Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    76s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 14:29

General

  • Target

    f1ae2eb12a38047ffbc1624a90d945cb683c7a9b471575dac7bb65bfbb9af4a3.exe

  • Size

    1.1MB

  • MD5

    3e85f7ad4c118b8cb454715e3027a3b3

  • SHA1

    5d2a1efa6badbd898d5a8941544a1ef7ff950032

  • SHA256

    f1ae2eb12a38047ffbc1624a90d945cb683c7a9b471575dac7bb65bfbb9af4a3

  • SHA512

    df8fa89095ff374b9133192aecc5b1f1fce553c0b0c664cb8196f212e4939cc2adc8d5459aaa814479707c8fbdedd74fe1f7cc584b4c6d226bc54dad7c18518b

  • SSDEEP

    24576:zypzhJrsMZ4PbL091tXgSBjeG2Em5QBtRFMj3WMbZGvl4+B/4nKYpxX2r:GLJrs3bLm1tXySBbFMjWM4vlXmn2

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1ae2eb12a38047ffbc1624a90d945cb683c7a9b471575dac7bb65bfbb9af4a3.exe
    "C:\Users\Admin\AppData\Local\Temp\f1ae2eb12a38047ffbc1624a90d945cb683c7a9b471575dac7bb65bfbb9af4a3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plkX36bp87.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plkX36bp87.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plGT11TI11.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plGT11TI11.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFp11vD74.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFp11vD74.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plnI46vg11.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plnI46vg11.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2580
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bugz12UL20.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bugz12UL20.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2032
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBG88Ej17.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBG88Ej17.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2604
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 1092
                7⤵
                • Program crash
                PID:2444
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diVP40yj05.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diVP40yj05.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4664
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 1080
              6⤵
              • Program crash
              PID:4432
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\espF07OP28.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\espF07OP28.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4324
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 1348
            5⤵
            • Program crash
            PID:4376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuqS0371wA86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuqS0371wA86.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4360
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grfc71Vu68.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grfc71Vu68.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5008
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2604 -ip 2604
    1⤵
      PID:3324
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4664 -ip 4664
      1⤵
        PID:4716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4324 -ip 4324
        1⤵
          PID:2852

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grfc71Vu68.exe

          Filesize

          176KB

          MD5

          e77460bbe1af9fb4f5c21c17a284da49

          SHA1

          14da49c6ce59fb3ed0d3d77bd69509c8802161a9

          SHA256

          197d25b8c8b3d7febb55ffe004d8ab5eab3b0ec73c5e8ce09a1b827936edb495

          SHA512

          232294aa72443d751e936037a9794ba22bfb64677c3d927ba246992cf8c13098481a2017df32a424fa5065eca4499c675cc572071ff1f3d80cfe97c98b2550ac

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grfc71Vu68.exe

          Filesize

          176KB

          MD5

          e77460bbe1af9fb4f5c21c17a284da49

          SHA1

          14da49c6ce59fb3ed0d3d77bd69509c8802161a9

          SHA256

          197d25b8c8b3d7febb55ffe004d8ab5eab3b0ec73c5e8ce09a1b827936edb495

          SHA512

          232294aa72443d751e936037a9794ba22bfb64677c3d927ba246992cf8c13098481a2017df32a424fa5065eca4499c675cc572071ff1f3d80cfe97c98b2550ac

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plkX36bp87.exe

          Filesize

          996KB

          MD5

          89673b7e64c8f4e060bdef71af13a6f2

          SHA1

          8e3a8e9986c8bdc1d38166b7710625c534dc5baf

          SHA256

          e437f32a7e95c29963f54518f9cd927a3516c866c6cfaf25f3a00819fb6a7fbf

          SHA512

          295f7935f854d23741b151ea776257f469108e1e27d6af77c7c3cd570af2e6b0f946e51add31eef6562399443474b52860245ac5d74432f61aff30ddb23d0fe1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plkX36bp87.exe

          Filesize

          996KB

          MD5

          89673b7e64c8f4e060bdef71af13a6f2

          SHA1

          8e3a8e9986c8bdc1d38166b7710625c534dc5baf

          SHA256

          e437f32a7e95c29963f54518f9cd927a3516c866c6cfaf25f3a00819fb6a7fbf

          SHA512

          295f7935f854d23741b151ea776257f469108e1e27d6af77c7c3cd570af2e6b0f946e51add31eef6562399443474b52860245ac5d74432f61aff30ddb23d0fe1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuqS0371wA86.exe

          Filesize

          17KB

          MD5

          6ed26cc0461453008dba97f2186d6ae5

          SHA1

          f90673f7b2812c33e52896b7396757eb161f63ba

          SHA256

          b3677d0b3eb5d4d5527bc3bba05490a1fb7418ba2ddfa2e18fe8ada9407f7783

          SHA512

          d84e92d73bdb1a79dbc0b5484dd8bff1f3285375491b6d837f8c8160854f851eeb1afff752b72f188633b15effdff1df0b03cfea33fa47cb50cb7660f4582fd8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuqS0371wA86.exe

          Filesize

          17KB

          MD5

          6ed26cc0461453008dba97f2186d6ae5

          SHA1

          f90673f7b2812c33e52896b7396757eb161f63ba

          SHA256

          b3677d0b3eb5d4d5527bc3bba05490a1fb7418ba2ddfa2e18fe8ada9407f7783

          SHA512

          d84e92d73bdb1a79dbc0b5484dd8bff1f3285375491b6d837f8c8160854f851eeb1afff752b72f188633b15effdff1df0b03cfea33fa47cb50cb7660f4582fd8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plGT11TI11.exe

          Filesize

          892KB

          MD5

          edb3983bd856ded791f56580aaa702e1

          SHA1

          9bb001dc192f308d0c69f33be54e92e2d36b9f4b

          SHA256

          9f5b896392e40416b45e0ced9c15af33b5315702577637160b552bf16fc6edec

          SHA512

          3c2636fba8bbbf8fd80ce026c74e726e80b7976b0f328a0fe5faa4ad04d31a3bc2e1a4044dd28891e025eeb99dd4e129e88b5463438769a24f85fa204767a4a2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plGT11TI11.exe

          Filesize

          892KB

          MD5

          edb3983bd856ded791f56580aaa702e1

          SHA1

          9bb001dc192f308d0c69f33be54e92e2d36b9f4b

          SHA256

          9f5b896392e40416b45e0ced9c15af33b5315702577637160b552bf16fc6edec

          SHA512

          3c2636fba8bbbf8fd80ce026c74e726e80b7976b0f328a0fe5faa4ad04d31a3bc2e1a4044dd28891e025eeb99dd4e129e88b5463438769a24f85fa204767a4a2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\espF07OP28.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\espF07OP28.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFp11vD74.exe

          Filesize

          666KB

          MD5

          727fc549125469836f8da755fdd9f1e3

          SHA1

          4c928dc5093a57aafadc12e41e22d798253ca44b

          SHA256

          6cd641f57628b6b54e336fa1e952293ef1a88bb31de4efa892a16bd0695183b6

          SHA512

          b78a5fe5b50c1675baf09e23c98a0787eab319fa9fc3a396f7e065468fb596f5bfef085cb5e57479fe75dfa6addd4888c63d47a96614a75f4e5beae15b027d76

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFp11vD74.exe

          Filesize

          666KB

          MD5

          727fc549125469836f8da755fdd9f1e3

          SHA1

          4c928dc5093a57aafadc12e41e22d798253ca44b

          SHA256

          6cd641f57628b6b54e336fa1e952293ef1a88bb31de4efa892a16bd0695183b6

          SHA512

          b78a5fe5b50c1675baf09e23c98a0787eab319fa9fc3a396f7e065468fb596f5bfef085cb5e57479fe75dfa6addd4888c63d47a96614a75f4e5beae15b027d76

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diVP40yj05.exe

          Filesize

          246KB

          MD5

          97c977c85d447742b3e217de53a0f069

          SHA1

          053a758567d8c26f1aea1e74382133097d8ba74d

          SHA256

          ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d

          SHA512

          14fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diVP40yj05.exe

          Filesize

          246KB

          MD5

          97c977c85d447742b3e217de53a0f069

          SHA1

          053a758567d8c26f1aea1e74382133097d8ba74d

          SHA256

          ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d

          SHA512

          14fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plnI46vg11.exe

          Filesize

          391KB

          MD5

          00f1d7efc294d2a295757eac2ff16bfd

          SHA1

          fc47aa7a9d3850f995c456eef1cb4cecb6b17d6d

          SHA256

          936545141112922cfe4e6f24f4a74962d258ecbd82800e4c67c85286bab92bfa

          SHA512

          9ef71765b5b1df563b4c1f9e736298b31e33b330c4ed66facd2680eb65a1301d4bc867b94d3187e2e9a07b9e0631860dc9607b0c06e16e79095637dc3a02f4f5

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plnI46vg11.exe

          Filesize

          391KB

          MD5

          00f1d7efc294d2a295757eac2ff16bfd

          SHA1

          fc47aa7a9d3850f995c456eef1cb4cecb6b17d6d

          SHA256

          936545141112922cfe4e6f24f4a74962d258ecbd82800e4c67c85286bab92bfa

          SHA512

          9ef71765b5b1df563b4c1f9e736298b31e33b330c4ed66facd2680eb65a1301d4bc867b94d3187e2e9a07b9e0631860dc9607b0c06e16e79095637dc3a02f4f5

