Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/07/2023, 04:52

General

  • Target

    cc7673fc48ab400d792a22f16b71453dc108d2f5c8186f887610e7a00d6d08de.exe

  • Size

    514KB

  • MD5

    ff820fb6795d8755b2a21fc49c09f798

  • SHA1

    42f1174512680c2ad14ed244285628de84b88b07

  • SHA256

    cc7673fc48ab400d792a22f16b71453dc108d2f5c8186f887610e7a00d6d08de

  • SHA512

    73525c24bda9742ef0d64c7323ae576f5f0e0ea2f875440e3f8380aba386531f8666359f29393cae9e4c16f3e846e7d5d0d8bfda1e0a500f36269e6782f9a30c

  • SSDEEP

    6144:Kwy+bnr+bp0yN90QERyQdYmOkmSlGgcGfsRHE6TuVGB9OLprUvsIZOVA8igpMr04:sMrXy90/y3BSUdnKiVZOV6gpO0ICi

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

news

C2

77.91.68.68:19071

Attributes
  • auth_value

    99ba2ffe8d72ebe9fdc7e758c94db148

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc7673fc48ab400d792a22f16b71453dc108d2f5c8186f887610e7a00d6d08de.exe
    "C:\Users\Admin\AppData\Local\Temp\cc7673fc48ab400d792a22f16b71453dc108d2f5c8186f887610e7a00d6d08de.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6308713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6308713.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8693591.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8693591.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4584
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2270328.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2270328.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4672
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2188120.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2188120.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3172
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3360
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:3364
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4384
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:512
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:4856
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:2024
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:3348
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:3740
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:4192
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:4432
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4088467.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4088467.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:4176
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3108739.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3108739.exe
                  2⤵
                  • Executes dropped EXE
                  PID:5056
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:3912
              • C:\Users\Admin\AppData\Local\Temp\7209.exe
                C:\Users\Admin\AppData\Local\Temp\7209.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1384
                • C:\Windows\SysWOW64\msiexec.exe
                  "C:\Windows\System32\msiexec.exe" -y .\_E62LIn4.O
                  2⤵
                  • Loads dropped DLL
                  PID:1228

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                85f039edf6663cfb514621ff70b924ba

                SHA1

                f127cfca2b8e7f532cb6266e1f078dd3a1dace40

                SHA256

                924d0bd5d67caabf4c0699c124d572f2c75d518738afa2073baf7fac349a1964

                SHA512

                b2c52eae5a27ad09fdd0e9103abc57a2eb0d26e1ba0930e5abc68794ac147e0518448eaa853b9916bcd0c1fd5fcd55ba5bcc96243ec7dafa9ce0aaca9a878b58

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                85f039edf6663cfb514621ff70b924ba

                SHA1

                f127cfca2b8e7f532cb6266e1f078dd3a1dace40

                SHA256

                924d0bd5d67caabf4c0699c124d572f2c75d518738afa2073baf7fac349a1964

                SHA512

                b2c52eae5a27ad09fdd0e9103abc57a2eb0d26e1ba0930e5abc68794ac147e0518448eaa853b9916bcd0c1fd5fcd55ba5bcc96243ec7dafa9ce0aaca9a878b58

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                85f039edf6663cfb514621ff70b924ba

                SHA1

                f127cfca2b8e7f532cb6266e1f078dd3a1dace40

                SHA256

                924d0bd5d67caabf4c0699c124d572f2c75d518738afa2073baf7fac349a1964

                SHA512

                b2c52eae5a27ad09fdd0e9103abc57a2eb0d26e1ba0930e5abc68794ac147e0518448eaa853b9916bcd0c1fd5fcd55ba5bcc96243ec7dafa9ce0aaca9a878b58

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                85f039edf6663cfb514621ff70b924ba

