attributes
  • auth_value

    337984645d237df105d30aab7013119f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81a7049723c5bfb73933733f572a2ea72da5ff5a7977d6860a7757d7f30fde12.exe
    "C:\Users\Admin\AppData\Local\Temp\81a7049723c5bfb73933733f572a2ea72da5ff5a7977d6860a7757d7f30fde12.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plfX23KR58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plfX23KR58.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIJ83sR64.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIJ83sR64.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:508
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plCO14IW11.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plCO14IW11.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4956
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plDW43WQ02.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plDW43WQ02.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buvX94oR73.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buvX94oR73.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4752
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadL52Vz49.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadL52Vz49.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1680
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 1380
                7⤵
                • Program crash
                PID:4232
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diWD40kN62.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diWD40kN62.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4620
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 1076
              6⤵
              • Program crash
              PID:2708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eswE90TU33.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eswE90TU33.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2188
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 1328
            5⤵
            • Program crash
            PID:4928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuzg9668jp94.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuzg9668jp94.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grvY79ow04.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grvY79ow04.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:320
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1680 -ip 1680
    1⤵
      PID:4448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4620 -ip 4620
      1⤵
        PID:5112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2188 -ip 2188
        1⤵
          PID:4128

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grvY79ow04.exe

          Filesize

          175KB

          MD5

          4366b0f30813dcc13cdd369161733cd1

          SHA1

          f1456fb4239a7529322b39d015e0402174c36a07

          SHA256

          4b16ebc4eb7d3c2cb40c01e2afa3b53a010b9ddcb486abdb7a798b91393b030c

          SHA512

          35967cf6dccd8de31742d76a1f1a95c657a75c887548674bce254d828cbbc35fb8edbed314660e6103deee04807db58e609a2cba1b342ea1857048a9d15b453c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grvY79ow04.exe

          Filesize

          175KB

          MD5

          4366b0f30813dcc13cdd369161733cd1

          SHA1

          f1456fb4239a7529322b39d015e0402174c36a07

          SHA256

          4b16ebc4eb7d3c2cb40c01e2afa3b53a010b9ddcb486abdb7a798b91393b030c

          SHA512

          35967cf6dccd8de31742d76a1f1a95c657a75c887548674bce254d828cbbc35fb8edbed314660e6103deee04807db58e609a2cba1b342ea1857048a9d15b453c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plfX23KR58.exe

          Filesize

          992KB

          MD5

          b85d12956f553cd493dca00e456b7fd8

          SHA1

          e37e076d9b12e52e9896214644aa7672274f068b

          SHA256

          57fe206d436c838c39e1a51e704a56b63f671543d250bf720be8c4b943b44dae

          SHA512

          51089225805806323bd07d97214c104fa31bb5979a437a9068d05312196c8e961d776e6b9bbace22ae64f601f7ee3942612ece070c1f8a5815ccee2d50add57a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plfX23KR58.exe

          Filesize

          992KB

          MD5

          b85d12956f553cd493dca00e456b7fd8

          SHA1

          e37e076d9b12e52e9896214644aa7672274f068b

          SHA256

          57fe206d436c838c39e1a51e704a56b63f671543d250bf720be8c4b943b44dae

          SHA512

          51089225805806323bd07d97214c104fa31bb5979a437a9068d05312196c8e961d776e6b9bbace22ae64f601f7ee3942612ece070c1f8a5815ccee2d50add57a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuzg9668jp94.exe

          Filesize

          11KB

          MD5

          989364c865eb7ae6b7d99c0f9315aaaa

          SHA1

          180d31c042c0b72eb8c94d628de6df2819179820

          SHA256

          5c4fdba1407b2e7812a326d05f334021ffc6d33bac1b87b67061d9fdae5ce33b

          SHA512

          3526a12bb0b90e9a2568cdb55a817ea3552b35e6cc66933965e49f1dd113b9cf04c9b1c45add6e6538bbef1c4956a56fddf736cecd6542680dd2712c0eec4a31

