Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2023, 08:13

General

  • Target

    4ae5e60bf502fa9aecdbaaf9d7f1e001d78a683a830b5f4dd99614028ac74fc9.exe

  • Size

    514KB

  • MD5

    e3d4713da1e9b77bc4bfc80fc1a0861f

  • SHA1

    0f16d42a8da039768dd2d564f14753405b3a219b

  • SHA256

    4ae5e60bf502fa9aecdbaaf9d7f1e001d78a683a830b5f4dd99614028ac74fc9

  • SHA512

    852f009a10c6284653bad1ace1b4991623cb3e4c55b16c3fdbaaf34c956b4e2e8bb03e84fff2bc68819d81290d47b74a40464b2e904bc899a9795ba344c7835e

  • SSDEEP

    12288:zMrgy90GA6tR2003WU4Hn7sw2hvtwIOWp9ONT1:byc6R03ibAhvtwIOZ1

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ae5e60bf502fa9aecdbaaf9d7f1e001d78a683a830b5f4dd99614028ac74fc9.exe
    "C:\Users\Admin\AppData\Local\Temp\4ae5e60bf502fa9aecdbaaf9d7f1e001d78a683a830b5f4dd99614028ac74fc9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0942301.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0942301.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7963325.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7963325.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7447774.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7447774.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3232750.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3232750.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:856
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:3924
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4448
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:3316
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:4940
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:4316
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4928
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:2836
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:1160
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:2696
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c8273765.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c8273765.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:4548
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2376686.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2376686.exe
                  2⤵
                  • Executes dropped EXE
                  PID:884
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:3316
              • C:\Users\Admin\AppData\Local\Temp\13DC.exe
                C:\Users\Admin\AppData\Local\Temp\13DC.exe
                1⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2868
                • C:\Windows\SysWOW64\msiexec.exe
                  "C:\Windows\System32\msiexec.exe" -y .\VN13Q0L.wF
                  2⤵
                  • Loads dropped DLL
                  PID:3528
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:4456

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\13DC.exe

                Filesize

                1.8MB

                MD5

                96f6e0b6c21be2c663a9caf45fd9c401

                SHA1

                73ea1b68dd3fe50ca5c6200096aaab46586a0c20

                SHA256

                5115eb2734f18bde8a0b67682905b9a143bdd9b19d588d8d78c3a1be69fb3c08

                SHA512

                b223168394a993eb49c6a7b3fe7ed87ef024dc0f8057ee1b170a0319ad53f4ddc0a7a1e6b17d106803b0e0b4d84d8707850971e8713c363e9ec3364b79b880cb

              • C:\Users\Admin\AppData\Local\Temp\13DC.exe

                Filesize

                1.8MB

                MD5

                96f6e0b6c21be2c663a9caf45fd9c401

                SHA1

                73ea1b68dd3fe50ca5c6200096aaab46586a0c20

                SHA256

                5115eb2734f18bde8a0b67682905b9a143bdd9b19d588d8d78c3a1be69fb3c08

                SHA512

                b223168394a993eb49c6a7b3fe7ed87ef024dc0f8057ee1b170a0319ad53f4ddc0a7a1e6b17d106803b0e0b4d84d8707850971e8713c363e9ec3364b79b880cb

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                8f4cd8aace08898768e92ed320c05325

                SHA1

                74fda7ee1005ce2698ad8ad203b824bee9974943

                SHA256

                89b76b974080a28b13b5dabf3590d046a69ed99d71adfa7b14bd4bd5c9fe2180

                SHA512

                216e0dcb4e057e3be761393ab7078ca93f2581715b2de162a7f9489615225bbc5428c405ac2536f4ffe365bbcc1d1c23bc07bb8310bcf7e4451c7e2aff80ffd7

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                8f4cd8aace08898768e92ed320c05325

                SHA1

                74fda7ee1005ce2698ad8ad203b824bee9974943

                SHA256

                89b76b974080a28b13b5dabf3590d046a69ed99d71adfa7b14bd4bd5c9fe2180

                SHA512

                216e0dcb4e057e3be761393ab7078ca93f2581715b2de162a7f9489615225bbc5428c405ac2536f4ffe365bbcc1d1c23bc07bb8310bcf7e4451c7e2aff80ffd7

