Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 08:00

General

  • Target

    baeff3e6fdd93bbf488c9ef19b898a8097b4f50bd95018ec7bb1dc8721e86d95.exe

  • Size

    1.2MB

  • MD5

    fc9cf8d6a035a8994d630d791d9afc37

  • SHA1

    c5a5a58309cbca7b46ce9b507fc30a60a823048a

  • SHA256

    baeff3e6fdd93bbf488c9ef19b898a8097b4f50bd95018ec7bb1dc8721e86d95

  • SHA512

    3df3f69895d0754546cec220be05091e88d20b6bf4b7d38fcedd76102290ce48000a3523bbadb54250eb3bfe45a0fb447321ea1e4b47aec9b44e743c19337bca

  • SSDEEP

    24576:iy03MUficJ9abkEE7U3EP8CQ4b7MO6XJdHMzEhN2GdWLd:JH7KYJE7UUEC9cJdsIT3WL

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

durov

C2

193.56.146.11:4162

Attributes
  • auth_value

    337984645d237df105d30aab7013119f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baeff3e6fdd93bbf488c9ef19b898a8097b4f50bd95018ec7bb1dc8721e86d95.exe
    "C:\Users\Admin\AppData\Local\Temp\baeff3e6fdd93bbf488c9ef19b898a8097b4f50bd95018ec7bb1dc8721e86d95.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUQ10IY76.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUQ10IY76.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plyq85Kk55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plyq85Kk55.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plTW75iE06.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plTW75iE06.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgM50TR50.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgM50TR50.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1432
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buci50As26.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buci50As26.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:224
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\camW84aK26.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\camW84aK26.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3644
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 1996
                7⤵
                • Program crash
                PID:4476
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diFU84BM75.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diFU84BM75.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2232
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1060
              6⤵
              • Program crash
              PID:2228
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esdF17Mg03.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esdF17Mg03.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2932
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 1548
            5⤵
            • Program crash
            PID:1468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fusp8976kB14.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fusp8976kB14.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grHT99yq58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grHT99yq58.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4648
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3644 -ip 3644
    1⤵
      PID:1372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2232 -ip 2232
      1⤵
        PID:2988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 2932 -ip 2932
        1⤵
          PID:2036

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grHT99yq58.exe

          Filesize

          175KB

          MD5

          500e4a9bc0f93bfed1c1bcb2202fe2a1

          SHA1

          485ce5634819d1f937513a9a227b5f1fec426777

          SHA256

          bbc398dc70b6e49300ae96a060bd2b74660c0ddbadff3f528f8d2fcfb4499feb

          SHA512

          cc1f03caf7d7434880173b734f82ae4a1e87af9d514e2be3917267332fa6e525df3b71e2c44ce7b745ab19debba4ba97cfbdac14fa48545c6a80f9d7be03677f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grHT99yq58.exe

          Filesize

          175KB

          MD5

          500e4a9bc0f93bfed1c1bcb2202fe2a1

          SHA1

          485ce5634819d1f937513a9a227b5f1fec426777

          SHA256

          bbc398dc70b6e49300ae96a060bd2b74660c0ddbadff3f528f8d2fcfb4499feb

          SHA512

          cc1f03caf7d7434880173b734f82ae4a1e87af9d514e2be3917267332fa6e525df3b71e2c44ce7b745ab19debba4ba97cfbdac14fa48545c6a80f9d7be03677f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUQ10IY76.exe

          Filesize

          1.0MB

          MD5

          05e41e3b7e005354a7e84e22b6e977e7

          SHA1

          99dd828a09b371b03664a219478db636a2a859dc

          SHA256

          fe1d70434f6a172b86020d8100fb9efc986be03ab2b355f093f7bd914b82fdf4

          SHA512

          238b15ef62854e6eb38c61a55719b59bc1315b55104753352dc364f6f1d1cf4e061801572ef3d99098b50b37900e0329852c1094886f33ad889ae412fb233a77

