Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 04:02

General

  • Target

    68eb20a955db5d05d2dcb18d943497b7e051edbe4a16499cd806f9efc2e151eb.exe

  • Size

    1.2MB

  • MD5

    6d4ac001333c3f71154c85c3d4576123

  • SHA1

    7b88e2d3e41de5ae1bdd5c8666e829278dc2797e

  • SHA256

    68eb20a955db5d05d2dcb18d943497b7e051edbe4a16499cd806f9efc2e151eb

  • SHA512

    37396a96f69916d242e969d060226371c32bf66825b75f682f15dbb1e385b519edefdb758358a36e5c7718d964b083e618abfea56982b989400c5d659db5a8ff

  • SSDEEP

    24576:NylV2778Qr5afM7D0iNHUkSuzbVbqoWkkDxin6gP:olwf8Qr5d7D0ydjzbQo3Ixi6g

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

durov

C2

193.56.146.11:4162

Attributes
  • auth_value

    337984645d237df105d30aab7013119f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68eb20a955db5d05d2dcb18d943497b7e051edbe4a16499cd806f9efc2e151eb.exe
    "C:\Users\Admin\AppData\Local\Temp\68eb20a955db5d05d2dcb18d943497b7e051edbe4a16499cd806f9efc2e151eb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plPs46Sr11.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plPs46Sr11.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pllp47tf15.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pllp47tf15.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3864
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plIv25xQ74.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plIv25xQ74.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4364
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plSM09Pn29.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plSM09Pn29.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2072
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buNq45Iv36.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buNq45Iv36.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:348
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caeH78NU18.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caeH78NU18.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1912
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\disx36sH02.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\disx36sH02.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esWE84OI19.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esWE84OI19.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fufe7535eF90.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fufe7535eF90.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grdG21ro49.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grdG21ro49.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2684
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grdG21ro49.exe

    Filesize

    175KB

    MD5

    5fd273b22beadd6bf9866f9ae4bc8c5f

    SHA1

    eedc6f519ce92d828e5ca512ee3e1e6868d13c34

    SHA256

    176edfb523ef3259ce81516328fa10115507fa07b7b64892ab96eb7ea63a8bb5

    SHA512

    305ebf25366bfc2b34d4595124576a3bb92100b0f98c00bc796c3859498afe5ed3c4790f72d2b56ba1b8c366b99cf3e39991231812d79ac9ef03bc5579fc9e60

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grdG21ro49.exe

    Filesize

    175KB

    MD5

    5fd273b22beadd6bf9866f9ae4bc8c5f

    SHA1

    eedc6f519ce92d828e5ca512ee3e1e6868d13c34

    SHA256

    176edfb523ef3259ce81516328fa10115507fa07b7b64892ab96eb7ea63a8bb5

    SHA512

    305ebf25366bfc2b34d4595124576a3bb92100b0f98c00bc796c3859498afe5ed3c4790f72d2b56ba1b8c366b99cf3e39991231812d79ac9ef03bc5579fc9e60

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plPs46Sr11.exe

    Filesize

    1.0MB

    MD5

    cee310ad3e2eedb7c190edbe3329d61c

    SHA1

    89cb6f8e7537fbebe3ce79831ebde1c8d6503eb8

    SHA256

    63300b3d6ea9c8377f42b76681f549fbdd120e80e5ce49762769badf7f660242

    SHA512

    6f7a833e8f47f8773216517c33c6b04357b42e90d9e027f544ce5df93d2494ce64b91111272f129de70dbea24ff4015a82aedbe143a1bfd4108eb654a69f3bd1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plPs46Sr11.exe

    Filesize

    1.0MB

    MD5

    cee310ad3e2eedb7c190edbe3329d61c

    SHA1

    89cb6f8e7537fbebe3ce79831ebde1c8d6503eb8

    SHA256

    63300b3d6ea9c8377f42b76681f549fbdd120e80e5ce49762769badf7f660242

    SHA512

    6f7a833e8f47f8773216517c33c6b04357b42e90d9e027f544ce5df93d2494ce64b91111272f129de70dbea24ff4015a82aedbe143a1bfd4108eb654a69f3bd1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fufe7535eF90.exe

    Filesize

    12KB

    MD5

    6b891ea43a97cd5a36f75e6858f68561

    SHA1

    7812ef9c3fcd666236a6c61c5ce4fc629afa3837

    SHA256

    5cb3320fd689b5bdc905614c6672124ad1986f0c9d6c3c40c5c80f126d0b92fa

    SHA512

    095cf08967416175fa62dd3e4c1dc465166ec170e073d9be12a84509b2ef04b6d7083c464bae81d3725e7ffefcc7be6f012a78c9ef63e73189fa3dd9625760c9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fufe7535eF90.exe

    Filesize

    12KB

    MD5

    6b891ea43a97cd5a36f75e6858f68561

    SHA1

    7812ef9c3fcd666236a6c61c5ce4fc629afa3837

    SHA256

    5cb3320fd689b5bdc905614c6672124ad1986f0c9d6c3c40c5c80f126d0b92fa

    SHA512

    095cf08967416175fa62dd3e4c1dc465166ec170e073d9be12a84509b2ef04b6d7083c464bae81d3725e7ffefcc7be6f012a78c9ef63e73189fa3dd9625760c9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pllp47tf15.exe

