Analysis

  • max time kernel
    130s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-03-2023 10:24

General

  • Target

    86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936.exe

  • Size

    1.2MB

  • MD5

    e3cc26daaa71d3815fcf00b364daf2eb

  • SHA1

    f7e9025a0eb119cd583e7cf03dad0e02f6432d96

  • SHA256

    86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936

  • SHA512

    fcb45ae85aef1fb83a50f92e9977080d48c7f70187a18272608d91c7462d42bb600a07836c2bf4cdc15e17f3239684f5f336d14013a1091bebfac6b4c76a7205

  • SSDEEP

    24576:GyfAIGD8AMMOx/HQR42eMpZty49nXXj8U//zm1Kr/rJ1D:VfV88lRwre6ZAmXXj8DKr/rJ

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936.exe
    "C:\Users\Admin\AppData\Local\Temp\86ad8148925434e611740dce6d5eeb58c8fcabbb79f0406a92326fe8f61b5936.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plJY31zi09.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plJY31zi09.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4416
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plLQ33Cz09.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plLQ33Cz09.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plav03fY83.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plav03fY83.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plut93Me05.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plut93Me05.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1332
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bukR32dU99.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bukR32dU99.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4048
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadS94ZT57.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadS94ZT57.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1976
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 1336
                7⤵
                • Program crash
                PID:4352
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diVP62ey16.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diVP62ey16.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5016
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1080
              6⤵
              • Program crash
              PID:3852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\escS03WX08.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\escS03WX08.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4376
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1336
            5⤵
            • Program crash
            PID:3328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuBQ5553rR86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuBQ5553rR86.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3172
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grTy95HT19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grTy95HT19.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:460
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1976 -ip 1976
    1⤵
      PID:2856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5016 -ip 5016
      1⤵
        PID:4424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4376 -ip 4376
        1⤵
          PID:4916
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe start wuauserv
          1⤵
          • Launches sc.exe
          PID:4928

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grTy95HT19.exe

          Filesize

          176KB

          MD5

          152bc6817f6af08fafeefeff53fad7b4

          SHA1

          42e17dca2b392dbb2a207f8322a7689ddcbb6838

          SHA256

          c6bd802a3182a006efbb9cb1f074bcb0de7231e1c1c97da80008ff98ca653212

          SHA512

          20588de056c4286b53c1b2b21cd7efb6281096e6043e55bfc9d5fcd5830879e037b8c002497f102290eb312d05481764227677c9582abe4318500795557259de

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grTy95HT19.exe

          Filesize

          176KB

          MD5

          152bc6817f6af08fafeefeff53fad7b4

          SHA1

          42e17dca2b392dbb2a207f8322a7689ddcbb6838

          SHA256

          c6bd802a3182a006efbb9cb1f074bcb0de7231e1c1c97da80008ff98ca653212

          SHA512

          20588de056c4286b53c1b2b21cd7efb6281096e6043e55bfc9d5fcd5830879e037b8c002497f102290eb312d05481764227677c9582abe4318500795557259de

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plJY31zi09.exe

          Filesize

          1.0MB

          MD5

          e059e9b3f396aa9a533f9a3ba4c2ba8f

          SHA1

          b65153ba8c119de0e6455b160ce575e22513bd05

          SHA256

          7f05dfcf4a11e2f9590b8b72c84f9d90be3da881f19a2543d81bd4268a6b8d0e

          SHA512

          b27c77e123e24fc109e8421eea739b3065d6aa83011a38f469b580af42eed9498f946e2431ef6391061e565c5224471f9c4ccad05fb5f8ee54a7911aed00f2b4

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plJY31zi09.exe

          Filesize

          1.0MB

          MD5

          e059e9b3f396aa9a533f9a3ba4c2ba8f

          SHA1

          b65153ba8c119de0e6455b160ce575e22513bd05

          SHA256

          7f05dfcf4a11e2f9590b8b72c84f9d90be3da881f19a2543d81bd4268a6b8d0e

          SHA512

          b27c77e123e24fc109e8421eea739b3065d6aa83011a38f469b580af42eed9498f946e2431ef6391061e565c5224471f9c4ccad05fb5f8ee54a7911aed00f2b4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuBQ5553rR86.exe