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUQ10IY76.exe

          Filesize

          1.0MB

          MD5

          05e41e3b7e005354a7e84e22b6e977e7

          SHA1

          99dd828a09b371b03664a219478db636a2a859dc

          SHA256

          fe1d70434f6a172b86020d8100fb9efc986be03ab2b355f093f7bd914b82fdf4

          SHA512

          238b15ef62854e6eb38c61a55719b59bc1315b55104753352dc364f6f1d1cf4e061801572ef3d99098b50b37900e0329852c1094886f33ad889ae412fb233a77

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fusp8976kB14.exe

          Filesize

          12KB

          MD5

          6971ec1dc8327e05663b89be68f3de64

          SHA1

          620706a54a97aa9b2675b7c5ff1af6fa01204290

          SHA256

          583a7177bd890d539305fadb9e7880873e422dd6cd1a04c7785688f833b0ab89

          SHA512

          404246edb80d1500edef09207cace7bbe0e6b7f9c48aa6d99bfea6cea3ceb7238400a5e8065a2af270342fde2b31217193556393021af88bd1a74c1f8175bfcc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fusp8976kB14.exe

          Filesize

          12KB

          MD5

          6971ec1dc8327e05663b89be68f3de64

          SHA1

          620706a54a97aa9b2675b7c5ff1af6fa01204290

          SHA256

          583a7177bd890d539305fadb9e7880873e422dd6cd1a04c7785688f833b0ab89

          SHA512

          404246edb80d1500edef09207cace7bbe0e6b7f9c48aa6d99bfea6cea3ceb7238400a5e8065a2af270342fde2b31217193556393021af88bd1a74c1f8175bfcc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plyq85Kk55.exe

          Filesize

          975KB

          MD5

          7aa6f7262b285187777b11c0a47f6b1f

          SHA1

          9d6e60674e6013f7f218af3bbb2b2553cacaba38

          SHA256

          0dad91a886717f2f8f85fa374929ece999d2ffc48c089654ec26b34f97d80b8e

          SHA512

          6151edf1e72a6ab70a1f86cdd783621af4738ed20cdc6ce00b49b2ae36bad0f45c5d8efccad526f0b1e0bafab93362fc8263c627e01cffc06cd051b9933d6d2f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plyq85Kk55.exe

          Filesize

          975KB

          MD5

          7aa6f7262b285187777b11c0a47f6b1f

          SHA1

          9d6e60674e6013f7f218af3bbb2b2553cacaba38

          SHA256

          0dad91a886717f2f8f85fa374929ece999d2ffc48c089654ec26b34f97d80b8e

          SHA512

          6151edf1e72a6ab70a1f86cdd783621af4738ed20cdc6ce00b49b2ae36bad0f45c5d8efccad526f0b1e0bafab93362fc8263c627e01cffc06cd051b9933d6d2f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esdF17Mg03.exe

          Filesize

          381KB

          MD5

          57b4e73c1d36751cb60a4d2e68594087

          SHA1

          0e371eaad20ebbb81735876f0f1703adee193117

          SHA256

          39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

          SHA512

          e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esdF17Mg03.exe

          Filesize

          381KB

          MD5

          57b4e73c1d36751cb60a4d2e68594087

          SHA1

          0e371eaad20ebbb81735876f0f1703adee193117

          SHA256

          39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

          SHA512

          e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plTW75iE06.exe

          Filesize

          693KB

          MD5

          56ba782f9e71f1ac79aa3367fcea5f9b

          SHA1

          c4fca61d7995ba81c42839d4247755ef3cfc2b7c

          SHA256

          f5e29bcd86aa0e5c8777c34134b46dbed1a142305b74c37b0cb50ab4e50f4dc1

          SHA512

          4ddc8762f9370cd8fdb4c706e7c95a8472e394ba037a0544d03b047474b4b3ab39a8370cda363be4566e7cf28173703557bcb5c351c40574b2bcbb3073201970

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plTW75iE06.exe

          Filesize

          693KB

          MD5

          56ba782f9e71f1ac79aa3367fcea5f9b

          SHA1

          c4fca61d7995ba81c42839d4247755ef3cfc2b7c

          SHA256

          f5e29bcd86aa0e5c8777c34134b46dbed1a142305b74c37b0cb50ab4e50f4dc1

          SHA512

          4ddc8762f9370cd8fdb4c706e7c95a8472e394ba037a0544d03b047474b4b3ab39a8370cda363be4566e7cf28173703557bcb5c351c40574b2bcbb3073201970

