Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    81s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 18:55

General

  • Target

    e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe

  • Size

    867KB

  • MD5

    c4de65fb82daa97d657be2c6d0ee977c

  • SHA1

    2b4752edfcb2137ecc6ccc73b460be1d49921a59

  • SHA256

    e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360

  • SHA512

    bd1e1526f0d9ee74c1dbb3293074d3dea0aa3abb5dde3cca9fca6d30e1a312ae10d904f0211015c781e70065ba247c4b206b68a85ddb9cf9e8d1af883818f550

  • SSDEEP

    12288:cy90vlTu/pBetfuIHcQj6iDu68fWb/YLAUHMpzjKngK34qEPpWw7vlkfiMx/gksT:cymySH/FKXfc/0AUs1jyR4XBZzmrVg3

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe
    "C:\Users\Admin\AppData\Local\Temp\e63f4b5a91cc2355ef33235e3ef138e82d168a3e9dd929101d775df6478a9360.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88058824.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88058824.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r13462002.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r13462002.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe

    Filesize

    395KB

    MD5

    72377ccb94122cc382fc87990a7bde5f

    SHA1

    b328489a14f282f542f8e3ef93258117ae1fcaed

    SHA256

    961ac64175900adfe34980914b139f1eba060c5e540af75473af770e08d8cf32

    SHA512

    7095f2686f8b00e181ef3c886b388985e383f00f8064b21ea421faa1f5de5b4f39bc6eb48ec91c97f3df839cede8f2185ec9e044a5e2942d53b8436d075223a4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe

    Filesize

    395KB

    MD5

    72377ccb94122cc382fc87990a7bde5f

    SHA1

    b328489a14f282f542f8e3ef93258117ae1fcaed

    SHA256

    961ac64175900adfe34980914b139f1eba060c5e540af75473af770e08d8cf32

    SHA512

    7095f2686f8b00e181ef3c886b388985e383f00f8064b21ea421faa1f5de5b4f39bc6eb48ec91c97f3df839cede8f2185ec9e044a5e2942d53b8436d075223a4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe

    Filesize

    395KB

    MD5

    72377ccb94122cc382fc87990a7bde5f

    SHA1

    b328489a14f282f542f8e3ef93258117ae1fcaed

    SHA256

    961ac64175900adfe34980914b139f1eba060c5e540af75473af770e08d8cf32

    SHA512

    7095f2686f8b00e181ef3c886b388985e383f00f8064b21ea421faa1f5de5b4f39bc6eb48ec91c97f3df839cede8f2185ec9e044a5e2942d53b8436d075223a4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88058824.exe

    Filesize

    577KB

    MD5

    ff1cbac2ba8609016549a82cdc1b9f33

    SHA1

    ae2a044a9a780cb617d950b39d6ee4a94bf75d95

    SHA256

    f402ee3def87f7015aa8362f67835fbb42f85829b54bc2b56ce7d37e191b7ca5

    SHA512

    7c618cfdbafde06c2e96479118e2dd4b71ab739a9187e390480739d17a6fb48aabd6c8e768dabd7681642db5c9fdd5033930e32eb6584535ee60e09f6f76f8ab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y88058824.exe

    Filesize

    577KB

    MD5

    ff1cbac2ba8609016549a82cdc1b9f33

    SHA1

    ae2a044a9a780cb617d950b39d6ee4a94bf75d95

    SHA256

    f402ee3def87f7015aa8362f67835fbb42f85829b54bc2b56ce7d37e191b7ca5

    SHA512

    7c618cfdbafde06c2e96479118e2dd4b71ab739a9187e390480739d17a6fb48aabd6c8e768dabd7681642db5c9fdd5033930e32eb6584535ee60e09f6f76f8ab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe

    Filesize

    574KB

    MD5

    a934a18b13e275f1e5544ceb5335f8df

    SHA1

    5d86d4401b104cfd8a19da2bb8285571df71abb3

    SHA256

    3a34ce0abf9fed18d3adb9214c5e803f29dd1656eaa00842c1f42856ceecab90

    SHA512

    98c72982e6c65fdfa20d0e76c6bbdc07a211663f6c2048c53309b7fa25d3f6b8941e8a473fe9a54e7764aa9634838d8e2e3db81be085d3cf8015722554528d32

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe

    Filesize

    574KB

    MD5

    a934a18b13e275f1e5544ceb5335f8df

    SHA1

    5d86d4401b104cfd8a19da2bb8285571df71abb3

    SHA256

    3a34ce0abf9fed18d3adb9214c5e803f29dd1656eaa00842c1f42856ceecab90

    SHA512

    98c72982e6c65fdfa20d0e76c6bbdc07a211663f6c2048c53309b7fa25d3f6b8941e8a473fe9a54e7764aa9634838d8e2e3db81be085d3cf8015722554528d32