    Filesize

    936KB

    MD5

    f5479f72d116589b7e4176473e7a0f98

    SHA1

    d46f0a695817e3667d263e7abe44a443bb75887d

    SHA256

    54b40d1a1aeb20a9f1601cbb9a6295c735984356837926a848e7f829312a5286

    SHA512

    26c84a50f382dd2e009f21ddb7055fe8ff50e460dfe4981796202373e126f56dd3838de4ddccfa05774ddcdb8ad845ceba723469fc16092a1d35455ff770b900

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pllp47tf15.exe

    Filesize

    936KB

    MD5

    f5479f72d116589b7e4176473e7a0f98

    SHA1

    d46f0a695817e3667d263e7abe44a443bb75887d

    SHA256

    54b40d1a1aeb20a9f1601cbb9a6295c735984356837926a848e7f829312a5286

    SHA512

    26c84a50f382dd2e009f21ddb7055fe8ff50e460dfe4981796202373e126f56dd3838de4ddccfa05774ddcdb8ad845ceba723469fc16092a1d35455ff770b900

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esWE84OI19.exe

    Filesize

    304KB

    MD5

    6940451e769c094029427d1531775121

    SHA1

    03c763ca8ebc6896fb35c9f8d4d3fc64d03fe850

    SHA256

    ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca

    SHA512

    53578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esWE84OI19.exe

    Filesize

    304KB

    MD5

    6940451e769c094029427d1531775121

    SHA1

    03c763ca8ebc6896fb35c9f8d4d3fc64d03fe850

    SHA256

    ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca

    SHA512

    53578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plIv25xQ74.exe

    Filesize

    667KB

    MD5

    0134541648d2fd15ee43c6ce5f7d2248

    SHA1

    2b9cc33ca48b2620fa14917bd3f3bc0a9fb7f883

    SHA256

    6afc2ade2bd05b24f0454212ed256d1427e79139196ba68b3891146bdea29ec2

    SHA512

    60cff1b9b40edce142be0aec3e1312f871f4c940c241bae55e200507a24a79698907e170c3781a3f60e7706aaa59fc29c9aec086a152a0965c7fef6ba942a8ac

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plIv25xQ74.exe

    Filesize

    667KB

    MD5

    0134541648d2fd15ee43c6ce5f7d2248

    SHA1

    2b9cc33ca48b2620fa14917bd3f3bc0a9fb7f883

    SHA256

    6afc2ade2bd05b24f0454212ed256d1427e79139196ba68b3891146bdea29ec2

    SHA512

    60cff1b9b40edce142be0aec3e1312f871f4c940c241bae55e200507a24a79698907e170c3781a3f60e7706aaa59fc29c9aec086a152a0965c7fef6ba942a8ac

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\disx36sH02.exe

    Filesize

    247KB

    MD5

    78eeb9b551547dda5c9689af8a5cd4d3

    SHA1

    8e01997b520ea67897d83ad645e1abb098303fd5

    SHA256

    ae283e8f40225c356a94b7266f4368c435e52b1e6a8ba259d5fb12230c9b35bd

    SHA512

    7ee35485c802ba05358cdade7d6a5a62670e8a846b50cd799dc879e8fb0529882c25b46e462cd924e43cfe4c6a4bde5057f7e1287f67265d9d2372a330e13053

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\disx36sH02.exe

    Filesize

    247KB

    MD5

    78eeb9b551547dda5c9689af8a5cd4d3

    SHA1

    8e01997b520ea67897d83ad645e1abb098303fd5

    SHA256

    ae283e8f40225c356a94b7266f4368c435e52b1e6a8ba259d5fb12230c9b35bd

    SHA512

    7ee35485c802ba05358cdade7d6a5a62670e8a846b50cd799dc879e8fb0529882c25b46e462cd924e43cfe4c6a4bde5057f7e1287f67265d9d2372a330e13053

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plSM09Pn29.exe

    Filesize

    392KB

    MD5

    6388ef3b44a967035a22a19b25ffd248

    SHA1

    301fb942bdd919b537af504ea05cbabff30cad0a

    SHA256

    925f9ea1cce04c931e7e877a2345ba8081983d0d50a6120d140e3f8d4214af28

    SHA512

    941c799650e5fb6bce23dec6539e9b3a20de9b727647798687a29a56cdc63c7b07affd096239a1d452a62bb53550a3b484d009be03ccc279abed16ac1ad28317

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plSM09Pn29.exe

    Filesize

    392KB

    MD5

    6388ef3b44a967035a22a19b25ffd248

    SHA1

    301fb942bdd919b537af504ea05cbabff30cad0a

    SHA256

    925f9ea1cce04c931e7e877a2345ba8081983d0d50a6120d140e3f8d4214af28

    SHA512

    941c799650e5fb6bce23dec6539e9b3a20de9b727647798687a29a56cdc63c7b07affd096239a1d452a62bb53550a3b484d009be03ccc279abed16ac1ad28317

