Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 16:38

General

  • Target

    66e633bf85c899ff12dac7a60cbc7041018f0f166dac184faf16bda06d90123d.exe

  • Size

    1.1MB

  • MD5

    98d04e5d724571997d7c647883241bf5

  • SHA1

    71304d0aa971bbc054ed23f3dcbc30f85774e049

  • SHA256

    66e633bf85c899ff12dac7a60cbc7041018f0f166dac184faf16bda06d90123d

  • SHA512

    ee289d970945d5c14f6329073e59e28c7e72bd8b1012043c085512430b1a406aa4164b6241e892883dee13bc2d7082e058147d82f7d5a51f070a4d69176958fc

  • SSDEEP

    12288:zMrIy90sLcjhYaa4wgoTs94Sx28JoG2esYTSj3yxykOSNdKgUE8QgmGWZk6pngR1:Dy7j+wjsi7bXSPKeZX1Q0vWBsYXwW

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66e633bf85c899ff12dac7a60cbc7041018f0f166dac184faf16bda06d90123d.exe
    "C:\Users\Admin\AppData\Local\Temp\66e633bf85c899ff12dac7a60cbc7041018f0f166dac184faf16bda06d90123d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plcA34ga94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plcA34ga94.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plnw82nh42.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plnw82nh42.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plRd25iw54.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plRd25iw54.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:216
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plTn17gf94.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plTn17gf94.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4420
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXf56vZ73.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXf56vZ73.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:460
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caMZ09Ab56.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caMZ09Ab56.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4592
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 1996
                7⤵
                • Program crash
                PID:4956
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diul02vU31.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diul02vU31.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1920
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 1108
              6⤵
              • Program crash
              PID:4860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esVE64lm27.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esVE64lm27.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4592 -ip 4592
    1⤵
      PID:4656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1920 -ip 1920
      1⤵
        PID:2344

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plcA34ga94.exe

              Filesize

              1.0MB

              MD5

              6b344e4ec506d42498c78c2938ce35b0

              SHA1

              3dc31e8520d22cb8fbda9c0a16ed449b19db13ce

              SHA256

              c4c45ad9c83142af0c0c4f9d662c2f42515f9179ca56c9d09099e2ec38d65e2a

              SHA512

              88be235b6058377a0caebf33e7ca07c16403566361af9a583573d383f9cd8095154dd1258432bb5b1cd87dc78f2a3b1878534b451661f5c8625f3d08ee1fddf5

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plcA34ga94.exe

              Filesize

              1.0MB

              MD5

              6b344e4ec506d42498c78c2938ce35b0

              SHA1

              3dc31e8520d22cb8fbda9c0a16ed449b19db13ce

              SHA256

              c4c45ad9c83142af0c0c4f9d662c2f42515f9179ca56c9d09099e2ec38d65e2a

              SHA512

              88be235b6058377a0caebf33e7ca07c16403566361af9a583573d383f9cd8095154dd1258432bb5b1cd87dc78f2a3b1878534b451661f5c8625f3d08ee1fddf5

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plnw82nh42.exe

              Filesize

              934KB

              MD5

              b2cbd957da77a85473e904ae7149098b

              SHA1

              7cf759ce5cd56259e0f271575946085eb43fa275

              SHA256

              2b91203cb74e3f779dd4b4855518625f6935bfb8332138ff3638d3ad5baa6e94

              SHA512

              ee55cd32564f580baf92d37d54a31259d6970f0cd07cf0aa29a9375c8145f3f14a8d8e64e997a2f3dcaf56027e3c8a33ba32151b63b4939c0a03b978d621e5bf

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plnw82nh42.exe

              Filesize

              934KB

              MD5

              b2cbd957da77a85473e904ae7149098b

              SHA1

              7cf759ce5cd56259e0f271575946085eb43fa275

              SHA256

              2b91203cb74e3f779dd4b4855518625f6935bfb8332138ff3638d3ad5baa6e94

              SHA512

              ee55cd32564f580baf92d37d54a31259d6970f0cd07cf0aa29a9375c8145f3f14a8d8e64e997a2f3dcaf56027e3c8a33ba32151b63b4939c0a03b978d621e5bf

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esVE64lm27.exe

              Filesize

              302KB

              MD5

              b0b07df44fd27fecf8a8ed8735a76c78

              SHA1

              33e2470f3dea8a97ecff3109daed706e174201b4

              SHA256

              c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374

              SHA512

              3e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esVE64lm27.exe

              Filesize

              302KB

              MD5

              b0b07df44fd27fecf8a8ed8735a76c78

              SHA1

              33e2470f3dea8a97ecff3109daed706e174201b4

              SHA256

              c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374

              SHA512

              3e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plRd25iw54.exe

              Filesize

              666KB

              MD5

              af00057ef00f5e50b99efe04d74b5118

              SHA1

              2d245aa182a54461ac980a4554bbe2f7061f0e5b

              SHA256

              3d5e6684f959f9abf3e82252aba41b8e832cfe974ee8c4f26d5ebaf4395d8b48

              SHA512

              7ce4316c3708410ee54f260b236da81505eb8a5492d3822fc3f3633dab4363718d898ab502c88edcaa63e13fcefe2505c75f86fe4e15858a1c227715136fbe3d

