Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2025, 05:34

General

  • Target

    bdcf554198a5dc7d2367103854d9ab0088302d7a3d60b9b71a4882afb537b7b2.exe

  • Size

    1.8MB

  • MD5

    7d73c981878c3890d5b2c4e402bbd8dc

  • SHA1

    f9e3b3d0b36c110fa480f30cc4884afbe647e58a

  • SHA256

    bdcf554198a5dc7d2367103854d9ab0088302d7a3d60b9b71a4882afb537b7b2

  • SHA512

    86f215c68b3597a3c35872f6aa9868f49cb2f115639146042d79c67a70722f3c9f2b33a4677dcff2c14ba9d3593f1e1bb872be8f80c1eeeb58df74a1cd93cfd8

  • SSDEEP

    49152:z/hxpLhalOwRidDm8hPNStLljEKVChQ0iQS63a+SD:zXp8lHwDthP+LljTr0iw3O

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

systembc

C2

wodresomdaymomentum.org

Attributes
  • dns

    5.132.191.104

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file 8 IoCs
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\bdcf554198a5dc7d2367103854d9ab0088302d7a3d60b9b71a4882afb537b7b2.exe
        "C:\Users\Admin\AppData\Local\Temp\bdcf554198a5dc7d2367103854d9ab0088302d7a3d60b9b71a4882afb537b7b2.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4192
        • C:\Users\Admin\AppData\Local\Temp\EWWYY8TF8ERM4HV62IX.exe
          "C:\Users\Admin\AppData\Local\Temp\EWWYY8TF8ERM4HV62IX.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2176
        • C:\Users\Admin\AppData\Local\Temp\WMU0LZCC6WBQB3QITHG37SV9RMS8Y.exe
          "C:\Users\Admin\AppData\Local\Temp\WMU0LZCC6WBQB3QITHG37SV9RMS8Y.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:212
            • C:\Users\Admin\AppData\Local\Temp\1068334001\7fOMOTQ.exe
              "C:\Users\Admin\AppData\Local\Temp\1068334001\7fOMOTQ.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2332
            • C:\Users\Admin\AppData\Local\Temp\1068542001\1VB7gm8.exe
              "C:\Users\Admin\AppData\Local\Temp\1068542001\1VB7gm8.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3896
            • C:\Users\Admin\AppData\Local\Temp\1068561001\GjZwgbz.exe
              "C:\Users\Admin\AppData\Local\Temp\1068561001\GjZwgbz.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1884
            • C:\Users\Admin\AppData\Local\Temp\1068567001\q8viZ0W.exe
              "C:\Users\Admin\AppData\Local\Temp\1068567001\q8viZ0W.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1624
            • C:\Users\Admin\AppData\Local\Temp\1068740001\L65uNi1.exe
              "C:\Users\Admin\AppData\Local\Temp\1068740001\L65uNi1.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1100
              • C:\Users\Admin\AppData\Local\Temp\1068740001\L65uNi1.exe
                "C:\Users\Admin\AppData\Local\Temp\1068740001\L65uNi1.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2576
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 824
                6⤵
                • Program crash
                PID:4852
            • C:\Users\Admin\AppData\Local\Temp\1068766001\nAEqBMS.exe
              "C:\Users\Admin\AppData\Local\Temp\1068766001\nAEqBMS.exe"
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3076
            • C:\Users\Admin\AppData\Local\Temp\1068808001\af53YGc.exe
              "C:\Users\Admin\AppData\Local\Temp\1068808001\af53YGc.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2496
              • C:\Users\Admin\AppData\Local\Temp\1068808001\af53YGc.exe
                "C:\Users\Admin\AppData\Local\Temp\1068808001\af53YGc.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4716
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 816
                6⤵
                • Program crash
                PID:2196
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:768
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2908
    • C:\ProgramData\jiik\oiexwl.exe
      C:\ProgramData\jiik\oiexwl.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1100 -ip 1100
      1⤵
        PID:2908
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4792
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2496 -ip 2496
        1⤵
          PID:3672

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1068334001\7fOMOTQ.exe

          Filesize

          1.8MB

          MD5

          9ac96e9c847e1ae6595d8b30845d12a3

          SHA1

          954c89dbffd2dd77eff1509886e4624852e094da

          SHA256

          bf6d2fe4af4a4704cb02b0942d7e6401e114c289998c69a56a51cebdcde87eca

          SHA512

          66d350d835f5327f8d989aa11eee6b7a191ed05533a044685f4f37edc2d654940515510f16ee418a7e0fa9283aece47203f028df8365397791c468647802cda0

        • C:\Users\Admin\AppData\Local\Temp\1068542001\1VB7gm8.exe

          Filesize

          1.8MB

          MD5

          36465d1f2d56ae0a5ec876cf59bc7b19

          SHA1

          30eb8b914f3371d5432b79296112c26d538c455e

          SHA256

          69c2785558326b01a5150e07c43129e4045ae2df449b7625b75aea94b8206c63

          SHA512

          af0344bd9a088040167b5e231bf3d894f40a737a7b2630dd2321332cac79331619d7b7eedb3063d26f96380ab39ffea16ec06bb172445e4d108792ca0a7bcb15