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buNq45Iv36.exe

    Filesize

    12KB

    MD5

    d10e7ec3c63245595f789f42eb58083b

    SHA1

    82c43228b1181a3bc3d7bc0356aaaf272cdb92ec

    SHA256

    4e36053cbeeca12cf497ba719ead06e1b98517d820ee7c01aaa19f32b9525193

    SHA512

    85dad3e10fa771321233df906db5bb7f40d23de3580da5529ea2d46940ca16d72ce4f9d8157d018f12bad65fd07947f039dcd2439db0439e17b7472830dfa942

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buNq45Iv36.exe

    Filesize

    12KB

    MD5

    d10e7ec3c63245595f789f42eb58083b

    SHA1

    82c43228b1181a3bc3d7bc0356aaaf272cdb92ec

    SHA256

    4e36053cbeeca12cf497ba719ead06e1b98517d820ee7c01aaa19f32b9525193

    SHA512

    85dad3e10fa771321233df906db5bb7f40d23de3580da5529ea2d46940ca16d72ce4f9d8157d018f12bad65fd07947f039dcd2439db0439e17b7472830dfa942

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buNq45Iv36.exe

    Filesize

    12KB

    MD5

    d10e7ec3c63245595f789f42eb58083b

    SHA1

    82c43228b1181a3bc3d7bc0356aaaf272cdb92ec

    SHA256

    4e36053cbeeca12cf497ba719ead06e1b98517d820ee7c01aaa19f32b9525193

    SHA512

    85dad3e10fa771321233df906db5bb7f40d23de3580da5529ea2d46940ca16d72ce4f9d8157d018f12bad65fd07947f039dcd2439db0439e17b7472830dfa942

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caeH78NU18.exe

    Filesize

    304KB

    MD5

    6940451e769c094029427d1531775121

    SHA1

    03c763ca8ebc6896fb35c9f8d4d3fc64d03fe850

    SHA256

    ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca

    SHA512

    53578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caeH78NU18.exe

    Filesize

    304KB

    MD5

    6940451e769c094029427d1531775121

    SHA1

    03c763ca8ebc6896fb35c9f8d4d3fc64d03fe850

    SHA256

    ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca

    SHA512

    53578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caeH78NU18.exe

    Filesize

    304KB

    MD5

    6940451e769c094029427d1531775121

    SHA1

    03c763ca8ebc6896fb35c9f8d4d3fc64d03fe850

    SHA256

    ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca

    SHA512

    53578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06

  • memory/348-168-0x0000000000940000-0x000000000094A000-memory.dmp

    Filesize

    40KB

  • memory/1140-2059-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1140-2058-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1140-2057-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1140-2055-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1140-1692-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1140-1690-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1140-1687-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1912-222-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-1089-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/1912-201-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-203-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/1912-207-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/1912-205-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-204-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/1912-208-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-210-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-212-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-214-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-216-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-218-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-220-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-197-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-224-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-226-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-228-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-230-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-232-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-234-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-236-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-238-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-240-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-242-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-1085-0x00000000052D0000-0x00000000058E8000-memory.dmp

    Filesize

    6.1MB

  • memory/1912-1086-0x0000000005970000-0x0000000005A7A000-memory.dmp

    Filesize

    1.0MB

  • memory/1912-1087-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

    Filesize

    72KB

  • memory/1912-1088-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

    Filesize

    240KB

  • memory/1912-199-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-1091-0x0000000005DC0000-0x0000000005E52000-memory.dmp

    Filesize

    584KB

  • memory/1912-1092-0x0000000005E60000-0x0000000005EC6000-memory.dmp

    Filesize

    408KB

  • memory/1912-1093-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/1912-1094-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/1912-1095-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/1912-1096-0x0000000006680000-0x0000000006842000-memory.dmp

    Filesize

    1.8MB

  • memory/1912-1097-0x0000000006860000-0x0000000006D8C000-memory.dmp

    Filesize

    5.2MB

  • memory/1912-1098-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/1912-1099-0x0000000006EE0000-0x0000000006F56000-memory.dmp

    Filesize

    472KB

  • memory/1912-1100-0x0000000006F60000-0x0000000006FB0000-memory.dmp

    Filesize

    320KB

  • memory/1912-174-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/1912-175-0x0000000004D20000-0x00000000052C4000-memory.dmp

    Filesize

    5.6MB

  • memory/1912-176-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-179-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-195-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-193-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-191-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-189-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-187-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-185-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-183-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-181-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/1912-177-0x0000000004B50000-0x0000000004B8E000-memory.dmp

    Filesize

    248KB

  • memory/2684-2069-0x0000000000350000-0x0000000000382000-memory.dmp

    Filesize

    200KB

  • memory/2684-2070-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/3096-1138-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/3096-1137-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/3096-1136-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/3096-1135-0x00000000006F0000-0x000000000071D000-memory.dmp

    Filesize

    180KB