Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 03:49

General

  • Target

    fa42753a5fe2e60076476da32fcfaf01.exe

  • Size

    37KB

  • MD5

    fa42753a5fe2e60076476da32fcfaf01

  • SHA1

    8147938ec14fc596c55d1819f8e2cb3d92991ac5

  • SHA256

    22bf47b5ca0c997a013a8259a44a81171f00ee542c349695f1ea30a8b9c1051a

  • SHA512

    e16b32648b38d7a6d8e2bb3062e0246d6bae0118d60b865eda9a671b26eb2f8f087d1ebddc9a6f9191cdc980e94d734adcd461e0dc2479e7790e2ebb79561dd1

  • SSDEEP

    768:d8n3N4JRqwg8UTB+8zx70f0PSuopLwlFFWO7:dmN4JRrg8ypxSKFFX

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://81.19.131.34/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

LiveTraffic

C2

77.105.132.87:6731

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.7.190:32927

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa42753a5fe2e60076476da32fcfaf01.exe
    "C:\Users\Admin\AppData\Local\Temp\fa42753a5fe2e60076476da32fcfaf01.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2768
  • C:\Users\Admin\AppData\Local\Temp\9877.exe
    C:\Users\Admin\AppData\Local\Temp\9877.exe
    1⤵
    • Executes dropped EXE
    PID:656
  • C:\Users\Admin\AppData\Roaming\sfsbfug
    C:\Users\Admin\AppData\Roaming\sfsbfug
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3632
  • C:\Users\Admin\AppData\Local\Temp\1583.exe
    C:\Users\Admin\AppData\Local\Temp\1583.exe
    1⤵
      PID:3328
      • C:\Users\Admin\AppData\Local\Temp\tuc3.exe
        "C:\Users\Admin\AppData\Local\Temp\tuc3.exe"
        2⤵
          PID:2848
          • C:\Users\Admin\AppData\Local\Temp\is-2AI56.tmp\tuc3.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-2AI56.tmp\tuc3.tmp" /SL5="$C0062,8423542,54272,C:\Users\Admin\AppData\Local\Temp\tuc3.exe"
            3⤵
              PID:2072
              • C:\Program Files (x86)\xrecode3\xrecode3.exe
                "C:\Program Files (x86)\xrecode3\xrecode3.exe" -i
                4⤵
                  PID:2068
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\system32\schtasks.exe" /Query
                  4⤵
                    PID:4320
                  • C:\Program Files (x86)\xrecode3\xrecode3.exe
                    "C:\Program Files (x86)\xrecode3\xrecode3.exe" -s
                    4⤵
                      PID:1528
                    • C:\Windows\SysWOW64\net.exe
                      "C:\Windows\system32\net.exe" helpmsg 1
                      4⤵
                        PID:4608
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 helpmsg 1
                          5⤵
                            PID:32
                    • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                      "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                      2⤵
                        PID:3460
                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                        "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                        2⤵
                          PID:3368
                          • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                            "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                            3⤵
                              PID:4992
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                4⤵
                                  PID:1096
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                  4⤵
                                    PID:4596
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    4⤵
                                      PID:624
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      4⤵
                                        PID:2280
                                      • C:\Windows\rss\csrss.exe
                                        C:\Windows\rss\csrss.exe
                                        4⤵
                                          PID:4776
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nologo -noprofile
                                            5⤵
                                              PID:1096
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              schtasks /delete /tn ScheduledUpdate /f
                                              5⤵
                                                PID:1880
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -nologo -noprofile
                                                5⤵
                                                  PID:3496
                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                  5⤵
                                                  • Creates scheduled task(s)
                                                  PID:4616
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -nologo -noprofile
                                                  5⤵
                                                    PID:5064
                                                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                    5⤵
                                                      PID:3788
                                              • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                                "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                                                2⤵
                                                  PID:4076
                                                • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"
                                                  2⤵
                                                    PID:2884
                                                • C:\Users\Admin\AppData\Local\Temp\Broom.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Broom.exe
                                                  1⤵
                                                    PID:1436
                                                  • C:\Users\Admin\AppData\Local\Temp\192D.exe
                                                    C:\Users\Admin\AppData\Local\Temp\192D.exe
                                                    1⤵
                                                      PID:4952
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -nologo -noprofile
                                                      1⤵
                                                        PID:2512
                                                      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
                                                        1⤵
                                                          PID:4380
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 328
                                                            2⤵
                                                            • Program crash
                                                            PID:2216
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4380 -ip 4380
                                                          1⤵
                                                            PID:2836
                                                          • C:\Windows\system32\netsh.exe
                                                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                            1⤵
                                                            • Modifies Windows Firewall
                                                            PID:5012
                                                          • C:\Users\Admin\AppData\Local\Temp\6BD3.exe
                                                            C:\Users\Admin\AppData\Local\Temp\6BD3.exe
                                                            1⤵
                                                              PID:1444

