Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2023, 23:35

General

  • Target

    Nitro Giveaway.exe

  • Size

    4.5MB

  • MD5

    ac1c1e0f6655f7e96cc0462892b3ed6d

  • SHA1

    115c61abbfab4adad6cd9ac43f9c3cd843419371

  • SHA256

    82a1371c11aec9e8090bb454b1e82325600f090c281f9035478f39ed2c5e1f98

  • SHA512

    0ed002fc47d48775880fe429ca17f8c8afda85d9baee826470ddf4be276071cfbc39cb2801c6c114a2121adbbfe98385a4f78dc5b083d3ee8fd81619132fdf89

  • SSDEEP

    98304:TQf3s64R9ybzUcwti78OqJ7TPBF3ZlHHgkWJ0P39qXSaDv:KzUcwti7TQlF3ZxxWJSUnDv

Score
9/10

Malware Config

Signatures

  • NirSoft WebBrowserPassView 7 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 14 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nitro Giveaway.exe
    "C:\Users\Admin\AppData\Local\Temp\Nitro Giveaway.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe
      "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs72wEYpFLmpx719KvyWfzZjeDzUqYkKr2orqb8Yb14OgSKmhc0cYusIdSeMVUU0XBWVhfUkJvmBipJg2TuEXpB8czVfo/odvb15Ly+U6DWdzByelT1pwX9X+gRjxzL9iVQ=
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4664
          • C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe
            C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3544
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Users\Admin\AppData\Local\Temp\winhlp32.exe
            C:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"
            5⤵
            • Executes dropped EXE
            PID:4476
          • C:\Users\Admin\AppData\Local\Temp\hh.exe
            C:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4284
          • C:\Users\Admin\AppData\Local\Temp\splwow64.exe
            C:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"
            5⤵
            • Executes dropped EXE
            PID:568
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3684
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c compile.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3964
          • C:\Users\Admin\AppData\Local\Temp\xwizard.exe
            C:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3672
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Windows\SysWOW64\choice.exe
          choice /C Y /N /D Y /T 3
          4⤵
            PID:2012
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /7
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Admin_History.txt

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt

      Filesize

      4KB

      MD5

      a1b5c3414bdf116a029cc9cf95e0f669

      SHA1

      a2c9b55dc8c342e0990dfab9f8f59e8488db0286

      SHA256

      270ae1478e10fdb56e6959d02437e9ccd1bbdae219a68c975119097a8e82f664

      SHA512

      83fe424cdab8a43c10e4c574a96ea5bcc20d70a2975a26b9355360a2c5f0d9085313ef22f53d7fba71febb8f098f457f84ee2a2dc349ed10bffc0edf54606b5c

    • C:\Users\Admin\AppData\Local\Temp\Cookies1

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Local\Temp\Cookies3

      Filesize

      11KB

      MD5

      89dc716e091ff531d2f3640b996ca6b4

      SHA1

      1841243e8911bc460056d64f5b34b9b7e3094c6d

      SHA256

      596c74835033cc4e770c4f937ef208e2eb79f471649ce2c8df5f8eae3804e634

      SHA512

      6a7f4dfe4d2b63c39941f15725cf2ab8d47bb94cf6882eb9e35c2a2bcababfb3c3ea2d646bfccf6dbd8053c1efcdaa2ca040cdf7669497de3f816565e8b9b4d1

    • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe

      Filesize

      4.4MB

      MD5

      3405f654559010ca2ae38d786389f0f1

      SHA1

      8ac5552c64dfc3ccf0c678f6f946ee23719cf43d

      SHA256

      bc1364d8e68f515f9f35a6b41c11a649b1f514302eb01812c68c9a95a3198b30

      SHA512

      cb1e5ffed2ab86502ea4236383e9a4211a14b1abda13babbcceea67700c5746b37b4da6e45e10196eb76fa1e6959e71f19c6827466a54df1d5ba5ad2e16fc05b

    • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe

      Filesize

      4.4MB

      MD5

      3405f654559010ca2ae38d786389f0f1

      SHA1

      8ac5552c64dfc3ccf0c678f6f946ee23719cf43d

      SHA256

      bc1364d8e68f515f9f35a6b41c11a649b1f514302eb01812c68c9a95a3198b30

      SHA512

      cb1e5ffed2ab86502ea4236383e9a4211a14b1abda13babbcceea67700c5746b37b4da6e45e10196eb76fa1e6959e71f19c6827466a54df1d5ba5ad2e16fc05b

    • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe

      Filesize

      4.4MB

      MD5

      3405f654559010ca2ae38d786389f0f1

      SHA1

      8ac5552c64dfc3ccf0c678f6f946ee23719cf43d

      SHA256

      bc1364d8e68f515f9f35a6b41c11a649b1f514302eb01812c68c9a95a3198b30

      SHA512

      cb1e5ffed2ab86502ea4236383e9a4211a14b1abda13babbcceea67700c5746b37b4da6e45e10196eb76fa1e6959e71f19c6827466a54df1d5ba5ad2e16fc05b

    • C:\Users\Admin\AppData\Local\Temp\bhv2E00.tmp

      Filesize

      14.0MB

      MD5

      214ddbd093e64cc73fb936626b2f583c

      SHA1

      a77bc11a90e7b21d01dd43bf708b04c8475e8fcd

      SHA256

      941592bb7845c12c0879f2be90985666ff4b01c72c56769f331c158d3443180b

      SHA512

      cd89d678f2e8cefe0c0eb9f73f31e96e57c6f5c2f99b5ad6d0615a06e2b0e5e3a6729a009df5c87a32fb0a4783f4cfc7291830b110a4f54861ca49804ce4934a

    • C:\Users\Admin\AppData\Local\Temp\compile.bat

      Filesize

      74B

      MD5

      808099bfbd62ec04f0ed44959bbc6160

      SHA1

      f4b6853d958c2c4416f6e4a5be8a11d86f64c023

      SHA256

      f465a1bd2f9a3efcf0589f0b1c234d285f2bebf7416b324271d987a282915ca8

      SHA512

      e4f75253a402f0f5d5c651cde045757dad0d4312be023fabf279d7c053fde6ba63cf387551a0451585a87f929634e0bfa73a06dac85ecd1bb5bc0b72bb98e1f0

    • C:\Users\Admin\AppData\Local\Temp\compile.bat

      Filesize

      156B

      MD5

      eb51755b637423154d1341c6ee505f50

      SHA1

      d71d27e283b26e75e58c0d02f91d91a2e914c959

      SHA256

      db903aae119dc795581080a528ba04286be11be7e9d417305d77123545fbf0f9

      SHA512

      e23463fe0a3719c2700826b55f375f60e5e67f3e432aa8e90c5afc8f449fc635aa4c031f9b6fa71344a8da9542585b74e4c812383043868a10a1065d477acee5

    • C:\Users\Admin\AppData\Local\Temp\compile.bat

      Filesize

      71B

      MD5

      91128da441ad667b8c54ebeadeca7525

      SHA1

      24b5c77fb68db64cba27c338e4373a455111a8cc

      SHA256

      50801c4db374acec11831bf7602cd2635bc8964800c67217b25683dce4a45873

      SHA512

      bd2a8bc4458b1bc85c5a59db872278197bb0a2a2086a1a9aa5b6b876965b9f5586959171f334237588cc6b0f9643f580db2e959f82e451f4a3043a27e4a95cdd

    • C:\Users\Admin\AppData\Local\Temp\compile.vbs

      Filesize

      265B

      MD5

      ca906422a558f4bc9e471709f62ec1a9

      SHA1

      e3da070007fdeae52779964df6f71fcb697ffb06

      SHA256

      abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee

      SHA512

      661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b

    • C:\Users\Admin\AppData\Local\Temp\compile.vbs

      Filesize

      265B

      MD5

      ca906422a558f4bc9e471709f62ec1a9

      SHA1

      e3da070007fdeae52779964df6f71fcb697ffb06

      SHA256

      abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee

      SHA512

      661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b

    • C:\Users\Admin\AppData\Local\Temp\compile.vbs

      Filesize

      265B

      MD5

      ca906422a558f4bc9e471709f62ec1a9

      SHA1

      e3da070007fdeae52779964df6f71fcb697ffb06

      SHA256

      abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee

      SHA512

      661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b

    • C:\Users\Admin\AppData\Local\Temp\compile.vbs

      Filesize

      265B

      MD5

      ca906422a558f4bc9e471709f62ec1a9

      SHA1

      e3da070007fdeae52779964df6f71fcb697ffb06

      SHA256

      abf09cb96f4c04a1d2d2bfd7184da63dd79c2109b1a768ca5dae4265def39eee

      SHA512

      661d4b4130ba12281527db418f71b7213dab62931806e2bd48690cfaed65b8a2859e5b161eaa4152d5a18babb54d6c2203f4ef5e3a1153c468d67703fd79f66b

