Analysis

  • max time kernel
    87s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 13:07

General

  • Target

    013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c.exe

  • Size

    1.1MB

  • MD5

    eff0ef4b378f6f520e598ebe89610943

  • SHA1

    30a80ed6b016191de30a1790dc610a2f6007ae7f

  • SHA256

    013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c

  • SHA512

    b678d37d0999d00f20344446160cab6506fa26f71ab2f9a710ac956102952610dd8e05cc075cb68f7fe2d436badb5545f120024c9be2d44dc66a5f1e417b291a

  • SSDEEP

    24576:9ywq0fDRAE0Wxii7QYZ0d24/RKJfNoRLR/LSPtHGUIEzJcN:Ywq07Rp0WxZQYZ0d3RK9NoRdcZIEzJc

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c.exe
    "C:\Users\Admin\AppData\Local\Temp\013983eaedf3c158d7541cb3d8187c11bc87e1b75a73a0a8dc3743765974804c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plKt92yv62.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plKt92yv62.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plYC22Vz73.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plYC22Vz73.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4292
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plAE38mx91.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plAE38mx91.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4516
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plwR66pL48.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plwR66pL48.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2300
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buAW56zo60.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buAW56zo60.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4584
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caei77xw81.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caei77xw81.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4664
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 1488
                7⤵
                • Program crash
                PID:2440
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dimG39FC77.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dimG39FC77.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3644
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 1080
              6⤵
              • Program crash
              PID:2176
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esmo13Ca91.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esmo13Ca91.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2724
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 1292
            5⤵
            • Program crash
            PID:376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fumF1983Rz60.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fumF1983Rz60.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gruU66fx48.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gruU66fx48.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3756
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4664 -ip 4664
    1⤵
      PID:3400
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3644 -ip 3644
      1⤵
        PID:4204
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2724 -ip 2724
        1⤵
          PID:720

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gruU66fx48.exe

                Filesize

                176KB

                MD5

                473cbb3ac2fa617c8165ed903cd7a996

                SHA1

                b3f62e03b7d6b73c117c63700f30c131505e7e32

                SHA256

                66b3ceff06ef4ef6ed123f6876c15929b89bd67f6690d8eeead1af4ac4048222

                SHA512

                7c5291d086ae0fb83617f3367eb882c4b8b448619e6ea33b38169f035a12c9b8261688043761e4cdee6193303dea50e9513a6afd020f3d1e6ed6499e09b1d2e0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gruU66fx48.exe

                Filesize

                176KB

                MD5

                473cbb3ac2fa617c8165ed903cd7a996

                SHA1

                b3f62e03b7d6b73c117c63700f30c131505e7e32

                SHA256

                66b3ceff06ef4ef6ed123f6876c15929b89bd67f6690d8eeead1af4ac4048222

                SHA512

                7c5291d086ae0fb83617f3367eb882c4b8b448619e6ea33b38169f035a12c9b8261688043761e4cdee6193303dea50e9513a6afd020f3d1e6ed6499e09b1d2e0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plKt92yv62.exe

                Filesize

                996KB

                MD5

                1e11f3ffe15811834d07b7870f48e20e

                SHA1

                b1fd7acc7e7c4064a4f4937b02d1c67de6421d66

                SHA256

                29c1dc58fda040d2df9b496b55f5a77940bea068e264d83c68f7b02a2cea3b5b

                SHA512

                5b0ac9c9b23e73880ef530cc18d36bbdd3b91750b0f49982bd410c447d03f65c48d722a13a6e62bcf45cb6a615c49a859e0b7f52fbe575beb431f08790c136a3

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plKt92yv62.exe

                Filesize

                996KB

                MD5

                1e11f3ffe15811834d07b7870f48e20e

                SHA1

                b1fd7acc7e7c4064a4f4937b02d1c67de6421d66

                SHA256

                29c1dc58fda040d2df9b496b55f5a77940bea068e264d83c68f7b02a2cea3b5b

                SHA512

                5b0ac9c9b23e73880ef530cc18d36bbdd3b91750b0f49982bd410c447d03f65c48d722a13a6e62bcf45cb6a615c49a859e0b7f52fbe575beb431f08790c136a3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fumF1983Rz60.exe