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                8f4cd8aace08898768e92ed320c05325

                SHA1

                74fda7ee1005ce2698ad8ad203b824bee9974943

                SHA256

                89b76b974080a28b13b5dabf3590d046a69ed99d71adfa7b14bd4bd5c9fe2180

                SHA512

                216e0dcb4e057e3be761393ab7078ca93f2581715b2de162a7f9489615225bbc5428c405ac2536f4ffe365bbcc1d1c23bc07bb8310bcf7e4451c7e2aff80ffd7

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                8f4cd8aace08898768e92ed320c05325

                SHA1

                74fda7ee1005ce2698ad8ad203b824bee9974943

                SHA256

                89b76b974080a28b13b5dabf3590d046a69ed99d71adfa7b14bd4bd5c9fe2180

                SHA512

                216e0dcb4e057e3be761393ab7078ca93f2581715b2de162a7f9489615225bbc5428c405ac2536f4ffe365bbcc1d1c23bc07bb8310bcf7e4451c7e2aff80ffd7

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                8f4cd8aace08898768e92ed320c05325

                SHA1

                74fda7ee1005ce2698ad8ad203b824bee9974943

                SHA256

                89b76b974080a28b13b5dabf3590d046a69ed99d71adfa7b14bd4bd5c9fe2180

                SHA512

                216e0dcb4e057e3be761393ab7078ca93f2581715b2de162a7f9489615225bbc5428c405ac2536f4ffe365bbcc1d1c23bc07bb8310bcf7e4451c7e2aff80ffd7

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2376686.exe

                Filesize

                176KB

                MD5

                b28ef2902eff33caad957fd3d4ba20e7

                SHA1

                0121a7ae76a663acb6759bbd2fd89491858e9163

                SHA256

                8cbc200dd69e8ff4be444e242b15253c3b5835eeb74c6e71b9b04683f80ea1e0

                SHA512

                e626b98b8ef54168a670d6b4fcd76456e1f748ff8e20d41d27dafe8023e8e040b157893ac715b09a75124d53d0f8fc5214495e48ff2dba4cbdcf6bc9af3025ee

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2376686.exe

                Filesize

                176KB

                MD5

                b28ef2902eff33caad957fd3d4ba20e7

                SHA1

                0121a7ae76a663acb6759bbd2fd89491858e9163

                SHA256

                8cbc200dd69e8ff4be444e242b15253c3b5835eeb74c6e71b9b04683f80ea1e0

                SHA512

                e626b98b8ef54168a670d6b4fcd76456e1f748ff8e20d41d27dafe8023e8e040b157893ac715b09a75124d53d0f8fc5214495e48ff2dba4cbdcf6bc9af3025ee

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0942301.exe

                Filesize

                359KB

                MD5

                5759913a269735aa5189f863e18f7de9

                SHA1

                b1e53a01982f95d20158ced301084167d9bbe609

                SHA256

                c22a89052ea3ddf0d5b645403bf846a7688e99f18723268c4a5c9f49e05e62f8

                SHA512

                9a8bead2d3763c5a3f8484f4d5389b4ab94f6552e4bde716c11665726d9aef07d31c748b131d447d0a5436c40f69ff1c7438423ece50126072def26b1e670ed3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0942301.exe

                Filesize

                359KB

                MD5

                5759913a269735aa5189f863e18f7de9

                SHA1

                b1e53a01982f95d20158ced301084167d9bbe609

                SHA256

                c22a89052ea3ddf0d5b645403bf846a7688e99f18723268c4a5c9f49e05e62f8

                SHA512

                9a8bead2d3763c5a3f8484f4d5389b4ab94f6552e4bde716c11665726d9aef07d31c748b131d447d0a5436c40f69ff1c7438423ece50126072def26b1e670ed3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c8273765.exe

