Analysis

  • max time kernel
    143s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 01:00

General

  • Target

    234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe

  • Size

    1.1MB

  • MD5

    0b40969e72a4dfd32110a8627fe8ef9e

  • SHA1

    c39532bc3fbe15738f39a59af3a4a35825019dd0

  • SHA256

    234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db

  • SHA512

    bc5f93fb5b48347448ec393269233b1f08ab33d71f28cd859d9a1e32311364cf3ea8816cf35be8a48859919178dca29f0a1fedc10906a30c72c9ce4855fba4a9

  • SSDEEP

    24576:eyKibSWKaFdUoVlynQ2y4hRqoXg9jzVnH+FSp4G:tvbSonUoXz2JGoXg9jqSp4

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

forma

C2

193.233.20.24:4123

Attributes
  • auth_value

    50b8e065d7cb1e9e30786f7a370368f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe
    "C:\Users\Admin\AppData\Local\Temp\234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmTM87rS10.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmTM87rS10.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmhg05pT33.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmhg05pT33.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3864
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmuC91ng39.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmuC91ng39.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:724
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmfO74PK26.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmfO74PK26.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3004
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iLV05fU07.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iLV05fU07.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:348
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kED40Px55.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kED40Px55.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1972
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 1744
                7⤵
                • Program crash
                PID:1620
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mrv00cF00.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mrv00cF00.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5036
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 1080
              6⤵
              • Program crash
              PID:3188
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxN41Zj47.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxN41Zj47.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4560
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 2012
            5⤵
            • Program crash
            PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rf97CI92lz04.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rf97CI92lz04.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sv03LA60Gx04.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sv03LA60Gx04.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1972 -ip 1972
    1⤵
      PID:1836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 5036 -ip 5036
      1⤵
        PID:4488
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4560 -ip 4560
        1⤵
          PID:4024

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sv03LA60Gx04.exe

                Filesize

                175KB

                MD5

                08f1d0c03618e93f9817e6643d25d4e1

                SHA1

                f64f41a902393074fe5f185a67b0b4d4e7935441

                SHA256

                f16826580dcbea79547222cfed8ec8727a509978b00311cd6c0f7ac1221a0dda

                SHA512

                29a2c193eff9350267978a47dc23d8fc7aabcc102868916c251d0b8d12b28c23f52ac45c014b1215296d7010f278cc9bdb471f43a79a385f94d8d77d53d1ab7b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sv03LA60Gx04.exe

                Filesize

                175KB

                MD5

                08f1d0c03618e93f9817e6643d25d4e1

                SHA1

                f64f41a902393074fe5f185a67b0b4d4e7935441

                SHA256

                f16826580dcbea79547222cfed8ec8727a509978b00311cd6c0f7ac1221a0dda

                SHA512

                29a2c193eff9350267978a47dc23d8fc7aabcc102868916c251d0b8d12b28c23f52ac45c014b1215296d7010f278cc9bdb471f43a79a385f94d8d77d53d1ab7b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmTM87rS10.exe

                Filesize

                978KB

                MD5

                0eaaf99fff13b54e7589fe0374073527

                SHA1

                9d8bc6380fc6242b9c407825f07118351ade0ec3

                SHA256

                342cfbf0d4a685aae1b1f4383c5295799f9dd16c5b3bfad11e9a9844ae69e87e

                SHA512

                3e58504cf540dc3e47bc2da019559ba72962aa41c2abb8289d3d01aec83f2214ef2dae111f3a04f7bdfb49e459a055ef559aace2af1c936b8182df546eb80c7e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmTM87rS10.exe

                Filesize

                978KB

                MD5

                0eaaf99fff13b54e7589fe0374073527

                SHA1

                9d8bc6380fc6242b9c407825f07118351ade0ec3

                SHA256

                342cfbf0d4a685aae1b1f4383c5295799f9dd16c5b3bfad11e9a9844ae69e87e

                SHA512

                3e58504cf540dc3e47bc2da019559ba72962aa41c2abb8289d3d01aec83f2214ef2dae111f3a04f7bdfb49e459a055ef559aace2af1c936b8182df546eb80c7e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rf97CI92lz04.exe

                Filesize

                11KB

                MD5

                67fa991e464adb0cbe6c4c01090ebf8d

                SHA1

                5e1b375b08191834298fd3c669e1b66d9a8dfc96

                SHA256

                6f9f7a745538518d1f3909b8717dcff1b63f3267803dfc8acd15077265a9e6f6

                SHA512

                e810061e11b3b21fee8b6d624190fb4ae6a17a802bcf669fd6553233210e37df46a1e42d393839032fe530c1c05bb6c1ae3aa1b85adbf8e01464a0f18a86f5f8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rf97CI92lz04.exe

                Filesize

                11KB

                MD5

                67fa991e464adb0cbe6c4c01090ebf8d

                SHA1

                5e1b375b08191834298fd3c669e1b66d9a8dfc96

                SHA256

                6f9f7a745538518d1f3909b8717dcff1b63f3267803dfc8acd15077265a9e6f6

                SHA512

                e810061e11b3b21fee8b6d624190fb4ae6a17a802bcf669fd6553233210e37df46a1e42d393839032fe530c1c05bb6c1ae3aa1b85adbf8e01464a0f18a86f5f8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmhg05pT33.exe

                Filesize

                882KB

                MD5

                61eb0c918cf0e1c959f2a97f97b1ad00

                SHA1

                c91e2350ff648f0e42dc302106fb2d8784eb1d22

                SHA256

                88406d533a88d780f25dd5ab79a0650658d19ad3b8b77c1075b2b2b1dc4e34b7

                SHA512

                c842759aa6dc5e3212ba8326fb1ea5931ff7541a5973e10d7ef09cde9af109ddcfaa8355602499d861c6827f042c58aa427a61567b0c108965cbce8048a2764f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmhg05pT33.exe

                Filesize

                882KB

                MD5

                61eb0c918cf0e1c959f2a97f97b1ad00

                SHA1

                c91e2350ff648f0e42dc302106fb2d8784eb1d22

                SHA256

                88406d533a88d780f25dd5ab79a0650658d19ad3b8b77c1075b2b2b1dc4e34b7

                SHA512

                c842759aa6dc5e3212ba8326fb1ea5931ff7541a5973e10d7ef09cde9af109ddcfaa8355602499d861c6827f042c58aa427a61567b0c108965cbce8048a2764f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxN41Zj47.exe

                Filesize

                303KB

                MD5

                a1f3354a99b35edf172a95b90afbc9b1

                SHA1

                8b02f77b82ec8b005aacb5bd87f50f6ceee0052f

                SHA256

                2565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a

                SHA512

                f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxN41Zj47.exe

                Filesize

                303KB

                MD5

                a1f3354a99b35edf172a95b90afbc9b1

                SHA1

                8b02f77b82ec8b005aacb5bd87f50f6ceee0052f

                SHA256

                2565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a

                SHA512

                f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmuC91ng39.exe

                Filesize

                658KB

                MD5

                e0d14c6393cc7e0c114527463360be33

                SHA1

                dca35f05ba3e19aa63cedcf870d3ff395b4dce76

                SHA256

                1af0cc408d49fa0b7071b0d78961dcc794dfb01db68bb75163f79c277f2663bc

                SHA512

                86604216967bab685b2c7bd0fa4f102be646344be50009d373e5d7a20ede9571719fe0add8849eab6dbf8df3a2cd9dfa69495ccf0dc34fd5b17378be291c0114