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diFU84BM75.exe

          Filesize

          323KB

          MD5

          3f33c6c8759069f165f07180a32abf2e

          SHA1

          a85dadf12b28a19928e42a81b66f6858fe07b4b2

          SHA256

          8e20b7bce03582ff47bb369c0694190ba21061b9ba3c10fb4cd1b899277fd0ba

          SHA512

          fa9cea89d7109d901b75ae6c8aff17a70e63bae4c9c4764ba569562fc338bbccb04092ccbe22bd8c24a4f9fcaa9c99f0fedb13717314e19ed5bd5dea457ee148

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diFU84BM75.exe

          Filesize

          323KB

          MD5

          3f33c6c8759069f165f07180a32abf2e

          SHA1

          a85dadf12b28a19928e42a81b66f6858fe07b4b2

          SHA256

          8e20b7bce03582ff47bb369c0694190ba21061b9ba3c10fb4cd1b899277fd0ba

          SHA512

          fa9cea89d7109d901b75ae6c8aff17a70e63bae4c9c4764ba569562fc338bbccb04092ccbe22bd8c24a4f9fcaa9c99f0fedb13717314e19ed5bd5dea457ee148

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgM50TR50.exe

          Filesize

          405KB

          MD5

          3b859607aafc5c9bb90a348ad86266dc

          SHA1

          8cb29f2265a9dd98d465aedb1a2ff50d7e8805ae

          SHA256

          8164de23d206a53fcb029e4ad7c79f2358b239aa40f16b00d48cf9a76ba3fa6f

          SHA512

          935187c4a625c3f0fa2eb66807e68b5b87d2e191c149fb51d6086dc42153e73c2a7840302aea19a971db028be060d773593debe59040d7ed8087c1dff46ea2d0

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plgM50TR50.exe

          Filesize

          405KB

          MD5

          3b859607aafc5c9bb90a348ad86266dc

          SHA1

          8cb29f2265a9dd98d465aedb1a2ff50d7e8805ae

          SHA256

          8164de23d206a53fcb029e4ad7c79f2358b239aa40f16b00d48cf9a76ba3fa6f

          SHA512

          935187c4a625c3f0fa2eb66807e68b5b87d2e191c149fb51d6086dc42153e73c2a7840302aea19a971db028be060d773593debe59040d7ed8087c1dff46ea2d0

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buci50As26.exe

          Filesize

          12KB

          MD5

          b93ee99394362110eed3773422ad7062

          SHA1

          953bd39de4ade953130b1b807a32c0553552aaae

          SHA256

          030371cc238681c7e3825eebd1a3d53c4f69dcf702111f7fac2405d0d9e4d3a9

          SHA512

          bee9a42a79af342da5da2c813dd907ee6ecbd480f4e29f623b1ed696a53b0d6d51ddff313fbfe6110a80775264cdba7a9aad7a2135edebe595fd9fcd44bda55c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buci50As26.exe

          Filesize

          12KB

          MD5

          b93ee99394362110eed3773422ad7062

          SHA1

          953bd39de4ade953130b1b807a32c0553552aaae

          SHA256

          030371cc238681c7e3825eebd1a3d53c4f69dcf702111f7fac2405d0d9e4d3a9

          SHA512

          bee9a42a79af342da5da2c813dd907ee6ecbd480f4e29f623b1ed696a53b0d6d51ddff313fbfe6110a80775264cdba7a9aad7a2135edebe595fd9fcd44bda55c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buci50As26.exe

          Filesize

          12KB

          MD5

          b93ee99394362110eed3773422ad7062

          SHA1

          953bd39de4ade953130b1b807a32c0553552aaae

          SHA256

          030371cc238681c7e3825eebd1a3d53c4f69dcf702111f7fac2405d0d9e4d3a9

          SHA512

          bee9a42a79af342da5da2c813dd907ee6ecbd480f4e29f623b1ed696a53b0d6d51ddff313fbfe6110a80775264cdba7a9aad7a2135edebe595fd9fcd44bda55c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\camW84aK26.exe

