Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    295s
  • max time network
    287s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 04:54

General

  • Target

    881963d131beda0aa2b22a681b74614574962845a6161e093eee1a3c90ca3de4.exe

  • Size

    1.8MB

  • MD5

    3057a14ae0c5f0ceb2858e273ee9633a

  • SHA1

    ce9ffe6d73c10e260de31df0b34765708208afee

  • SHA256

    881963d131beda0aa2b22a681b74614574962845a6161e093eee1a3c90ca3de4

  • SHA512

    15e30b0c7b874d1ff11178e147f3adf744a7631e6d94e103bdd150323540131b6f47acbb1d8ad0253071cbca60460da47c9b3abfe0ffc89675c6d83deb8a5dc9

  • SSDEEP

    49152:4dW5kRem7F2qwI51qRhqcLSy+Pj+uHR5JKxh9iyU:4c5IL77V51ahjLSy+bxJKX9iyU

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

risepro

C2

193.233.132.62

Extracted

Family

amadey

Version

4.12

C2

http://185.172.128.19

Attributes
  • install_dir

    cd1f156d67

  • install_file

    Utsysc.exe

  • strings_key

    0dd3e5ee91b367c60c9e575983554b30

  • url_paths

    /ghsdh39s/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\881963d131beda0aa2b22a681b74614574962845a6161e093eee1a3c90ca3de4.exe
    "C:\Users\Admin\AppData\Local\Temp\881963d131beda0aa2b22a681b74614574962845a6161e093eee1a3c90ca3de4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:2668
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\063562292805_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2312
        • C:\Users\Admin\AppData\Local\Temp\1000010001\lenin.exe
          "C:\Users\Admin\AppData\Local\Temp\1000010001\lenin.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          PID:2384
        • C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
          "C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:944
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN InstallSetup8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe" /F
            4⤵
            • Creates scheduled task(s)
            PID:1976
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:2880
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {9478AC8E-2249-4863-8299-00A9390CABF1} S-1-5-21-406356229-2805545415-1236085040-1000:IKJSPGIM\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
        C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
        2⤵
        • Executes dropped EXE
        PID:2640
      • C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
        C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
        2⤵
        • Executes dropped EXE
        PID:784
      • C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
        C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
        2⤵
        • Executes dropped EXE
        PID:1192
      • C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
        C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe
        2⤵
        • Executes dropped EXE
        PID:792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

      Filesize

      1.8MB

      MD5

      3057a14ae0c5f0ceb2858e273ee9633a

      SHA1

      ce9ffe6d73c10e260de31df0b34765708208afee

      SHA256

      881963d131beda0aa2b22a681b74614574962845a6161e093eee1a3c90ca3de4

      SHA512

      15e30b0c7b874d1ff11178e147f3adf744a7631e6d94e103bdd150323540131b6f47acbb1d8ad0253071cbca60460da47c9b3abfe0ffc89675c6d83deb8a5dc9

    • C:\Users\Admin\AppData\Local\Temp\1000010001\lenin.exe

      Filesize

      3.0MB

      MD5

      3d64a79615fce0bd0bcf8d123b5d4218

      SHA1

      d0d27ee13f2e2c169ce0e89fc2d0584f774edd8e

      SHA256

      0821aa04218b032989b65e98adcbecbea94c94378d94d5c7591b124cd78322bd

      SHA512

      f80087fdea0151710cfe0360eb19c243aa87326c121d05615cf47cf2b6caa5bf90bdde6476c3c76eee38b6a0512630a935c2a8d06038658068b9cdc9ee9e11ef

    • C:\Users\Admin\AppData\Local\Temp\1000010001\lenin.exe

      Filesize

      448KB

      MD5

      5c5048dce12b928996e3596b6cf29f34

      SHA1

      f2fc369604ee888700a4ed22e0f98248d1190f54

      SHA256

      0ea69654b92fe6a1aaf63651202d3e9776bc1dd70bcf415f0f11582f83a5a6ed

      SHA512

      410d9ad659dbe190fe7987ab4e163be3295509898f4ef1346a660f7f378b17958adceeb0036d0a06b48c54a025c55f83ef3b3dbcf1128376f09134586fbd0652

    • C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe

      Filesize

      254KB

      MD5

      30c78b9b452b853d9144660f60882af0

      SHA1

      a72198fe06d4c360e085bd3e95430587dc6b3559

      SHA256

      acbd7fb9926e116b44487b9eb8e6fd55feb38f9e5fa655ed2cf429ed2dfca8a7

      SHA512

      dadd87c7e6a91a9806127d252f24edc295535e5d2dce5c68203a246a6626454d5f5b5e070439e7d88f10740b3076bf8be34d2c1ca094bab0f26406e4ed8cf7e8

    • C:\Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe

      Filesize

      207KB

      MD5

      16dd15303f7900f8c281ff9008893a98

      SHA1

      70ca013bf7937ed44d25b602caa53497396c4859

      SHA256

      e51615bdcefd8adc3a300bcd0f397362cd87a7b26e84ed6c73aeda259873d98d

      SHA512

      5274efb18f7ae64b5fd45ed5e7b2d5677bc9c75bf95c81d30fd9c4bd450bc1c2580b2bf63325b1ab13468da871e6fbb8463e18621ceaebadcfa8c0546d562186

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      109KB

      MD5

      726cd06231883a159ec1ce28dd538699

      SHA1

      404897e6a133d255ad5a9c26ac6414d7134285a2

      SHA256

      12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

      SHA512

      9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

      Filesize

      1.2MB

      MD5

      15a42d3e4579da615a384c717ab2109b

      SHA1

      22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

      SHA256

      3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

      SHA512

      1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

    • \Users\Admin\AppData\Local\Temp\1000018001\InstallSetup8.exe

      Filesize

      418KB

      MD5

      0099a99f5ffb3c3ae78af0084136fab3

      SHA1

      0205a065728a9ec1133e8a372b1e3864df776e8c

      SHA256

      919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

      SHA512

      5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

    • memory/2312-95-0x000007FEF4D60000-0x000007FEF56FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2312-97-0x000007FEF4D60000-0x000007FEF56FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2312-98-0x00000000025F0000-0x0000000002670000-memory.dmp

      Filesize

      512KB

    • memory/2312-99-0x00000000025F0000-0x0000000002670000-memory.dmp

      Filesize

      512KB

    • memory/2312-100-0x00000000025F0000-0x0000000002670000-memory.dmp

      Filesize

      512KB

    • memory/2312-101-0x000007FEF4D60000-0x000007FEF56FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2312-94-0x0000000002370000-0x0000000002378000-memory.dmp

      Filesize

      32KB

    • memory/2312-93-0x000000001B270000-0x000000001B552000-memory.dmp

      Filesize

      2.9MB

    • memory/2312-92-0x00000000025F0000-0x0000000002670000-memory.dmp

      Filesize

      512KB

    • memory/2384-169-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-160-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-156-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-151-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-149-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-147-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-145-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-143-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-141-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-138-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-136-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-134-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-133-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-130-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-158-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-154-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-162-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-164-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-167-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-91-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-171-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-173-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-96-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-175-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-177-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-180-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-182-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-184-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-186-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2384-188-0x00000000003A0000-0x000000000074C000-memory.dmp

      Filesize

      3.7MB

    • memory/2492-40-0x00000000008D0000-0x00000000008D1000-memory.dmp

      Filesize

      4KB

    • memory/2492-170-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-72-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-54-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-53-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-52-0x00000000009E0000-0x00000000009E1000-memory.dmp

      Filesize

      4KB

    • memory/2492-51-0x0000000002930000-0x0000000002931000-memory.dmp

      Filesize

      4KB

    • memory/2492-49-0x0000000000C30000-0x0000000000C31000-memory.dmp

      Filesize

      4KB

    • memory/2492-50-0x00000000028E0000-0x00000000028E1000-memory.dmp

      Filesize

      4KB

    • memory/2492-43-0x0000000000C40000-0x0000000000C41000-memory.dmp

      Filesize

      4KB

    • memory/2492-47-0x0000000000C20000-0x0000000000C21000-memory.dmp

      Filesize

      4KB

    • memory/2492-46-0x0000000000B00000-0x0000000000B01000-memory.dmp

      Filesize

      4KB

    • memory/2492-45-0x00000000028C0000-0x00000000028C1000-memory.dmp

      Filesize

      4KB

    • memory/2492-44-0x0000000000C90000-0x0000000000C91000-memory.dmp

      Filesize

      4KB

    • memory/2492-42-0x0000000000B90000-0x0000000000B91000-memory.dmp

      Filesize

      4KB

    • memory/2492-129-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-41-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

      Filesize

      4KB

    • memory/2492-131-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-132-0x0000000005DE0000-0x000000000618C000-memory.dmp

      Filesize

      3.7MB

    • memory/2492-187-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-39-0x00000000028D0000-0x00000000028D1000-memory.dmp

      Filesize

      4KB

    • memory/2492-135-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-37-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

      Filesize

      4KB

    • memory/2492-137-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-38-0x0000000000DA0000-0x0000000000DA1000-memory.dmp

      Filesize

      4KB

    • memory/2492-139-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-36-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

      Filesize

      4KB

    • memory/2492-142-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-35-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-144-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-34-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-146-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-185-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-148-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-183-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-150-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-181-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-152-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-178-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-155-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-176-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-157-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-174-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-159-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-172-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-161-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-90-0x0000000005DE0000-0x000000000618C000-memory.dmp

      Filesize

      3.7MB

    • memory/2492-163-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-168-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2492-165-0x0000000000FD0000-0x000000000147A000-memory.dmp

      Filesize

      4.7MB

    • memory/2624-8-0x0000000002480000-0x0000000002481000-memory.dmp

      Filesize

      4KB

    • memory/2624-19-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

      Filesize

      4KB

    • memory/2624-5-0x0000000002550000-0x0000000002551000-memory.dmp

      Filesize

      4KB

    • memory/2624-14-0x00000000024A0000-0x00000000024A1000-memory.dmp

      Filesize

      4KB

    • memory/2624-12-0x0000000002470000-0x0000000002471000-memory.dmp

      Filesize

      4KB

    • memory/2624-15-0x00000000028A0000-0x00000000028A1000-memory.dmp

      Filesize

      4KB

    • memory/2624-11-0x00000000026F0000-0x00000000026F1000-memory.dmp

      Filesize

      4KB

    • memory/2624-17-0x0000000002710000-0x0000000002711000-memory.dmp

      Filesize

      4KB

    • memory/2624-7-0x0000000002300000-0x0000000002301000-memory.dmp

      Filesize

      4KB

    • memory/2624-10-0x0000000002540000-0x0000000002541000-memory.dmp

      Filesize

      4KB

    • memory/2624-13-0x0000000002490000-0x0000000002491000-memory.dmp

      Filesize

      4KB

    • memory/2624-3-0x0000000002560000-0x0000000002562000-memory.dmp

      Filesize

      8KB

    • memory/2624-18-0x0000000002310000-0x0000000002311000-memory.dmp

      Filesize

      4KB

    • memory/2624-9-0x00000000024F0000-0x00000000024F1000-memory.dmp

      Filesize

      4KB

    • memory/2624-31-0x0000000006540000-0x00000000069EA000-memory.dmp

      Filesize

      4.7MB

    • memory/2624-6-0x0000000002700000-0x0000000002701000-memory.dmp

      Filesize

      4KB

    • memory/2624-32-0x00000000008B0000-0x0000000000D5A000-memory.dmp

      Filesize

      4.7MB

    • memory/2624-4-0x0000000002680000-0x0000000002681000-memory.dmp

      Filesize

      4KB

    • memory/2624-33-0x0000000006540000-0x00000000069EA000-memory.dmp

      Filesize

      4.7MB

    • memory/2624-2-0x00000000008B0000-0x0000000000D5A000-memory.dmp

      Filesize

      4.7MB

    • memory/2624-0-0x00000000008B0000-0x0000000000D5A000-memory.dmp

      Filesize

      4.7MB

    • memory/2624-1-0x0000000077170000-0x0000000077172000-memory.dmp

      Filesize

      8KB