Analysis

  • max time kernel
    77s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 09:41

General

  • Target

    3f0005f16c034e4195bf27fc6c39fd680794ab741bef60c5b52670263f1137a6.exe

  • Size

    1.1MB

  • MD5

    671fb147d0e04dfe5dcb5326e848a01f

  • SHA1

    44fdd72539818aaeff88a11e2742929019edf897

  • SHA256

    3f0005f16c034e4195bf27fc6c39fd680794ab741bef60c5b52670263f1137a6

  • SHA512

    733fde2d50d8da325f39c1e2db2212640343a8a6e2ccf0ef05ae1c95d6a575c79568208cecb6dd4a3c78173f939734a263771fd18a4410649107a4d7226f1d81

  • SSDEEP

    24576:6yIjj1v76PHv80k/kFFKDIO2d5JJLipzgMZgrQws2SlsvV3NZQRl9:Bil76/kjkXKkO2d5/2QrQwjlt3TYl

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f0005f16c034e4195bf27fc6c39fd680794ab741bef60c5b52670263f1137a6.exe
    "C:\Users\Admin\AppData\Local\Temp\3f0005f16c034e4195bf27fc6c39fd680794ab741bef60c5b52670263f1137a6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUA04SR36.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUA04SR36.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plQD60iD44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plQD60iD44.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1904
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pllW19Xd01.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pllW19Xd01.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plUG92JB39.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plUG92JB39.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4692
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXB23zu47.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXB23zu47.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:228
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caCg60Td57.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caCg60Td57.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5076
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 1344
                7⤵
                • Program crash
                PID:676
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dibC98IA86.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dibC98IA86.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:236
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 236 -s 1084
              6⤵
              • Program crash
              PID:1068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esxK27bZ76.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esxK27bZ76.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4676
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 1328
            5⤵
            • Program crash
            PID:1980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuNb4392wO50.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuNb4392wO50.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grbC25AD42.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grbC25AD42.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4828
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5076 -ip 5076
    1⤵
      PID:1176
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 236 -ip 236
      1⤵
        PID:1040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4676 -ip 4676
        1⤵
          PID:4540

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grbC25AD42.exe

          Filesize

          176KB

          MD5

          e770024ac4ca41920184bea6fdde9189

          SHA1

          025031e3c323bca02f87c7d234f0f063f01f0b63

          SHA256

          ed6c25dc92f6955c7b1393b15fd708020dd243ed45bd918cb656ba3438046ad1

          SHA512

          d582fabc4ffc64080ae111af4d8abc4786e4748ec05a65d72f4a6d3b378b4dc70f7e5c37f9188e6165af5c96457e8c0a02d769eff46bac9fb05a1939e825c2e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grbC25AD42.exe

          Filesize

          176KB

          MD5

          e770024ac4ca41920184bea6fdde9189

          SHA1

          025031e3c323bca02f87c7d234f0f063f01f0b63

          SHA256

          ed6c25dc92f6955c7b1393b15fd708020dd243ed45bd918cb656ba3438046ad1

          SHA512

          d582fabc4ffc64080ae111af4d8abc4786e4748ec05a65d72f4a6d3b378b4dc70f7e5c37f9188e6165af5c96457e8c0a02d769eff46bac9fb05a1939e825c2e1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUA04SR36.exe

          Filesize

          995KB

          MD5

          ae239bd5be3a6995e9685adbc4d01f3f

          SHA1

          43ec1867139733bd080d63b35a7e77fbc61d3e25

          SHA256

          06871eca58053075771b077589c9a715816ec4419571fc5b4f7d4e2befc2ac77

          SHA512

          73c5b5f879083f59e9c5e027053a6399dc4a875da599bfada90d6c339f12b08fe78089421ab082a23e42d53ec0384e987a3b602932dd7298b921856635eeb8c7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plUA04SR36.exe

          Filesize

          995KB

          MD5

          ae239bd5be3a6995e9685adbc4d01f3f

          SHA1

          43ec1867139733bd080d63b35a7e77fbc61d3e25

          SHA256

          06871eca58053075771b077589c9a715816ec4419571fc5b4f7d4e2befc2ac77

          SHA512

          73c5b5f879083f59e9c5e027053a6399dc4a875da599bfada90d6c339f12b08fe78089421ab082a23e42d53ec0384e987a3b602932dd7298b921856635eeb8c7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuNb4392wO50.exe

          Filesize

          16KB

          MD5

          0d761926067940e095a01ff4c3287a79

          SHA1

          2fcef7a261dbee3c9067aa9d800e8dfd4d0b4a97

          SHA256

          896123b044076a41db4a218031d4e9642c514c050a9643143d5c5ba963c43490

          SHA512

          5942fdc74ad5c8d3305976b01999a1b1f36e845a52075716fed7d707c70341f9139094ea846f9ba4e0141be347078ccfe18c3a52f6945a3d331468a7ed8611fa

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuNb4392wO50.exe

          Filesize

          16KB

          MD5

          0d761926067940e095a01ff4c3287a79

          SHA1

          2fcef7a261dbee3c9067aa9d800e8dfd4d0b4a97

          SHA256

          896123b044076a41db4a218031d4e9642c514c050a9643143d5c5ba963c43490

          SHA512

          5942fdc74ad5c8d3305976b01999a1b1f36e845a52075716fed7d707c70341f9139094ea846f9ba4e0141be347078ccfe18c3a52f6945a3d331468a7ed8611fa

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plQD60iD44.exe

          Filesize

          892KB

          MD5

          6a2584d05253a63f1a89d078069f1c54

          SHA1

          ce64fa78b22c20ed6b2f24728058a73103efee4f

          SHA256

          0706d163b0b04ff584f386b4a00f4097e131c7412dff9906a9e81c956042b662

          SHA512

          636219050c69c4b894729198985c2424631ccb74db9d5db88ed260f9e87dd1fe06d635b2ae4d93323216d5a467b9276ea1f94b04ec9dd378062ac27552c1e568

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plQD60iD44.exe

          Filesize

          892KB

          MD5

          6a2584d05253a63f1a89d078069f1c54

          SHA1

          ce64fa78b22c20ed6b2f24728058a73103efee4f

          SHA256

          0706d163b0b04ff584f386b4a00f4097e131c7412dff9906a9e81c956042b662

          SHA512

          636219050c69c4b894729198985c2424631ccb74db9d5db88ed260f9e87dd1fe06d635b2ae4d93323216d5a467b9276ea1f94b04ec9dd378062ac27552c1e568

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esxK27bZ76.exe

          Filesize

          301KB

          MD5

          c20ade32de13d71d0544db09353ae664

          SHA1

          2360c19884041d41655172027c5ae07d537e01b4

          SHA256

          680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc

          SHA512

          c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esxK27bZ76.exe

          Filesize

          301KB

          MD5

          c20ade32de13d71d0544db09353ae664

          SHA1

          2360c19884041d41655172027c5ae07d537e01b4

          SHA256

          680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc

          SHA512

          c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pllW19Xd01.exe

          Filesize

          666KB

          MD5

          ae76315e7cc0b2e2a679f55edd08740b

          SHA1

          38f38cb90d962fa39c56a1f891a19585dfff0606

          SHA256

          660bb8966e71f824b3c70a8bd24697d4ddd1e1cf2d73d341f19e89b450b49eb3

          SHA512

          4ce03548fb6daa8062d98fef95a867b639dc68c598fe33e4259652b84002961c25bbb9e6e3b25bcbc4ac34fe68b6b4b91a7563f498367669652fc90335c54425

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pllW19Xd01.exe

          Filesize

          666KB

          MD5

          ae76315e7cc0b2e2a679f55edd08740b

          SHA1

          38f38cb90d962fa39c56a1f891a19585dfff0606

          SHA256

          660bb8966e71f824b3c70a8bd24697d4ddd1e1cf2d73d341f19e89b450b49eb3

          SHA512

          4ce03548fb6daa8062d98fef95a867b639dc68c598fe33e4259652b84002961c25bbb9e6e3b25bcbc4ac34fe68b6b4b91a7563f498367669652fc90335c54425

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dibC98IA86.exe

          Filesize

          244KB

          MD5

          02f5dcb777fe1b583584f6f69878cc07

          SHA1

          26c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e

          SHA256

          b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d

          SHA512

          030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dibC98IA86.exe

          Filesize

          244KB

          MD5

          02f5dcb777fe1b583584f6f69878cc07

          SHA1

          26c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e

          SHA256

          b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d

          SHA512

          030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plUG92JB39.exe

          Filesize

          391KB

          MD5

          43abc5332d986ce35fb693f2405b3a2b

          SHA1

          f8d114e0fb4b3b9c8a6655beece2b425347a6489

          SHA256

          60ea9ec7c4ab9001aba876ef55d9425e6b125311dad7db27ac8c2a89821f1264

          SHA512

          d4154d3084e7a051895aa9b93e0beff23d590da732ddd42a76b8e1f0f99ef900cbefb426298a9422ae2ba624e52ef18f8ed141880ace50b65b9e0698d8dfd669

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plUG92JB39.exe

          Filesize

          391KB

          MD5

          43abc5332d986ce35fb693f2405b3a2b

          SHA1

          f8d114e0fb4b3b9c8a6655beece2b425347a6489

          SHA256

          60ea9ec7c4ab9001aba876ef55d9425e6b125311dad7db27ac8c2a89821f1264

          SHA512

          d4154d3084e7a051895aa9b93e0beff23d590da732ddd42a76b8e1f0f99ef900cbefb426298a9422ae2ba624e52ef18f8ed141880ace50b65b9e0698d8dfd669

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXB23zu47.exe

          Filesize

          16KB

          MD5

          a9253ae480e2d03711b8f78dc055cf72

          SHA1

          8ee19de4ae429ae9cdde2b01b157d5e246976331

          SHA256

          f6864b3d8f93f610266afe6449075385a0273ee069d24b770d541edacc9c12b8

          SHA512

          3783f51163f5b58462dcd4195b89995fc81bf6277823214637dc48f3981e80a0644a5af56734807b3e735d3c5c64c6fba4c26292aad81d215503f69295481b6b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXB23zu47.exe

          Filesize

          16KB

          MD5

          a9253ae480e2d03711b8f78dc055cf72

          SHA1

          8ee19de4ae429ae9cdde2b01b157d5e246976331

          SHA256

          f6864b3d8f93f610266afe6449075385a0273ee069d24b770d541edacc9c12b8

          SHA512

          3783f51163f5b58462dcd4195b89995fc81bf6277823214637dc48f3981e80a0644a5af56734807b3e735d3c5c64c6fba4c26292aad81d215503f69295481b6b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXB23zu47.exe

          Filesize

          16KB

          MD5

          a9253ae480e2d03711b8f78dc055cf72

          SHA1

          8ee19de4ae429ae9cdde2b01b157d5e246976331

          SHA256

          f6864b3d8f93f610266afe6449075385a0273ee069d24b770d541edacc9c12b8

          SHA512

          3783f51163f5b58462dcd4195b89995fc81bf6277823214637dc48f3981e80a0644a5af56734807b3e735d3c5c64c6fba4c26292aad81d215503f69295481b6b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caCg60Td57.exe

          Filesize

          301KB

          MD5

          c20ade32de13d71d0544db09353ae664

          SHA1

          2360c19884041d41655172027c5ae07d537e01b4

          SHA256

          680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc

          SHA512

          c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caCg60Td57.exe

          Filesize

          301KB

          MD5

          c20ade32de13d71d0544db09353ae664

          SHA1

          2360c19884041d41655172027c5ae07d537e01b4

          SHA256

          680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc

          SHA512

          c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caCg60Td57.exe

          Filesize

          301KB

          MD5

          c20ade32de13d71d0544db09353ae664

          SHA1

          2360c19884041d41655172027c5ae07d537e01b4

          SHA256

          680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc

          SHA512

          c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa

        • memory/228-168-0x0000000000C60000-0x0000000000C6A000-memory.dmp

          Filesize

          40KB

        • memory/236-1138-0x00000000027E0000-0x00000000027F0000-memory.dmp

          Filesize

          64KB

        • memory/236-1143-0x00000000027E0000-0x00000000027F0000-memory.dmp

          Filesize

          64KB

        • memory/236-1135-0x0000000000990000-0x00000000009BD000-memory.dmp

          Filesize

          180KB

        • memory/236-1136-0x00000000027E0000-0x00000000027F0000-memory.dmp

          Filesize

          64KB

        • memory/236-1137-0x00000000027E0000-0x00000000027F0000-memory.dmp

          Filesize

          64KB

        • memory/236-1142-0x00000000027E0000-0x00000000027F0000-memory.dmp

          Filesize

          64KB

        • memory/236-1141-0x00000000027E0000-0x00000000027F0000-memory.dmp

          Filesize

          64KB

        • memory/4676-1151-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/4676-2062-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/4676-2061-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/4676-1149-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/4676-2060-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/4676-1154-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/4676-2058-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/4828-2072-0x0000000000B50000-0x0000000000B82000-memory.dmp

          Filesize

          200KB

        • memory/4828-2073-0x00000000053C0000-0x00000000053D0000-memory.dmp

          Filesize

          64KB

        • memory/5076-186-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-1099-0x0000000007210000-0x0000000007286000-memory.dmp

          Filesize

          472KB

        • memory/5076-219-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/5076-222-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-224-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-226-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-228-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-230-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-232-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-234-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-236-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-238-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-240-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-242-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-1085-0x00000000052D0000-0x00000000058E8000-memory.dmp

          Filesize

          6.1MB

        • memory/5076-1086-0x0000000005970000-0x0000000005A7A000-memory.dmp

          Filesize

          1.0MB

        • memory/5076-1087-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

          Filesize

          72KB

        • memory/5076-1089-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

          Filesize

          240KB

        • memory/5076-1088-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/5076-1091-0x0000000005DC0000-0x0000000005E26000-memory.dmp

          Filesize

          408KB

        • memory/5076-1092-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/5076-1093-0x0000000006470000-0x0000000006502000-memory.dmp

          Filesize

          584KB

        • memory/5076-1094-0x0000000006580000-0x0000000006742000-memory.dmp

          Filesize

          1.8MB

        • memory/5076-1095-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/5076-1096-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/5076-1097-0x0000000006750000-0x0000000006C7C000-memory.dmp

          Filesize

          5.2MB

        • memory/5076-1098-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/5076-216-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-1100-0x0000000007290000-0x00000000072E0000-memory.dmp

          Filesize

          320KB

        • memory/5076-220-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-217-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/5076-214-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-212-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-210-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-208-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-206-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-204-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-202-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-200-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-198-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-196-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-194-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-192-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-190-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-188-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-184-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-182-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-180-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-178-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-177-0x0000000005130000-0x000000000516E000-memory.dmp

          Filesize

          248KB

        • memory/5076-176-0x0000000004B80000-0x0000000005124000-memory.dmp

          Filesize

          5.6MB

        • memory/5076-175-0x0000000004B70000-0x0000000004B80000-memory.dmp

          Filesize

          64KB

        • memory/5076-174-0x0000000000750000-0x000000000079B000-memory.dmp

          Filesize

          300KB