                SHA1

                f127cfca2b8e7f532cb6266e1f078dd3a1dace40

                SHA256

                924d0bd5d67caabf4c0699c124d572f2c75d518738afa2073baf7fac349a1964

                SHA512

                b2c52eae5a27ad09fdd0e9103abc57a2eb0d26e1ba0930e5abc68794ac147e0518448eaa853b9916bcd0c1fd5fcd55ba5bcc96243ec7dafa9ce0aaca9a878b58

              • C:\Users\Admin\AppData\Local\Temp\7209.exe

                Filesize

                1.6MB

                MD5

                436c574c5b11a763dd96c83bca8bb4b3

                SHA1

                3d0bca0898cb7cb43c93f5b1a24b3a099f760891

                SHA256

                a4996fca522880b7495304b8b0959c56b71dd62e42d8dfd2001e73bcb5023499

                SHA512

                bfbc35d14d682018608f30f874c71608cb1ffd0077e4445ced049344e359ab1d2a114013c2bb7c49a32982a9cffdba4667646e45a1ec7fbafead221fb9d84144

              • C:\Users\Admin\AppData\Local\Temp\7209.exe

                Filesize

                1.6MB

                MD5

                436c574c5b11a763dd96c83bca8bb4b3

                SHA1

                3d0bca0898cb7cb43c93f5b1a24b3a099f760891

                SHA256

                a4996fca522880b7495304b8b0959c56b71dd62e42d8dfd2001e73bcb5023499

                SHA512

                bfbc35d14d682018608f30f874c71608cb1ffd0077e4445ced049344e359ab1d2a114013c2bb7c49a32982a9cffdba4667646e45a1ec7fbafead221fb9d84144

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3108739.exe

                Filesize

                175KB

                MD5

                9979625d1bd44b07f06a9fefae273551

                SHA1

                93a1e937e45dedc15ad66b344a1459a27d4eb805

                SHA256

                b0958220b07d2294244123779e603e616eb108cde28675fd91f5f24b78bd3c6e

                SHA512

                778a4f0fa6a4bc9db8384528d6529f65480799c37b4aea3b002246060c7cb62413a961ab6a8ebfe2d8d253c37369f0811859f9e26db313f0522c13fbdc5fd3ce

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3108739.exe

                Filesize

                175KB

                MD5

                9979625d1bd44b07f06a9fefae273551

                SHA1

                93a1e937e45dedc15ad66b344a1459a27d4eb805

                SHA256

                b0958220b07d2294244123779e603e616eb108cde28675fd91f5f24b78bd3c6e

                SHA512

                778a4f0fa6a4bc9db8384528d6529f65480799c37b4aea3b002246060c7cb62413a961ab6a8ebfe2d8d253c37369f0811859f9e26db313f0522c13fbdc5fd3ce

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6308713.exe

                Filesize

                359KB

                MD5

                e369a581873d8f0c0725fc7518d457ee

                SHA1

                34f9fddb6e2dda8bc6fd91f0835b3b0af9f0896a

                SHA256

                745be0f5d98688b7c9e1654f0563471988b93f71a2da7750ea530746c93f3653

                SHA512

                75f37a84821797d39304e62eed0c16a3aca56792c47be8a981cf7fb669b06ddff2752fc4fda316bde065600ec01466e7af51fc52f7c85be439329ef917069982

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6308713.exe

                Filesize

                359KB

                MD5

                e369a581873d8f0c0725fc7518d457ee

                SHA1

                34f9fddb6e2dda8bc6fd91f0835b3b0af9f0896a

                SHA256

                745be0f5d98688b7c9e1654f0563471988b93f71a2da7750ea530746c93f3653

                SHA512

                75f37a84821797d39304e62eed0c16a3aca56792c47be8a981cf7fb669b06ddff2752fc4fda316bde065600ec01466e7af51fc52f7c85be439329ef917069982

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4088467.exe

                Filesize

                34KB

                MD5

                9ec3f68e4eb46f8693b9e3f1900c4651

                SHA1

                f2da33054cd72e486696af6f78a2cd945c1ef4a8

                SHA256

                b7f2f6c04391709049f596f84b932f9346864bbff1eba18c06e484a1ace1de4b

                SHA512

                f30e3b301fca4e958e600083578ab72db26b70c5c226b395d180cce1976e83b3cc5767406780ead8629ae5e41725369070a75e583ec65084fc1fb406ac291fb8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4088467.exe

                Filesize

                34KB

                MD5

                9ec3f68e4eb46f8693b9e3f1900c4651

                SHA1

                f2da33054cd72e486696af6f78a2cd945c1ef4a8

                SHA256

                b7f2f6c04391709049f596f84b932f9346864bbff1eba18c06e484a1ace1de4b

                SHA512

                f30e3b301fca4e958e600083578ab72db26b70c5c226b395d180cce1976e83b3cc5767406780ead8629ae5e41725369070a75e583ec65084fc1fb406ac291fb8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8693591.exe

                Filesize

                235KB

                MD5

                95afb0de45e4c7131afcfe97365049fa

                SHA1

                69192141d709af0f140c35e923f57be611d89fd5

                SHA256

                6e844c875e130b3a57426fb2f68a540d8576ebe719779f9f99628920f61184c3

                SHA512

                ba06bd54c16a0bf28d9ded2ff6dc03c930d95cb5d95c23d5a3bcf17c1a7d884f8a495b2a33ebdae39dd6687472d6e61556b0db97def3347e3bba77ec0dd0ec51

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8693591.exe

                Filesize

                235KB

                MD5

                95afb0de45e4c7131afcfe97365049fa

                SHA1

                69192141d709af0f140c35e923f57be611d89fd5

                SHA256

                6e844c875e130b3a57426fb2f68a540d8576ebe719779f9f99628920f61184c3

                SHA512

                ba06bd54c16a0bf28d9ded2ff6dc03c930d95cb5d95c23d5a3bcf17c1a7d884f8a495b2a33ebdae39dd6687472d6e61556b0db97def3347e3bba77ec0dd0ec51

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2270328.exe

                Filesize

                13KB

                MD5

                9f8fac14be286d5ab250008dbdef3888

                SHA1

                6b8a238a079bc6f0fd7825053c219b3739e82c70

                SHA256

                94d1efd37f7524754a6aba8cffaa5fd3ebab5e65d107e57c930a0f41bc70d7be

                SHA512

                5c564b6ae9b3326d1b2b947f605c6ec00665b0ceb37328e471ddb862cf54530e5fdb712af15ac3e6d14c0fcac06737a128d9463e17b58cc43b39150b9f0fbb02

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2270328.exe

                Filesize

                13KB

                MD5

                9f8fac14be286d5ab250008dbdef3888

                SHA1

                6b8a238a079bc6f0fd7825053c219b3739e82c70

                SHA256

                94d1efd37f7524754a6aba8cffaa5fd3ebab5e65d107e57c930a0f41bc70d7be

                SHA512

                5c564b6ae9b3326d1b2b947f605c6ec00665b0ceb37328e471ddb862cf54530e5fdb712af15ac3e6d14c0fcac06737a128d9463e17b58cc43b39150b9f0fbb02

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2188120.exe

                Filesize

                230KB

                MD5

                85f039edf6663cfb514621ff70b924ba

                SHA1

                f127cfca2b8e7f532cb6266e1f078dd3a1dace40

                SHA256

                924d0bd5d67caabf4c0699c124d572f2c75d518738afa2073baf7fac349a1964

                SHA512

                b2c52eae5a27ad09fdd0e9103abc57a2eb0d26e1ba0930e5abc68794ac147e0518448eaa853b9916bcd0c1fd5fcd55ba5bcc96243ec7dafa9ce0aaca9a878b58

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2188120.exe

                Filesize

                230KB

                MD5

                85f039edf6663cfb514621ff70b924ba

                SHA1

                f127cfca2b8e7f532cb6266e1f078dd3a1dace40

                SHA256

                924d0bd5d67caabf4c0699c124d572f2c75d518738afa2073baf7fac349a1964

                SHA512

                b2c52eae5a27ad09fdd0e9103abc57a2eb0d26e1ba0930e5abc68794ac147e0518448eaa853b9916bcd0c1fd5fcd55ba5bcc96243ec7dafa9ce0aaca9a878b58