          Filesize

          16KB

          MD5

          4b873a9111bec307b0ef00f9471a4f54

          SHA1

          e047a3cd787cabd2bf71beea235ff462819ffb36

          SHA256

          a44b7aca88352945c2a5b170e7bb9fb08d44368362a5070ac6b082b5500ab017

          SHA512

          d7e405f71175817819b77ecfb32dbece22fec65b6ee1bbcadcfcd361fc8fdcfd79964ed55ba4a8730b18de936afb72c3c1b6cfb8dc9eb2f06ca79b20c936f194

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuBQ5553rR86.exe

          Filesize

          16KB

          MD5

          4b873a9111bec307b0ef00f9471a4f54

          SHA1

          e047a3cd787cabd2bf71beea235ff462819ffb36

          SHA256

          a44b7aca88352945c2a5b170e7bb9fb08d44368362a5070ac6b082b5500ab017

          SHA512

          d7e405f71175817819b77ecfb32dbece22fec65b6ee1bbcadcfcd361fc8fdcfd79964ed55ba4a8730b18de936afb72c3c1b6cfb8dc9eb2f06ca79b20c936f194

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plLQ33Cz09.exe

          Filesize

          934KB

          MD5

          6bafe3604883c50702638bff1a0d056b

          SHA1

          e6d31b8fc608068f5f13d4b229ebeef0df335989

          SHA256

          0f519d7548b62c637d67d848b48f37a7e0e31a770a596c46a2f0c4659764be87

          SHA512

          587ebaaba2e97ddb9802af8c72ea44babc19b344a8455ec9b9308c1793769781f09e4fb657649172496096982703cd37e059dcc303862fce6e5bed86bfce828e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plLQ33Cz09.exe

          Filesize

          934KB

          MD5

          6bafe3604883c50702638bff1a0d056b

          SHA1

          e6d31b8fc608068f5f13d4b229ebeef0df335989

          SHA256

          0f519d7548b62c637d67d848b48f37a7e0e31a770a596c46a2f0c4659764be87

          SHA512

          587ebaaba2e97ddb9802af8c72ea44babc19b344a8455ec9b9308c1793769781f09e4fb657649172496096982703cd37e059dcc303862fce6e5bed86bfce828e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\escS03WX08.exe

          Filesize

          301KB

          MD5

          87dd5e3740a284128ebde181e52ad25d

          SHA1

          b5766ebf651999b8c4be3a4ed44c9b828cd38912

          SHA256

          9550bd7e6baa67c488e005edc23aa29bcfa3dbe8dd643ad7165d5c90394ac6e5

          SHA512

          1e1b338d5b83fedde610798299cb0b8a8e1e7d1c76e8fd7ded02dcbc2a68b40f5ad0641d95661f5d7c9600b0ac0510ac343b72a3f09fc2c2c96f0b98cbf6fe67

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\escS03WX08.exe

          Filesize

          301KB

          MD5

          87dd5e3740a284128ebde181e52ad25d

          SHA1

          b5766ebf651999b8c4be3a4ed44c9b828cd38912

          SHA256

          9550bd7e6baa67c488e005edc23aa29bcfa3dbe8dd643ad7165d5c90394ac6e5

          SHA512

          1e1b338d5b83fedde610798299cb0b8a8e1e7d1c76e8fd7ded02dcbc2a68b40f5ad0641d95661f5d7c9600b0ac0510ac343b72a3f09fc2c2c96f0b98cbf6fe67

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plav03fY83.exe

          Filesize

          665KB

          MD5

          9c815b0804b0ac0b40f945dc0feb5105

          SHA1

          0b086a28dea88e580c7bb24cc9be32d63f2cf351

          SHA256

          ef6f2976ad109372d9511cdcc04df8e48ef9835d875a42de761056b6fc9369cb

          SHA512

          46e2f79f5dc743af643d8cbd4448510de3bc2db49a5e2344eec06f7192c8723d50aa18e50bfa2cdf5e44821d92f62644dd85327321d3eb0f12abef9b73b11ec5

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plav03fY83.exe

          Filesize

          665KB

          MD5

          9c815b0804b0ac0b40f945dc0feb5105

          SHA1

          0b086a28dea88e580c7bb24cc9be32d63f2cf351

          SHA256

          ef6f2976ad109372d9511cdcc04df8e48ef9835d875a42de761056b6fc9369cb

          SHA512

          46e2f79f5dc743af643d8cbd4448510de3bc2db49a5e2344eec06f7192c8723d50aa18e50bfa2cdf5e44821d92f62644dd85327321d3eb0f12abef9b73b11ec5

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diVP62ey16.exe

          Filesize

          243KB

          MD5

          068c6e93523e500dc3d687317572cf3c

          SHA1

          58612d3a6c5528c8e901108dd15625c08c7991f6

          SHA256

          243536284047d671c497feebc41ffab5b1d2989d10d83de822cab17162189060

          SHA512

          b00cdf9ab42c6d0bbeca67332c0f6013857aa054a39dc6c4c972c7eab5f87dc7507df9794ddf08c818d13126e41e3ea481fd61f3f4f14c743748304cbdf37668

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diVP62ey16.exe

          Filesize

          243KB

          MD5

          068c6e93523e500dc3d687317572cf3c

          SHA1

          58612d3a6c5528c8e901108dd15625c08c7991f6

          SHA256

          243536284047d671c497feebc41ffab5b1d2989d10d83de822cab17162189060

          SHA512

          b00cdf9ab42c6d0bbeca67332c0f6013857aa054a39dc6c4c972c7eab5f87dc7507df9794ddf08c818d13126e41e3ea481fd61f3f4f14c743748304cbdf37668

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plut93Me05.exe

          Filesize

          391KB

          MD5

          133af064d9713dd254d36dcb54788515

          SHA1

          700829b3c6665afea5a82e77a77a2670adaf19c2

          SHA256

          4ceaeca3b9a6e2020235d04fd8f44e4800d2d39a7eec1eae749bbbb7b7d4bc4c

          SHA512

          ecfa239c56051bc2be0e5b4bd9a3f377b4253047bffd7cc559aa16308bb9f3730e65828f07477ad8f7981aa7991c9557af61eab949f608e379c801df23568859

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plut93Me05.exe

          Filesize

          391KB

          MD5

          133af064d9713dd254d36dcb54788515

          SHA1

          700829b3c6665afea5a82e77a77a2670adaf19c2

          SHA256

          4ceaeca3b9a6e2020235d04fd8f44e4800d2d39a7eec1eae749bbbb7b7d4bc4c

          SHA512

          ecfa239c56051bc2be0e5b4bd9a3f377b4253047bffd7cc559aa16308bb9f3730e65828f07477ad8f7981aa7991c9557af61eab949f608e379c801df23568859

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bukR32dU99.exe

          Filesize

          16KB

          MD5

          924732f4be3903bfca15675a898d8f71

          SHA1

          297d19827c019c63b8bff51bb915f08f446e779d

          SHA256

          0adffc6029a77af563c5df899505589c01c11a78c5c4ac82fdc015c7864ba824

          SHA512

          20780600913778278914add6ccd7d7ff5544af78cd4938ce6e54f8e7a2976d1a66bc29333c3a7d7fc5223313b26d64a22dd62acc024c74cb34f22e855588e094

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bukR32dU99.exe

          Filesize

          16KB

          MD5

          924732f4be3903bfca15675a898d8f71

          SHA1

          297d19827c019c63b8bff51bb915f08f446e779d

          SHA256

          0adffc6029a77af563c5df899505589c01c11a78c5c4ac82fdc015c7864ba824

          SHA512

          20780600913778278914add6ccd7d7ff5544af78cd4938ce6e54f8e7a2976d1a66bc29333c3a7d7fc5223313b26d64a22dd62acc024c74cb34f22e855588e094

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bukR32dU99.exe

          Filesize

          16KB

          MD5

          924732f4be3903bfca15675a898d8f71

          SHA1

          297d19827c019c63b8bff51bb915f08f446e779d

          SHA256

          0adffc6029a77af563c5df899505589c01c11a78c5c4ac82fdc015c7864ba824

          SHA512

          20780600913778278914add6ccd7d7ff5544af78cd4938ce6e54f8e7a2976d1a66bc29333c3a7d7fc5223313b26d64a22dd62acc024c74cb34f22e855588e094

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadS94ZT57.exe

          Filesize

          301KB

          MD5

          87dd5e3740a284128ebde181e52ad25d

          SHA1

          b5766ebf651999b8c4be3a4ed44c9b828cd38912

          SHA256

          9550bd7e6baa67c488e005edc23aa29bcfa3dbe8dd643ad7165d5c90394ac6e5

          SHA512

          1e1b338d5b83fedde610798299cb0b8a8e1e7d1c76e8fd7ded02dcbc2a68b40f5ad0641d95661f5d7c9600b0ac0510ac343b72a3f09fc2c2c96f0b98cbf6fe67