        • C:\Users\Admin\AppData\Local\Temp\1068561001\GjZwgbz.exe

          Filesize

          1.7MB

          MD5

          e2df3d65784e6202d297bec31d1dfaa1

          SHA1

          a74be156066f49f56bd5835e35210591b7010634

          SHA256

          c539384c0034cc40b226df8cf1354eb264c0e48e722fdd44205ce6783122dba8

          SHA512

          3e311421b7bd8db2ed11fa3bd6406d96a6506b96c54dcf8ab0ea5b95d208dbb124e3372a7be39e42f25f2c2cf59a35888d489c2a107377b831c470bde8f35dfc

        • C:\Users\Admin\AppData\Local\Temp\1068567001\q8viZ0W.exe

          Filesize

          1.8MB

          MD5

          31ba89e658d9ad58689a04a275f78c26

          SHA1

          03c6e64fcbe125c1817447caa8787e095f569f6c

          SHA256

          d1cd20e918b58bb60a8377f3793123008e95eb7d2727a309bd6ee153316efd94

          SHA512

          c77e93051da8c7a508b1dac9705577e8a717279fe2176b2900c514b533bd45a3847aafc3cf2961d662f08c5ba0f82e83fb8496114a582bbaed0e115d5b1ea7d5

        • C:\Users\Admin\AppData\Local\Temp\1068740001\L65uNi1.exe

          Filesize

          795KB

          MD5

          56c1170157268e27017cfa8b5ebf500a

          SHA1

          7194ece41a522c8b6be2869a8a50f152c1da3803

          SHA256

          5f9b7bf8888cafff923dcad8076bbd104e19bc06680c715331ddb28accdf1d34

          SHA512

          0004b994a5291527234fff75aaf74a9805ff87ef87ac51681801a1fa7bda2d94e49ea1e88721d1a4bb9a12e96e748f897362656cd4ef46ef0062922037495625

        • C:\Users\Admin\AppData\Local\Temp\1068766001\nAEqBMS.exe

          Filesize

          13.6MB

          MD5

          1f5ebe1464006d73af7cc479c2054cbf

          SHA1

          07f4e37805d2a0ddc7780e532188a19836deb481

          SHA256

          e27167add3c8150d629cc1d16471101a1a2b56d208701cfcf1298be6bed3ab14

          SHA512

          318f349694ba47f52d0fa9fda13f1deacf85af90e1613964d125fe72bea26c98629150a762f23a07e9679e4a038b020f4ca7d9bf54a96b5d404de19c36fbfe95

        • C:\Users\Admin\AppData\Local\Temp\EWWYY8TF8ERM4HV62IX.exe

          Filesize

          1.7MB

          MD5

          e9b928780742fa22ababf73d7904af16

          SHA1

          654d936dbea2ec1dcae7b787e9c2226425a42a76

          SHA256

          655c7915a26a0a33320d7059b06ae220105dfc48c71b85ad0c66497115955ced

          SHA512

          87443ea4c43dcea2b2df5c795559926f7f19627652f89c7eac7a603c8175c2945af13fefa256c3479444b2f9cc32cff3f3c5793c4a48661e2f2a6cb16635c647

        • C:\Users\Admin\AppData\Local\Temp\WMU0LZCC6WBQB3QITHG37SV9RMS8Y.exe

          Filesize

          1.8MB

          MD5

          fa872640e46a3e408c68fa9f9cecd015

          SHA1

          b6d2e38792c40fc382d5908f633873078cac6c7a

          SHA256

          a5276b574366ac82c4c8dc695e22d325343766f98b34a8d4bd67cdf94cabd797

          SHA512

          d25ed34e8d6c0e7c49f31c4065466436d3cd997f88cc86080bcbe9667456e2c03dfd4f88be419467c038b6802061e3eccc4f15b292cc4b7905af8ac61ffe375e

        • C:\Windows\Tasks\Test Task17.job

          Filesize

          234B

          MD5

          08b3f12b331e0c772d5d3a7ad0d748e0

          SHA1

          dec03ce8018bf74a3a439cce94a4c61aee3e8562

          SHA256

          50bdebcd53d847a80cd513710a8c05ed43b5a7300594643f34087f254c2a42e5

          SHA512

          ba960603ef3ffd880ecaa1335a7fb9d176faf6b71527b44fa090e3cad7613bb73533f7ec89d470664bc5a8121f847f61a6ca0c7ae3237498460a0103abd9f74a

        • memory/212-152-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-171-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-158-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-161-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-173-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-75-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-73-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-103-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-38-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-123-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-39-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/212-164-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/728-100-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/728-170-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/728-122-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/728-163-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/728-151-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/728-172-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/728-160-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/728-157-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1100-145-0x00000000007F0000-0x00000000008BE000-memory.dmp