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuzg9668jp94.exe

          Filesize

          11KB

          MD5

          989364c865eb7ae6b7d99c0f9315aaaa

          SHA1

          180d31c042c0b72eb8c94d628de6df2819179820

          SHA256

          5c4fdba1407b2e7812a326d05f334021ffc6d33bac1b87b67061d9fdae5ce33b

          SHA512

          3526a12bb0b90e9a2568cdb55a817ea3552b35e6cc66933965e49f1dd113b9cf04c9b1c45add6e6538bbef1c4956a56fddf736cecd6542680dd2712c0eec4a31

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIJ83sR64.exe

          Filesize

          892KB

          MD5

          d7760c756e54ec5405cb26ecf5df24d9

          SHA1

          125e28d96bfce4ed9c59b2e2312010eef216de01

          SHA256

          979cfec201d50c0f8d541891a803ec98a7f8f9d1f8a65f6f9d7722b7c22650f7

          SHA512

          6e6d6b68e65733f29b6e7745a97806dcc77fd929013eab1c2f3dddb93695bd1ae4de28a4f53628fbff958ad28c1e64c35da89a11c8b85987d3597b8ba9b93e34

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIJ83sR64.exe

          Filesize

          892KB

          MD5

          d7760c756e54ec5405cb26ecf5df24d9

          SHA1

          125e28d96bfce4ed9c59b2e2312010eef216de01

          SHA256

          979cfec201d50c0f8d541891a803ec98a7f8f9d1f8a65f6f9d7722b7c22650f7

          SHA512

          6e6d6b68e65733f29b6e7745a97806dcc77fd929013eab1c2f3dddb93695bd1ae4de28a4f53628fbff958ad28c1e64c35da89a11c8b85987d3597b8ba9b93e34

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eswE90TU33.exe

          Filesize

          304KB

          MD5

          a562213cf445eaaf665759f35b4e91c2

          SHA1

          c37cb42d6b01cb56f0528499c8cb2d801176bf45

          SHA256

          457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

          SHA512

          6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eswE90TU33.exe

          Filesize

          304KB

          MD5

          a562213cf445eaaf665759f35b4e91c2

          SHA1

          c37cb42d6b01cb56f0528499c8cb2d801176bf45

          SHA256

          457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

          SHA512

          6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plCO14IW11.exe

          Filesize

          666KB

          MD5

          5f7b503a40898693d035920e8eee3eae

          SHA1

          6ab0f3210d44b610a37bd4ef1c2436cdf063745d

          SHA256

          a81679f493c3b652f19343c65e56db6271daf8a5a2b2d1a91c9d66cd17d5b437

          SHA512

          ce6f0518174b52123b786e1d9707b806c45c310f08a0faca4e49d3300a47d316abe151da42f3d10f2798c2519253619c32ec12f26f5ae10e95f4ffc149621aba

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plCO14IW11.exe

          Filesize

          666KB

          MD5

          5f7b503a40898693d035920e8eee3eae

          SHA1

          6ab0f3210d44b610a37bd4ef1c2436cdf063745d

          SHA256

          a81679f493c3b652f19343c65e56db6271daf8a5a2b2d1a91c9d66cd17d5b437

          SHA512

          ce6f0518174b52123b786e1d9707b806c45c310f08a0faca4e49d3300a47d316abe151da42f3d10f2798c2519253619c32ec12f26f5ae10e95f4ffc149621aba

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diWD40kN62.exe

          Filesize

          246KB

          MD5

          507d6ec6d7a5a7af2977e0a7f8e8d480

          SHA1

          2640fc4ec86dbe93a161f085be5748ae910700b4

          SHA256

          cd820dff6ac4db86f20d40b750d50211c3a02d6b47d5f40c2550a426caa680a7

          SHA512

          6d06c09a0c67086f34e25902bf62e79e8e4edde77a1b11649f67b7bdbb89bec756774e6c646884e6dcf31096e5a6068abcbd7581d1ed40ae52231489e55b2d8d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diWD40kN62.exe