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe

    Filesize

    574KB

    MD5

    a934a18b13e275f1e5544ceb5335f8df

    SHA1

    5d86d4401b104cfd8a19da2bb8285571df71abb3

    SHA256

    3a34ce0abf9fed18d3adb9214c5e803f29dd1656eaa00842c1f42856ceecab90

    SHA512

    98c72982e6c65fdfa20d0e76c6bbdc07a211663f6c2048c53309b7fa25d3f6b8941e8a473fe9a54e7764aa9634838d8e2e3db81be085d3cf8015722554528d32

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r13462002.exe

    Filesize

    171KB

    MD5

    1c9111bc2efaf70736c87680c75e9499

    SHA1

    03071dc890210f93ca207b575c0461a93e17cf56

    SHA256

    918da3c1f57b346cc1fefc98ab1e715fbf53a14e16ac9a7076052eb54e1e7b8b

    SHA512

    5039255d0976303ab8d5e605229fe74220885d66d9b753ff55f1cf366e83a9f97dcb07ca4d2c7bc505591e2068ab0c60a112eeaa1e5163afa26deb154855fe30

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r13462002.exe

    Filesize

    171KB

    MD5

    1c9111bc2efaf70736c87680c75e9499

    SHA1

    03071dc890210f93ca207b575c0461a93e17cf56

    SHA256

    918da3c1f57b346cc1fefc98ab1e715fbf53a14e16ac9a7076052eb54e1e7b8b

    SHA512

    5039255d0976303ab8d5e605229fe74220885d66d9b753ff55f1cf366e83a9f97dcb07ca4d2c7bc505591e2068ab0c60a112eeaa1e5163afa26deb154855fe30

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe

    Filesize

    395KB

    MD5

    72377ccb94122cc382fc87990a7bde5f

    SHA1

    b328489a14f282f542f8e3ef93258117ae1fcaed

    SHA256

    961ac64175900adfe34980914b139f1eba060c5e540af75473af770e08d8cf32

    SHA512

    7095f2686f8b00e181ef3c886b388985e383f00f8064b21ea421faa1f5de5b4f39bc6eb48ec91c97f3df839cede8f2185ec9e044a5e2942d53b8436d075223a4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe

    Filesize

    395KB

    MD5

    72377ccb94122cc382fc87990a7bde5f

    SHA1

    b328489a14f282f542f8e3ef93258117ae1fcaed

    SHA256

    961ac64175900adfe34980914b139f1eba060c5e540af75473af770e08d8cf32

    SHA512

    7095f2686f8b00e181ef3c886b388985e383f00f8064b21ea421faa1f5de5b4f39bc6eb48ec91c97f3df839cede8f2185ec9e044a5e2942d53b8436d075223a4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s05943769.exe

    Filesize

    395KB

    MD5

    72377ccb94122cc382fc87990a7bde5f

    SHA1

    b328489a14f282f542f8e3ef93258117ae1fcaed

    SHA256

    961ac64175900adfe34980914b139f1eba060c5e540af75473af770e08d8cf32

    SHA512

    7095f2686f8b00e181ef3c886b388985e383f00f8064b21ea421faa1f5de5b4f39bc6eb48ec91c97f3df839cede8f2185ec9e044a5e2942d53b8436d075223a4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y88058824.exe

    Filesize

    577KB

    MD5

    ff1cbac2ba8609016549a82cdc1b9f33

    SHA1

    ae2a044a9a780cb617d950b39d6ee4a94bf75d95

    SHA256

    f402ee3def87f7015aa8362f67835fbb42f85829b54bc2b56ce7d37e191b7ca5

    SHA512

    7c618cfdbafde06c2e96479118e2dd4b71ab739a9187e390480739d17a6fb48aabd6c8e768dabd7681642db5c9fdd5033930e32eb6584535ee60e09f6f76f8ab

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y88058824.exe

    Filesize

    577KB

    MD5

    ff1cbac2ba8609016549a82cdc1b9f33

    SHA1

    ae2a044a9a780cb617d950b39d6ee4a94bf75d95

    SHA256

    f402ee3def87f7015aa8362f67835fbb42f85829b54bc2b56ce7d37e191b7ca5

    SHA512

    7c618cfdbafde06c2e96479118e2dd4b71ab739a9187e390480739d17a6fb48aabd6c8e768dabd7681642db5c9fdd5033930e32eb6584535ee60e09f6f76f8ab