          Filesize

          381KB

          MD5

          57b4e73c1d36751cb60a4d2e68594087

          SHA1

          0e371eaad20ebbb81735876f0f1703adee193117

          SHA256

          39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

          SHA512

          e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\camW84aK26.exe

          Filesize

          381KB

          MD5

          57b4e73c1d36751cb60a4d2e68594087

          SHA1

          0e371eaad20ebbb81735876f0f1703adee193117

          SHA256

          39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

          SHA512

          e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\camW84aK26.exe

          Filesize

          381KB

          MD5

          57b4e73c1d36751cb60a4d2e68594087

          SHA1

          0e371eaad20ebbb81735876f0f1703adee193117

          SHA256

          39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

          SHA512

          e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

        • memory/224-168-0x00000000000D0000-0x00000000000DA000-memory.dmp

          Filesize

          40KB

        • memory/2232-1137-0x0000000007370000-0x0000000007380000-memory.dmp

          Filesize

          64KB

        • memory/2232-1139-0x0000000007370000-0x0000000007380000-memory.dmp

          Filesize

          64KB

        • memory/2232-1138-0x0000000007370000-0x0000000007380000-memory.dmp

          Filesize

          64KB

        • memory/2232-1136-0x0000000002D10000-0x0000000002D3D000-memory.dmp

          Filesize

          180KB

        • memory/2932-2059-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/2932-2058-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/2932-2056-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/2932-1445-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/2932-1444-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/2932-1442-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/2932-2061-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/3644-220-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-1091-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB

        • memory/3644-206-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-204-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-208-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-210-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-212-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-214-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-216-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-218-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-202-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-222-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-224-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-226-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-230-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-232-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-228-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-238-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-240-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-236-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-234-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-242-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-1085-0x0000000007910000-0x0000000007F28000-memory.dmp

          Filesize

          6.1MB

        • memory/3644-1086-0x0000000007FB0000-0x00000000080BA000-memory.dmp

          Filesize

          1.0MB

        • memory/3644-1087-0x00000000080F0000-0x0000000008102000-memory.dmp

          Filesize

          72KB

        • memory/3644-1088-0x0000000008110000-0x000000000814C000-memory.dmp

          Filesize

          240KB

        • memory/3644-1089-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB

        • memory/3644-196-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-1092-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB

        • memory/3644-1093-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB

        • memory/3644-1094-0x0000000008400000-0x0000000008466000-memory.dmp

          Filesize

          408KB

        • memory/3644-1095-0x0000000008BB0000-0x0000000008C42000-memory.dmp

          Filesize

          584KB

        • memory/3644-1096-0x0000000008CA0000-0x0000000008D16000-memory.dmp

          Filesize

          472KB

        • memory/3644-1097-0x0000000008D30000-0x0000000008D80000-memory.dmp

          Filesize

          320KB

        • memory/3644-198-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-200-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-194-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-192-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-190-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-188-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-186-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-184-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-182-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-180-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-179-0x0000000007870000-0x00000000078AE000-memory.dmp

          Filesize

          248KB

        • memory/3644-178-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB

        • memory/3644-177-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB

        • memory/3644-176-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB

        • memory/3644-175-0x00000000072A0000-0x0000000007844000-memory.dmp

          Filesize

          5.6MB

        • memory/3644-174-0x0000000003040000-0x000000000308B000-memory.dmp

          Filesize

          300KB

        • memory/3644-1098-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB

        • memory/3644-1099-0x0000000008DE0000-0x0000000008FA2000-memory.dmp

          Filesize

          1.8MB

        • memory/3644-1100-0x0000000008FB0000-0x00000000094DC000-memory.dmp

          Filesize

          5.2MB

        • memory/4648-2070-0x0000000000D70000-0x0000000000DA2000-memory.dmp

          Filesize

          200KB

        • memory/4648-2071-0x00000000059A0000-0x00000000059B0000-memory.dmp

          Filesize

          64KB