Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2023, 22:15

General

  • Target

    fa7be7315b16b74cfd49404de2bd6485ba95215bb156e0c8f6bdb2ec958a6f45.exe

  • Size

    754KB

  • MD5

    b20182a9d2097e7e8fd817ecd90f6ca7

  • SHA1

    022d01d8af791a11c5173b2b1872bad716c1cb85

  • SHA256

    fa7be7315b16b74cfd49404de2bd6485ba95215bb156e0c8f6bdb2ec958a6f45

  • SHA512

    27dfa891456cded983a3b41724180cc37932fa52e4d0c1075b74b454b59ef00447156e570b6bb4cdd64695bbba65bec805bbc5ff07fecafc72a261be93bf53f0

  • SSDEEP

    12288:xMr4y901W/lP916Fa30E92ctLs4x3zAfU6uHCIqx7ac0kxcVoZ1s04dm91wb5k:hyZZqyHLsI3yZxfxW8VZym9C9k

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa7be7315b16b74cfd49404de2bd6485ba95215bb156e0c8f6bdb2ec958a6f45.exe
    "C:\Users\Admin\AppData\Local\Temp\fa7be7315b16b74cfd49404de2bd6485ba95215bb156e0c8f6bdb2ec958a6f45.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6664214.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6664214.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8632045.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8632045.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2564068.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2564068.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5080
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1528
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2481585.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2481585.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m8640551.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m8640551.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4068
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1832
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3700
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:5004
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:3000
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:1364
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4320
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4620
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:1216
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4448
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0153914.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0153914.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:528
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4440
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4236
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:1684
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4220

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0153914.exe

                Filesize

                327KB

                MD5

                0fda1bbf1f0d7469e953ce273c1cb827

                SHA1

                8dfa83422c767579f608f7bc5db54fdfe1f2177d

                SHA256

                fe847cc39bdc7a4da998fce06329ccf8f4e36ae7181f2a34499570524f00d186

                SHA512

                811e9ebc64054a984900b6a11aadee1f44b75e7f34d537bf96b684c794017d97f8c977e1bbd2167ceacc34ca8c24f7a66a1c9e5706cd677d7980970ac02b52db

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0153914.exe

                Filesize

                327KB

                MD5

                0fda1bbf1f0d7469e953ce273c1cb827

                SHA1

                8dfa83422c767579f608f7bc5db54fdfe1f2177d

                SHA256

                fe847cc39bdc7a4da998fce06329ccf8f4e36ae7181f2a34499570524f00d186

                SHA512

                811e9ebc64054a984900b6a11aadee1f44b75e7f34d537bf96b684c794017d97f8c977e1bbd2167ceacc34ca8c24f7a66a1c9e5706cd677d7980970ac02b52db

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6664214.exe

                Filesize

                454KB

                MD5

                6f5df0e655be1e17b11d164eba15a16b

                SHA1

                16c16b692c8f87b2bf8b4a1a0f88793d1924cde6

                SHA256

                3bde92d7d717c316b3e660f2b50115a71b02d03c3e683fbd66b0fe3f2ea9e149

                SHA512

                86c53843fa6cc71ee7a2b5fa434f95ad3c5e4120c1091c3c591ce0601df69e263ac0c1b27089f633569dced9a7c4ec6056ca87c73b1f6ab08137cd43ab465061

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6664214.exe

                Filesize

                454KB

                MD5

                6f5df0e655be1e17b11d164eba15a16b

                SHA1

                16c16b692c8f87b2bf8b4a1a0f88793d1924cde6

                SHA256

                3bde92d7d717c316b3e660f2b50115a71b02d03c3e683fbd66b0fe3f2ea9e149

                SHA512

                86c53843fa6cc71ee7a2b5fa434f95ad3c5e4120c1091c3c591ce0601df69e263ac0c1b27089f633569dced9a7c4ec6056ca87c73b1f6ab08137cd43ab465061

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m8640551.exe

                Filesize

                210KB

                MD5

                e4afa676f24456fda3d627c4378be45d

                SHA1

                9ef8e97bc7c3842f6968af517fbf63956d393830

                SHA256

                e4ce29cecc5384576c9070afbbd2f828e1eb6c0118387bc0c31ae0a02a0237f6

                SHA512

                bb5a117df7f8eb8c939e677daf18b072199c15c4fa4fc756a9a4c0c7cc50abd26ad6cb0c83067486f0c4e3bbd799c34d505e492c0764dbc6a06a4f43ae37cec0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m8640551.exe