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Temp\1583.exe

                                                              Filesize

                                                              32KB

                                                              MD5

                                                              6d85259c78b1d653d7e077ef515fde6e

                                                              SHA1

                                                              fb27c5cf8c58199f67ee2b3caecfd3ee5bde86d0

                                                              SHA256

                                                              847f4898f2adef5839ff24d7d9ea9da008dcadd4d620daf3c9321ff1b7cfdafc

                                                              SHA512

                                                              039d83cc5517be741eb120cef3bd77936742c25a23b44e7f9514678d99dd664c04842c2b62718b544053836d26bc6dfa7e4ac17eaaf3ae491753ffc986a50cdd

                                                            • C:\Users\Admin\AppData\Local\Temp\1583.exe

                                                              Filesize

                                                              33KB

                                                              MD5

                                                              1ea753c26a9a9b36a1ea3eb6eef74792

                                                              SHA1

                                                              5abc373a4ac4f2f374e9bee21ee1e2d104b2a4a3

                                                              SHA256

                                                              28352504c842004725e1f53fc4e65e16065642452de646917dc606ddcfd9f970

                                                              SHA512

                                                              a9a62165d42ed8d380cdfe887f29d1028c2e96f7dc5f8cab38e2398f842eaf7c7f8191a454efae0280782dfddef2d9c7a8b142cce5008c346930d181ddbd5c42

                                                            • C:\Users\Admin\AppData\Local\Temp\192D.exe

                                                              Filesize

                                                              75KB

                                                              MD5

                                                              74461137d38386f0473fbcb475d0fc37

                                                              SHA1

                                                              9f849998554b4584a172dfc4e99d84454cd32323

                                                              SHA256

                                                              59ba7fbb6e1f42ac28150728de37110b881ffd5cdabc359768566c4b1806f722

                                                              SHA512

                                                              d1e97e73886dc2bf11a076490f6665cca6b4716c767a61bf3e80af7b4bb1e75884df7b8aebb5557d23cd014c5d35b974f9609d71d855eb899be4945f25d9bae7

                                                            • C:\Users\Admin\AppData\Local\Temp\192D.exe

                                                              Filesize

                                                              27KB

                                                              MD5

                                                              52a959ca162a679855ffd3f5c08ec9a0

                                                              SHA1

                                                              d28813ea9b81c639ace82f812370fc1541ec9ede

                                                              SHA256

                                                              bd91ce0d9b7621bbb0abaffb2085a6b53a0ff0c21a002f90cf11519f0a39fb3e

                                                              SHA512

                                                              4d33183acf674816bcb4760d5837bad1922d5bedc8f20c5ceff4d6c754b04c15d942fb448047eb96dbe6a1d0e3cb83c062848aebdf859bc3a06b820962eeaf33

                                                            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                              Filesize

                                                              169KB

                                                              MD5

                                                              e33cadf4b3ae6a9d47c1f8357631426d

                                                              SHA1

                                                              6f7f9ee4e9d44d2e2829781034e9b3365ef21819

                                                              SHA256

                                                              be0de1f5f6d9c900cee889ff035623793aa11eb56717fc395f7daa0a6a2fdc0c

                                                              SHA512

                                                              a8f384ba81c1f6e4ceada53ec23fb39bb28f9d259f73dcbbcfbf15cb20eb526a740378c7e2d90a9cdd915c2124f88d51af212706e7060b10bdc8a72bac2666c9

                                                            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                              Filesize

                                                              137KB

                                                              MD5

                                                              d8d8daa14e7259290e728e98ff6bfbbb

                                                              SHA1

                                                              79627f6e255582d8eee34ada3c4377054bfa3ea1

                                                              SHA256

                                                              21ceca5b4af638a7f8d6c1a0b7ce9b5ca459b28aef1b7d5f9d80381d09ad7a43

                                                              SHA512

                                                              bd326ddd695efa2420ee9940b9bce99400579b1b17a603358ca7e33f18275724d71023aeb99e786719260c2b50cfac4674aa996bd583e92c4545188af20737f5

                                                            • C:\Users\Admin\AppData\Local\Temp\9877.exe

                                                              Filesize

                                                              401KB

                                                              MD5

                                                              f88edad62a7789c2c5d8047133da5fa7

                                                              SHA1

                                                              41b1f056cdda764a1c7c402c6fa4f8ab2f3ce5f9

                                                              SHA256

                                                              eb2b1ce5574096b91eb9e0482117d2518ab188c0747a209dc77e88d30bb970dc

                                                              SHA512

                                                              e2d5b0ace5dfd3bd2321b2a42b7e7725071ca440389dc5ef12720a34727ae84c2907cd7befeae5d53568d9deaee8443f4cbda44b598cfc9b6316d9389be09a60

                                                            • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                                                              Filesize

                                                              87KB

                                                              MD5

                                                              713258283d098fdc6a26408edc9dca13

                                                              SHA1

                                                              5784f69076c2057f21b963a9e13fbd186fb1f308

                                                              SHA256

                                                              7a268aff850715b2f1aef618c46512c531885248c1a05aea326ddd13bb39eea0

                                                              SHA512

                                                              3af46480eb917f37bcb85c5fb046debe24d86f5804227388e81af9d351604d33b4bfce2fe034f8f0a60e2ac1088134236f4053681a844b4fe5b033657065929f

                                                            • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                                              Filesize

                                                              38KB

                                                              MD5

                                                              e531d4b3fe89b853c46bc13fe348d06f

                                                              SHA1

                                                              75fa013b9dc494df46a0b1227bcf7a59456a211b

                                                              SHA256

                                                              9c59b6ccdce18585f923ef2aeb39b3fc1d5bf47de74134629bf542248ec8cb68

                                                              SHA512

                                                              5a3e06a7e1ebdb627e88c79dc1854423e55e4b2f0ff0a715d149d5e416f5a3ab59874cb7aa43ca1589909e004197f01120536bbb8c430c208ccf7917b45edbad

                                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              879f6daa64e7c5cd0c5407b3335f1a08

                                                              SHA1

                                                              1b90e48b2db46ca06ecaa783b49afa596c69aaef

                                                              SHA256

                                                              0260e173818cf121d0b744131756d7799228508cd38af9a033f4bdf27f927728

                                                              SHA512

                                                              51ca18517e520c98c4064f42d8ed2aba05318392ce11f89705dec7eab6c624790f561a9a3b09af4398ac2377787a4ac552eda66df116bb9ee1432d3c924cfdfa

                                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                                              Filesize

                                                              204KB

                                                              MD5

                                                              7776759ea28041a3b23799da25b042d7

                                                              SHA1

                                                              145ad923430023052617a70a957d96dcba1eb692

                                                              SHA256

                                                              db3491d1d1017660e5626ef5173a1d117d852a934341073ae67040e17fe779e0

                                                              SHA512

                                                              4d4100e896f9c1b4156ff0f0028765d10dfe2a505d7cbcb273189751231a77921ff5a34448fd7a15809d147185624478565eb926be089264af89e6d7ce3f6308

                                                            • C:\Users\Admin\AppData\Local\Temp\tuc3.exe

                                                              Filesize

                                                              174KB

                                                              MD5

                                                              02ab342dc31ba5c94685b020407a9bdd

                                                              SHA1

                                                              eee928e482e81814c6c4d72df2e3cc61d4e1477a

                                                              SHA256

                                                              4514276540e9290b92cbf2c08ee6b0d522769ddc22812ce2baad167dd8a71e8d

                                                              SHA512

                                                              ceb607b6b034e2529239372709862b612483205fa2bb69d398e1800ad8a8fafd44640260deb87ef2f0c511a1cdbcd7a1aa9acb9aca18f578907caaede55a7375

                                                            • C:\Users\Admin\AppData\Local\Temp\tuc3.exe

                                                              Filesize

                                                              92KB

                                                              MD5

                                                              a3d098610415db87bc6cee13cda24803

                                                              SHA1

                                                              bfed2811ab2e0a6348eaccd168fc7ffc3a9c3d92

                                                              SHA256

                                                              f722cb4a916da1dae426e44f98a359eee43014d379b9c23118120c144cc52301

                                                              SHA512

                                                              2d7be3981e1c4dd634ebd377f6b7cb866d00be726e87cd66348e3bdd55916b848a3b7fbca2bbb581b4f70103f669dbe1479a4beaeb11ffeb4646d1057b518361