                Filesize

                32KB

                MD5

                08c00e3e85162ec60be06b175decc295

                SHA1

                8f6b46b8e42b5bfaf0fdfc8fde6a143e254ea49b

                SHA256

                e7034d5dfeaf5e54aec803ccf4e7d385152b908495b6c5102a489f5b406f5b16

                SHA512

                9a973a4510151975ac48b9828e7a3c4161d8317ac205ffa4ea7b26e4b89d4a63651d81f6f47a083e9467788949cc4c8470a918f7f9018a9732ae69d1462df21f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c8273765.exe

                Filesize

                32KB

                MD5

                08c00e3e85162ec60be06b175decc295

                SHA1

                8f6b46b8e42b5bfaf0fdfc8fde6a143e254ea49b

                SHA256

                e7034d5dfeaf5e54aec803ccf4e7d385152b908495b6c5102a489f5b406f5b16

                SHA512

                9a973a4510151975ac48b9828e7a3c4161d8317ac205ffa4ea7b26e4b89d4a63651d81f6f47a083e9467788949cc4c8470a918f7f9018a9732ae69d1462df21f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7963325.exe

                Filesize

                235KB

                MD5

                3255e8404ae25a38420ce8858dabfb2f

                SHA1

                6712745228c236b692dea49e17d99e14daa91791

                SHA256

                2ee4adbc783614101d23f3f354853711cb87e1689fa49fa11f3f6f4e9f356b71

                SHA512

                713de05c39d1c11b0bce190a3125e1bd5eeb8b7c1351ba1f7fc5af5808cd6c109ca902cb221932a5e958af5bbdc41790af4a4f5c745d67f33933151c948b1067

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7963325.exe

                Filesize

                235KB

                MD5

                3255e8404ae25a38420ce8858dabfb2f

                SHA1

                6712745228c236b692dea49e17d99e14daa91791

                SHA256

                2ee4adbc783614101d23f3f354853711cb87e1689fa49fa11f3f6f4e9f356b71

                SHA512

                713de05c39d1c11b0bce190a3125e1bd5eeb8b7c1351ba1f7fc5af5808cd6c109ca902cb221932a5e958af5bbdc41790af4a4f5c745d67f33933151c948b1067

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7447774.exe

                Filesize

                14KB

                MD5

                7d241df7e44c28ae495de05280e334a8

                SHA1

                107ca50a416f6140e57ad916685c0eaa074c6a73

                SHA256

                319b7879e485431a0e6e427d4a0037fd17c40cc46b58b0cb2838ba2e54cc902f

                SHA512

                fd19507f20d58079c231154e294ecf34bd14ec78e68b66f18b0faeccfad1e3c578d1791891ecb4191691577aaa0f8385b620687086f819ace35425da01fed618

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7447774.exe

                Filesize

                14KB

                MD5

                7d241df7e44c28ae495de05280e334a8

                SHA1

                107ca50a416f6140e57ad916685c0eaa074c6a73

                SHA256

                319b7879e485431a0e6e427d4a0037fd17c40cc46b58b0cb2838ba2e54cc902f

                SHA512

                fd19507f20d58079c231154e294ecf34bd14ec78e68b66f18b0faeccfad1e3c578d1791891ecb4191691577aaa0f8385b620687086f819ace35425da01fed618

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3232750.exe

                Filesize

                226KB

                MD5

                8f4cd8aace08898768e92ed320c05325

                SHA1

                74fda7ee1005ce2698ad8ad203b824bee9974943

                SHA256

                89b76b974080a28b13b5dabf3590d046a69ed99d71adfa7b14bd4bd5c9fe2180

                SHA512

                216e0dcb4e057e3be761393ab7078ca93f2581715b2de162a7f9489615225bbc5428c405ac2536f4ffe365bbcc1d1c23bc07bb8310bcf7e4451c7e2aff80ffd7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3232750.exe

                Filesize

                226KB

                MD5

                8f4cd8aace08898768e92ed320c05325

                SHA1

                74fda7ee1005ce2698ad8ad203b824bee9974943

                SHA256

                89b76b974080a28b13b5dabf3590d046a69ed99d71adfa7b14bd4bd5c9fe2180

                SHA512

                216e0dcb4e057e3be761393ab7078ca93f2581715b2de162a7f9489615225bbc5428c405ac2536f4ffe365bbcc1d1c23bc07bb8310bcf7e4451c7e2aff80ffd7