                Filesize

                210KB

                MD5

                e4afa676f24456fda3d627c4378be45d

                SHA1

                9ef8e97bc7c3842f6968af517fbf63956d393830

                SHA256

                e4ce29cecc5384576c9070afbbd2f828e1eb6c0118387bc0c31ae0a02a0237f6

                SHA512

                bb5a117df7f8eb8c939e677daf18b072199c15c4fa4fc756a9a4c0c7cc50abd26ad6cb0c83067486f0c4e3bbd799c34d505e492c0764dbc6a06a4f43ae37cec0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8632045.exe

                Filesize

                282KB

                MD5

                9ddaa0066733055ada5000d2184aede6

                SHA1

                4cdb6ab354dceb63166a7ae980689c00c4fb7078

                SHA256

                806ceda3f9931872dc27da7c03318fc102ab5ddad3098353b6e6223387d53cf8

                SHA512

                ffedb4537870c5590a3df89d1430ad7b1081b0deb4699b8d619e80b1e139dc496a3f0658f86417cf0edfd1420f3bce36a29b669967e68762d68ffe72ca36fd64

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8632045.exe

                Filesize

                282KB

                MD5

                9ddaa0066733055ada5000d2184aede6

                SHA1

                4cdb6ab354dceb63166a7ae980689c00c4fb7078

                SHA256

                806ceda3f9931872dc27da7c03318fc102ab5ddad3098353b6e6223387d53cf8

                SHA512

                ffedb4537870c5590a3df89d1430ad7b1081b0deb4699b8d619e80b1e139dc496a3f0658f86417cf0edfd1420f3bce36a29b669967e68762d68ffe72ca36fd64

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2564068.exe

                Filesize

                170KB

                MD5

                075d96954066ffe5be0c89a1337825af

                SHA1

                85a2212ac2180c92279044e5f0bca552952e87cc

                SHA256

                a4788fe0cf7823e530f9fb06c2359694d624ad84ee6269c0d530af1195e736f2

                SHA512

                258f86c41f02ee75a31efd7a3444f2058012eb682df7bdefda86c711065fb9c45f44d08103e3064395a224d6be4889d7c42ae9f9ce272024013b33f8902553a5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2564068.exe

                Filesize

                170KB

                MD5

                075d96954066ffe5be0c89a1337825af

                SHA1

                85a2212ac2180c92279044e5f0bca552952e87cc

                SHA256

                a4788fe0cf7823e530f9fb06c2359694d624ad84ee6269c0d530af1195e736f2

                SHA512

                258f86c41f02ee75a31efd7a3444f2058012eb682df7bdefda86c711065fb9c45f44d08103e3064395a224d6be4889d7c42ae9f9ce272024013b33f8902553a5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2481585.exe

                Filesize

                168KB

                MD5

                44e2babc7a03582a0fc67e6c1abb1388

                SHA1

                602562a7bd834ee008b385bb33985162db1acca8

                SHA256

                e3730d3ef27033c3219d55a6eb2284774141ef92231fa38d4262396ea7c2ac51

                SHA512

                7068073188e399e242886753f576bf2de51fd3470d9c07f1b773682aa395082662648848fd5f3a4ca295b0644a4b1a838e9d029dccc12cecddd895895d16218f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2481585.exe

                Filesize

                168KB

                MD5

                44e2babc7a03582a0fc67e6c1abb1388

                SHA1

                602562a7bd834ee008b385bb33985162db1acca8

                SHA256

                e3730d3ef27033c3219d55a6eb2284774141ef92231fa38d4262396ea7c2ac51

                SHA512

                7068073188e399e242886753f576bf2de51fd3470d9c07f1b773682aa395082662648848fd5f3a4ca295b0644a4b1a838e9d029dccc12cecddd895895d16218f

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                210KB

                MD5

                e4afa676f24456fda3d627c4378be45d

                SHA1

                9ef8e97bc7c3842f6968af517fbf63956d393830

                SHA256

                e4ce29cecc5384576c9070afbbd2f828e1eb6c0118387bc0c31ae0a02a0237f6

                SHA512

                bb5a117df7f8eb8c939e677daf18b072199c15c4fa4fc756a9a4c0c7cc50abd26ad6cb0c83067486f0c4e3bbd799c34d505e492c0764dbc6a06a4f43ae37cec0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                210KB

                MD5

                e4afa676f24456fda3d627c4378be45d

                SHA1

                9ef8e97bc7c3842f6968af517fbf63956d393830

                SHA256

                e4ce29cecc5384576c9070afbbd2f828e1eb6c0118387bc0c31ae0a02a0237f6

                SHA512

                bb5a117df7f8eb8c939e677daf18b072199c15c4fa4fc756a9a4c0c7cc50abd26ad6cb0c83067486f0c4e3bbd799c34d505e492c0764dbc6a06a4f43ae37cec0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                210KB

                MD5

                e4afa676f24456fda3d627c4378be45d

                SHA1

                9ef8e97bc7c3842f6968af517fbf63956d393830

                SHA256

                e4ce29cecc5384576c9070afbbd2f828e1eb6c0118387bc0c31ae0a02a0237f6

                SHA512

                bb5a117df7f8eb8c939e677daf18b072199c15c4fa4fc756a9a4c0c7cc50abd26ad6cb0c83067486f0c4e3bbd799c34d505e492c0764dbc6a06a4f43ae37cec0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                210KB

                MD5

                e4afa676f24456fda3d627c4378be45d

                SHA1

                9ef8e97bc7c3842f6968af517fbf63956d393830

                SHA256

                e4ce29cecc5384576c9070afbbd2f828e1eb6c0118387bc0c31ae0a02a0237f6

                SHA512

                bb5a117df7f8eb8c939e677daf18b072199c15c4fa4fc756a9a4c0c7cc50abd26ad6cb0c83067486f0c4e3bbd799c34d505e492c0764dbc6a06a4f43ae37cec0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                210KB

                MD5

                e4afa676f24456fda3d627c4378be45d

                SHA1

                9ef8e97bc7c3842f6968af517fbf63956d393830

                SHA256

                e4ce29cecc5384576c9070afbbd2f828e1eb6c0118387bc0c31ae0a02a0237f6

                SHA512

                bb5a117df7f8eb8c939e677daf18b072199c15c4fa4fc756a9a4c0c7cc50abd26ad6cb0c83067486f0c4e3bbd799c34d505e492c0764dbc6a06a4f43ae37cec0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                210KB

                MD5

                e4afa676f24456fda3d627c4378be45d

                SHA1

                9ef8e97bc7c3842f6968af517fbf63956d393830

                SHA256

                e4ce29cecc5384576c9070afbbd2f828e1eb6c0118387bc0c31ae0a02a0237f6

                SHA512

                bb5a117df7f8eb8c939e677daf18b072199c15c4fa4fc756a9a4c0c7cc50abd26ad6cb0c83067486f0c4e3bbd799c34d505e492c0764dbc6a06a4f43ae37cec0

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1528-155-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/3320-175-0x0000000005760000-0x0000000005770000-memory.dmp

                Filesize

                64KB

              • memory/3320-170-0x0000000005CA0000-0x0000000005D32000-memory.dmp

                Filesize

                584KB

              • memory/3320-176-0x0000000006D70000-0x0000000006F32000-memory.dmp

                Filesize

                1.8MB

              • memory/3320-174-0x0000000006600000-0x0000000006650000-memory.dmp

                Filesize

                320KB

              • memory/3320-172-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                Filesize

                408KB

              • memory/3320-171-0x0000000006F50000-0x00000000074F4000-memory.dmp

                Filesize

                5.6MB

              • memory/3320-163-0x0000000000EC0000-0x0000000000EEE000-memory.dmp

                Filesize

                184KB

              • memory/3320-177-0x0000000009120000-0x000000000964C000-memory.dmp

                Filesize

                5.2MB

              • memory/3320-164-0x0000000005E90000-0x00000000064A8000-memory.dmp

                Filesize

                6.1MB

              • memory/3320-169-0x0000000005B80000-0x0000000005BF6000-memory.dmp

                Filesize

                472KB

              • memory/3320-168-0x0000000005760000-0x0000000005770000-memory.dmp

                Filesize

                64KB

              • memory/3320-167-0x0000000005870000-0x00000000058AC000-memory.dmp

                Filesize

                240KB

              • memory/3320-166-0x0000000005700000-0x0000000005712000-memory.dmp

                Filesize

                72KB

              • memory/3320-165-0x0000000005980000-0x0000000005A8A000-memory.dmp

                Filesize

                1.0MB

              • memory/4440-202-0x0000000004C50000-0x0000000004C60000-memory.dmp

                Filesize

                64KB

              • memory/4440-196-0x0000000000370000-0x000000000039E000-memory.dmp

                Filesize

                184KB