Analysis

  • max time kernel
    151s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:49

General

  • Target

    d3dc541ec3e985943277604003194ee3.exe

  • Size

    1.5MB

  • MD5

    d3dc541ec3e985943277604003194ee3

  • SHA1

    0d04b6570cf97890e4c280b7ce5fadc8d0461e2b

  • SHA256

    91edaf65442a0d2cce04a878cd582df3a37da3ae3225c2a881337c5661d97846

  • SHA512

    6723677d4c26d0e528209b6a4f8e6ccb5edc03260253ab51eb5b909181fd4129ef10d2da416d982b899d9702a315dc7fe081f87f10b194c74e14cde173530ff9

  • SSDEEP

    24576:8y53cKISP5fCxNX71UjDj344sZ31JPeshxSIJqpnQxwSjbITAjwOWaF8AvwHg99j:rlIw5axNX7SD74bHPthx/JqpsETAjTWY

Malware Config

Extracted

Family

redline

Botnet

mazda

C2

217.196.96.56:4138

Attributes
  • auth_value

    3d2870537d84a4c6d7aeecd002871c51

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3dc541ec3e985943277604003194ee3.exe
    "C:\Users\Admin\AppData\Local\Temp\d3dc541ec3e985943277604003194ee3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1048703.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1048703.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0384894.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0384894.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5931057.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5931057.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:912
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0012839.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0012839.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2009095.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2009095.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2916
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 1080
                7⤵
                • Program crash
                PID:4792
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1588553.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1588553.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2812
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7924190.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7924190.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3572
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 696
              6⤵
              • Program crash
              PID:5052
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 764
              6⤵
              • Program crash
              PID:1288
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 856
              6⤵
              • Program crash
              PID:2156
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 952
              6⤵
              • Program crash
              PID:2772
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 960
              6⤵
              • Program crash
              PID:4732
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 860
              6⤵
              • Program crash
              PID:1516
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 1216
              6⤵
              • Program crash
              PID:3172
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 1204
              6⤵
              • Program crash
              PID:1876
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 1312
              6⤵
              • Program crash
              PID:3360
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 1108
              6⤵
              • Program crash
              PID:3528
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
              6⤵
              • Executes dropped EXE
              PID:4344
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 692
                7⤵
                • Program crash
                PID:1304
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 844
                7⤵
                • Program crash
                PID:2004
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 772
              6⤵
              • Program crash
              PID:4324
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 764
              6⤵
              • Program crash
              PID:3436
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5960505.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5960505.exe
          4⤵
          • Executes dropped EXE
          PID:3348
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2916 -ip 2916
    1⤵
      PID:4920
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3572 -ip 3572
      1⤵
        PID:5056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3572 -ip 3572
        1⤵
          PID:2924
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3572 -ip 3572
          1⤵
            PID:3148
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3572 -ip 3572
            1⤵
              PID:3356
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3572 -ip 3572
              1⤵
                PID:5112
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3572 -ip 3572
                1⤵
                  PID:3404
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3572 -ip 3572
                  1⤵
                    PID:1848
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3572 -ip 3572
                    1⤵
                      PID:1148
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3572 -ip 3572
                      1⤵
                        PID:2180
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3572 -ip 3572
                        1⤵
                          PID:1924
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3572 -ip 3572
                          1⤵
                            PID:4744
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4344 -ip 4344
                            1⤵
                              PID:3676
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3572 -ip 3572
                              1⤵
                                PID:2352
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4344 -ip 4344
                                1⤵
                                  PID:1156

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1048703.exe

                                  Filesize

                                  1.3MB

                                  MD5

                                  601f49a7d70a7ede7773826c0853e8ad

                                  SHA1

                                  5d55345cb74e1f36dce8ae0543ccfed66421ad84

                                  SHA256

                                  0b52d32f506eabb47bbbcc77a934ad1d4104fab85657a15f01503990df992325

                                  SHA512

                                  51ebbfb8dc3341c205773354db062cc178fef9909115ff6c34bb39bafe72175fdc946610b0abd982e525d2d630781fa02638198bf4eaa754d419cf2ad917cfeb

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1048703.exe

                                  Filesize

                                  1.3MB

                                  MD5

                                  601f49a7d70a7ede7773826c0853e8ad

                                  SHA1

                                  5d55345cb74e1f36dce8ae0543ccfed66421ad84

                                  SHA256

                                  0b52d32f506eabb47bbbcc77a934ad1d4104fab85657a15f01503990df992325

                                  SHA512

                                  51ebbfb8dc3341c205773354db062cc178fef9909115ff6c34bb39bafe72175fdc946610b0abd982e525d2d630781fa02638198bf4eaa754d419cf2ad917cfeb

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0384894.exe

                                  Filesize

                                  867KB

                                  MD5

                                  d1692026e7df8fa54a536ceef311c0b2

                                  SHA1

                                  b2e39fd6de05167c80dabc6888369322b632a427

                                  SHA256

                                  a4950c4318e780896b6c6fbedcf79401cc46977f15edf5dba6fd92290275ccbd

                                  SHA512

                                  74e0ad21d4f964c754ab7f7154f62facebb37024916425c5dff7e3643769d2110872cc79e468edb156932928738150e4c151fefcd902acb88e68877c9fe2b5e7

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0384894.exe

                                  Filesize

                                  867KB

                                  MD5

                                  d1692026e7df8fa54a536ceef311c0b2

                                  SHA1

                                  b2e39fd6de05167c80dabc6888369322b632a427

                                  SHA256

                                  a4950c4318e780896b6c6fbedcf79401cc46977f15edf5dba6fd92290275ccbd

                                  SHA512

                                  74e0ad21d4f964c754ab7f7154f62facebb37024916425c5dff7e3643769d2110872cc79e468edb156932928738150e4c151fefcd902acb88e68877c9fe2b5e7

                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5960505.exe

                                  Filesize

                                  179KB

                                  MD5

                                  3a7fc71f8eee854325d60a9d6e2c60b0

                                  SHA1

                                  baecdc094eb94ce285a77555faddb974c3a4be6c

                                  SHA256

                                  5d2e2475d9db19a7e802f82054ca8e4456be404561ac90b63830e0cf9dd5bcff

                                  SHA512

                                  d87dd0b0bfee87bf5a7118b2205714e9d9aa973333a2d92d955e4365d32c66bb8e2c86a487ec0c70e4ae5ad19ee15c6ac1d12d7dbecdbe585dd2d8e1246cea51

                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5960505.exe

                                  Filesize

                                  179KB

                                  MD5

                                  3a7fc71f8eee854325d60a9d6e2c60b0

                                  SHA1

                                  baecdc094eb94ce285a77555faddb974c3a4be6c

                                  SHA256

                                  5d2e2475d9db19a7e802f82054ca8e4456be404561ac90b63830e0cf9dd5bcff

                                  SHA512

                                  d87dd0b0bfee87bf5a7118b2205714e9d9aa973333a2d92d955e4365d32c66bb8e2c86a487ec0c70e4ae5ad19ee15c6ac1d12d7dbecdbe585dd2d8e1246cea51

                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5931057.exe

                                  Filesize

                                  663KB

                                  MD5

                                  7320395ab3b645f32fee773896d3eafa

                                  SHA1

                                  ef3a2721adcf34e6e2e4c1341d750534e31933f2

                                  SHA256

                                  869c9c442974951743cd51cfad54fff4faef167bd9e6d94945921590ca96ea68

                                  SHA512

                                  7d550cb7a4c5eaa598b4c6893bdbc78c11124f2bfb5685927e78d39d16cd44e9a91eb9fccbc065b12d983a5847cf4d19c9f53d62f85704f8b745d62cf4d8cf84

                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5931057.exe

                                  Filesize

                                  663KB

                                  MD5

                                  7320395ab3b645f32fee773896d3eafa

                                  SHA1

                                  ef3a2721adcf34e6e2e4c1341d750534e31933f2

                                  SHA256

                                  869c9c442974951743cd51cfad54fff4faef167bd9e6d94945921590ca96ea68

                                  SHA512

                                  7d550cb7a4c5eaa598b4c6893bdbc78c11124f2bfb5685927e78d39d16cd44e9a91eb9fccbc065b12d983a5847cf4d19c9f53d62f85704f8b745d62cf4d8cf84