                                                            • C:\Users\Admin\AppData\Roaming\sfsbfug

                                                              Filesize

                                                              37KB

                                                              MD5

                                                              fa42753a5fe2e60076476da32fcfaf01

                                                              SHA1

                                                              8147938ec14fc596c55d1819f8e2cb3d92991ac5

                                                              SHA256

                                                              22bf47b5ca0c997a013a8259a44a81171f00ee542c349695f1ea30a8b9c1051a

                                                              SHA512

                                                              e16b32648b38d7a6d8e2bb3062e0246d6bae0118d60b865eda9a671b26eb2f8f087d1ebddc9a6f9191cdc980e94d734adcd461e0dc2479e7790e2ebb79561dd1

                                                            • memory/656-19-0x00000000013B0000-0x00000000013EC000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/656-31-0x000000000B020000-0x000000000B12A000-memory.dmp

                                                              Filesize

                                                              1.0MB

                                                            • memory/656-33-0x000000000AF50000-0x000000000AF8C000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/656-34-0x000000000AF90000-0x000000000AFDC000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/656-32-0x0000000009660000-0x0000000009672000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/656-30-0x0000000009690000-0x0000000009CA8000-memory.dmp

                                                              Filesize

                                                              6.1MB

                                                            • memory/656-269-0x0000000009130000-0x0000000009196000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/656-28-0x0000000008170000-0x000000000817A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/656-252-0x0000000074750000-0x0000000074F00000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/656-27-0x0000000008190000-0x00000000081A0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/656-26-0x00000000081B0000-0x0000000008242000-memory.dmp

                                                              Filesize

                                                              584KB

                                                            • memory/656-25-0x00000000086C0000-0x0000000008C64000-memory.dmp

                                                              Filesize

                                                              5.6MB

                                                            • memory/656-24-0x0000000074750000-0x0000000074F00000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/656-254-0x0000000008190000-0x00000000081A0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1436-361-0x0000000000400000-0x0000000000965000-memory.dmp

                                                              Filesize

                                                              5.4MB

                                                            • memory/1436-78-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1436-263-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1528-257-0x0000000000400000-0x0000000000785000-memory.dmp

                                                              Filesize

                                                              3.5MB

                                                            • memory/1528-256-0x0000000000400000-0x0000000000785000-memory.dmp

                                                              Filesize

                                                              3.5MB

                                                            • memory/1528-318-0x0000000000400000-0x0000000000785000-memory.dmp

                                                              Filesize

                                                              3.5MB

                                                            • memory/1528-392-0x0000000000400000-0x0000000000785000-memory.dmp

                                                              Filesize

                                                              3.5MB

                                                            • memory/1528-546-0x0000000000400000-0x0000000000785000-memory.dmp

                                                              Filesize

                                                              3.5MB

                                                            • memory/2068-251-0x0000000000400000-0x0000000000785000-memory.dmp

                                                              Filesize

                                                              3.5MB

                                                            • memory/2068-247-0x0000000000400000-0x0000000000785000-memory.dmp

                                                              Filesize

                                                              3.5MB

                                                            • memory/2068-248-0x0000000000400000-0x0000000000785000-memory.dmp

                                                              Filesize

                                                              3.5MB

                                                            • memory/2072-203-0x00000000020B0000-0x00000000020B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2072-364-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                              Filesize

                                                              756KB

                                                            • memory/2512-306-0x0000000007E80000-0x0000000007E8A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/2512-286-0x0000000006D30000-0x0000000006D74000-memory.dmp

                                                              Filesize

                                                              272KB

                                                            • memory/2512-270-0x00000000032B0000-0x00000000032C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/2512-273-0x00000000032B0000-0x00000000032C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/2512-284-0x0000000006380000-0x00000000066D4000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/2512-274-0x00000000060D0000-0x0000000006136000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/2512-285-0x00000000067C0000-0x00000000067DE000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/2512-305-0x0000000007D90000-0x0000000007E33000-memory.dmp

                                                              Filesize

                                                              652KB

                                                            • memory/2512-271-0x00000000057F0000-0x0000000005812000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2512-315-0x0000000074750000-0x0000000074F00000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/2512-267-0x0000000005930000-0x0000000005F58000-memory.dmp

                                                              Filesize

                                                              6.2MB

                                                            • memory/2512-265-0x00000000031D0000-0x0000000003206000-memory.dmp

                                                              Filesize

                                                              216KB

                                                            • memory/2512-309-0x0000000007ED0000-0x0000000007EDE000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/2512-311-0x0000000007F30000-0x0000000007F4A000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/2512-312-0x0000000007F20000-0x0000000007F28000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/2512-304-0x00000000032B0000-0x00000000032C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/2512-310-0x0000000007EF0000-0x0000000007F04000-memory.dmp

                                                              Filesize

                                                              80KB

                                                            • memory/2512-291-0x0000000007D30000-0x0000000007D62000-memory.dmp

                                                              Filesize

                                                              200KB

                                                            • memory/2512-292-0x000000006DCF0000-0x000000006DD3C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/2512-287-0x0000000007AD0000-0x0000000007B46000-memory.dmp

                                                              Filesize

                                                              472KB

                                                            • memory/2512-293-0x000000006C5C0000-0x000000006C914000-memory.dmp

                                                              Filesize

                                                              3.3MB

                                                            • memory/2512-308-0x0000000007E90000-0x0000000007EA1000-memory.dmp

                                                              Filesize

                                                              68KB

                                                            • memory/2512-289-0x0000000007B70000-0x0000000007B8A000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/2512-288-0x00000000081D0000-0x000000000884A000-memory.dmp

                                                              Filesize

                                                              6.5MB

                                                            • memory/2512-268-0x0000000074750000-0x0000000074F00000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/2512-307-0x0000000007F90000-0x0000000008026000-memory.dmp

                                                              Filesize

                                                              600KB

                                                            • memory/2512-303-0x0000000007D70000-0x0000000007D8E000-memory.dmp

                                                              Filesize

                                                              120KB

                                                            • memory/2768-3-0x0000000000400000-0x000000000040B000-memory.dmp

                                                              Filesize

                                                              44KB

                                                            • memory/2768-0-0x0000000000400000-0x000000000040B000-memory.dmp

                                                              Filesize

                                                              44KB

                                                            • memory/2848-84-0x0000000000400000-0x0000000000414000-memory.dmp

                                                              Filesize

                                                              80KB

                                                            • memory/2848-266-0x0000000000400000-0x0000000000414000-memory.dmp

                                                              Filesize

                                                              80KB

                                                            • memory/3328-40-0x0000000000310000-0x00000000017C6000-memory.dmp

                                                              Filesize

                                                              20.7MB

                                                            • memory/3328-98-0x0000000074750000-0x0000000074F00000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/3328-39-0x0000000074750000-0x0000000074F00000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/3368-260-0x0000000002E30000-0x000000000371B000-memory.dmp

                                                              Filesize

                                                              8.9MB

                                                            • memory/3368-259-0x0000000002A30000-0x0000000002E2A000-memory.dmp

                                                              Filesize

                                                              4.0MB

                                                            • memory/3368-261-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                              Filesize

                                                              9.1MB

                                                            • memory/3384-323-0x0000000002B70000-0x0000000002B86000-memory.dmp

                                                              Filesize

                                                              88KB

                                                            • memory/3384-1-0x0000000002B50000-0x0000000002B66000-memory.dmp

                                                              Filesize

                                                              88KB

                                                            • memory/3384-14-0x00000000029D0000-0x00000000029E6000-memory.dmp

                                                              Filesize

                                                              88KB

                                                            • memory/3460-363-0x00007FF76CDD0000-0x00007FF76D371000-memory.dmp

                                                              Filesize

                                                              5.6MB

                                                            • memory/3632-17-0x0000000000400000-0x000000000040B000-memory.dmp

                                                              Filesize

                                                              44KB

                                                            • memory/4380-339-0x0000000000400000-0x0000000000409000-memory.dmp

                                                              Filesize

                                                              36KB

                                                            • memory/4380-264-0x0000000000400000-0x0000000000409000-memory.dmp

                                                              Filesize

                                                              36KB

                                                            • memory/4776-547-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                              Filesize

                                                              9.1MB

                                                            • memory/4952-290-0x0000000007090000-0x00000000070A0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4952-99-0x0000000000180000-0x00000000001BC000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/4952-97-0x0000000074750000-0x0000000074F00000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/4952-130-0x0000000007090000-0x00000000070A0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4952-272-0x0000000074750000-0x0000000074F00000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/4992-319-0x0000000002BA0000-0x0000000002FA5000-memory.dmp

                                                              Filesize

                                                              4.0MB

                                                            • memory/4992-464-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                              Filesize

                                                              9.1MB