Analysis

  • max time kernel
    72s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/02/2023, 22:44

General

  • Target

    6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe

  • Size

    960KB

  • MD5

    ea5a446817d0b3df03a8c152029b7975

  • SHA1

    bb54ea839b02d75aaa92743f2cbdf41b73a0f895

  • SHA256

    6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899

  • SHA512

    72b215988dc36ebf4671cae2699ba623744f18c3ff9d58171d68f803fb059370e58c0ce0412e11be2d3d3638d8c6f881b6606ad1d6f66868832d7ac7e6196f1b

  • SSDEEP

    24576:DycgeuTc97HTwSJXTHVwUaV9CDOvixKDz0mNdQ7V:Wcgeu0cSJDHVwNXCKvGKDo1

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

redline

Botnet

cr10n

C2

176.113.115.17:4132

Attributes
  • auth_value

    6016c19179aa1044c369adb0ec1f363b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe
    "C:\Users\Admin\AppData\Local\Temp\6dde89d4281d0cb2f83bd630307e194ce2a6dbcc5167796c5851dc24c0b92899.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\deW0417.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\deW0417.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:60
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dPS5603.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dPS5603.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3532
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doH8006.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doH8006.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kUq34Sd.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kUq34Sd.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4324
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mYN12hh.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mYN12hh.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4588
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nvJ07Qp.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nvJ07Qp.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ocM90UL.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ocM90UL.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plO51LN.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plO51LN.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2788

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\deW0417.exe

          Filesize

          820KB

          MD5

          a20ee69f7e60f9827c169d2e9f450e1a

          SHA1

          5f50ca27ae6032c57e8195d6156c9f93f9d7eea6

          SHA256

          3885b6429a12a095ba0c46ae5dd6bca60981aa76a06e254b0da63002d00b1ab9

          SHA512

          4cd797a698525bade8fcf3616188ccc764097a76c718b358bb0ba1ed548931c42a1b81db7c690afeaae75f96f0a8b7d77bccb14375cdce4ca816efb859c34412

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\deW0417.exe

          Filesize

          820KB

          MD5

          a20ee69f7e60f9827c169d2e9f450e1a

          SHA1

          5f50ca27ae6032c57e8195d6156c9f93f9d7eea6

          SHA256

          3885b6429a12a095ba0c46ae5dd6bca60981aa76a06e254b0da63002d00b1ab9

          SHA512

          4cd797a698525bade8fcf3616188ccc764097a76c718b358bb0ba1ed548931c42a1b81db7c690afeaae75f96f0a8b7d77bccb14375cdce4ca816efb859c34412

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plO51LN.exe

          Filesize

          175KB

          MD5

          ce5ef6aac94fdb2af40da676f6cab58f

          SHA1

          c393f24b1550955a686ee39067f20813415af95f

          SHA256

          ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0

          SHA512

          2cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plO51LN.exe

          Filesize

          175KB

          MD5

          ce5ef6aac94fdb2af40da676f6cab58f

          SHA1

          c393f24b1550955a686ee39067f20813415af95f

          SHA256

          ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0

          SHA512

          2cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dPS5603.exe

          Filesize

          483KB

          MD5

          6701dace23a9bf0a7e4e25ff32ef622d

          SHA1

          c5b9a3227ebd70c582b957a1d4604d30f2195b9c

          SHA256

          3d6b3b6aed0a2f0d487d2126c27259a23b8afeadfa327989d5ce559b4327e304

          SHA512

          4525297c526198c3d843c2e025aa375b4e32837fdc0a01ccfa8eec3e3817fc71aac5534e67dd34a20a4445d417b959d72a6b09c4f58613bddc4328fb4ddedee7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dPS5603.exe

          Filesize

          483KB

          MD5

          6701dace23a9bf0a7e4e25ff32ef622d

          SHA1

          c5b9a3227ebd70c582b957a1d4604d30f2195b9c

          SHA256

          3d6b3b6aed0a2f0d487d2126c27259a23b8afeadfa327989d5ce559b4327e304

          SHA512

          4525297c526198c3d843c2e025aa375b4e32837fdc0a01ccfa8eec3e3817fc71aac5534e67dd34a20a4445d417b959d72a6b09c4f58613bddc4328fb4ddedee7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ocM90UL.exe

          Filesize

          315KB

          MD5

          f294797a611f6dee63a6fcad56fa3e5a

          SHA1

          b526f47e46b96c55059660891d1260ee0b51d5e7

          SHA256

          ee8c1327dd23846c9c6fdd9eb6930e7bc91b18c31a9291c01fa0e2a6dc462ff2

          SHA512

          15ca26c8bb2affac72d413973d5639ac045c73b1b49c5728a611b5d7624e8d19b0c2b42f24fddd23168da2c60b1b6452dc3454e9799c8c8c284a2ec05343e828

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ocM90UL.exe

          Filesize

          315KB

          MD5

          f294797a611f6dee63a6fcad56fa3e5a

          SHA1

          b526f47e46b96c55059660891d1260ee0b51d5e7

          SHA256

          ee8c1327dd23846c9c6fdd9eb6930e7bc91b18c31a9291c01fa0e2a6dc462ff2

          SHA512

          15ca26c8bb2affac72d413973d5639ac045c73b1b49c5728a611b5d7624e8d19b0c2b42f24fddd23168da2c60b1b6452dc3454e9799c8c8c284a2ec05343e828

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doH8006.exe

          Filesize

          339KB

          MD5

          e33d167d634907759fff4b432396c598

          SHA1

          604e7ebfd511c571ffb8f767737ebded12dd9568

          SHA256

          546f11a2ada7ac4f7709edc14f1bc245709ea0f2d8a0fbefe4b3d465c7cf6d4c

          SHA512

          eb90b2cc1978cae68780737b71019ff7d3e7826ee88ff7600ff37a8e170085f2ea7236954d1c5a64398ce8fbdc8564c870ea1eaefe26dcc86003b9e4fee90d4d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\doH8006.exe

          Filesize

          339KB

          MD5

          e33d167d634907759fff4b432396c598

          SHA1

          604e7ebfd511c571ffb8f767737ebded12dd9568

          SHA256

          546f11a2ada7ac4f7709edc14f1bc245709ea0f2d8a0fbefe4b3d465c7cf6d4c

          SHA512

          eb90b2cc1978cae68780737b71019ff7d3e7826ee88ff7600ff37a8e170085f2ea7236954d1c5a64398ce8fbdc8564c870ea1eaefe26dcc86003b9e4fee90d4d

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nvJ07Qp.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nvJ07Qp.exe

          Filesize

          175KB

          MD5

          dd0c9e110c68ce1fa5308979ef718f7b

          SHA1

          473deb8069f0841d47b74b7f414dacc6f96eca78

          SHA256

          dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

          SHA512

          29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kUq34Sd.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kUq34Sd.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mYN12hh.exe

          Filesize

          258KB

          MD5

          5a704962dbdb25e4b334c2fb21cf8cb3

          SHA1

          234c1e7a4cd5df7209fb2ff4c054a8fb71fc7ff1

          SHA256

          8eba9adce93cfbf45188ba4d6a84ba9dbd98f6c4476bf56f359bfdabac616d22

          SHA512

          6f1eceea4d68fef53697ac8d1dd37864f6726cd612e3e4c0fe190b9b7c8897607f41a557c2e3c37dffe18ccf459c4e132da02cacfbc13970add91f75b5b4a271

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mYN12hh.exe

          Filesize

          258KB

          MD5

          5a704962dbdb25e4b334c2fb21cf8cb3

          SHA1

          234c1e7a4cd5df7209fb2ff4c054a8fb71fc7ff1

          SHA256

          8eba9adce93cfbf45188ba4d6a84ba9dbd98f6c4476bf56f359bfdabac616d22

          SHA512

          6f1eceea4d68fef53697ac8d1dd37864f6726cd612e3e4c0fe190b9b7c8897607f41a557c2e3c37dffe18ccf459c4e132da02cacfbc13970add91f75b5b4a271

        • memory/60-178-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-174-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-167-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-168-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-169-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-170-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-171-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-173-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-175-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-176-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-183-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-184-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-182-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-181-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-180-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-179-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-166-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/60-177-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/1392-580-0x0000000000400000-0x0000000000583000-memory.dmp

          Filesize

          1.5MB

        • memory/1392-575-0x00000000006A0000-0x00000000007EA000-memory.dmp

          Filesize

          1.3MB

        • memory/1392-574-0x00000000006A0000-0x00000000007EA000-memory.dmp

          Filesize

          1.3MB

        • memory/1392-561-0x0000000000400000-0x0000000000583000-memory.dmp

          Filesize

          1.5MB

        • memory/1392-560-0x00000000006A0000-0x00000000007EA000-memory.dmp

          Filesize

          1.3MB

        • memory/1392-559-0x00000000006A0000-0x00000000007EA000-memory.dmp

          Filesize

          1.3MB

        • memory/1392-557-0x0000000005A00000-0x0000000005A4B000-memory.dmp

          Filesize

          300KB

        • memory/1392-543-0x0000000004B00000-0x0000000004B44000-memory.dmp

          Filesize

          272KB

        • memory/1392-538-0x0000000002630000-0x0000000002676000-memory.dmp

          Filesize

          280KB

        • memory/2788-631-0x0000000000A90000-0x0000000000AC2000-memory.dmp

          Filesize

          200KB

        • memory/2972-153-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-143-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-162-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-161-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-160-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-159-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-158-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-156-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-157-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-130-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-141-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-144-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-146-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-148-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-151-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-154-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-155-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-118-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-152-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-150-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-149-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-134-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-147-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-145-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-133-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-135-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-132-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-142-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-140-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-131-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-139-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-119-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-137-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-120-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-121-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-163-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-122-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-123-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-124-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-125-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-126-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-138-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-136-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-127-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-128-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/2972-129-0x0000000077220000-0x00000000773AE000-memory.dmp

          Filesize

          1.6MB

        • memory/4324-314-0x00000000007F0000-0x00000000007FA000-memory.dmp

          Filesize

          40KB

        • memory/4588-376-0x0000000000400000-0x0000000000574000-memory.dmp

          Filesize

          1.5MB

        • memory/4588-384-0x0000000000400000-0x0000000000574000-memory.dmp

          Filesize

          1.5MB

        • memory/4588-371-0x0000000002220000-0x000000000223A000-memory.dmp

          Filesize

          104KB

        • memory/4588-374-0x0000000000913000-0x0000000000933000-memory.dmp

          Filesize

          128KB

        • memory/4588-375-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4588-378-0x0000000004DD0000-0x00000000052CE000-memory.dmp

          Filesize

          5.0MB

        • memory/4588-380-0x00000000026E0000-0x00000000026F8000-memory.dmp

          Filesize

          96KB

        • memory/4972-459-0x0000000005080000-0x0000000005112000-memory.dmp

          Filesize

          584KB

        • memory/4972-451-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

          Filesize

          72KB

        • memory/4972-449-0x0000000004DA0000-0x0000000004EAA000-memory.dmp

          Filesize

          1.0MB

        • memory/4972-448-0x0000000005210000-0x0000000005816000-memory.dmp

          Filesize

          6.0MB

        • memory/4972-435-0x0000000000470000-0x00000000004A2000-memory.dmp

          Filesize

          200KB

        • memory/4972-453-0x0000000004D30000-0x0000000004D6E000-memory.dmp

          Filesize

          248KB

        • memory/4972-455-0x0000000004EB0000-0x0000000004EFB000-memory.dmp

          Filesize

          300KB

        • memory/4972-470-0x0000000007750000-0x0000000007912000-memory.dmp

          Filesize

          1.8MB

        • memory/4972-462-0x0000000005120000-0x0000000005186000-memory.dmp

          Filesize

          408KB

        • memory/4972-476-0x00000000076E0000-0x0000000007730000-memory.dmp

          Filesize

          320KB

        • memory/4972-475-0x0000000007660000-0x00000000076D6000-memory.dmp

          Filesize

          472KB

        • memory/4972-471-0x0000000007E50000-0x000000000837C000-memory.dmp

          Filesize

          5.2MB