                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7924190.exe

                                  Filesize

                                  295KB

                                  MD5

                                  55983840ef1177ff974c355c4323bbcf

                                  SHA1

                                  e75634e086f9cc69c5ee2e6f64da9c63ce0a3a39

                                  SHA256

                                  16cc76b49909433872c608c46cd554dba4753d8f6fe750e8866d19aa9595db51

                                  SHA512

                                  9a6e4838f3242ef8a469a73d57f1a641af94b0c5eca093faac6cb419c6d9c3e95f8b66ccc2c51528a30d870975870d1c8ec5506fe47ea1ab172df2ab2e728eef

                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7924190.exe

                                  Filesize

                                  295KB

                                  MD5

                                  55983840ef1177ff974c355c4323bbcf

                                  SHA1

                                  e75634e086f9cc69c5ee2e6f64da9c63ce0a3a39

                                  SHA256

                                  16cc76b49909433872c608c46cd554dba4753d8f6fe750e8866d19aa9595db51

                                  SHA512

                                  9a6e4838f3242ef8a469a73d57f1a641af94b0c5eca093faac6cb419c6d9c3e95f8b66ccc2c51528a30d870975870d1c8ec5506fe47ea1ab172df2ab2e728eef

                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0012839.exe

                                  Filesize

                                  394KB

                                  MD5

                                  96c0a897c4dc84a0cad2cbf083c26961

                                  SHA1

                                  26022eda59acf7b92095de759e58d7505f1864fa

                                  SHA256

                                  50324716ac1be0e4681431600ab10b688259cf1228bb9c79a4defc97b28028d2

                                  SHA512

                                  dfd51909cc4812925f297c98bc175b0a0c420b7b3555fbd6b65ddfbd0ddb85d7570ddb816f9f7d23f1db3b1ad48a5ab40d4726ed75afcadcf6ec5620bffb9417

                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0012839.exe

                                  Filesize

                                  394KB

                                  MD5

                                  96c0a897c4dc84a0cad2cbf083c26961

                                  SHA1

                                  26022eda59acf7b92095de759e58d7505f1864fa

                                  SHA256

                                  50324716ac1be0e4681431600ab10b688259cf1228bb9c79a4defc97b28028d2

                                  SHA512

                                  dfd51909cc4812925f297c98bc175b0a0c420b7b3555fbd6b65ddfbd0ddb85d7570ddb816f9f7d23f1db3b1ad48a5ab40d4726ed75afcadcf6ec5620bffb9417

                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2009095.exe

                                  Filesize

                                  315KB

                                  MD5

                                  90dc57915fd44e16fcc69c004e3e2316

                                  SHA1

                                  4a4ba9b954e83efcd7952e63ce366f412611dd39

                                  SHA256

                                  d864da3ef6feafbe002a5a7bbee4b99deceb90468fe4da8629a1097e9cc2dc79

                                  SHA512

                                  7cffc9e0514dc16acc0132d55b9cdcecf58b869b997d97474ed01375bcb66e842f2872baa5bb68137c525400a4cc54b87f73de60e039d1a870c15ce7c465a784

                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2009095.exe

                                  Filesize

                                  315KB

                                  MD5

                                  90dc57915fd44e16fcc69c004e3e2316

                                  SHA1

                                  4a4ba9b954e83efcd7952e63ce366f412611dd39

                                  SHA256

                                  d864da3ef6feafbe002a5a7bbee4b99deceb90468fe4da8629a1097e9cc2dc79

                                  SHA512

                                  7cffc9e0514dc16acc0132d55b9cdcecf58b869b997d97474ed01375bcb66e842f2872baa5bb68137c525400a4cc54b87f73de60e039d1a870c15ce7c465a784

                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1588553.exe

                                  Filesize

                                  168KB

                                  MD5

                                  ca95079073291df816385e04df66ff6b

                                  SHA1

                                  01482587b832b41353d7cbf66e31b9ba6d6f1e29

                                  SHA256

                                  fbffa7cdea5ddb2e23ef2a42c64624152a3f940a1e3713b5022b7773387e9fde

                                  SHA512

                                  2de4342ef2a6f7e24009367dbea75d3b45412d72ba395c76ee7830f6f881d7bfc125491eb06b3222c252ff1491dbb8a3428b9f95f4ec863e63b0a2b449a210d2

                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1588553.exe

                                  Filesize

                                  168KB

                                  MD5

                                  ca95079073291df816385e04df66ff6b

                                  SHA1

                                  01482587b832b41353d7cbf66e31b9ba6d6f1e29

                                  SHA256

                                  fbffa7cdea5ddb2e23ef2a42c64624152a3f940a1e3713b5022b7773387e9fde

                                  SHA512

                                  2de4342ef2a6f7e24009367dbea75d3b45412d72ba395c76ee7830f6f881d7bfc125491eb06b3222c252ff1491dbb8a3428b9f95f4ec863e63b0a2b449a210d2

                                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                  Filesize

                                  295KB

                                  MD5

                                  55983840ef1177ff974c355c4323bbcf

                                  SHA1

                                  e75634e086f9cc69c5ee2e6f64da9c63ce0a3a39

                                  SHA256

                                  16cc76b49909433872c608c46cd554dba4753d8f6fe750e8866d19aa9595db51

                                  SHA512

                                  9a6e4838f3242ef8a469a73d57f1a641af94b0c5eca093faac6cb419c6d9c3e95f8b66ccc2c51528a30d870975870d1c8ec5506fe47ea1ab172df2ab2e728eef

                                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                  Filesize

                                  295KB

                                  MD5

                                  55983840ef1177ff974c355c4323bbcf

                                  SHA1

                                  e75634e086f9cc69c5ee2e6f64da9c63ce0a3a39

                                  SHA256

                                  16cc76b49909433872c608c46cd554dba4753d8f6fe750e8866d19aa9595db51

                                  SHA512

                                  9a6e4838f3242ef8a469a73d57f1a641af94b0c5eca093faac6cb419c6d9c3e95f8b66ccc2c51528a30d870975870d1c8ec5506fe47ea1ab172df2ab2e728eef

                                • memory/2812-223-0x000000000ACB0000-0x000000000AD16000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/2812-224-0x000000000B970000-0x000000000B9C0000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/2812-225-0x000000000C3E0000-0x000000000C5A2000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2812-222-0x000000000AD50000-0x000000000ADE2000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/2812-221-0x000000000AC30000-0x000000000ACA6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/2812-220-0x0000000005470000-0x0000000005480000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2812-219-0x000000000A920000-0x000000000A95C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/2812-218-0x0000000005470000-0x0000000005480000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2812-217-0x000000000A8C0000-0x000000000A8D2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2812-216-0x000000000A990000-0x000000000AA9A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/2812-215-0x000000000AE20000-0x000000000B438000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/2812-214-0x0000000000B50000-0x0000000000B80000-memory.dmp

                                  Filesize

                                  192KB

                                • memory/2812-226-0x000000000CAE0000-0x000000000D00C000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/2916-173-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-186-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-207-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/2916-203-0x0000000004D80000-0x0000000004D90000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2916-202-0x0000000004D80000-0x0000000004D90000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2916-201-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/2916-200-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-198-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-196-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-194-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-192-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-190-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-188-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-204-0x0000000004D80000-0x0000000004D90000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2916-184-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-182-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-180-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-178-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-176-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-174-0x0000000002490000-0x00000000024A2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2916-169-0x0000000004D90000-0x0000000005334000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/2916-170-0x0000000000490000-0x00000000004BD000-memory.dmp

                                  Filesize

                                  180KB

                                • memory/2916-172-0x0000000004D80000-0x0000000004D90000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2916-171-0x0000000004D80000-0x0000000004D90000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3572-244-0x0000000000400000-0x00000000006CA000-memory.dmp

                                  Filesize

                                  2.8MB

                                • memory/3572-249-0x0000000000400000-0x00000000006CA000-memory.dmp

                                  Filesize

                                  2.8MB

                                • memory/3572-233-0x0000000000400000-0x00000000006CA000-memory.dmp

                                  Filesize

                                  2.8MB

                                • memory/3572-232-0x00000000007B0000-0x00000000007E5000-memory.dmp

                                  Filesize

                                  212KB