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadS94ZT57.exe

          Filesize

          301KB

          MD5

          87dd5e3740a284128ebde181e52ad25d

          SHA1

          b5766ebf651999b8c4be3a4ed44c9b828cd38912

          SHA256

          9550bd7e6baa67c488e005edc23aa29bcfa3dbe8dd643ad7165d5c90394ac6e5

          SHA512

          1e1b338d5b83fedde610798299cb0b8a8e1e7d1c76e8fd7ded02dcbc2a68b40f5ad0641d95661f5d7c9600b0ac0510ac343b72a3f09fc2c2c96f0b98cbf6fe67

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cadS94ZT57.exe

          Filesize

          301KB

          MD5

          87dd5e3740a284128ebde181e52ad25d

          SHA1

          b5766ebf651999b8c4be3a4ed44c9b828cd38912

          SHA256

          9550bd7e6baa67c488e005edc23aa29bcfa3dbe8dd643ad7165d5c90394ac6e5

          SHA512

          1e1b338d5b83fedde610798299cb0b8a8e1e7d1c76e8fd7ded02dcbc2a68b40f5ad0641d95661f5d7c9600b0ac0510ac343b72a3f09fc2c2c96f0b98cbf6fe67

        • memory/460-2067-0x0000000000F40000-0x0000000000F72000-memory.dmp

          Filesize

          200KB

        • memory/460-2068-0x00000000058A0000-0x00000000058B0000-memory.dmp

          Filesize

          64KB

        • memory/1976-224-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-1088-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

          Filesize

          240KB

        • memory/1976-198-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/1976-196-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/1976-200-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/1976-199-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-195-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-202-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-204-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-206-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-208-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-210-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-212-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-214-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-216-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-218-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-220-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-222-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-191-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-226-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-228-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-230-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-232-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-234-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-236-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-238-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-240-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-242-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-1085-0x00000000052D0000-0x00000000058E8000-memory.dmp

          Filesize

          6.1MB

        • memory/1976-1086-0x0000000005970000-0x0000000005A7A000-memory.dmp

          Filesize

          1.0MB

        • memory/1976-1087-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

          Filesize

          72KB

        • memory/1976-193-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-1089-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/1976-1091-0x0000000005DC0000-0x0000000005E52000-memory.dmp

          Filesize

          584KB

        • memory/1976-1092-0x0000000005E60000-0x0000000005EC6000-memory.dmp

          Filesize

          408KB

        • memory/1976-1093-0x0000000006560000-0x00000000065D6000-memory.dmp

          Filesize

          472KB

        • memory/1976-1094-0x00000000065F0000-0x0000000006640000-memory.dmp

          Filesize

          320KB

        • memory/1976-1095-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/1976-1096-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/1976-1097-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/1976-1098-0x00000000067A0000-0x0000000006962000-memory.dmp

          Filesize

          1.8MB

        • memory/1976-1099-0x0000000006980000-0x0000000006EAC000-memory.dmp

          Filesize

          5.2MB

        • memory/1976-1100-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/1976-189-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-187-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-174-0x00000000006E0000-0x000000000072B000-memory.dmp

          Filesize

          300KB

        • memory/1976-175-0x0000000004CA0000-0x0000000005244000-memory.dmp

          Filesize

          5.6MB

        • memory/1976-176-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-179-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-181-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-177-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-183-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/1976-185-0x0000000005250000-0x000000000528E000-memory.dmp

          Filesize

          248KB

        • memory/4048-168-0x00000000004D0000-0x00000000004DA000-memory.dmp

          Filesize

          40KB

        • memory/4376-1671-0x0000000004E00000-0x0000000004E10000-memory.dmp

          Filesize

          64KB

        • memory/4376-1669-0x0000000004E00000-0x0000000004E10000-memory.dmp

          Filesize

          64KB

        • memory/4376-2056-0x0000000004E00000-0x0000000004E10000-memory.dmp

          Filesize

          64KB

        • memory/5016-1142-0x0000000004D90000-0x0000000004DA0000-memory.dmp

          Filesize

          64KB

        • memory/5016-1141-0x0000000004D90000-0x0000000004DA0000-memory.dmp

          Filesize

          64KB

        • memory/5016-1140-0x0000000004D90000-0x0000000004DA0000-memory.dmp

          Filesize

          64KB

        • memory/5016-1137-0x0000000004D90000-0x0000000004DA0000-memory.dmp

          Filesize

          64KB

        • memory/5016-1136-0x0000000004D90000-0x0000000004DA0000-memory.dmp

          Filesize

          64KB

        • memory/5016-1135-0x00000000021B0000-0x00000000021DD000-memory.dmp

          Filesize

          180KB