                Filesize

                17KB

                MD5

                198785a007ba2f914535da7d845217fa

                SHA1

                b02c564d155e75ff20ecb7994569d53dd3e263c1

                SHA256

                abeb4b99de97d1bc5a88098293e64a2340401527fa541df1600716130c9a3b61

                SHA512

                7a15b8d2f6962a1103348d337cdd7c6a2d0d1e04038c445fde0a6ba6673b1263f6edf64156d9cb101ede1407749dfc5f71af1d0ca4730e2ae1be3d3997dc258f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fumF1983Rz60.exe

                Filesize

                17KB

                MD5

                198785a007ba2f914535da7d845217fa

                SHA1

                b02c564d155e75ff20ecb7994569d53dd3e263c1

                SHA256

                abeb4b99de97d1bc5a88098293e64a2340401527fa541df1600716130c9a3b61

                SHA512

                7a15b8d2f6962a1103348d337cdd7c6a2d0d1e04038c445fde0a6ba6673b1263f6edf64156d9cb101ede1407749dfc5f71af1d0ca4730e2ae1be3d3997dc258f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plYC22Vz73.exe

                Filesize

                893KB

                MD5

                200d2edae7e3ff62eb2562c3a66c0e4f

                SHA1

                612a9e1dea9080b187526f54437f34d996b0545a

                SHA256

                de8ebb7e2fdd1052a4af1d46bba917cbfbd9316c8412b755e88ea57df7eb08a2

                SHA512

                f95ea00ef1b18600ee5c0caeca0bfc7d919bfcf2b9f94cd6f64526758adfe184013ed819c23bf7325a8bdddaa9221c7b0a4931f79ff715e7a178754bd61fd896

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plYC22Vz73.exe

                Filesize

                893KB

                MD5

                200d2edae7e3ff62eb2562c3a66c0e4f

                SHA1

                612a9e1dea9080b187526f54437f34d996b0545a

                SHA256

                de8ebb7e2fdd1052a4af1d46bba917cbfbd9316c8412b755e88ea57df7eb08a2

                SHA512

                f95ea00ef1b18600ee5c0caeca0bfc7d919bfcf2b9f94cd6f64526758adfe184013ed819c23bf7325a8bdddaa9221c7b0a4931f79ff715e7a178754bd61fd896

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esmo13Ca91.exe

                Filesize

                303KB

                MD5

                12a07204bf4c65efdd968689ed260c4e

                SHA1

                8430e5110448dc962c4191a1a06b05c4e3c1a140

                SHA256

                e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b

                SHA512

                61dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esmo13Ca91.exe

                Filesize

                303KB

                MD5

                12a07204bf4c65efdd968689ed260c4e

                SHA1

                8430e5110448dc962c4191a1a06b05c4e3c1a140

                SHA256

                e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b

                SHA512

                61dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plAE38mx91.exe

                Filesize

                667KB

                MD5

                cfb2846ba2ec0321d62f4819646b5b9f

                SHA1

                305279bf2025f4f0629047f79d57fa32a0598d16

                SHA256

                dc646387ff64dacb6de12e80498927867e2e0210bf945045d05d70ac6f591a06

                SHA512

                8aa768ecc50476f53a16b2b1c06a95b671b05f09980c20696c1e0cdae24ede2091f0e2eb3ab4e7cc98252b69c3ba665c2a7d2f7a890628d4f8d03b4bf750c100