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plRd25iw54.exe

              Filesize

              666KB

              MD5

              af00057ef00f5e50b99efe04d74b5118

              SHA1

              2d245aa182a54461ac980a4554bbe2f7061f0e5b

              SHA256

              3d5e6684f959f9abf3e82252aba41b8e832cfe974ee8c4f26d5ebaf4395d8b48

              SHA512

              7ce4316c3708410ee54f260b236da81505eb8a5492d3822fc3f3633dab4363718d898ab502c88edcaa63e13fcefe2505c75f86fe4e15858a1c227715136fbe3d

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diul02vU31.exe

              Filesize

              245KB

              MD5

              a431bc74fcefa003b9f56052f7503547

              SHA1

              8ff582845291cf5b122b87707a74e5e904004d6f

              SHA256

              4a0a577563dd54d2ffd2fa8b37ebcc1b6eca5d4a63f070daf6d52a57f786fd21

              SHA512

              6612daf3836bce59a92d9a155480fbc1d4949cd5a5148c4dbba773253cea8306f62e1a5678247a6182192667579fd9ee7f7c1e51526a019416ab7ea51791d350

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diul02vU31.exe

              Filesize

              245KB

              MD5

              a431bc74fcefa003b9f56052f7503547

              SHA1

              8ff582845291cf5b122b87707a74e5e904004d6f

              SHA256

              4a0a577563dd54d2ffd2fa8b37ebcc1b6eca5d4a63f070daf6d52a57f786fd21

              SHA512

              6612daf3836bce59a92d9a155480fbc1d4949cd5a5148c4dbba773253cea8306f62e1a5678247a6182192667579fd9ee7f7c1e51526a019416ab7ea51791d350

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plTn17gf94.exe

              Filesize

              391KB

              MD5

              27c44636aa62a6355ec38754129b5d02

              SHA1

              e47b3006e7e1d3b66045ce868cbd7c7cda3ab669

              SHA256

              5ace2ff0f61a3cf092673a9d1b35c89eadf4ad5ba06642a994522f22eded01df

              SHA512

              0fc3c712d246c9cd2d5540f81eddf3562c2aaa8fae78bd301c83e91a1a1fc248925ea8c78d23abd50b8d2449834d7f2063e841bdc6f4ea2df9fada1da8f6e17d

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plTn17gf94.exe

              Filesize

              391KB

              MD5

              27c44636aa62a6355ec38754129b5d02

              SHA1

              e47b3006e7e1d3b66045ce868cbd7c7cda3ab669

              SHA256

              5ace2ff0f61a3cf092673a9d1b35c89eadf4ad5ba06642a994522f22eded01df

              SHA512

              0fc3c712d246c9cd2d5540f81eddf3562c2aaa8fae78bd301c83e91a1a1fc248925ea8c78d23abd50b8d2449834d7f2063e841bdc6f4ea2df9fada1da8f6e17d

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXf56vZ73.exe

              Filesize

              17KB

              MD5

              7e99a458101e5fe900811e0c2a37e0cc

              SHA1

              5cec449ab8ef65373602b5b298fdc2ca4570d961

              SHA256

              ec93e6ab9f5ebb52d3d45940905bdbd49a2e57987d8978d430929e7c6821dc1f

              SHA512

              703625409cb92a11b7f012091beafc8ee2b6b5f3da7bec0b4fd25c6bc9e5c9ff2d492c151ce411f72606fe8cc04282b9c8b9924f10346a9057b1a4094041751c

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXf56vZ73.exe

              Filesize

              17KB

              MD5

              7e99a458101e5fe900811e0c2a37e0cc

              SHA1

              5cec449ab8ef65373602b5b298fdc2ca4570d961

              SHA256

              ec93e6ab9f5ebb52d3d45940905bdbd49a2e57987d8978d430929e7c6821dc1f

              SHA512

              703625409cb92a11b7f012091beafc8ee2b6b5f3da7bec0b4fd25c6bc9e5c9ff2d492c151ce411f72606fe8cc04282b9c8b9924f10346a9057b1a4094041751c

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buXf56vZ73.exe

              Filesize

              17KB

              MD5

              7e99a458101e5fe900811e0c2a37e0cc

              SHA1

              5cec449ab8ef65373602b5b298fdc2ca4570d961

              SHA256

              ec93e6ab9f5ebb52d3d45940905bdbd49a2e57987d8978d430929e7c6821dc1f

              SHA512

              703625409cb92a11b7f012091beafc8ee2b6b5f3da7bec0b4fd25c6bc9e5c9ff2d492c151ce411f72606fe8cc04282b9c8b9924f10346a9057b1a4094041751c

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caMZ09Ab56.exe

              Filesize

              302KB

              MD5

              b0b07df44fd27fecf8a8ed8735a76c78

              SHA1

              33e2470f3dea8a97ecff3109daed706e174201b4

              SHA256

              c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374

              SHA512

              3e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caMZ09Ab56.exe

              Filesize

              302KB

              MD5

              b0b07df44fd27fecf8a8ed8735a76c78

              SHA1

              33e2470f3dea8a97ecff3109daed706e174201b4

              SHA256

              c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374

              SHA512

              3e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caMZ09Ab56.exe

              Filesize

              302KB

              MD5

              b0b07df44fd27fecf8a8ed8735a76c78

              SHA1

              33e2470f3dea8a97ecff3109daed706e174201b4

              SHA256

              c1628dae076220ce412d7342a5880f545b9ecec4fc819e1ee50d16b483b8e374

              SHA512

              3e251045447c14c3aa8948ef5a625fd29a87f4ca05330a390e5830fa3cc399d28caa5c03c481b7e97b1d41ef3717872e45bad6609ae3f17ed45fd7be950fd2a7

            • memory/224-2060-0x0000000002380000-0x0000000002390000-memory.dmp

              Filesize

              64KB

            • memory/224-2057-0x0000000002380000-0x0000000002390000-memory.dmp

              Filesize

              64KB

            • memory/224-2055-0x0000000002380000-0x0000000002390000-memory.dmp

              Filesize

              64KB

            • memory/224-1282-0x0000000002380000-0x0000000002390000-memory.dmp

              Filesize

              64KB

            • memory/224-1280-0x0000000002380000-0x0000000002390000-memory.dmp

              Filesize

              64KB

            • memory/224-1278-0x0000000002380000-0x0000000002390000-memory.dmp

              Filesize

              64KB

            • memory/224-2058-0x0000000002380000-0x0000000002390000-memory.dmp

              Filesize

              64KB

            • memory/460-168-0x0000000000E60000-0x0000000000E6A000-memory.dmp

              Filesize

              40KB

            • memory/1920-1140-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

              Filesize

              64KB

            • memory/1920-1139-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

              Filesize

              64KB

            • memory/1920-1108-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

              Filesize

              64KB

            • memory/1920-1106-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

              Filesize

              64KB

            • memory/1920-1107-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

              Filesize

              64KB

            • memory/1920-1105-0x0000000000710000-0x000000000073D000-memory.dmp

              Filesize

              180KB

            • memory/4592-211-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-1087-0x00000000059A0000-0x00000000059DC000-memory.dmp

              Filesize

              240KB

            • memory/4592-203-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-205-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-209-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-215-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-217-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-213-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-199-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-207-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-219-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-221-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-223-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-225-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-227-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-229-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-231-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-235-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-233-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-241-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-239-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-237-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-1084-0x0000000005360000-0x0000000005978000-memory.dmp

              Filesize

              6.1MB

            • memory/4592-1085-0x0000000004C50000-0x0000000004D5A000-memory.dmp

              Filesize

              1.0MB

            • memory/4592-1086-0x0000000005980000-0x0000000005992000-memory.dmp

              Filesize

              72KB

            • memory/4592-201-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-1088-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4592-1090-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4592-1091-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4592-1092-0x0000000005C80000-0x0000000005D12000-memory.dmp

              Filesize

              584KB

            • memory/4592-1093-0x0000000005D20000-0x0000000005D86000-memory.dmp

              Filesize

              408KB

            • memory/4592-1094-0x0000000006410000-0x0000000006486000-memory.dmp

              Filesize

              472KB

            • memory/4592-1095-0x00000000064B0000-0x0000000006500000-memory.dmp

              Filesize

              320KB

            • memory/4592-1096-0x00000000069A0000-0x0000000006B62000-memory.dmp

              Filesize

              1.8MB

            • memory/4592-197-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-195-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-193-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-191-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-189-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-187-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-185-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-183-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-181-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-179-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-178-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/4592-177-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4592-176-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4592-175-0x00000000006F0000-0x000000000073B000-memory.dmp

              Filesize

              300KB

            • memory/4592-174-0x0000000004DB0000-0x0000000005354000-memory.dmp

              Filesize

              5.6MB

            • memory/4592-1097-0x0000000006B70000-0x000000000709C000-memory.dmp

              Filesize

              5.2MB

            • memory/4592-1098-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB