Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 13:52

General

  • Target

    d21c1dae567563d5e9bd69de0eaa4822b5274fb9ccf5026b2c2b0adaaed5cf3b.exe

  • Size

    1.8MB

  • MD5

    1d3a32909de7256112d4472c5b93b62d

  • SHA1

    8d4f2768136f0a65c8f3d65ab8e29deb39503fe9

  • SHA256

    d21c1dae567563d5e9bd69de0eaa4822b5274fb9ccf5026b2c2b0adaaed5cf3b

  • SHA512

    13b11661122bb250e57e23ab50a278a8fc3eb61885f4592915ed54405937f59b74225935b434bba07f9b76915223bca4967db7623fe726db2c11b2fe329acc6f

  • SSDEEP

    24576:586oILSwqzbGJEJFYPKVa5KuK53j101yHrqBAwutYXqi1299A2044J61M4q11KVH:G6orwqz79Va5cjqyHcbgYXpIqK4+ge

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

newbild

C2

185.215.113.67:40960

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 18 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d21c1dae567563d5e9bd69de0eaa4822b5274fb9ccf5026b2c2b0adaaed5cf3b.exe
    "C:\Users\Admin\AppData\Local\Temp\d21c1dae567563d5e9bd69de0eaa4822b5274fb9ccf5026b2c2b0adaaed5cf3b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe
        "C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Users\Admin\AppData\Local\Temp\onefile_1668_133630195795562000\stub.exe
          "C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:828
      • C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe
        "C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2256
      • C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe
        "C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 52
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1680
      • C:\Users\Admin\AppData\Local\Temp\1000025001\setup222.exe
        "C:\Users\Admin\AppData\Local\Temp\1000025001\setup222.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Users\Admin\AppData\Local\Temp\SetupWizard.exe
          SetupWizard.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\Users\Admin\AppData\Local\Temp\SetupWizard-361ac38d73977af1\SetupWizard.exe
            "C:\Users\Admin\AppData\Local\Temp\SetupWizard-361ac38d73977af1\SetupWizard.exe"
            5⤵
            • Executes dropped EXE
            PID:1952
      • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe
        "C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 84
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1628
      • C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe
        "C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:2580
        • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe
          "C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe"
          3⤵
            PID:1552
            • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
              "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
              4⤵
                PID:2164

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4c5d7720edbc43f5de8dd6b318b839aa

          SHA1

          5df4b6013615ca89e67c42cca05b23f4db0114fe

          SHA256

          716f0f8c2cb4783c1b566f3aab5d1cef495538fc397fe598c248a6901fc33261

          SHA512

          db5a28dfaa227e1f7445b44593540e1c355db47cca80f9f35659f70115f7cb0e35aeb1f39d83c0067f3568dbc1696913e7c10b1fec326fe2371053add13ca2fe

        • C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe

          Filesize

          10.7MB

          MD5

          c09ff1273b09cb1f9c7698ed147bf22e

          SHA1

          5634aec5671c4fd565694aa12cd3bf11758675d2

          SHA256

          bf8ce6bb537881386facfe6c1f9003812b985cbc4b9e9addd39e102449868d92

          SHA512

          e8f19b432dc3be9a6138d6a2f79521599087466d1c55a49d73600c876508ab307a6e65694e0effb5b705fdecdd0e201f588c8d5c3767fe9ae0b8581c318cadac

        • C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe

          Filesize

          297KB

          MD5

          0efd5136528869a8ea1a37c5059d706e

          SHA1

          3593bec29dbfd333a5a3a4ad2485a94982bbf713

          SHA256

          7c21c1f3063ba963818542036a50f62ac7494ad422e7088897b55c61306ec74e

          SHA512

          4ac391812634107e4a4318c454a19e7c34abfc1f97acc9bcd0fac9a92c372e5ebfe809e5c433479142537762ed633564bc690b38fc268b169498d6a54249e3fe

        • C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe

          Filesize

          1.7MB

          MD5

          e8a7d0c6dedce0d4a403908a29273d43

          SHA1

          8289c35dabaee32f61c74de6a4e8308dc98eb075

          SHA256

          672f24842aeb72d7bd8d64e78aaba5f3a953409ce21cfe97d3a80e7ef67f232a

          SHA512

          c8bf2f42f7bcf6f6b752ba5165c57ee99d4b31d5ba48ce1c2651afdb8bc37a14f392253f3daa0e811116d11d4c9175dc55cfb1baac0c30a71a18e1df17e73770

        • C:\Users\Admin\AppData\Local\Temp\1000025001\setup222.exe

          Filesize

          96KB

          MD5

          8677376c509f0c66d1f02c6b66d7ef90

          SHA1

          e057eddf9d2e319967e200a5801e4bbe6e45862a

          SHA256

          f7afac39d2754ac953bf129ee094c8b092e349cdf35f1ba23c2c76a0229f9e96

          SHA512

          e0c685e289c10a48b5fa251aa4414653c103dac69faf536b9ae9598e066aab5a03b03c09096c42a0f244aeaf80f2b9e4aa28d6b28da436587a3f52a9155473d0

        • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe

          Filesize

          522KB

          MD5

          70a578f7f58456e475facd69469cf20a

          SHA1

          83e147e7ba01fa074b2f046b65978f838f7b1e8e

          SHA256

          5c8d556e39269b22e63ba9c941ff306bb043bc35125ba08787617577231b381a

          SHA512

          707ed48b45978d26faaf3544bf22912461503d6e4b1a077cbb7c3a8abd2f1eb3fec16b2786a79ae4db2dfec92f662ece1998bc142706d2b482599fb6191563c0

        • C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe

          Filesize

          304KB

          MD5

          ae636b586917c999826cadf93d5ef774

          SHA1

          cf86f7f12616b60c5e8447207fb04ead262046ea

          SHA256

          e3b562a60253715da3533084ec3ca98c566d0f85d44f66502151d50b064ad680

          SHA512

          5230bdd15c5f76476bd197fb2e6f73ed068d5b54436bcdaace10629a51c927a90b91624c82e732e3125e9f05a5f4b41300c773a518f15ce05cd22f586b1501f3

        • C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe

          Filesize

          3.6MB

          MD5

          c28a2d0a008788b49690b333d501e3f3

          SHA1

          6a25fdb8613db00b09d4d6e1ad302c20c7f7e2c4

          SHA256

          f61712dccccf8f19c6dbf0dfb7c7c0be9eb2f13d3381ee94e4cb6cb70ffb5f5a

          SHA512

          455923a63e60b6079d7e0af2bfae5f922b205d024def456ae95158ef1bfcdbc4f56e24b4421a2203f4618d0ea29e229e331c7ee0d7881ee8ebac83fa72f5d788

        • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe

          Filesize

          415KB

          MD5

          07101cac5b9477ba636cd8ca7b9932cb

          SHA1

          59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

          SHA256

          488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

          SHA512

          02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

        • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe

          Filesize

          1.8MB

          MD5

          1d3a32909de7256112d4472c5b93b62d

          SHA1

          8d4f2768136f0a65c8f3d65ab8e29deb39503fe9

          SHA256

          d21c1dae567563d5e9bd69de0eaa4822b5274fb9ccf5026b2c2b0adaaed5cf3b

          SHA512

          13b11661122bb250e57e23ab50a278a8fc3eb61885f4592915ed54405937f59b74225935b434bba07f9b76915223bca4967db7623fe726db2c11b2fe329acc6f

        • C:\Users\Admin\AppData\Local\Temp\Cab823C.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\SetupWizard-361ac38d73977af1\SetupWizard.exe

          Filesize

          21.9MB

          MD5

          a2f305c64392293dd4bab5e81aa788fb

          SHA1

          ee2ff74cefddd79dc84f0ab9f976254c5aecb196

          SHA256

          b0142fe3c93527de2a0f49e24c0a745752148635eefef71659eda33ea57b3c91

          SHA512

          1abc1883447971d493515a7a2e7be4e22f75fceb2f5f47f3889ad85ae2900761189bffedb2da5bfd2995a12be7c53713073905b6a3febdcc8337b30d291d8396

        • C:\Users\Admin\AppData\Local\Temp\SetupWizard.exe

          Filesize

          23.9MB

          MD5

          a3c783cab09a68b24208b0f2f801d9dc

          SHA1

          948f96f2af7d73f8d12abd9235efc2f8c03cdf6d

          SHA256

          cf35f64f4a4bbe853bc3d555b0120061ef8c7cd5ba8068de4aab8ea3ba4f3990

          SHA512

          1ac654700039883faec019b161002310b0cda925f7d4f3201add507fd22787c661a1e7155aa3ffa9b359ce831375e13c1538bc00a30cfd5c95950f727481c310

        • C:\Users\Admin\AppData\Local\Temp\SetupWizard.exe

          Filesize

          25.6MB

          MD5

          5174f5445fa3da3dbcd66669ef965511

          SHA1

          3d342a7cf545723afb43439817ca934bf9be9578

          SHA256

          2f24d7461eb23096019b5b5e38db80c1da05e81a1ee9c9640a3473ac81db2704

          SHA512

          bec58d489495e8c2558ed43740e2c0b5774d76ea6ea64181aadfe4821a9c1af17f0546672734b591e014fc28abad0ac7368593aba63843bb4f86f7a83193e0ba

        • C:\Users\Admin\AppData\Local\Temp\Tar87FA.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\onefile_1668_133630195795562000\python310.dll

          Filesize

          4.3MB

          MD5

          c80b5cb43e5fe7948c3562c1fff1254e

          SHA1

          f73cb1fb9445c96ecd56b984a1822e502e71ab9d

          SHA256

          058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

          SHA512

          faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

        • C:\Users\Admin\AppData\Local\Temp\onefile_1668_133630195795562000\stub.exe

          Filesize

          17.9MB

          MD5

          972d9d2422f1a71bed840709024302f8

          SHA1

          e52170710e3c413ae3cfa45fcdecf19db4aa382c

          SHA256

          1c666df4eafab03ecde809ffbc40dd60b8ac2fe7bdca5632c5c4002254e6e564

          SHA512

          3d84252756dcb4820b7794e9a92811d32631b9f3e9bd1a558fd040736b1472c0d00efb6ff7a13ae3bcd327f3bfac2b6ad94a5a3dfbc8ba54511a366c4f4727a6

        • \Users\Admin\AppData\Local\Temp\SetupWizard-361ac38d73977af1\SetupWizard.exe

          Filesize

          21.2MB

          MD5

          9f6bf9cbe176cdb4f154f5a3fdd302ad

          SHA1

          9ebcb1995cd5c41da0ab4d2266591d774011fd9f

          SHA256

          58f78cdde66c37f8dd97440b96ddbec1b65e8406584818eebbe71592375b344c

          SHA512

          d48992a0a4b87d5378996255e55bdca18a5124d4db62d608a5164c35a9fe83300e1e418a112e09eeb8a6e1a9608cb10eee0f4d4d26e9ca093fdc44070b128374

        • \Users\Admin\AppData\Local\Temp\SetupWizard-361ac38d73977af1\SetupWizard.exe

          Filesize

          21.6MB

          MD5

          5114fc4bae3ac654b4f8426a6f192ad4

          SHA1

          c7ec7e6914df780c8d2f609b19fe6f679b0797c3

          SHA256

          933caa6e4dc811480f62e434dbf94a42d1fd9a1d03142ab3432409abb2088168

          SHA512

          cb452e95ea8e6c0892004bbd7d38bce35214e2d136023dd3c5f6a439c3c00d6fb41a94be39cd71d5c494fb3ff43f27c746c50b8154e84b31345c626adf0af489

        • \Users\Admin\AppData\Local\Temp\SetupWizard.exe

          Filesize

          26.2MB

          MD5

          5b20d7092c3d63f1ad07c99dde7a4e11

          SHA1

          3e975880f2601e874ec2c01a7f753543236c2629

          SHA256

          0de8bb0030a6de8f9d465cbf14ef20ec7d0231fa3080f4e0b836c45f53649310

          SHA512

          6b9e770e3dfe9a0358b2fa3a19a86e5800e8331664cea0e31e7f8aad1138e2d543707dba0089a4c66797f2fa3571243b102b9786b1396ce4ab8c432c3773f87b

        • memory/828-94-0x000000013F600000-0x0000000140835000-memory.dmp

          Filesize

          18.2MB

        • memory/968-147-0x0000000000020000-0x0000000000021000-memory.dmp

          Filesize

          4KB

        • memory/1248-244-0x000000013F660000-0x000000013F684000-memory.dmp

          Filesize

          144KB

        • memory/1460-325-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-329-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-337-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-314-0x0000000004F20000-0x000000000500C000-memory.dmp

          Filesize

          944KB

        • memory/1460-342-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-347-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-317-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-319-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-321-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-313-0x0000000004AC0000-0x0000000004BC6000-memory.dmp

          Filesize

          1.0MB

        • memory/1460-323-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-315-0x0000000000560000-0x000000000057C000-memory.dmp

          Filesize

          112KB

        • memory/1460-327-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-312-0x00000000008F0000-0x0000000000C8C000-memory.dmp

          Filesize

          3.6MB

        • memory/1460-331-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-333-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-335-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-339-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-343-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-345-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-349-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-353-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-355-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-351-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1460-316-0x0000000000560000-0x0000000000575000-memory.dmp

          Filesize

          84KB

        • memory/1668-130-0x000000013FE10000-0x00000001408E5000-memory.dmp

          Filesize

          10.8MB

        • memory/1668-102-0x000000013FE10000-0x00000001408E5000-memory.dmp

          Filesize

          10.8MB

        • memory/2256-92-0x00000000012A0000-0x00000000012F0000-memory.dmp

          Filesize

          320KB

        • memory/2728-20-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-18-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-296-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-93-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-284-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-282-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-275-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-25-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-15-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-16-0x00000000779C0000-0x00000000779C2000-memory.dmp

          Filesize

          8KB

        • memory/2728-17-0x0000000000811000-0x000000000083F000-memory.dmp

          Filesize

          184KB

        • memory/2728-24-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-164-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-259-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-243-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-21-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-22-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2728-23-0x0000000000810000-0x0000000000CBC000-memory.dmp

          Filesize

          4.7MB

        • memory/2924-0-0x0000000000030000-0x00000000004DC000-memory.dmp

          Filesize

          4.7MB

        • memory/2924-2-0x0000000000030000-0x00000000004DC000-memory.dmp

          Filesize

          4.7MB

        • memory/2924-14-0x0000000000030000-0x00000000004DC000-memory.dmp

          Filesize

          4.7MB

        • memory/2924-4-0x0000000000030000-0x00000000004DC000-memory.dmp

          Filesize

          4.7MB

        • memory/2924-1-0x0000000000030000-0x00000000004DC000-memory.dmp

          Filesize

          4.7MB