    • C:\Users\Admin\AppData\Local\Temp\config

      Filesize

      108B

      MD5

      1ba367d0f9aac0f650e65ab7401776c0

      SHA1

      75cf3295125cfaa0c247ebccc57e63f915198683

      SHA256

      68c4ec552c98f3b5a4744e4eefadd6364dc8075c2e718b7bcbfc76625aa60d03

      SHA512

      45ccdf02314fe01948aa2ecddb3b50f68d5b32d8542e3a3aeaf3f2920e2285d3b75ebb81b9eb9fb9e0a446af5a3708720e07672874d5d38871dbdcd09483449c

    • C:\Users\Admin\AppData\Local\Temp\hh.exe

      Filesize

      103KB

      MD5

      4d4c98eca32b14aeb074db34cd0881e4

      SHA1

      92f213d609bba05d41d6941652a88c44936663a4

      SHA256

      4182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f

      SHA512

      959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf

    • C:\Users\Admin\AppData\Local\Temp\hh.exe

      Filesize

      103KB

      MD5

      4d4c98eca32b14aeb074db34cd0881e4

      SHA1

      92f213d609bba05d41d6941652a88c44936663a4

      SHA256

      4182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f

      SHA512

      959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf

    • C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe

      Filesize

      391KB

      MD5

      053778713819beab3df309df472787cd

      SHA1

      99c7b5827df89b4fafc2b565abed97c58a3c65b8

      SHA256

      f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

      SHA512

      35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

    • C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe

      Filesize

      391KB

      MD5

      053778713819beab3df309df472787cd

      SHA1

      99c7b5827df89b4fafc2b565abed97c58a3c65b8

      SHA256

      f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

      SHA512

      35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

    • C:\Users\Admin\AppData\Local\Temp\splwow64.exe

      Filesize

      49KB

      MD5

      0d8360781e488e250587a17fbefa646c

      SHA1

      29bc9b438efd70defa8fc45a6f8ee524143f6d04

      SHA256

      ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64

      SHA512

      940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e

    • C:\Users\Admin\AppData\Local\Temp\splwow64.exe

      Filesize

      49KB

      MD5

      0d8360781e488e250587a17fbefa646c

      SHA1

      29bc9b438efd70defa8fc45a6f8ee524143f6d04

      SHA256

      ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64

      SHA512

      940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e

    • C:\Users\Admin\AppData\Local\Temp\whysosad

      Filesize

      3KB

      MD5

      fc3c88c2080884d6c995d48e172fbc4f

      SHA1

      cb1dcc479ad2533f390786b0480f66296b847ad3

      SHA256

      1637ce704a463bd3c91a38aa02d1030107670f91ee3f0dd4fa13d07a77ba2664

      SHA512

      4807d3bd44a3197d1a9dcf709a1e70e1cf3bf71fe1a9fa1479441b598154c282a620208557a4415a34d23ceb4fd32dda41edbb940b46acb2f00c696648703bf1

    • C:\Users\Admin\AppData\Local\Temp\winhlp32.exe

      Filesize

      184KB

      MD5

      a776e68f497c996788b406a3dc5089eb

      SHA1

      45bf5e512752389fe71f20b64aa344f6ca0cad50

      SHA256

      071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1

      SHA512

      02b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073

    • C:\Users\Admin\AppData\Local\Temp\winhlp32.exe

      Filesize

      184KB

      MD5

      a776e68f497c996788b406a3dc5089eb

      SHA1

      45bf5e512752389fe71f20b64aa344f6ca0cad50

      SHA256

      071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1

      SHA512

      02b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073

    • C:\Users\Admin\AppData\Local\Temp\xwizard.cfg

      Filesize

      1KB

      MD5

      ae8eed5a6b1470aec0e7fece8b0669ef

      SHA1

      ca0e896f90c38f3a8bc679ea14c808726d8ef730

      SHA256

      3f6ca2bc068c8436044daab867f8ff8f75060048b29882cb2ac9fdef1800df9e

      SHA512

      e79d04f4041edb867fd6bdf4485f78352292782d9405ba81888a1bc62f5039cc46c6cc786ba1fd53284baafa7128e0f875390cb573584ed2d03c3b33c7f93eb6