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bugz12UL20.exe

          Filesize

          17KB

          MD5

          29beefdb1912c5b324190123789c3d31

          SHA1

          c2719566cd5ea20c86f3a4845f0fe7bda9d2ba45

          SHA256

          927015aab2041d01043f83cc2a0bf97ccaf2eaae9aacce6a2b350156c93af502

          SHA512

          ac008290b9a2803b3a0ed672cdac106bc9942b672c0fbf7c293fe6a56725d48ad56fc9964efcc4d03a2034227c9e14f0ec20801f8838b341e6191416b4dd7243

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bugz12UL20.exe

          Filesize

          17KB

          MD5

          29beefdb1912c5b324190123789c3d31

          SHA1

          c2719566cd5ea20c86f3a4845f0fe7bda9d2ba45

          SHA256

          927015aab2041d01043f83cc2a0bf97ccaf2eaae9aacce6a2b350156c93af502

          SHA512

          ac008290b9a2803b3a0ed672cdac106bc9942b672c0fbf7c293fe6a56725d48ad56fc9964efcc4d03a2034227c9e14f0ec20801f8838b341e6191416b4dd7243

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bugz12UL20.exe

          Filesize

          17KB

          MD5

          29beefdb1912c5b324190123789c3d31

          SHA1

          c2719566cd5ea20c86f3a4845f0fe7bda9d2ba45

          SHA256

          927015aab2041d01043f83cc2a0bf97ccaf2eaae9aacce6a2b350156c93af502

          SHA512

          ac008290b9a2803b3a0ed672cdac106bc9942b672c0fbf7c293fe6a56725d48ad56fc9964efcc4d03a2034227c9e14f0ec20801f8838b341e6191416b4dd7243

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBG88Ej17.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBG88Ej17.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBG88Ej17.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • memory/2032-168-0x0000000000BC0000-0x0000000000BCA000-memory.dmp

          Filesize

          40KB

        • memory/2604-227-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-1088-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2604-189-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-191-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-193-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-195-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-197-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-199-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-201-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-203-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-205-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-207-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-209-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-211-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-213-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-217-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-215-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-219-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-221-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-223-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-225-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-185-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-229-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-231-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-233-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-235-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-237-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-239-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-241-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-1084-0x0000000005290000-0x00000000058A8000-memory.dmp

          Filesize

          6.1MB

        • memory/2604-1085-0x00000000058B0000-0x00000000059BA000-memory.dmp

          Filesize

          1.0MB

        • memory/2604-1086-0x0000000004C80000-0x0000000004C92000-memory.dmp

          Filesize

          72KB

        • memory/2604-1087-0x00000000059C0000-0x00000000059FC000-memory.dmp

          Filesize

          240KB

        • memory/2604-187-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-1090-0x0000000005C80000-0x0000000005CE6000-memory.dmp

          Filesize

          408KB

        • memory/2604-1091-0x0000000006340000-0x00000000063D2000-memory.dmp

          Filesize

          584KB

        • memory/2604-1092-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2604-1093-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2604-1094-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2604-1095-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2604-1096-0x0000000006680000-0x00000000066F6000-memory.dmp

          Filesize

          472KB

        • memory/2604-1097-0x0000000006720000-0x0000000006770000-memory.dmp

          Filesize

          320KB

        • memory/2604-1098-0x00000000067A0000-0x0000000006962000-memory.dmp

          Filesize

          1.8MB

        • memory/2604-1099-0x0000000006970000-0x0000000006E9C000-memory.dmp

          Filesize

          5.2MB

        • memory/2604-183-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-181-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/2604-174-0x0000000000850000-0x000000000089B000-memory.dmp

          Filesize

          300KB

        • memory/2604-175-0x0000000004CE0000-0x0000000005284000-memory.dmp

          Filesize

          5.6MB

        • memory/2604-176-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-179-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-177-0x0000000004B30000-0x0000000004B6E000-memory.dmp

          Filesize

          248KB

        • memory/2604-180-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

          Filesize

          64KB

        • memory/4324-2058-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/4324-1524-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/4324-1526-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/4324-1528-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/4324-2055-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/4324-2057-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/4324-2059-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/4664-1106-0x0000000000700000-0x000000000072D000-memory.dmp

          Filesize

          180KB

        • memory/4664-1108-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/4664-1140-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/4664-1107-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/4664-1139-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/5008-2069-0x0000000000140000-0x0000000000172000-memory.dmp

          Filesize

          200KB

        • memory/5008-2070-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

          Filesize

          64KB