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe

    Filesize

    574KB

    MD5

    a934a18b13e275f1e5544ceb5335f8df

    SHA1

    5d86d4401b104cfd8a19da2bb8285571df71abb3

    SHA256

    3a34ce0abf9fed18d3adb9214c5e803f29dd1656eaa00842c1f42856ceecab90

    SHA512

    98c72982e6c65fdfa20d0e76c6bbdc07a211663f6c2048c53309b7fa25d3f6b8941e8a473fe9a54e7764aa9634838d8e2e3db81be085d3cf8015722554528d32

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe

    Filesize

    574KB

    MD5

    a934a18b13e275f1e5544ceb5335f8df

    SHA1

    5d86d4401b104cfd8a19da2bb8285571df71abb3

    SHA256

    3a34ce0abf9fed18d3adb9214c5e803f29dd1656eaa00842c1f42856ceecab90

    SHA512

    98c72982e6c65fdfa20d0e76c6bbdc07a211663f6c2048c53309b7fa25d3f6b8941e8a473fe9a54e7764aa9634838d8e2e3db81be085d3cf8015722554528d32

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\p09505292.exe

    Filesize

    574KB

    MD5

    a934a18b13e275f1e5544ceb5335f8df

    SHA1

    5d86d4401b104cfd8a19da2bb8285571df71abb3

    SHA256

    3a34ce0abf9fed18d3adb9214c5e803f29dd1656eaa00842c1f42856ceecab90

    SHA512

    98c72982e6c65fdfa20d0e76c6bbdc07a211663f6c2048c53309b7fa25d3f6b8941e8a473fe9a54e7764aa9634838d8e2e3db81be085d3cf8015722554528d32

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r13462002.exe

    Filesize

    171KB

    MD5

    1c9111bc2efaf70736c87680c75e9499

    SHA1

    03071dc890210f93ca207b575c0461a93e17cf56

    SHA256

    918da3c1f57b346cc1fefc98ab1e715fbf53a14e16ac9a7076052eb54e1e7b8b

    SHA512

    5039255d0976303ab8d5e605229fe74220885d66d9b753ff55f1cf366e83a9f97dcb07ca4d2c7bc505591e2068ab0c60a112eeaa1e5163afa26deb154855fe30

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r13462002.exe

    Filesize

    171KB

    MD5

    1c9111bc2efaf70736c87680c75e9499

    SHA1

    03071dc890210f93ca207b575c0461a93e17cf56

    SHA256

    918da3c1f57b346cc1fefc98ab1e715fbf53a14e16ac9a7076052eb54e1e7b8b

    SHA512

    5039255d0976303ab8d5e605229fe74220885d66d9b753ff55f1cf366e83a9f97dcb07ca4d2c7bc505591e2068ab0c60a112eeaa1e5163afa26deb154855fe30

  • \Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/288-2244-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/288-2243-0x0000000001070000-0x000000000109E000-memory.dmp

    Filesize

    184KB

  • memory/1440-88-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-98-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-112-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-114-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-110-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-116-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-108-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-118-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-120-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-122-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-124-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-126-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-134-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-136-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-132-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-138-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-140-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-130-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-146-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-144-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-142-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-128-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-2230-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1440-2231-0x0000000005250000-0x0000000005282000-memory.dmp

    Filesize

    200KB

  • memory/1440-2235-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1440-106-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-102-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-104-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-100-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-94-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-96-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-92-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-90-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-86-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-78-0x0000000002660000-0x00000000026C8000-memory.dmp

    Filesize

    416KB

  • memory/1440-84-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-79-0x0000000000310000-0x000000000036B000-memory.dmp

    Filesize

    364KB

  • memory/1440-81-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1440-80-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/1440-83-0x0000000002560000-0x00000000025C0000-memory.dmp

    Filesize

    384KB

  • memory/1440-82-0x0000000002560000-0x00000000025C6000-memory.dmp

    Filesize

    408KB

  • memory/1460-2254-0x0000000000F90000-0x0000000000FD0000-memory.dmp

    Filesize

    256KB

  • memory/1460-2253-0x0000000000F90000-0x0000000000FD0000-memory.dmp

    Filesize

    256KB

  • memory/1460-2252-0x00000000003E0000-0x00000000003E6000-memory.dmp

    Filesize

    24KB

  • memory/1460-2251-0x00000000010F0000-0x0000000001120000-memory.dmp

    Filesize

    192KB

  • memory/1764-2265-0x0000000001F80000-0x0000000001F9A000-memory.dmp

    Filesize

    104KB

  • memory/1764-2266-0x00000000020C0000-0x00000000020D8000-memory.dmp

    Filesize

    96KB

  • memory/1764-2295-0x00000000002A0000-0x00000000002CD000-memory.dmp

    Filesize

    180KB

  • memory/1764-2296-0x0000000002210000-0x0000000002250000-memory.dmp

    Filesize

    256KB