          Filesize

          824KB

        • memory/1100-146-0x00000000058B0000-0x0000000005E54000-memory.dmp

          Filesize

          5.6MB

        • memory/1624-121-0x00000000009E0000-0x0000000000E8A000-memory.dmp

          Filesize

          4.7MB

        • memory/1624-156-0x00000000009E0000-0x0000000000E8A000-memory.dmp

          Filesize

          4.7MB

        • memory/1624-154-0x00000000009E0000-0x0000000000E8A000-memory.dmp

          Filesize

          4.7MB

        • memory/1624-126-0x00000000009E0000-0x0000000000E8A000-memory.dmp

          Filesize

          4.7MB

        • memory/1624-125-0x00000000009E0000-0x0000000000E8A000-memory.dmp

          Filesize

          4.7MB

        • memory/1884-124-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1884-105-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1884-165-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1884-104-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1884-153-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1884-159-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1884-91-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1884-162-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/1884-166-0x0000000000400000-0x0000000000843000-memory.dmp

          Filesize

          4.3MB

        • memory/2176-12-0x0000000000021000-0x0000000000038000-memory.dmp

          Filesize

          92KB

        • memory/2176-15-0x0000000000020000-0x00000000006AF000-memory.dmp

          Filesize

          6.6MB

        • memory/2176-13-0x0000000000020000-0x00000000006AF000-memory.dmp

          Filesize

          6.6MB

        • memory/2176-10-0x0000000000020000-0x00000000006AF000-memory.dmp

          Filesize

          6.6MB

        • memory/2332-72-0x0000000000170000-0x0000000000619000-memory.dmp

          Filesize

          4.7MB

        • memory/2332-55-0x0000000000170000-0x0000000000619000-memory.dmp

          Filesize

          4.7MB

        • memory/2576-148-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/2576-150-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/2908-95-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/2908-96-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/3076-195-0x0000000005E30000-0x0000000005EC2000-memory.dmp

          Filesize

          584KB

        • memory/3076-209-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-1524-0x0000000006890000-0x00000000068E4000-memory.dmp

          Filesize

          336KB

        • memory/3076-1521-0x0000000005EF0000-0x0000000005F3C000-memory.dmp

          Filesize

          304KB

        • memory/3076-1520-0x0000000005FD0000-0x0000000006052000-memory.dmp

          Filesize

          520KB

        • memory/3076-1519-0x0000000005F50000-0x0000000005FD4000-memory.dmp

          Filesize

          528KB

        • memory/3076-196-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-197-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-199-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-201-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-205-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-211-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-214-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-215-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-217-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-219-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-207-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3076-192-0x0000000000BD0000-0x0000000000FCC000-memory.dmp

          Filesize

          4.0MB

        • memory/3076-193-0x0000000005920000-0x0000000005B80000-memory.dmp

          Filesize

          2.4MB

        • memory/3076-194-0x0000000005BF0000-0x0000000005D1A000-memory.dmp

          Filesize

          1.2MB

        • memory/3076-203-0x0000000005BF0000-0x0000000005D14000-memory.dmp

          Filesize

          1.1MB

        • memory/3408-22-0x0000000000E21000-0x0000000000E4F000-memory.dmp

          Filesize

          184KB

        • memory/3408-23-0x0000000000E20000-0x00000000012D8000-memory.dmp

          Filesize

          4.7MB

        • memory/3408-24-0x0000000000E20000-0x00000000012D8000-memory.dmp

          Filesize

          4.7MB

        • memory/3408-37-0x0000000000E20000-0x00000000012D8000-memory.dmp

          Filesize

          4.7MB

        • memory/3408-20-0x0000000000E20000-0x00000000012D8000-memory.dmp

          Filesize

          4.7MB

        • memory/3896-74-0x0000000000CA0000-0x0000000001142000-memory.dmp

          Filesize

          4.6MB

        • memory/3896-97-0x0000000000CA0000-0x0000000001142000-memory.dmp

          Filesize

          4.6MB

        • memory/3896-71-0x0000000000CA0000-0x0000000001142000-memory.dmp

          Filesize

          4.6MB

        • memory/4192-4-0x0000000000C00000-0x00000000010A7000-memory.dmp

          Filesize

          4.7MB

        • memory/4192-5-0x0000000000C00000-0x00000000010A7000-memory.dmp

          Filesize

          4.7MB

        • memory/4192-3-0x0000000000C00000-0x00000000010A7000-memory.dmp

          Filesize

          4.7MB

        • memory/4192-0-0x0000000000C00000-0x00000000010A7000-memory.dmp

          Filesize

          4.7MB

        • memory/4192-11-0x0000000000C00000-0x00000000010A7000-memory.dmp

          Filesize

          4.7MB

        • memory/4192-2-0x0000000000C01000-0x0000000000C2A000-memory.dmp

          Filesize

          164KB

        • memory/4192-1-0x0000000077334000-0x0000000077336000-memory.dmp

          Filesize

          8KB

        • memory/4792-168-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB

        • memory/4792-169-0x0000000000360000-0x0000000000818000-memory.dmp

          Filesize

          4.7MB