Analysis

  • max time kernel
    126s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 06:10

General

  • Target

    e2f7dc42c43b47336f72c3bf33472d6b5e83a6861fd6fcad22616415fc557991.exe

  • Size

    1.2MB

  • MD5

    dcfe029d9f664c8eb9b5f508295a89d7

  • SHA1

    48c00587d181cd7a44db30bb1d08c32322cb3474

  • SHA256

    e2f7dc42c43b47336f72c3bf33472d6b5e83a6861fd6fcad22616415fc557991

  • SHA512

    7c188d7dbfe524ed2fc6a99d543f1abb8daaa798a1658556b83611bbe06e39c7bc4c78969c0f4bac4dd3101cde62e6fb6cee2d767861926f052099dce47e73c1

  • SSDEEP

    24576:JyDZljcSLnvIUHdEQ0FjjGT93+VGRpHxCU1tD5qBCjI:8DZlQ30EQ0FjjGJ+VGRjnzj

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

durov

C2

193.56.146.11:4162

Attributes
  • auth_value

    337984645d237df105d30aab7013119f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2f7dc42c43b47336f72c3bf33472d6b5e83a6861fd6fcad22616415fc557991.exe
    "C:\Users\Admin\AppData\Local\Temp\e2f7dc42c43b47336f72c3bf33472d6b5e83a6861fd6fcad22616415fc557991.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plbm63Et52.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plbm63Et52.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plMZ50iN64.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plMZ50iN64.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ploj76rp51.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ploj76rp51.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5016
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plUy36ws45.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plUy36ws45.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3896
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buIN94lD25.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buIN94lD25.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4164
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFT43va27.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFT43va27.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4256
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 1852
                7⤵
                • Program crash
                PID:380
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dirF01wK00.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dirF01wK00.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5020
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1080
              6⤵
              • Program crash
              PID:2124
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esvh54RV63.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esvh54RV63.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1848
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 1972
            5⤵
            • Program crash
            PID:3468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuzq4130BR40.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuzq4130BR40.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grkW60fi95.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grkW60fi95.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2452
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4256 -ip 4256
    1⤵
      PID:3164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5020 -ip 5020
      1⤵
        PID:3884
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1848 -ip 1848
        1⤵
          PID:1840
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe start wuauserv
          1⤵
          • Launches sc.exe
          PID:3852

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grkW60fi95.exe

                Filesize

                175KB

                MD5

                d4ebb6a14349bda22250ee97fa9d44ea

                SHA1

                446ea39476498d5fdb93246096e42461748110f8

                SHA256

                14f5761a58bc694241965dc92bfbd1a6f0321825c49e88fc267a7fb025dce331

                SHA512

                2a51cc01bfe6737db5562904f9cccb0f031b1842b74b39ab51578ecf58abed10bb35e7291b1716ba442427a1df33987df5060c6bd9b65bd7fa50d316fba93f6c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grkW60fi95.exe

                Filesize

                175KB

                MD5

                d4ebb6a14349bda22250ee97fa9d44ea

                SHA1

                446ea39476498d5fdb93246096e42461748110f8

                SHA256

                14f5761a58bc694241965dc92bfbd1a6f0321825c49e88fc267a7fb025dce331

                SHA512

                2a51cc01bfe6737db5562904f9cccb0f031b1842b74b39ab51578ecf58abed10bb35e7291b1716ba442427a1df33987df5060c6bd9b65bd7fa50d316fba93f6c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plbm63Et52.exe

                Filesize

                1.0MB

                MD5

                8c966c710a74efb13827d0ca73da9c46

                SHA1

                c303bbbcb1e77e1210f5b4a050bc717c6f4eb4af

                SHA256

                26af233d9f0a068b08f3268d6414da1bd2614ff9e5d8d05f309ef6c8bd324481

                SHA512

                ad8116808a9341525eea033c7a26c84e93688261f422111a2fdcd5614e69ef726d56df00c833a9803dd23a8c90e9127979c053c24619449290a1c46feb6111fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plbm63Et52.exe

                Filesize

                1.0MB

                MD5

                8c966c710a74efb13827d0ca73da9c46

                SHA1

                c303bbbcb1e77e1210f5b4a050bc717c6f4eb4af

                SHA256

                26af233d9f0a068b08f3268d6414da1bd2614ff9e5d8d05f309ef6c8bd324481

                SHA512

                ad8116808a9341525eea033c7a26c84e93688261f422111a2fdcd5614e69ef726d56df00c833a9803dd23a8c90e9127979c053c24619449290a1c46feb6111fd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuzq4130BR40.exe

                Filesize

                12KB

                MD5

                368482b8e0278ffded179f6487ec5b41

                SHA1

                72d29399423378d42d56ca5e82e32ccb21d8242a

                SHA256

                44c1c69aa387ef52497dcdf1a5db178f5c49fb9809aabd1d1fc24674cb97d788

                SHA512

                8af8c6b7c1da80903aaa18ad2d44c33494fb3ce8ba9825c3b0bd7529ead3dafe11490b2f86a39daabcee7dd59208bb3fab3ca7f60a28dc40d7a7c5553f152b6e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuzq4130BR40.exe

                Filesize

                12KB

                MD5

                368482b8e0278ffded179f6487ec5b41

                SHA1

                72d29399423378d42d56ca5e82e32ccb21d8242a

                SHA256

                44c1c69aa387ef52497dcdf1a5db178f5c49fb9809aabd1d1fc24674cb97d788

                SHA512

                8af8c6b7c1da80903aaa18ad2d44c33494fb3ce8ba9825c3b0bd7529ead3dafe11490b2f86a39daabcee7dd59208bb3fab3ca7f60a28dc40d7a7c5553f152b6e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plMZ50iN64.exe

                Filesize

                955KB

                MD5

                ccd6898742bd3a6097e966b16699a5e6

                SHA1

                2ae72975dd8c6faf020621cd67ac052dc6aa9d75

                SHA256

                2054b6a3da841cfa3310f154096a5941193b50e7cc590b2ab45b732d9a06ae3a

                SHA512

                ad0659e417306038d13bdc0cc23e62ad35e7e674321bb0b07a45e423763cee71ba7485e81da473b6ad5a3a41bef62ccb3b15748032b5bb26decbc9358372db54

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plMZ50iN64.exe

                Filesize

                955KB

                MD5

                ccd6898742bd3a6097e966b16699a5e6

                SHA1

                2ae72975dd8c6faf020621cd67ac052dc6aa9d75

                SHA256

                2054b6a3da841cfa3310f154096a5941193b50e7cc590b2ab45b732d9a06ae3a

                SHA512

                ad0659e417306038d13bdc0cc23e62ad35e7e674321bb0b07a45e423763cee71ba7485e81da473b6ad5a3a41bef62ccb3b15748032b5bb26decbc9358372db54

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esvh54RV63.exe

                Filesize

                381KB

                MD5

                57b4e73c1d36751cb60a4d2e68594087

                SHA1

                0e371eaad20ebbb81735876f0f1703adee193117

                SHA256

                39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

                SHA512

                e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esvh54RV63.exe

                Filesize

                381KB

                MD5

                57b4e73c1d36751cb60a4d2e68594087

                SHA1

                0e371eaad20ebbb81735876f0f1703adee193117

                SHA256

                39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

                SHA512

                e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ploj76rp51.exe

                Filesize

                692KB

                MD5

                88ef8f6505495ef9900d0cc0365ed5a8

                SHA1

                1113855230f95e97f612f44c5a4c9178436e0ffb

                SHA256

                c824bdfac7b1476698d0fc50e8fa69475d0a716428861b0abb40bba1295cd86c

                SHA512

                f639fc09e31569a8e2abad3a5365e892af75693b000b201a1654fd3a6c8f9f9f0b1ca07f3971e6a4183e953fdf9eb0f414242d293dba08da4db2bafac7ea2ed5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ploj76rp51.exe

                Filesize

                692KB

                MD5

                88ef8f6505495ef9900d0cc0365ed5a8

                SHA1

                1113855230f95e97f612f44c5a4c9178436e0ffb

                SHA256

                c824bdfac7b1476698d0fc50e8fa69475d0a716428861b0abb40bba1295cd86c

                SHA512

                f639fc09e31569a8e2abad3a5365e892af75693b000b201a1654fd3a6c8f9f9f0b1ca07f3971e6a4183e953fdf9eb0f414242d293dba08da4db2bafac7ea2ed5

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dirF01wK00.exe

                Filesize

                323KB

                MD5

                3f33c6c8759069f165f07180a32abf2e

                SHA1

                a85dadf12b28a19928e42a81b66f6858fe07b4b2

                SHA256

                8e20b7bce03582ff47bb369c0694190ba21061b9ba3c10fb4cd1b899277fd0ba

                SHA512

                fa9cea89d7109d901b75ae6c8aff17a70e63bae4c9c4764ba569562fc338bbccb04092ccbe22bd8c24a4f9fcaa9c99f0fedb13717314e19ed5bd5dea457ee148

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dirF01wK00.exe

                Filesize

                323KB

                MD5

                3f33c6c8759069f165f07180a32abf2e

                SHA1

                a85dadf12b28a19928e42a81b66f6858fe07b4b2

                SHA256

                8e20b7bce03582ff47bb369c0694190ba21061b9ba3c10fb4cd1b899277fd0ba

                SHA512

                fa9cea89d7109d901b75ae6c8aff17a70e63bae4c9c4764ba569562fc338bbccb04092ccbe22bd8c24a4f9fcaa9c99f0fedb13717314e19ed5bd5dea457ee148

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plUy36ws45.exe

                Filesize

                404KB

                MD5

                211064aaa67d869b76824b5f198e1f52

                SHA1

                88258d6716d94886f1ba5b09b32c906ba0e0c38d

                SHA256

                53b5350d0eb1b471fa0dba7565f64971fe40cd58faf6086ace4428a1d8eb71cc

                SHA512

                ff94627e6fc7deddf6089926bb5cda7e7f41c65c0151ca8e5d5bac74f1bf0604b7e0e7ac0a7714d4ea43c7cb25e926c66573fd60f173c881082b3def988ed5d3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plUy36ws45.exe

                Filesize

                404KB

                MD5

                211064aaa67d869b76824b5f198e1f52

                SHA1

                88258d6716d94886f1ba5b09b32c906ba0e0c38d

                SHA256

                53b5350d0eb1b471fa0dba7565f64971fe40cd58faf6086ace4428a1d8eb71cc

                SHA512

                ff94627e6fc7deddf6089926bb5cda7e7f41c65c0151ca8e5d5bac74f1bf0604b7e0e7ac0a7714d4ea43c7cb25e926c66573fd60f173c881082b3def988ed5d3

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buIN94lD25.exe

                Filesize

                12KB

                MD5

                cf6ba42121c91af86dec830e2906ef42

                SHA1

                79fe535af1c317628537504767250650137d3df6

                SHA256

                27a7fba50a19b58755c0581008b7b6127d524b4b536ef9c74610ab12dd066a64

                SHA512

                5edef25160e748ef664149dd7247ba58fca098772de69ee09d0866f222684a73006f3550f8e0d320490d9cdee39cb07a19c56bdf1b53c7a161e2849591096bf5

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buIN94lD25.exe

                Filesize

                12KB

                MD5

                cf6ba42121c91af86dec830e2906ef42

                SHA1

                79fe535af1c317628537504767250650137d3df6

                SHA256

                27a7fba50a19b58755c0581008b7b6127d524b4b536ef9c74610ab12dd066a64

                SHA512

                5edef25160e748ef664149dd7247ba58fca098772de69ee09d0866f222684a73006f3550f8e0d320490d9cdee39cb07a19c56bdf1b53c7a161e2849591096bf5

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buIN94lD25.exe

                Filesize

                12KB

                MD5

                cf6ba42121c91af86dec830e2906ef42

                SHA1

                79fe535af1c317628537504767250650137d3df6

                SHA256

                27a7fba50a19b58755c0581008b7b6127d524b4b536ef9c74610ab12dd066a64

                SHA512

                5edef25160e748ef664149dd7247ba58fca098772de69ee09d0866f222684a73006f3550f8e0d320490d9cdee39cb07a19c56bdf1b53c7a161e2849591096bf5

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFT43va27.exe

                Filesize

                381KB

                MD5

                57b4e73c1d36751cb60a4d2e68594087

                SHA1

                0e371eaad20ebbb81735876f0f1703adee193117

                SHA256

                39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

                SHA512

                e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFT43va27.exe

                Filesize

                381KB

                MD5

                57b4e73c1d36751cb60a4d2e68594087

                SHA1

                0e371eaad20ebbb81735876f0f1703adee193117

                SHA256

                39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

                SHA512

                e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caFT43va27.exe

                Filesize

                381KB

                MD5

                57b4e73c1d36751cb60a4d2e68594087

                SHA1

                0e371eaad20ebbb81735876f0f1703adee193117

                SHA256

                39f6bf6cf9f7bfba26380635a4b052c5de0e1688c92bacc10411dad74886dd25

                SHA512

                e5e81ce16ccd679b95cde5e1db79b62fe878d8c5e27d217bf0605433f47626261756b6b7da870333233023b1e8ea30af07af395b9078a7dd1c72834c254e279c

              • memory/1848-2059-0x0000000007250000-0x0000000007260000-memory.dmp

                Filesize

                64KB

              • memory/1848-2058-0x0000000007250000-0x0000000007260000-memory.dmp

                Filesize

                64KB

              • memory/1848-2057-0x0000000007250000-0x0000000007260000-memory.dmp

                Filesize

                64KB

              • memory/1848-2056-0x0000000007250000-0x0000000007260000-memory.dmp

                Filesize

                64KB

              • memory/1848-2054-0x0000000007250000-0x0000000007260000-memory.dmp

                Filesize

                64KB

              • memory/1848-1714-0x0000000007250000-0x0000000007260000-memory.dmp

                Filesize

                64KB

              • memory/1848-1716-0x0000000007250000-0x0000000007260000-memory.dmp

                Filesize

                64KB

              • memory/1848-1712-0x0000000007250000-0x0000000007260000-memory.dmp

                Filesize

                64KB

              • memory/2452-2069-0x0000000000AB0000-0x0000000000AE2000-memory.dmp

                Filesize

                200KB

              • memory/2452-2070-0x0000000005710000-0x0000000005720000-memory.dmp

                Filesize

                64KB

              • memory/2452-2071-0x0000000005710000-0x0000000005720000-memory.dmp

                Filesize

                64KB

              • memory/4164-168-0x0000000000240000-0x000000000024A000-memory.dmp

                Filesize

                40KB

              • memory/4256-222-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-1092-0x00000000074B0000-0x00000000074C0000-memory.dmp

                Filesize

                64KB

              • memory/4256-206-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-208-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-210-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-212-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-214-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-218-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-220-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-216-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-202-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-224-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-226-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-228-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-230-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-232-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-234-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-236-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-238-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-240-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-242-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-1085-0x0000000007A70000-0x0000000008088000-memory.dmp

                Filesize

                6.1MB

              • memory/4256-1086-0x0000000008090000-0x000000000819A000-memory.dmp

                Filesize

                1.0MB

              • memory/4256-1087-0x0000000007400000-0x0000000007412000-memory.dmp

                Filesize

                72KB

              • memory/4256-1088-0x0000000007420000-0x000000000745C000-memory.dmp

                Filesize

                240KB

              • memory/4256-1089-0x00000000074B0000-0x00000000074C0000-memory.dmp

                Filesize

                64KB

              • memory/4256-1091-0x0000000008400000-0x0000000008466000-memory.dmp

                Filesize

                408KB

              • memory/4256-204-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-1093-0x00000000074B0000-0x00000000074C0000-memory.dmp

                Filesize

                64KB

              • memory/4256-1094-0x00000000074B0000-0x00000000074C0000-memory.dmp

                Filesize

                64KB

              • memory/4256-1095-0x0000000008AC0000-0x0000000008B52000-memory.dmp

                Filesize

                584KB

              • memory/4256-1096-0x0000000008E00000-0x0000000008E76000-memory.dmp

                Filesize

                472KB

              • memory/4256-1097-0x0000000008E80000-0x0000000008ED0000-memory.dmp

                Filesize

                320KB

              • memory/4256-1098-0x00000000074B0000-0x00000000074C0000-memory.dmp

                Filesize

                64KB

              • memory/4256-1099-0x000000000A1A0000-0x000000000A362000-memory.dmp

                Filesize

                1.8MB

              • memory/4256-1100-0x000000000A370000-0x000000000A89C000-memory.dmp

                Filesize

                5.2MB

              • memory/4256-174-0x0000000002D50000-0x0000000002D9B000-memory.dmp

                Filesize

                300KB

              • memory/4256-175-0x00000000074B0000-0x00000000074C0000-memory.dmp

                Filesize

                64KB

              • memory/4256-176-0x00000000074B0000-0x00000000074C0000-memory.dmp

                Filesize

                64KB

              • memory/4256-200-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-198-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-196-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-194-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-192-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-190-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-188-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-186-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-180-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-184-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-182-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-179-0x0000000004E90000-0x0000000004ECE000-memory.dmp

                Filesize

                248KB

              • memory/4256-178-0x00000000074C0000-0x0000000007A64000-memory.dmp

                Filesize

                5.6MB

              • memory/4256-177-0x00000000074B0000-0x00000000074C0000-memory.dmp

                Filesize

                64KB

              • memory/5020-1137-0x0000000007350000-0x0000000007360000-memory.dmp

                Filesize

                64KB

              • memory/5020-1136-0x0000000007350000-0x0000000007360000-memory.dmp

                Filesize

                64KB

              • memory/5020-1135-0x0000000002D40000-0x0000000002D6D000-memory.dmp

                Filesize

                180KB