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmuC91ng39.exe

                Filesize

                658KB

                MD5

                e0d14c6393cc7e0c114527463360be33

                SHA1

                dca35f05ba3e19aa63cedcf870d3ff395b4dce76

                SHA256

                1af0cc408d49fa0b7071b0d78961dcc794dfb01db68bb75163f79c277f2663bc

                SHA512

                86604216967bab685b2c7bd0fa4f102be646344be50009d373e5d7a20ede9571719fe0add8849eab6dbf8df3a2cd9dfa69495ccf0dc34fd5b17378be291c0114

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mrv00cF00.exe

                Filesize

                245KB

                MD5

                5334eab571f52b8ab7f0e610f7df9831

                SHA1

                f2022927de6a6eeb88b9a0a95896e664b9133a0f

                SHA256

                9658e5d60c861c5eb465a0c7fdd57d15c0c0bb73e3b699879a83162caa69f7e5

                SHA512

                3d0106388a6730d86b2a8365572b5a26b1c5d0abcd1218de9f61f45467617b04a4acc7fcf670879bced39957a778599ecfd95ead5a601695206d378571216664

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mrv00cF00.exe

                Filesize

                245KB

                MD5

                5334eab571f52b8ab7f0e610f7df9831

                SHA1

                f2022927de6a6eeb88b9a0a95896e664b9133a0f

                SHA256

                9658e5d60c861c5eb465a0c7fdd57d15c0c0bb73e3b699879a83162caa69f7e5

                SHA512

                3d0106388a6730d86b2a8365572b5a26b1c5d0abcd1218de9f61f45467617b04a4acc7fcf670879bced39957a778599ecfd95ead5a601695206d378571216664

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmfO74PK26.exe

                Filesize

                387KB

                MD5

                cb7ef661452715e82d90e74ede4421d9

                SHA1

                b62a28bbb9378339504cbc45ecbd639e18559eae

                SHA256

                02c927c4103ab6e88d697d4beef0ab434c36b444778a7759d2df443a114069fc

                SHA512

                86381694a97aedb5a2a9316a27237cbde1fbe181f3b5257e55d154ade677b751e2cf213996ce25d6a0ac7901fd83bed27f9c188f064ec3dfe3433fc538a71188

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmfO74PK26.exe

                Filesize

                387KB

                MD5

                cb7ef661452715e82d90e74ede4421d9

                SHA1

                b62a28bbb9378339504cbc45ecbd639e18559eae

                SHA256

                02c927c4103ab6e88d697d4beef0ab434c36b444778a7759d2df443a114069fc

                SHA512

                86381694a97aedb5a2a9316a27237cbde1fbe181f3b5257e55d154ade677b751e2cf213996ce25d6a0ac7901fd83bed27f9c188f064ec3dfe3433fc538a71188

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iLV05fU07.exe

                Filesize

                11KB

                MD5

                77e9b29a0a32549aa24c2ae2b1d71bf4

                SHA1

                b6e145f586e69c19974efb89a9490efa7f82c6bc

                SHA256

                4228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee

                SHA512

                9d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iLV05fU07.exe

                Filesize

                11KB

                MD5

                77e9b29a0a32549aa24c2ae2b1d71bf4

                SHA1

                b6e145f586e69c19974efb89a9490efa7f82c6bc

                SHA256

                4228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee

                SHA512

                9d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iLV05fU07.exe

                Filesize

                11KB

                MD5

                77e9b29a0a32549aa24c2ae2b1d71bf4

                SHA1

                b6e145f586e69c19974efb89a9490efa7f82c6bc

                SHA256

                4228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee

                SHA512

                9d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kED40Px55.exe

                Filesize

                303KB

                MD5

                a1f3354a99b35edf172a95b90afbc9b1

                SHA1

                8b02f77b82ec8b005aacb5bd87f50f6ceee0052f

                SHA256

                2565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a

                SHA512

                f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kED40Px55.exe

                Filesize

                303KB

                MD5

                a1f3354a99b35edf172a95b90afbc9b1

                SHA1

                8b02f77b82ec8b005aacb5bd87f50f6ceee0052f

                SHA256

                2565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a

                SHA512

                f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kED40Px55.exe

                Filesize

                303KB

                MD5

                a1f3354a99b35edf172a95b90afbc9b1

                SHA1

                8b02f77b82ec8b005aacb5bd87f50f6ceee0052f

                SHA256

                2565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a

                SHA512

                f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e

              • memory/348-168-0x0000000000790000-0x000000000079A000-memory.dmp

                Filesize

                40KB

              • memory/1972-227-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-1088-0x0000000002700000-0x0000000002710000-memory.dmp