          Filesize

          246KB

          MD5

          507d6ec6d7a5a7af2977e0a7f8e8d480

          SHA1

          2640fc4ec86dbe93a161f085be5748ae910700b4

          SHA256

          cd820dff6ac4db86f20d40b750d50211c3a02d6b47d5f40c2550a426caa680a7

          SHA512

          6d06c09a0c67086f34e25902bf62e79e8e4edde77a1b11649f67b7bdbb89bec756774e6c646884e6dcf31096e5a6068abcbd7581d1ed40ae52231489e55b2d8d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plDW43WQ02.exe

          Filesize

          391KB

          MD5

          629546b033d7e678e5339eb140c24268

          SHA1

          bf188271a4d0021ef944227f7ea5809c2c13d3cd

          SHA256

          109780204486a02ae1772ccbbace923abf0e6bf6c17238bfbdeb6ba67d94f075

          SHA512

          5ea8e9df9fbaad7e65ff2646a9678a319ce80c46ef190b43b0519209e7a191d3046c82c8a07867d1b20bf2c02f8adf7748d68914e2d0684646aeca8c7a309504

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plDW43WQ02.exe

          Filesize

          391KB

          MD5

          629546b033d7e678e5339eb140c24268

          SHA1

          bf188271a4d0021ef944227f7ea5809c2c13d3cd

          SHA256

          109780204486a02ae1772ccbbace923abf0e6bf6c17238bfbdeb6ba67d94f075

          SHA512

          5ea8e9df9fbaad7e65ff2646a9678a319ce80c46ef190b43b0519209e7a191d3046c82c8a07867d1b20bf2c02f8adf7748d68914e2d0684646aeca8c7a309504

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buvX94oR73.exe

          Filesize

          11KB

          MD5

          8f39a3fbb2f51390399fb117bcb768ff

          SHA1

          0d74c92fdf8de1a3e9896dd249986aca2f30a600

          SHA256

          e37723f401f5f214fc2d90faccb03313b19e9d082d0bb46e8bfe817f20828aad

          SHA512

          c010ec3705c578b2fd68537d77e9d42e192d3ecbcbf09b822116d13621f041e27e4edd5f0a410981c759ce2452a103dfdca6ceb548c3d7cd0822401151be0c0c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buvX94oR73.exe

          Filesize

          11KB

          MD5

          8f39a3fbb2f51390399fb117bcb768ff

          SHA1

          0d74c92fdf8de1a3e9896dd249986aca2f30a600

          SHA256

          e37723f401f5f214fc2d90faccb03313b19e9d082d0bb46e8bfe817f20828aad

          SHA512

          c010ec3705c578b2fd68537d77e9d42e192d3ecbcbf09b822116d13621f041e27e4edd5f0a410981c759ce2452a103dfdca6ceb548c3d7cd0822401151be0c0c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buvX94oR73.exe

          Filesize

          11KB

          MD5

          8f39a3fbb2f51390399fb117bcb768ff

          SHA1

          0d74c92fdf8de1a3e9896dd249986aca2f30a600

          SHA256

          e37723f401f5f214fc2d90faccb03313b19e9d082d0bb46e8bfe817f20828aad

          SHA512

          c010ec3705c578b2fd68537d77e9d42e192d3ecbcbf09b822116d13621f041e27e4edd5f0a410981c759ce2452a103dfdca6ceb548c3d7cd0822401151be0c0c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadL52Vz49.exe

          Filesize

          304KB

          MD5

          a562213cf445eaaf665759f35b4e91c2

          SHA1

          c37cb42d6b01cb56f0528499c8cb2d801176bf45

          SHA256

          457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

          SHA512

          6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadL52Vz49.exe

          Filesize

          304KB

          MD5

          a562213cf445eaaf665759f35b4e91c2

          SHA1

          c37cb42d6b01cb56f0528499c8cb2d801176bf45

          SHA256

          457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

          SHA512

          6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadL52Vz49.exe

          Filesize

          304KB

          MD5

          a562213cf445eaaf665759f35b4e91c2

          SHA1

          c37cb42d6b01cb56f0528499c8cb2d801176bf45

          SHA256

          457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

          SHA512

          6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

        • memory/320-2069-0x0000000000E20000-0x0000000000E52000-memory.dmp

          Filesize

          200KB

        • memory/320-2070-0x00000000056B0000-0x00000000056C0000-memory.dmp

          Filesize

          64KB

        • memory/1680-222-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-1087-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

          Filesize

          72KB

        • memory/1680-186-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-188-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-190-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-192-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-194-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-196-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-198-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-200-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-202-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-204-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-206-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-208-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-210-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-212-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-214-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-216-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-218-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-220-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-182-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-224-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-226-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-228-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-230-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-232-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-234-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-236-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-238-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-240-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-242-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-1085-0x00000000052D0000-0x00000000058E8000-memory.dmp

          Filesize

          6.1MB

        • memory/1680-1086-0x0000000005970000-0x0000000005A7A000-memory.dmp

          Filesize

          1.0MB

        • memory/1680-184-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-1088-0x0000000002430000-0x0000000002440000-memory.dmp

          Filesize

          64KB

        • memory/1680-1089-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

          Filesize

          240KB

        • memory/1680-1091-0x0000000005DC0000-0x0000000005E52000-memory.dmp

          Filesize

          584KB

        • memory/1680-1092-0x0000000005E60000-0x0000000005EC6000-memory.dmp

          Filesize

          408KB

        • memory/1680-1093-0x0000000002430000-0x0000000002440000-memory.dmp

          Filesize

          64KB

        • memory/1680-1094-0x0000000002430000-0x0000000002440000-memory.dmp

          Filesize

          64KB

        • memory/1680-1095-0x0000000002430000-0x0000000002440000-memory.dmp

          Filesize

          64KB

        • memory/1680-1096-0x0000000007970000-0x0000000007B32000-memory.dmp

          Filesize

          1.8MB

        • memory/1680-1097-0x0000000007B50000-0x000000000807C000-memory.dmp

          Filesize

          5.2MB

        • memory/1680-1098-0x00000000082A0000-0x0000000008316000-memory.dmp

          Filesize

          472KB

        • memory/1680-1099-0x0000000002340000-0x0000000002390000-memory.dmp

          Filesize

          320KB

        • memory/1680-1100-0x0000000002430000-0x0000000002440000-memory.dmp

          Filesize

          64KB

        • memory/1680-174-0x0000000004B30000-0x00000000050D4000-memory.dmp

          Filesize

          5.6MB

        • memory/1680-176-0x0000000002430000-0x0000000002440000-memory.dmp

          Filesize

          64KB

        • memory/1680-175-0x0000000000630000-0x000000000067B000-memory.dmp

          Filesize

          300KB

        • memory/1680-180-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/1680-177-0x0000000002430000-0x0000000002440000-memory.dmp

          Filesize

          64KB

        • memory/1680-178-0x0000000002430000-0x0000000002440000-memory.dmp

          Filesize

          64KB

        • memory/1680-179-0x0000000005120000-0x000000000515E000-memory.dmp

          Filesize

          248KB

        • memory/2188-2056-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2188-2057-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2188-2058-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2188-2059-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2188-2054-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2188-1398-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2188-1397-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/4620-1137-0x0000000002790000-0x00000000027A0000-memory.dmp

          Filesize

          64KB

        • memory/4620-1136-0x0000000002790000-0x00000000027A0000-memory.dmp

          Filesize

          64KB

        • memory/4620-1135-0x0000000000700000-0x000000000072D000-memory.dmp

          Filesize

          180KB

        • memory/4620-1138-0x0000000002790000-0x00000000027A0000-memory.dmp

          Filesize

          64KB

        • memory/4752-168-0x00000000009D0000-0x00000000009DA000-memory.dmp

          Filesize

          40KB