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plAE38mx91.exe

                Filesize

                667KB

                MD5

                cfb2846ba2ec0321d62f4819646b5b9f

                SHA1

                305279bf2025f4f0629047f79d57fa32a0598d16

                SHA256

                dc646387ff64dacb6de12e80498927867e2e0210bf945045d05d70ac6f591a06

                SHA512

                8aa768ecc50476f53a16b2b1c06a95b671b05f09980c20696c1e0cdae24ede2091f0e2eb3ab4e7cc98252b69c3ba665c2a7d2f7a890628d4f8d03b4bf750c100

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dimG39FC77.exe

                Filesize

                245KB

                MD5

                e4b22871ffcbe7c0b619a865c36d9342

                SHA1

                8c312d9c94858b3f905802e8e34d6e8579af737a

                SHA256

                b3e8562d6d74517cb4379b503b1668d92e95b788174da3bf99098207d42dcce5

                SHA512

                fc304f96ac754ac60a0e2133c00b79acc86d974cf938aaed716bf76fd9e153186f07a4ef699daecc289da432f2b50c7b44d329f376d78fc89681cf7a4b81813d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dimG39FC77.exe

                Filesize

                245KB

                MD5

                e4b22871ffcbe7c0b619a865c36d9342

                SHA1

                8c312d9c94858b3f905802e8e34d6e8579af737a

                SHA256

                b3e8562d6d74517cb4379b503b1668d92e95b788174da3bf99098207d42dcce5

                SHA512

                fc304f96ac754ac60a0e2133c00b79acc86d974cf938aaed716bf76fd9e153186f07a4ef699daecc289da432f2b50c7b44d329f376d78fc89681cf7a4b81813d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plwR66pL48.exe

                Filesize

                391KB

                MD5

                da98942f2fc710ed9be15123ade4b3cd

                SHA1

                f739507cace6e400728edfe678fbbbf40108f118

                SHA256

                2413e9bd44d167ac06f0559d052eaa2507295aaa9c62cc160e970971664a1622

                SHA512

                3058933c9d0ce9068049515db0d5539f6b53b68b4e21f288fb453155e91f3263abc6bad61768caf97430bb2b25f108ce6fa8f4270a204e55c87c44cf78269aae

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plwR66pL48.exe

                Filesize

                391KB

                MD5

                da98942f2fc710ed9be15123ade4b3cd

                SHA1

                f739507cace6e400728edfe678fbbbf40108f118

                SHA256

                2413e9bd44d167ac06f0559d052eaa2507295aaa9c62cc160e970971664a1622

                SHA512

                3058933c9d0ce9068049515db0d5539f6b53b68b4e21f288fb453155e91f3263abc6bad61768caf97430bb2b25f108ce6fa8f4270a204e55c87c44cf78269aae

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buAW56zo60.exe

                Filesize

                17KB

                MD5

                96b254d0a578ce397b1c9bd35e536db5

                SHA1

                19743359cf88b27c14a703ee64200f02caeb16ea

                SHA256

                44148407d25590449c9564b91f4479508efdb0c6845e0730e83d864c6317a75d

                SHA512

                7c7a2b5ab58cfd99d0c23b69761c091ecb9a69a04cde6d76efd594347ef4a6901bedc242e95d5d2b444509f36650ead6177df1b1735f6ffd1fd79060c2f6d005

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buAW56zo60.exe

                Filesize

                17KB

                MD5

                96b254d0a578ce397b1c9bd35e536db5

                SHA1

                19743359cf88b27c14a703ee64200f02caeb16ea

                SHA256

                44148407d25590449c9564b91f4479508efdb0c6845e0730e83d864c6317a75d

                SHA512

                7c7a2b5ab58cfd99d0c23b69761c091ecb9a69a04cde6d76efd594347ef4a6901bedc242e95d5d2b444509f36650ead6177df1b1735f6ffd1fd79060c2f6d005

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buAW56zo60.exe

                Filesize

                17KB

                MD5

                96b254d0a578ce397b1c9bd35e536db5

                SHA1

                19743359cf88b27c14a703ee64200f02caeb16ea

                SHA256

                44148407d25590449c9564b91f4479508efdb0c6845e0730e83d864c6317a75d

                SHA512

                7c7a2b5ab58cfd99d0c23b69761c091ecb9a69a04cde6d76efd594347ef4a6901bedc242e95d5d2b444509f36650ead6177df1b1735f6ffd1fd79060c2f6d005

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caei77xw81.exe

                Filesize

                303KB

                MD5

                12a07204bf4c65efdd968689ed260c4e

                SHA1

                8430e5110448dc962c4191a1a06b05c4e3c1a140

                SHA256

                e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b

                SHA512

                61dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caei77xw81.exe

                Filesize

                303KB

                MD5

                12a07204bf4c65efdd968689ed260c4e

                SHA1

                8430e5110448dc962c4191a1a06b05c4e3c1a140

                SHA256

                e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b

                SHA512

                61dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caei77xw81.exe

                Filesize

                303KB

                MD5

                12a07204bf4c65efdd968689ed260c4e

                SHA1

                8430e5110448dc962c4191a1a06b05c4e3c1a140

                SHA256

                e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b

                SHA512

                61dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a

              • memory/2724-1150-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                Filesize

                64KB

              • memory/2724-1149-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                Filesize

                64KB

              • memory/2724-2060-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                Filesize

                64KB

              • memory/2724-2059-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                Filesize

                64KB

              • memory/2724-2057-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                Filesize

                64KB

              • memory/3644-1142-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3644-1135-0x0000000000700000-0x000000000072D000-memory.dmp

                Filesize

                180KB

              • memory/3644-1143-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3644-1141-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3644-1138-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3644-1137-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3644-1136-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

                Filesize

                64KB

              • memory/3756-2071-0x0000000005260000-0x0000000005270000-memory.dmp

                Filesize

                64KB

              • memory/3756-2070-0x0000000000590000-0x00000000005C2000-memory.dmp

                Filesize

                200KB

              • memory/4584-168-0x0000000000110000-0x000000000011A000-memory.dmp

                Filesize

                40KB

              • memory/4664-220-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-1094-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4664-210-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-212-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-214-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-216-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-218-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-206-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-222-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-224-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-226-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-228-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-230-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-232-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-234-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-236-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-238-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-240-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-242-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-1085-0x00000000052D0000-0x00000000058E8000-memory.dmp

                Filesize

                6.1MB

              • memory/4664-1086-0x0000000005970000-0x0000000005A7A000-memory.dmp

                Filesize

                1.0MB

              • memory/4664-1087-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

                Filesize

                72KB

              • memory/4664-1088-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

                Filesize

                240KB

              • memory/4664-1089-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4664-1091-0x0000000005DC0000-0x0000000005E52000-memory.dmp

                Filesize

                584KB

              • memory/4664-1092-0x0000000005E60000-0x0000000005EC6000-memory.dmp

                Filesize

                408KB

              • memory/4664-1093-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4664-208-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-1095-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4664-1096-0x0000000006560000-0x00000000065D6000-memory.dmp

                Filesize

                472KB

              • memory/4664-1097-0x00000000065F0000-0x0000000006640000-memory.dmp

                Filesize

                320KB

              • memory/4664-204-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-202-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-200-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-198-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-196-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-194-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-192-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-190-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-188-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-186-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-184-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-182-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-180-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-179-0x0000000004B30000-0x0000000004B6E000-memory.dmp

                Filesize

                248KB

              • memory/4664-178-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4664-176-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4664-177-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB

              • memory/4664-175-0x00000000021D0000-0x000000000221B000-memory.dmp

                Filesize

                300KB

              • memory/4664-174-0x0000000004BC0000-0x0000000005164000-memory.dmp

                Filesize

                5.6MB

              • memory/4664-1098-0x00000000068B0000-0x0000000006A72000-memory.dmp

                Filesize

                1.8MB

              • memory/4664-1099-0x0000000006A90000-0x0000000006FBC000-memory.dmp

                Filesize

                5.2MB

              • memory/4664-1100-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

                Filesize

                64KB