    • C:\Users\Admin\AppData\Local\Temp\xwizard.exe

      Filesize

      544KB

      MD5

      df991217f1cfadd9acfa56f878da5ee7

      SHA1

      0b03b34cfb2985a840db279778ca828e69813116

      SHA256

      deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112

      SHA512

      175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316

    • C:\Users\Admin\AppData\Local\Temp\xwizard.exe

      Filesize

      544KB

      MD5

      df991217f1cfadd9acfa56f878da5ee7

      SHA1

      0b03b34cfb2985a840db279778ca828e69813116

      SHA256

      deb1246347ce88e8cdd63a233a64bc2090b839f2d933a3097a2fd8fd913c4112

      SHA512

      175cde9e0def550f6380b4a9feb6845dfddbb641e2455d9d25dc6bfc7ffc08e654ea731946588961a5825dcc45c8b31972454a330fd97d7170f1991a8dac0316

    • memory/568-232-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/568-236-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1500-294-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-293-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-292-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-291-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-295-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-296-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-287-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-286-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-285-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/1500-297-0x000002CD90420000-0x000002CD90421000-memory.dmp

      Filesize

      4KB

    • memory/3924-133-0x00000170C6060000-0x00000170C64DE000-memory.dmp

      Filesize

      4.5MB

    • memory/3924-134-0x00007FFB00030000-0x00007FFB00AF1000-memory.dmp

      Filesize

      10.8MB

    • memory/3924-149-0x00007FFB00030000-0x00007FFB00AF1000-memory.dmp

      Filesize

      10.8MB

    • memory/4372-153-0x00000000051E0000-0x00000000051F0000-memory.dmp

      Filesize

      64KB

    • memory/4372-184-0x0000000004C00000-0x0000000004C1A000-memory.dmp

      Filesize

      104KB

    • memory/4372-201-0x00000000051E0000-0x00000000051F0000-memory.dmp

      Filesize

      64KB

    • memory/4372-154-0x00000000052E0000-0x0000000005356000-memory.dmp

      Filesize

      472KB

    • memory/4372-152-0x0000000005810000-0x0000000005DB4000-memory.dmp

      Filesize

      5.6MB

    • memory/4372-150-0x0000000000410000-0x000000000088A000-memory.dmp

      Filesize

      4.5MB

    • memory/4372-197-0x0000000074570000-0x0000000074D20000-memory.dmp

      Filesize

      7.7MB

    • memory/4372-183-0x0000000005290000-0x00000000052B2000-memory.dmp

      Filesize

      136KB

    • memory/4372-284-0x0000000074570000-0x0000000074D20000-memory.dmp

      Filesize

      7.7MB

    • memory/4372-151-0x0000000074570000-0x0000000074D20000-memory.dmp

      Filesize

      7.7MB

    • memory/4372-185-0x0000000005230000-0x000000000523A000-memory.dmp

      Filesize

      40KB

    • memory/4372-186-0x0000000007E70000-0x0000000007ED6000-memory.dmp

      Filesize

      408KB

    • memory/4372-187-0x0000000009020000-0x0000000009028000-memory.dmp

      Filesize

      32KB

    • memory/4372-188-0x00000000099D0000-0x00000000099D8000-memory.dmp

      Filesize

      32KB

    • memory/4372-194-0x0000000009CE0000-0x0000000009CFE000-memory.dmp

      Filesize

      120KB

    • memory/4372-189-0x00000000099E0000-0x00000000099E8000-memory.dmp

      Filesize

      32KB

    • memory/4372-190-0x0000000009A90000-0x0000000009B22000-memory.dmp

      Filesize

      584KB

    • memory/4476-222-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/4476-224-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB