Analysis

  • max time kernel
    70s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/03/2023, 15:58

General

  • Target

    f6edb65fdb96f8931dbd6f2521327a9cf4ddcdd2c6e15a2f47752bfe72e477db.exe

  • Size

    1.1MB

  • MD5

    f2752bfc091a5866fc53dc01a4335d50

  • SHA1

    58738f7e591a02eb696e6db5471ee4e08e6e6ec7

  • SHA256

    f6edb65fdb96f8931dbd6f2521327a9cf4ddcdd2c6e15a2f47752bfe72e477db

  • SHA512

    70ae96af3ded168264f52d1ca4e6183f9128b551e69d2e17462c9c1c0bd56a7d4d0b1ed3fd9a764450c94b3de37e7af9163f43f99d734cb6efbe95ad93bc88ae

  • SSDEEP

    24576:yy50ornC8AZBl7QQupGEmiPY+Bkt6sIO/zCXXwLDq4S9QCgS7:ZdrCrZ0GYPtiIO+L4Se

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 15 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6edb65fdb96f8931dbd6f2521327a9cf4ddcdd2c6e15a2f47752bfe72e477db.exe
    "C:\Users\Admin\AppData\Local\Temp\f6edb65fdb96f8931dbd6f2521327a9cf4ddcdd2c6e15a2f47752bfe72e477db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plSd57Kb39.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plSd57Kb39.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plyR21Qt36.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plyR21Qt36.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plYx66Oz43.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plYx66Oz43.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3924
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pluH35lN30.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pluH35lN30.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2492
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buVN43LK87.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buVN43LK87.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4824
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cabw04aN84.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cabw04aN84.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4880
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dilF52wY62.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dilF52wY62.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1336
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esIB75JK61.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esIB75JK61.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuYW5915AA19.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuYW5915AA19.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\graG75vC87.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\graG75vC87.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:524

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\graG75vC87.exe

          Filesize

          176KB

          MD5

          4d409cb40238001f7cfb98abd0c22d68

          SHA1

          3517f328e9a704119ed5d0de12eeb3ee6bddfeb3

          SHA256

          adfaa6eb96bd8983d4dc71cc391d019e03c4f9b598efe12efd7bdd846dd0b08b

          SHA512

          13b1840fbd64665eb8c26902a0cc4aca1b450c52f3dceacef36700cc012e3d465c1c74d81dbe6f1cc4046a7965ab1b0aa1b5c29a31c610d0fdee802fe92407cb

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\graG75vC87.exe

          Filesize

          176KB

          MD5

          4d409cb40238001f7cfb98abd0c22d68

          SHA1

          3517f328e9a704119ed5d0de12eeb3ee6bddfeb3

          SHA256

          adfaa6eb96bd8983d4dc71cc391d019e03c4f9b598efe12efd7bdd846dd0b08b

          SHA512

          13b1840fbd64665eb8c26902a0cc4aca1b450c52f3dceacef36700cc012e3d465c1c74d81dbe6f1cc4046a7965ab1b0aa1b5c29a31c610d0fdee802fe92407cb

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plSd57Kb39.exe

          Filesize

          997KB

          MD5

          4dfb54022d0624136d78bcbb7237c1c4

          SHA1

          5cd82c96ddd01a673073fcdb117d2a4e38acdbe3

          SHA256

          6f5409d9144e1e13641e103823234e97b132a6e2481a96ea91124c657c231dd8

          SHA512

          32b088083a84d08303fd15e2c4541b7075fdf1fbc738b8b3e3db5520ba9e9cd3ea04a72e167edd002b290c0099cd1eee33793bb020e842aacf0a8e4c77910565

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plSd57Kb39.exe

          Filesize

          997KB

          MD5

          4dfb54022d0624136d78bcbb7237c1c4

          SHA1

          5cd82c96ddd01a673073fcdb117d2a4e38acdbe3

          SHA256

          6f5409d9144e1e13641e103823234e97b132a6e2481a96ea91124c657c231dd8

          SHA512

          32b088083a84d08303fd15e2c4541b7075fdf1fbc738b8b3e3db5520ba9e9cd3ea04a72e167edd002b290c0099cd1eee33793bb020e842aacf0a8e4c77910565

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuYW5915AA19.exe

          Filesize

          17KB

          MD5

          89b4d06f88d0cfd798c2f154300e66ff

          SHA1

          3d3a979d3b227374be460fa1d5ef9da464bdf43e

          SHA256

          8db328bc45c2dd7ea1eb7dc0e77325a85806c72a3852594c7935ada66deb29cc

          SHA512

          660ac885714923c73bf9299c7c1418913158dc6987a7607968b92f4e0db96a9051e4c1e0d9ea47b79c62f54e8915d37e2b92f4a2b1f128deb11d0e19ab2ddce0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuYW5915AA19.exe

          Filesize

          17KB

          MD5

          89b4d06f88d0cfd798c2f154300e66ff

          SHA1

          3d3a979d3b227374be460fa1d5ef9da464bdf43e

          SHA256

          8db328bc45c2dd7ea1eb7dc0e77325a85806c72a3852594c7935ada66deb29cc

          SHA512

          660ac885714923c73bf9299c7c1418913158dc6987a7607968b92f4e0db96a9051e4c1e0d9ea47b79c62f54e8915d37e2b92f4a2b1f128deb11d0e19ab2ddce0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plyR21Qt36.exe

          Filesize

          893KB

          MD5

          7cc8c6b1b85b20a68f2711718f0cc942

          SHA1

          5e4b61cfbc627c576da000f5a9f3b1ea47a76ae5

          SHA256

          4344e8f51f19e203abe4125bde7fa32803219a017ba405e39e1ec4e5f01e3b0e

          SHA512

          a482f35407173b4f4d6a271ab66728e5e1e216f995ea9dbacd6b39281e9178300e20a3b64e7301fdc17b4c994fb6cfffeac4b43c7e7244f066946038fb57727b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plyR21Qt36.exe

          Filesize

          893KB

          MD5

          7cc8c6b1b85b20a68f2711718f0cc942

          SHA1

          5e4b61cfbc627c576da000f5a9f3b1ea47a76ae5

          SHA256

          4344e8f51f19e203abe4125bde7fa32803219a017ba405e39e1ec4e5f01e3b0e

          SHA512

          a482f35407173b4f4d6a271ab66728e5e1e216f995ea9dbacd6b39281e9178300e20a3b64e7301fdc17b4c994fb6cfffeac4b43c7e7244f066946038fb57727b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esIB75JK61.exe

          Filesize

          304KB

          MD5

          bc94778948460579a0739b42d8018118

          SHA1

          f960e87471a354673dc63408a7cfd07052a18561

          SHA256

          164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b

          SHA512

          ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esIB75JK61.exe

          Filesize

          304KB

          MD5

          bc94778948460579a0739b42d8018118

          SHA1

          f960e87471a354673dc63408a7cfd07052a18561

          SHA256

          164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b

          SHA512

          ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plYx66Oz43.exe

          Filesize

          667KB

          MD5

          5aea5794f69630e562c8f11b83985e2f

          SHA1

          3ff5ec44c633f0c2231abf3300c310ade844d6a0

          SHA256

          669f19e1a0abe9f6e29c3a3c337ab70bd8b3a1644eeafdc9c0b7240a5145023a

          SHA512

          2431c342d5d13e64a1a0d4dc82679aed1935171d246ec2721e63525b94259bc7a34acb001b3c1056a7d7276b3e4712b43ac8b5ac9ae7a32590e4e3f57c466cff

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plYx66Oz43.exe

          Filesize

          667KB

          MD5

          5aea5794f69630e562c8f11b83985e2f

          SHA1

          3ff5ec44c633f0c2231abf3300c310ade844d6a0

          SHA256

          669f19e1a0abe9f6e29c3a3c337ab70bd8b3a1644eeafdc9c0b7240a5145023a

          SHA512

          2431c342d5d13e64a1a0d4dc82679aed1935171d246ec2721e63525b94259bc7a34acb001b3c1056a7d7276b3e4712b43ac8b5ac9ae7a32590e4e3f57c466cff

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dilF52wY62.exe

          Filesize

          246KB

          MD5

          1b00aa290c5f57aca9420b25512997ac

          SHA1

          755c6719b2ccaad2292189a34e2250a0a4f098ca

          SHA256

          c8a94b411835cc43efcb2f22680bcd8523065dc9886a406508b6d362c5be8b4a

          SHA512

          93af0e601c6930507a3904b4042bb9c0a175ae71c752b5785622ff72a1d5f58e2b82e867ac750f4ba7b9ba6582443e2b217f799f6787fcbb4c9bfac4f731922d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dilF52wY62.exe

          Filesize

          246KB

          MD5

          1b00aa290c5f57aca9420b25512997ac

          SHA1

          755c6719b2ccaad2292189a34e2250a0a4f098ca

          SHA256

          c8a94b411835cc43efcb2f22680bcd8523065dc9886a406508b6d362c5be8b4a

          SHA512

          93af0e601c6930507a3904b4042bb9c0a175ae71c752b5785622ff72a1d5f58e2b82e867ac750f4ba7b9ba6582443e2b217f799f6787fcbb4c9bfac4f731922d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pluH35lN30.exe

          Filesize

          392KB

          MD5

          f35799eb890165b61ac33a29f1da3970

          SHA1

          a343c1c3f12d9d57ca25407e2bdbc6c5541b628d

          SHA256

          3477a1066759b4caa4493b77ff6aaa86ac094ef3a2edf919e6eb57dd4a32a62a

          SHA512

          d512c53a951f03891a0757f5e1dddd185a5f5e46290011d77d1f2914cb653544fe8c1827fef964925595b65c15788c6c52b8d87671f0eb5ae060af34fc4640be

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pluH35lN30.exe

          Filesize

          392KB

          MD5

          f35799eb890165b61ac33a29f1da3970

          SHA1

          a343c1c3f12d9d57ca25407e2bdbc6c5541b628d

          SHA256

          3477a1066759b4caa4493b77ff6aaa86ac094ef3a2edf919e6eb57dd4a32a62a

          SHA512

          d512c53a951f03891a0757f5e1dddd185a5f5e46290011d77d1f2914cb653544fe8c1827fef964925595b65c15788c6c52b8d87671f0eb5ae060af34fc4640be

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buVN43LK87.exe

          Filesize

          17KB

          MD5

          61c5b8d7e4bba8fa934f226c18610fed

          SHA1

          184bdd1b10631e63c6f8413d2ed0f8ec3e833b1f

          SHA256

          7ef4c835785f6a78019849a990e6100e37a780503a1938314a413869f9d5c9d2

          SHA512

          75289a6450bbce536c9b80b0a8d43e28cbb1acf0c34b6ffcfa29e2e96f764a0b4064dcf55f7b4769a61f5665ee018a70dd1cfccac5724674657ee9e65cc3fdc6

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buVN43LK87.exe

          Filesize

          17KB

          MD5

          61c5b8d7e4bba8fa934f226c18610fed

          SHA1

          184bdd1b10631e63c6f8413d2ed0f8ec3e833b1f

          SHA256

          7ef4c835785f6a78019849a990e6100e37a780503a1938314a413869f9d5c9d2

          SHA512

          75289a6450bbce536c9b80b0a8d43e28cbb1acf0c34b6ffcfa29e2e96f764a0b4064dcf55f7b4769a61f5665ee018a70dd1cfccac5724674657ee9e65cc3fdc6

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buVN43LK87.exe

          Filesize

          17KB

          MD5

          61c5b8d7e4bba8fa934f226c18610fed

          SHA1

          184bdd1b10631e63c6f8413d2ed0f8ec3e833b1f

          SHA256

          7ef4c835785f6a78019849a990e6100e37a780503a1938314a413869f9d5c9d2

          SHA512

          75289a6450bbce536c9b80b0a8d43e28cbb1acf0c34b6ffcfa29e2e96f764a0b4064dcf55f7b4769a61f5665ee018a70dd1cfccac5724674657ee9e65cc3fdc6

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cabw04aN84.exe

          Filesize

          304KB

          MD5

          bc94778948460579a0739b42d8018118

          SHA1

          f960e87471a354673dc63408a7cfd07052a18561

          SHA256

          164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b

          SHA512

          ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cabw04aN84.exe

          Filesize

          304KB

          MD5

          bc94778948460579a0739b42d8018118

          SHA1

          f960e87471a354673dc63408a7cfd07052a18561

          SHA256

          164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b

          SHA512

          ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cabw04aN84.exe

          Filesize

          304KB

          MD5

          bc94778948460579a0739b42d8018118

          SHA1

          f960e87471a354673dc63408a7cfd07052a18561

          SHA256

          164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b

          SHA512

          ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b

        • memory/524-2058-0x00000000055A0000-0x00000000055EB000-memory.dmp

          Filesize

          300KB

        • memory/524-2057-0x0000000000B30000-0x0000000000B62000-memory.dmp

          Filesize

          200KB

        • memory/524-2059-0x00000000053B0000-0x00000000053C0000-memory.dmp

          Filesize

          64KB

        • memory/1336-1128-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/1336-1096-0x00000000021A0000-0x00000000021BA000-memory.dmp

          Filesize

          104KB

        • memory/1336-1097-0x0000000002670000-0x0000000002688000-memory.dmp

          Filesize

          96KB

        • memory/1336-1126-0x0000000000590000-0x00000000005BD000-memory.dmp

          Filesize

          180KB

        • memory/1336-1127-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/1336-1129-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/2084-1303-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/2084-1299-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/2084-1300-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/2084-2046-0x0000000004B00000-0x0000000004B10000-memory.dmp

          Filesize

          64KB

        • memory/4824-155-0x0000000000800000-0x000000000080A000-memory.dmp

          Filesize

          40KB

        • memory/4880-209-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-1081-0x00000000056A0000-0x0000000005706000-memory.dmp

          Filesize

          408KB

        • memory/4880-195-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-197-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-201-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-199-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-203-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-205-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-191-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-207-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-211-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-213-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-215-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-217-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-219-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-221-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-223-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-225-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-227-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-229-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-231-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-1074-0x0000000005830000-0x0000000005E36000-memory.dmp

          Filesize

          6.0MB

        • memory/4880-1075-0x0000000005260000-0x000000000536A000-memory.dmp

          Filesize

          1.0MB

        • memory/4880-1076-0x00000000053A0000-0x00000000053B2000-memory.dmp

          Filesize

          72KB

        • memory/4880-1077-0x00000000053C0000-0x00000000053FE000-memory.dmp

          Filesize

          248KB

        • memory/4880-1078-0x0000000005510000-0x000000000555B000-memory.dmp

          Filesize

          300KB

        • memory/4880-1079-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4880-193-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-1082-0x00000000063A0000-0x0000000006432000-memory.dmp

          Filesize

          584KB

        • memory/4880-1083-0x0000000006580000-0x00000000065F6000-memory.dmp

          Filesize

          472KB

        • memory/4880-1084-0x0000000006600000-0x0000000006650000-memory.dmp

          Filesize

          320KB

        • memory/4880-1085-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4880-1086-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4880-1087-0x0000000006790000-0x0000000006952000-memory.dmp

          Filesize

          1.8MB

        • memory/4880-189-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-187-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-185-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-183-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-181-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-179-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-177-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-175-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-173-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4880-168-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-171-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4880-172-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-169-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4880-166-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-165-0x00000000027D0000-0x000000000280E000-memory.dmp

          Filesize

          248KB

        • memory/4880-164-0x00000000027D0000-0x0000000002814000-memory.dmp

          Filesize

          272KB

        • memory/4880-163-0x0000000004D20000-0x000000000521E000-memory.dmp

          Filesize

          5.0MB

        • memory/4880-162-0x0000000002750000-0x0000000002796000-memory.dmp

          Filesize

          280KB

        • memory/4880-161-0x00000000006F0000-0x000000000073B000-memory.dmp

          Filesize

          300KB

        • memory/4880-1088-0x0000000006960000-0x0000000006E8C000-memory.dmp

          Filesize

          5.2MB

        • memory/4880-1089-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB