Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    104s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2023, 18:14

General

  • Target

    22cb8a461c6a7887ee6fd5b26726f64002ce66908ad515e026a4df09d9dadaa7.exe

  • Size

    800KB

  • MD5

    7b18c315606af8310da2f0e0e70f04da

  • SHA1

    5283a9cc8678d334932290c5bbe754c4b65e6741

  • SHA256

    22cb8a461c6a7887ee6fd5b26726f64002ce66908ad515e026a4df09d9dadaa7

  • SHA512

    412d6a50b3c789082001b4182d993bc03c0791573215fe99a48387744f8c3d60a456e105f15eca00714eaedee92fea6357c35381cd5eeb90125339861d52f9d7

  • SSDEEP

    12288:+Mr7y90RkJWt4bnH8Utn9lqBImSSuFp3GkK5/XVP/T5zW2Hy6OTyy:5yyTt4bncUSub3g5/hT5zWcOGy

Malware Config

Extracted

Family

redline

Botnet

grega

C2

83.97.73.130:19061

Attributes
  • auth_value

    16e2fbc2847b2270b3f0679e2dd76c8d

Extracted

Family

redline

Botnet

medo

C2

83.97.73.130:19061

Attributes
  • auth_value

    f42b958077ee5abcccfea8daf5e27d13

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22cb8a461c6a7887ee6fd5b26726f64002ce66908ad515e026a4df09d9dadaa7.exe
    "C:\Users\Admin\AppData\Local\Temp\22cb8a461c6a7887ee6fd5b26726f64002ce66908ad515e026a4df09d9dadaa7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1876441.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1876441.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9449378.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9449378.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2424925.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2424925.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4380
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5392514.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5392514.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1904
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2024481.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2024481.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3892
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9092609.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9092609.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3696155.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3696155.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:784
        • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
          "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:488
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:1720
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "rugen.exe" /P "Admin:N"
                6⤵
                  PID:1616
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "rugen.exe" /P "Admin:R" /E
                  6⤵
                    PID:2240
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1888
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\200f691d32" /P "Admin:N"
                      6⤵
                        PID:4264
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\200f691d32" /P "Admin:R" /E
                        6⤵
                          PID:2200
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4676
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4066961.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4066961.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2440
              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe
                1⤵
                • Executes dropped EXE
                PID:2576

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                2KB

                MD5

                9b756bc85e5324eb8f87a69e3f9959ab

                SHA1

                1778b2e2d6a00c421578a284db1e743931611d66

                SHA256

                e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e

                SHA512

                c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4066961.exe

                Filesize

                267KB

                MD5

                c971ac8358f9e7722f7456fe89d1b95c

                SHA1

                0eb67fbdf93897ba01464a600e40e759e6eea341

                SHA256

                bbcae5dfcc40b3a21bb20c760614d6d0d2f9f87b0afabc4d95e38940111288dd

                SHA512

                568b4bec8f50aa1d339e7855903389a079ca23aa5632d984abc54cc098efc558f026660fec672388d8642218bf829c0a2040fc8d96f3d5307676f493abdddf81

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e4066961.exe

                Filesize

                267KB

                MD5

                c971ac8358f9e7722f7456fe89d1b95c

                SHA1

                0eb67fbdf93897ba01464a600e40e759e6eea341

                SHA256

                bbcae5dfcc40b3a21bb20c760614d6d0d2f9f87b0afabc4d95e38940111288dd

                SHA512

                568b4bec8f50aa1d339e7855903389a079ca23aa5632d984abc54cc098efc558f026660fec672388d8642218bf829c0a2040fc8d96f3d5307676f493abdddf81

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1876441.exe

                Filesize

                595KB

                MD5

                fff148e9f3ec368a0876ff8897cf2767

                SHA1

                2088d184245163d99707d784781ca95a4ce37dc1

                SHA256

                1fb48998a21d231890b9ec3ec4d56e65ae238e022c3ac16a410dcfc74c1a9f22

                SHA512

                a8b6622fe2344998f008fd2bfde320c2dcbc6c0258e5d2c65b0c3075843214b881a253e899276304bb423613424ac9bc957ac32360930025f281b8a52d7424db

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1876441.exe

                Filesize

                595KB

                MD5

                fff148e9f3ec368a0876ff8897cf2767

                SHA1

                2088d184245163d99707d784781ca95a4ce37dc1

                SHA256

                1fb48998a21d231890b9ec3ec4d56e65ae238e022c3ac16a410dcfc74c1a9f22

                SHA512

                a8b6622fe2344998f008fd2bfde320c2dcbc6c0258e5d2c65b0c3075843214b881a253e899276304bb423613424ac9bc957ac32360930025f281b8a52d7424db

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3696155.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3696155.exe

                Filesize

                205KB

                MD5

                835f1373b125353f2b0615a2f105d3dd

                SHA1

                1aae6edfedcfe6d6828b98b114c581d9f15db807

                SHA256

                00f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4

                SHA512

                8826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9449378.exe

                Filesize

                423KB

                MD5

                32656d73e5b235c6f07d4715702320c4

                SHA1

                bf35350af4e9e690b84f568f3be820166daf6231

                SHA256

                b2c2ffeba246267c6501122009cde7e853bd950222e81a9ba3e09a0a1de29379

                SHA512

                bc328b330cd8da63edd5f9b1171e71a5a9d4b0dba97b408e28ba3320cc5403e3ed85d12f59c11333b61844b809e5230188f7248203207194524f0a8b23684990

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9449378.exe

                Filesize

                423KB

                MD5

                32656d73e5b235c6f07d4715702320c4

                SHA1

                bf35350af4e9e690b84f568f3be820166daf6231

                SHA256

                b2c2ffeba246267c6501122009cde7e853bd950222e81a9ba3e09a0a1de29379

                SHA512

                bc328b330cd8da63edd5f9b1171e71a5a9d4b0dba97b408e28ba3320cc5403e3ed85d12f59c11333b61844b809e5230188f7248203207194524f0a8b23684990

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9092609.exe

                Filesize

                172KB

                MD5

                89a881d9382bb390f3bc219b7d2693ff

                SHA1

                3039e4bb4cf60c9def1f7ac4ac1d07e87def6dc2

                SHA256

                e40c2578eda06214b22d700d0c0d498be261d1fcc66a22ef9c6e461cf29219a1

                SHA512

                fd6361a29bf47fcc0df9e3c1569d8e924b83a137ab227547c5fe7a89d7a774e18dc02116c4fed28dd8de73635d4bee532db1fde41ef4a0e4f088c7fcb8491118

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9092609.exe

                Filesize

                172KB

                MD5

                89a881d9382bb390f3bc219b7d2693ff

                SHA1

                3039e4bb4cf60c9def1f7ac4ac1d07e87def6dc2

                SHA256

                e40c2578eda06214b22d700d0c0d498be261d1fcc66a22ef9c6e461cf29219a1

                SHA512

                fd6361a29bf47fcc0df9e3c1569d8e924b83a137ab227547c5fe7a89d7a774e18dc02116c4fed28dd8de73635d4bee532db1fde41ef4a0e4f088c7fcb8491118

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2424925.exe

                Filesize

                267KB

                MD5

                c18b10c34f3e7ad8d847f9d6dc9d69f5

                SHA1

                a78359416bbd78c53bca9b1e9c288f18dcf169a5

                SHA256

                04853cdd5461fcd2a74dd69e0f77f02a6ed61f0b05293fc5fb40d57bbd6bae96

                SHA512

                6e1a98906c04fd57d526615a5032d1f1635a944c88c93d87cc48cd0a3fcd337e1a01c61489b0b21ca7250981ef1a94cb79250402e5814343c6b0142092ee7815

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2424925.exe

                Filesize

                267KB

                MD5

                c18b10c34f3e7ad8d847f9d6dc9d69f5

                SHA1

                a78359416bbd78c53bca9b1e9c288f18dcf169a5

                SHA256

                04853cdd5461fcd2a74dd69e0f77f02a6ed61f0b05293fc5fb40d57bbd6bae96

                SHA512

                6e1a98906c04fd57d526615a5032d1f1635a944c88c93d87cc48cd0a3fcd337e1a01c61489b0b21ca7250981ef1a94cb79250402e5814343c6b0142092ee7815

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5392514.exe

                Filesize

                267KB

                MD5

                363d93c09422d21f9df8b8df846c71a3

                SHA1

                f98725d400ce670535581bbe991c8e4baf41c760

                SHA256

                c4233f72dc23bc129cfdf9a500d01ebf59f56ea929e792b0751e963897acd92d

                SHA512

                857220225fabe6bb3fa890e877666698669048b3eadd8957c87c452b88de83539deeaafecae74ffa1a12af6d48d5c4a3cc21f180779f31c5d18e4d9004ed01ab

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5392514.exe

                Filesize

                267KB

                MD5

                363d93c09422d21f9df8b8df846c71a3

                SHA1

                f98725d400ce670535581bbe991c8e4baf41c760

                SHA256

                c4233f72dc23bc129cfdf9a500d01ebf59f56ea929e792b0751e963897acd92d

                SHA512

                857220225fabe6bb3fa890e877666698669048b3eadd8957c87c452b88de83539deeaafecae74ffa1a12af6d48d5c4a3cc21f180779f31c5d18e4d9004ed01ab

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5392514.exe

                Filesize

                267KB

                MD5

                363d93c09422d21f9df8b8df846c71a3

                SHA1

                f98725d400ce670535581bbe991c8e4baf41c760

                SHA256

                c4233f72dc23bc129cfdf9a500d01ebf59f56ea929e792b0751e963897acd92d

                SHA512

                857220225fabe6bb3fa890e877666698669048b3eadd8957c87c452b88de83539deeaafecae74ffa1a12af6d48d5c4a3cc21f180779f31c5d18e4d9004ed01ab

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2024481.exe

                Filesize

                106KB

                MD5

                1594f189cc0a7c0e27f25203bf3c2542

                SHA1

                d69b851198f6f7988e8d2c9558fb9a74b738d267

                SHA256

                f04d46d3e84c0e3521f413099d3a0e0249bc0b5817f5982547f271311433cee3

                SHA512

                3b2b809f2039c1c7f4160f6348ee1ce088fe6e383bd790671f0b43361ae980bd3c5a801971a69c662d600736cdbc57859d4c7f553ba69a270f895ef5384332a5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2024481.exe

                Filesize

                106KB

                MD5

                1594f189cc0a7c0e27f25203bf3c2542

                SHA1

                d69b851198f6f7988e8d2c9558fb9a74b738d267

                SHA256

                f04d46d3e84c0e3521f413099d3a0e0249bc0b5817f5982547f271311433cee3

                SHA512

                3b2b809f2039c1c7f4160f6348ee1ce088fe6e383bd790671f0b43361ae980bd3c5a801971a69c662d600736cdbc57859d4c7f553ba69a270f895ef5384332a5

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                83fc14fb36516facb19e0e96286f7f48

                SHA1

                40082ca06de4c377585cd164fb521bacadb673da

                SHA256

                08dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e

                SHA512

                ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1492-193-0x00000000052B0000-0x00000000052C0000-memory.dmp

                Filesize

                64KB

              • memory/1492-192-0x00000000009C0000-0x00000000009F0000-memory.dmp

                Filesize

                192KB

              • memory/1904-166-0x000000000A630000-0x000000000A73A000-memory.dmp

                Filesize

                1.0MB

              • memory/1904-170-0x000000000A960000-0x000000000A9D6000-memory.dmp

                Filesize

                472KB

              • memory/1904-177-0x00000000045B0000-0x0000000004600000-memory.dmp

                Filesize

                320KB

              • memory/1904-176-0x0000000004B80000-0x0000000004B90000-memory.dmp

                Filesize

                64KB

              • memory/1904-175-0x000000000B920000-0x000000000BE4C000-memory.dmp

                Filesize

                5.2MB

              • memory/1904-174-0x000000000B740000-0x000000000B902000-memory.dmp

                Filesize

                1.8MB

              • memory/1904-173-0x000000000B070000-0x000000000B0D6000-memory.dmp

                Filesize

                408KB

              • memory/1904-172-0x000000000AA80000-0x000000000B024000-memory.dmp

                Filesize

                5.6MB

              • memory/1904-171-0x000000000A9E0000-0x000000000AA72000-memory.dmp

                Filesize

                584KB

              • memory/1904-161-0x0000000000450000-0x0000000000480000-memory.dmp

                Filesize

                192KB

              • memory/1904-165-0x000000000A010000-0x000000000A628000-memory.dmp

                Filesize

                6.1MB

              • memory/1904-167-0x000000000A760000-0x000000000A772000-memory.dmp

                Filesize

                72KB

              • memory/1904-169-0x0000000004B80000-0x0000000004B90000-memory.dmp

                Filesize

                64KB

              • memory/1904-168-0x000000000A780000-0x000000000A7BC000-memory.dmp

                Filesize

                240KB

              • memory/2440-215-0x00000000049A0000-0x00000000049B0000-memory.dmp

                Filesize

                64KB

              • memory/2440-211-0x0000000001DF0000-0x0000000001E20000-memory.dmp

                Filesize

                192KB

              • memory/3892-183-0x0000000000430000-0x000000000043A000-memory.dmp

                Filesize

                40KB