                Filesize

                64KB

              • memory/1972-191-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-193-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-195-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-197-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-198-0x0000000002700000-0x0000000002710000-memory.dmp

                Filesize

                64KB

              • memory/1972-199-0x0000000002700000-0x0000000002710000-memory.dmp

                Filesize

                64KB

              • memory/1972-201-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-203-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-205-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-207-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-209-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-211-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-213-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-215-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-217-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-219-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-221-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-223-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-225-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-187-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-229-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-231-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-233-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-235-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-237-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-239-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-241-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-1084-0x00000000052F0000-0x0000000005908000-memory.dmp

                Filesize

                6.1MB

              • memory/1972-1085-0x0000000005970000-0x0000000005A7A000-memory.dmp

                Filesize

                1.0MB

              • memory/1972-1086-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

                Filesize

                72KB

              • memory/1972-1087-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

                Filesize

                240KB

              • memory/1972-189-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-1090-0x0000000005DC0000-0x0000000005E26000-memory.dmp

                Filesize

                408KB

              • memory/1972-1091-0x0000000006490000-0x0000000006522000-memory.dmp

                Filesize

                584KB

              • memory/1972-1092-0x0000000002700000-0x0000000002710000-memory.dmp

                Filesize

                64KB

              • memory/1972-1093-0x0000000002700000-0x0000000002710000-memory.dmp

                Filesize

                64KB

              • memory/1972-1094-0x0000000002700000-0x0000000002710000-memory.dmp

                Filesize

                64KB

              • memory/1972-1095-0x0000000006680000-0x0000000006842000-memory.dmp

                Filesize

                1.8MB

              • memory/1972-1096-0x0000000006860000-0x0000000006D8C000-memory.dmp

                Filesize

                5.2MB

              • memory/1972-1097-0x0000000002700000-0x0000000002710000-memory.dmp

                Filesize

                64KB

              • memory/1972-1101-0x0000000007010000-0x0000000007086000-memory.dmp

                Filesize

                472KB

              • memory/1972-1102-0x0000000007090000-0x00000000070E0000-memory.dmp

                Filesize

                320KB

              • memory/1972-185-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-183-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-174-0x0000000000660000-0x00000000006AB000-memory.dmp

                Filesize

                300KB

              • memory/1972-175-0x0000000004BC0000-0x0000000005164000-memory.dmp

                Filesize

                5.6MB

              • memory/1972-176-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-179-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-181-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/1972-177-0x0000000005170000-0x00000000051AE000-memory.dmp

                Filesize

                248KB

              • memory/2280-2074-0x0000000000C70000-0x0000000000CA2000-memory.dmp

                Filesize

                200KB

              • memory/2280-2076-0x00000000058A0000-0x00000000058B0000-memory.dmp

                Filesize

                64KB

              • memory/2280-2075-0x00000000058A0000-0x00000000058B0000-memory.dmp

                Filesize

                64KB

              • memory/4560-2061-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/4560-2059-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/4560-2060-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/4560-1350-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/4560-2062-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/4560-2057-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/4560-1352-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/4560-1348-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                Filesize

                64KB

              • memory/5036-1140-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/5036-1139-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/5036-1138-0x0000000004B60000-0x0000000004B70000-memory.dmp

                Filesize

                64KB

              • memory/5036-1137-0x0000000000660000-0x000000000068D000-memory.dmp

                Filesize

                180KB