              • C:\Users\Admin\AppData\Local\Temp\_E62LIn4.O

                Filesize

                1.2MB

                MD5

                6dfa9d2297b99fd1d1785ccc47b9e0b3

                SHA1

                14159b943859a32c8016ecdc616ce935eee769e3

                SHA256

                6d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33

                SHA512

                bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                272B

                MD5

                d867eabb1be5b45bc77bb06814e23640

                SHA1

                3139a51ce7e8462c31070363b9532c13cc52c82d

                SHA256

                38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                SHA512

                afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

              • \Users\Admin\AppData\Local\Temp\_E62Lin4.O

                Filesize

                1.2MB

                MD5

                6dfa9d2297b99fd1d1785ccc47b9e0b3

                SHA1

                14159b943859a32c8016ecdc616ce935eee769e3

                SHA256

                6d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33

                SHA512

                bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc

              • \Users\Admin\AppData\Local\Temp\_E62Lin4.O

                Filesize

                1.2MB

                MD5

                6dfa9d2297b99fd1d1785ccc47b9e0b3

                SHA1

                14159b943859a32c8016ecdc616ce935eee769e3

                SHA256

                6d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33

                SHA512

                bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • memory/1228-210-0x0000000004490000-0x00000000045CC000-memory.dmp

                Filesize

                1.2MB

              • memory/1228-212-0x0000000004490000-0x00000000045CC000-memory.dmp

                Filesize

                1.2MB

              • memory/1228-211-0x00000000026E0000-0x00000000026E6000-memory.dmp

                Filesize

                24KB

              • memory/1228-214-0x0000000004810000-0x000000000490F000-memory.dmp

                Filesize

                1020KB

              • memory/1228-218-0x0000000004910000-0x00000000049F6000-memory.dmp

                Filesize

                920KB

              • memory/1228-215-0x0000000004910000-0x00000000049F6000-memory.dmp

                Filesize

                920KB

              • memory/1228-219-0x0000000004910000-0x00000000049F6000-memory.dmp

                Filesize

                920KB

              • memory/1228-216-0x0000000004910000-0x00000000049F6000-memory.dmp

                Filesize

                920KB

              • memory/3188-161-0x00000000006C0000-0x00000000006D6000-memory.dmp

                Filesize

                88KB

              • memory/4176-159-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4176-163-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4672-143-0x0000000000C50000-0x0000000000C5A000-memory.dmp

                Filesize

                40KB

              • memory/4672-144-0x00007FFE48610000-0x00007FFE48FFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4672-146-0x00007FFE48610000-0x00007FFE48FFC000-memory.dmp

                Filesize

                9.9MB

              • memory/5056-174-0x0000000009E00000-0x0000000009E3E000-memory.dmp

                Filesize

                248KB

              • memory/5056-171-0x000000000A330000-0x000000000A936000-memory.dmp

                Filesize

                6.0MB

              • memory/5056-170-0x00000000008C0000-0x00000000008C6000-memory.dmp

                Filesize

                24KB

              • memory/5056-173-0x0000000009DA0000-0x0000000009DB2000-memory.dmp

                Filesize

                72KB

              • memory/5056-168-0x0000000000060000-0x0000000000090000-memory.dmp

                Filesize

                192KB

              • memory/5056-176-0x00000000723D0000-0x0000000072ABE000-memory.dmp

                Filesize

                6.9MB

              • memory/5056-172-0x0000000009E70000-0x0000000009F7A000-memory.dmp

                Filesize

                1.0MB

              • memory/5056-169-0x00000000723D0000-0x0000000072ABE000-memory.dmp

                Filesize

                6.9MB

              • memory/5056-175-0x0000000009F80000-0x0000000009FCB000-memory.dmp

                Filesize

                300KB