Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 01:56

General

  • Target

    c76846cbaec0ba4dddfd89e03e794351f640fcced56021d8e3246a51ee88c176.exe

  • Size

    1.2MB

  • MD5

    dedfb0348d5dbb10f4b2efc46294cf20

  • SHA1

    67e00fd435ac396ff66e1ecb583291bfd130b1da

  • SHA256

    c76846cbaec0ba4dddfd89e03e794351f640fcced56021d8e3246a51ee88c176

  • SHA512

    45d9dd1567897bc51aa9bdad0c790c306742c633ea455e18afd047df2dd37569632d6d6fb2683bd0159e1dfcfb9ffa3c21cabc230a146d2c8a8be09c1238e93e

  • SSDEEP

    24576:PyQs8wafsdtb8b8ISrTUJxZSia65nyd3CD/5xN52FkCS:a1pksnbe8ISUJHvRysLMkC

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c76846cbaec0ba4dddfd89e03e794351f640fcced56021d8e3246a51ee88c176.exe
    "C:\Users\Admin\AppData\Local\Temp\c76846cbaec0ba4dddfd89e03e794351f640fcced56021d8e3246a51ee88c176.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plBQ78dm55.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plBQ78dm55.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqE15Nv11.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqE15Nv11.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFt43su45.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFt43su45.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4868
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plHL53KO51.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plHL53KO51.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4748
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buSh88it84.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buSh88it84.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2220
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFD77Tp64.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFD77Tp64.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1292
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 1544
                7⤵
                • Program crash
                PID:1216
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diMn80wI65.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diMn80wI65.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1988
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 1080
              6⤵
              • Program crash
              PID:3144
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esTA36Qo24.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esTA36Qo24.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4312
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 1340
            5⤵
            • Program crash
            PID:960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuBy9517NC63.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuBy9517NC63.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grgD10bq19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grgD10bq19.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1732
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1292 -ip 1292
    1⤵
      PID:2056
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1988 -ip 1988
      1⤵
        PID:5064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4312 -ip 4312
        1⤵
          PID:2416

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grgD10bq19.exe

          Filesize

          175KB

          MD5

          53bf688e7e40fb6e44813661851bf51b

          SHA1

          0356353ba1cb8c0d5c16ad344474151635804942

          SHA256

          23d2f4328311ef81e23edcb013b570e1ac24dedb31c67899c0001c3ed7a3890a

          SHA512

          204e75bb6ca7ff27527ef03faf16a61b6709a2d79d6a6ab86b5a0cff35f7a0b75275d6d213ebe2bca874c174ffe89cf24cb3696e88dee6c8a561b7f4438794dc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grgD10bq19.exe

          Filesize

          175KB

          MD5

          53bf688e7e40fb6e44813661851bf51b

          SHA1

          0356353ba1cb8c0d5c16ad344474151635804942

          SHA256

          23d2f4328311ef81e23edcb013b570e1ac24dedb31c67899c0001c3ed7a3890a

          SHA512

          204e75bb6ca7ff27527ef03faf16a61b6709a2d79d6a6ab86b5a0cff35f7a0b75275d6d213ebe2bca874c174ffe89cf24cb3696e88dee6c8a561b7f4438794dc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plBQ78dm55.exe

          Filesize

          1.0MB

          MD5

          58ecc690688a69b015270ba1338967b8

          SHA1

          b2ee0bbade52b564ab354c61164337452d0c4fb4

          SHA256

          e6479738a2e36f8613951a9c304e550e3f12d277bde77fa087b211f4d8c4bcbd

          SHA512

          2062f0e518b4d4288e23a379c821825950ca0674d80c6ccd0946f0929f80b9e2011d6d787b1cbebbbf9a81a770f907547ee0510eb683e6ab0397d1dacca23ca0

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plBQ78dm55.exe

          Filesize

          1.0MB

          MD5

          58ecc690688a69b015270ba1338967b8

          SHA1

          b2ee0bbade52b564ab354c61164337452d0c4fb4

          SHA256

          e6479738a2e36f8613951a9c304e550e3f12d277bde77fa087b211f4d8c4bcbd

          SHA512

          2062f0e518b4d4288e23a379c821825950ca0674d80c6ccd0946f0929f80b9e2011d6d787b1cbebbbf9a81a770f907547ee0510eb683e6ab0397d1dacca23ca0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuBy9517NC63.exe

          Filesize

          15KB

          MD5

          1b5602a04d65a22caa156af1d74ef14b

          SHA1

          336610a6873f0ca33c74c53502ed9f56f19c6fc3

          SHA256

          e89f670be816e4693712c9caa6a086591b3ff2e50b2f84cf5fc84c457957aa9b

          SHA512

          603318de7163cbf8a35bdfe0c2eda49b9d8e7eb4e05ca7bf1f709203c823d65e3aef23ad588eae89536bf640b417048d4d4001d1ffa244f6ffd8786e0e309eb8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuBy9517NC63.exe

          Filesize

          15KB

          MD5

          1b5602a04d65a22caa156af1d74ef14b

          SHA1

          336610a6873f0ca33c74c53502ed9f56f19c6fc3

          SHA256

          e89f670be816e4693712c9caa6a086591b3ff2e50b2f84cf5fc84c457957aa9b

          SHA512

          603318de7163cbf8a35bdfe0c2eda49b9d8e7eb4e05ca7bf1f709203c823d65e3aef23ad588eae89536bf640b417048d4d4001d1ffa244f6ffd8786e0e309eb8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqE15Nv11.exe

          Filesize

          971KB

          MD5

          991fd1807c0e98c51e4e3549469f4d72

          SHA1

          75c320a8a5d71d7ffca9c2ff0327ec71049fda95

          SHA256

          2afcf9ddef58cf9be8934230817efb06876fff8e8ad7f9b1742e9110d8b87e59

          SHA512

          7dccd2cbc033fb53bdd535f68fdb2ca0c93d731b6e8aff52d561abcdc2093ea4df8c3a09ec1370699ba39d54d636246172e90570384b59bf371f7927ccfb0011

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqE15Nv11.exe

          Filesize

          971KB

          MD5

          991fd1807c0e98c51e4e3549469f4d72

          SHA1

          75c320a8a5d71d7ffca9c2ff0327ec71049fda95

          SHA256

          2afcf9ddef58cf9be8934230817efb06876fff8e8ad7f9b1742e9110d8b87e59

          SHA512

          7dccd2cbc033fb53bdd535f68fdb2ca0c93d731b6e8aff52d561abcdc2093ea4df8c3a09ec1370699ba39d54d636246172e90570384b59bf371f7927ccfb0011

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esTA36Qo24.exe

          Filesize

          378KB

          MD5

          0699a3dd8a0bfbef309a3c474b22b56d

          SHA1

          8f8218184e8f28b14b8a3d5f828e28b9d8cd40a8

          SHA256

          0fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178

          SHA512

          6dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esTA36Qo24.exe

          Filesize

          378KB

          MD5

          0699a3dd8a0bfbef309a3c474b22b56d

          SHA1

          8f8218184e8f28b14b8a3d5f828e28b9d8cd40a8

          SHA256

          0fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178

          SHA512

          6dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFt43su45.exe

          Filesize

          690KB

          MD5

          220b7311f064f606942e823126fcfce2

          SHA1

          0e5a5bc9ea096ba2f899eacd9eb3c35cbd96d7ce

          SHA256

          325758caf63fb6013c3a76369c6a4a8cf1f3c1a8681e590bb032464de9090f9a

          SHA512

          888cfcb38ea68cfdd6ed88632576dfda555ccc869aba23b218b3ebfa092891224d80b463b3c134ace33691076e8cb93fc377189847fe8a1817e579623874ba91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFt43su45.exe

          Filesize

          690KB

          MD5

          220b7311f064f606942e823126fcfce2

          SHA1

          0e5a5bc9ea096ba2f899eacd9eb3c35cbd96d7ce

          SHA256

          325758caf63fb6013c3a76369c6a4a8cf1f3c1a8681e590bb032464de9090f9a

          SHA512

          888cfcb38ea68cfdd6ed88632576dfda555ccc869aba23b218b3ebfa092891224d80b463b3c134ace33691076e8cb93fc377189847fe8a1817e579623874ba91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diMn80wI65.exe

          Filesize

          320KB

          MD5

          887d5f3f25f82ef4ec073a39f3050594

          SHA1

          0f0d0e2f3b7d8b61dffab0d347d81740dfe956d8

          SHA256

          f253180eaa3ade6c077fe6af72f5146029ff4d27a93debfe7f66507aa8739c65

          SHA512

          bf6ab835d6f35063d6d499b18a60581b97c894e9a524da4b60008765a9853b29f0594c6fdca718b64cd5799a7b0fea1c115d21662bf90ff4dd67083d289cc81d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diMn80wI65.exe

          Filesize

          320KB

          MD5

          887d5f3f25f82ef4ec073a39f3050594

          SHA1

          0f0d0e2f3b7d8b61dffab0d347d81740dfe956d8

          SHA256

          f253180eaa3ade6c077fe6af72f5146029ff4d27a93debfe7f66507aa8739c65

          SHA512

          bf6ab835d6f35063d6d499b18a60581b97c894e9a524da4b60008765a9853b29f0594c6fdca718b64cd5799a7b0fea1c115d21662bf90ff4dd67083d289cc81d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plHL53KO51.exe

          Filesize

          403KB

          MD5

          c49e57752ad1f65bc253e8012abdfd24

          SHA1

          ed74703913f36a2096cc0879163d226adb0b1b47

          SHA256

          8349df9e08f4223080d5dbac0c24f5bb9a852e87f6a4ba9acd7b1dce615e0af3

          SHA512

          64514a81ff52ce0d123835645a7f96838d1223e55f16f0476a14354170c8f826eb1bc8df64e4d659fc03cab2a2847dc11c085903cd370fd702ab9bc1c6119973

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plHL53KO51.exe

          Filesize

          403KB

          MD5

          c49e57752ad1f65bc253e8012abdfd24

          SHA1

          ed74703913f36a2096cc0879163d226adb0b1b47

          SHA256

          8349df9e08f4223080d5dbac0c24f5bb9a852e87f6a4ba9acd7b1dce615e0af3

          SHA512

          64514a81ff52ce0d123835645a7f96838d1223e55f16f0476a14354170c8f826eb1bc8df64e4d659fc03cab2a2847dc11c085903cd370fd702ab9bc1c6119973

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buSh88it84.exe

          Filesize

          15KB

          MD5

          e9bbe82b7e04817d5d784d86b722a51d

          SHA1

          a7bfa9b17f2ab5f64b0a06002ebd9cc5b3bea78f

          SHA256

          ed0f2813f54e1d4935183bb9d6384108236752bba6d253b86159cac17039d50b

          SHA512

          68160107f1ccda41b02ed22ec91a8b196ac38cbdc1b1184dcbd1232a9626e1c62aafdf3caa6a0b0a0bf5156c5e46f0e6c30a14c270c3275676525a50f206ddbc

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buSh88it84.exe

          Filesize

          15KB

          MD5

          e9bbe82b7e04817d5d784d86b722a51d

          SHA1

          a7bfa9b17f2ab5f64b0a06002ebd9cc5b3bea78f

          SHA256

          ed0f2813f54e1d4935183bb9d6384108236752bba6d253b86159cac17039d50b

          SHA512

          68160107f1ccda41b02ed22ec91a8b196ac38cbdc1b1184dcbd1232a9626e1c62aafdf3caa6a0b0a0bf5156c5e46f0e6c30a14c270c3275676525a50f206ddbc

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buSh88it84.exe

          Filesize

          15KB

          MD5

          e9bbe82b7e04817d5d784d86b722a51d

          SHA1

          a7bfa9b17f2ab5f64b0a06002ebd9cc5b3bea78f

          SHA256

          ed0f2813f54e1d4935183bb9d6384108236752bba6d253b86159cac17039d50b

          SHA512

          68160107f1ccda41b02ed22ec91a8b196ac38cbdc1b1184dcbd1232a9626e1c62aafdf3caa6a0b0a0bf5156c5e46f0e6c30a14c270c3275676525a50f206ddbc

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFD77Tp64.exe

          Filesize

          378KB

          MD5

          0699a3dd8a0bfbef309a3c474b22b56d

          SHA1

          8f8218184e8f28b14b8a3d5f828e28b9d8cd40a8

          SHA256

          0fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178

          SHA512

          6dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFD77Tp64.exe

          Filesize

          378KB

          MD5

          0699a3dd8a0bfbef309a3c474b22b56d

          SHA1

          8f8218184e8f28b14b8a3d5f828e28b9d8cd40a8

          SHA256

          0fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178

          SHA512

          6dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFD77Tp64.exe

          Filesize

          378KB

          MD5

          0699a3dd8a0bfbef309a3c474b22b56d

          SHA1

          8f8218184e8f28b14b8a3d5f828e28b9d8cd40a8

          SHA256

          0fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178

          SHA512

          6dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd

        • memory/1292-227-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-1092-0x0000000008400000-0x0000000008466000-memory.dmp

          Filesize

          408KB

        • memory/1292-187-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-189-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-191-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-193-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-195-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-197-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-199-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-201-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-203-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-205-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-207-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-209-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-211-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-213-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-215-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-217-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-219-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-221-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-223-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-225-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-185-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-229-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-231-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-233-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-235-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-237-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-239-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-241-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-1086-0x0000000007920000-0x0000000007F38000-memory.dmp

          Filesize

          6.1MB

        • memory/1292-1087-0x0000000007FB0000-0x00000000080BA000-memory.dmp

          Filesize

          1.0MB

        • memory/1292-1088-0x00000000080F0000-0x0000000008102000-memory.dmp

          Filesize

          72KB

        • memory/1292-1089-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/1292-1090-0x0000000008110000-0x000000000814C000-memory.dmp

          Filesize

          240KB

        • memory/1292-181-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-1093-0x0000000008AC0000-0x0000000008B52000-memory.dmp

          Filesize

          584KB

        • memory/1292-1094-0x0000000008BD0000-0x0000000008D92000-memory.dmp

          Filesize

          1.8MB

        • memory/1292-1095-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/1292-1096-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/1292-1097-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/1292-1098-0x0000000008DA0000-0x00000000092CC000-memory.dmp

          Filesize

          5.2MB

        • memory/1292-1099-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/1292-1100-0x0000000009630000-0x00000000096A6000-memory.dmp

          Filesize

          472KB

        • memory/1292-183-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1292-1101-0x00000000096C0000-0x0000000009710000-memory.dmp

          Filesize

          320KB

        • memory/1292-175-0x00000000071F0000-0x0000000007794000-memory.dmp

          Filesize

          5.6MB

        • memory/1292-176-0x0000000002D20000-0x0000000002D6B000-memory.dmp

          Filesize

          300KB

        • memory/1292-178-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/1292-177-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/1292-179-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/1292-180-0x00000000077A0000-0x00000000077DE000-memory.dmp

          Filesize

          248KB

        • memory/1732-2076-0x0000000005750000-0x0000000005760000-memory.dmp

          Filesize

          64KB

        • memory/1732-2075-0x0000000000B40000-0x0000000000B72000-memory.dmp

          Filesize

          200KB

        • memory/1988-1141-0x00000000072A0000-0x00000000072B0000-memory.dmp

          Filesize

          64KB

        • memory/1988-1142-0x00000000072A0000-0x00000000072B0000-memory.dmp

          Filesize

          64KB

        • memory/1988-1143-0x00000000072A0000-0x00000000072B0000-memory.dmp

          Filesize

          64KB

        • memory/1988-1117-0x00000000047C0000-0x00000000047ED000-memory.dmp

          Filesize

          180KB

        • memory/1988-1118-0x00000000072A0000-0x00000000072B0000-memory.dmp

          Filesize

          64KB

        • memory/1988-1121-0x00000000072A0000-0x00000000072B0000-memory.dmp

          Filesize

          64KB

        • memory/2220-168-0x00000000001F0000-0x00000000001FA000-memory.dmp

          Filesize

          40KB

        • memory/2220-170-0x000000001C330000-0x000000001C47E000-memory.dmp

          Filesize

          1.3MB

        • memory/4312-1203-0x0000000007280000-0x0000000007290000-memory.dmp

          Filesize

          64KB

        • memory/4312-2066-0x0000000007280000-0x0000000007290000-memory.dmp

          Filesize

          64KB

        • memory/4312-2064-0x0000000007280000-0x0000000007290000-memory.dmp

          Filesize

          64KB

        • memory/4312-2065-0x0000000007280000-0x0000000007290000-memory.dmp

          Filesize

          64KB

        • memory/4312-2058-0x0000000007280000-0x0000000007290000-memory.dmp

          Filesize

          64KB

        • memory/4312-1207-0x0000000007280000-0x0000000007290000-memory.dmp

          Filesize

          64KB

        • memory/4312-1205-0x0000000007280000-0x0000000007290000-memory.dmp

          Filesize

          64KB