              • C:\Users\Admin\AppData\Local\Temp\VN13Q0L.wF

                Filesize

                1.3MB

                MD5

                5fbf691c52cf15cf15b312b7fe03ab55

                SHA1

                8b3c608891d7ffb0e708a0f79b83d22f94a3a2ca

                SHA256

                50edcf8c4ee6ab669c927d5f31a6fcf905820d9d0948b6017dcfe104a39861a9

                SHA512

                154b7b6a00526a09e7b13f04577013dc24a0ff611774c3c365dd36f654290597f6bb233f88a1fa38274385b1bca4f4fc76af31d39981ec4c19e6b0f896b97635

              • C:\Users\Admin\AppData\Local\Temp\VN13Q0L.wF

                Filesize

                1.3MB

                MD5

                5fbf691c52cf15cf15b312b7fe03ab55

                SHA1

                8b3c608891d7ffb0e708a0f79b83d22f94a3a2ca

                SHA256

                50edcf8c4ee6ab669c927d5f31a6fcf905820d9d0948b6017dcfe104a39861a9

                SHA512

                154b7b6a00526a09e7b13f04577013dc24a0ff611774c3c365dd36f654290597f6bb233f88a1fa38274385b1bca4f4fc76af31d39981ec4c19e6b0f896b97635

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                272B

                MD5

                d867eabb1be5b45bc77bb06814e23640

                SHA1

                3139a51ce7e8462c31070363b9532c13cc52c82d

                SHA256

                38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                SHA512

                afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

              • memory/884-184-0x0000000005A90000-0x00000000060A8000-memory.dmp

                Filesize

                6.1MB

              • memory/884-186-0x0000000002DC0000-0x0000000002DD0000-memory.dmp

                Filesize

                64KB

              • memory/884-188-0x0000000005520000-0x000000000555C000-memory.dmp

                Filesize

                240KB

              • memory/884-189-0x0000000072ED0000-0x0000000073680000-memory.dmp

                Filesize

                7.7MB

              • memory/884-190-0x0000000002DC0000-0x0000000002DD0000-memory.dmp

                Filesize

                64KB

              • memory/884-187-0x00000000054C0000-0x00000000054D2000-memory.dmp

                Filesize

                72KB

              • memory/884-183-0x0000000072ED0000-0x0000000073680000-memory.dmp

                Filesize

                7.7MB

              • memory/884-182-0x00000000009F0000-0x0000000000A20000-memory.dmp

                Filesize

                192KB

              • memory/884-185-0x0000000005580000-0x000000000568A000-memory.dmp

                Filesize

                1.0MB

              • memory/3124-175-0x0000000002A90000-0x0000000002AA6000-memory.dmp

                Filesize

                88KB

              • memory/3184-155-0x00007FFD9D7F0000-0x00007FFD9E2B1000-memory.dmp

                Filesize

                10.8MB

              • memory/3184-154-0x00000000009A0000-0x00000000009AA000-memory.dmp

                Filesize

                40KB

              • memory/3184-157-0x00007FFD9D7F0000-0x00007FFD9E2B1000-memory.dmp

                Filesize

                10.8MB

              • memory/3528-219-0x0000000002EE0000-0x0000000002EE6000-memory.dmp

                Filesize

                24KB

              • memory/3528-220-0x0000000000400000-0x0000000000544000-memory.dmp

                Filesize

                1.3MB

              • memory/3528-225-0x0000000003020000-0x0000000003137000-memory.dmp

                Filesize

                1.1MB

              • memory/3528-226-0x0000000003150000-0x000000000324E000-memory.dmp

                Filesize

                1016KB

              • memory/3528-229-0x0000000003150000-0x000000000324E000-memory.dmp

                Filesize

                1016KB

              • memory/3528-230-0x0000000003150000-0x000000000324E000-memory.dmp

                Filesize

                1016KB

              • memory/4548-173-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4548-176-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB