Analysis

  • max time kernel
    198s
  • max time network
    228s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:47

General

  • Target

    1c7e07ebdbef35690c89286630810740ba0fbf6dc20dca376b8c10f00cd7acfa.exe

  • Size

    1.5MB

  • MD5

    e21c2a8446ea89fee1fa3cb13f3cc6b1

  • SHA1

    23f9557d27bfce369547021581c868a944c8b02e

  • SHA256

    1c7e07ebdbef35690c89286630810740ba0fbf6dc20dca376b8c10f00cd7acfa

  • SHA512

    b89b7b49890fb75e8d81ee6bda7921d810a066601756ca8b9c6e2dbc336dc3fff61d4ec238ffa659a66c7f74a14503368e4e75e3f0771cb4f56e9dc11b32dc9e

  • SSDEEP

    24576:uyg7168drJwxaCKz7tsbk+ppfNKkBvb1XErKfdeZ7yWAqs3kH2c7MlKucYgW:9gB68dryxxK3t0k+ppfgkV1XSKfdeZ7N

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c7e07ebdbef35690c89286630810740ba0fbf6dc20dca376b8c10f00cd7acfa.exe
    "C:\Users\Admin\AppData\Local\Temp\1c7e07ebdbef35690c89286630810740ba0fbf6dc20dca376b8c10f00cd7acfa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nm743072.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nm743072.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vf751568.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vf751568.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4684
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iJ955093.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iJ955093.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1412
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\193814145.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\193814145.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4920
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4992
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\258442745.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\258442745.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3572
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 1216
              6⤵
              • Program crash
              PID:876
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\340871956.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\340871956.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4880
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2384
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:428
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1868
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:3364
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  7⤵
                    PID:2228
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:R" /E
                    7⤵
                      PID:3692
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:2084
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\cb7ae701b3" /P "Admin:N"
                        7⤵
                          PID:4444
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\cb7ae701b3" /P "Admin:R" /E
                          7⤵
                            PID:1196
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\427240589.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\427240589.exe
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3048
                    • C:\Windows\Temp\1.exe
                      "C:\Windows\Temp\1.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:1412
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 1516
                      4⤵
                      • Program crash
                      PID:2224
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3572 -ip 3572
                1⤵
                  PID:2532
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3048 -ip 3048
                  1⤵
                    PID:2356
                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3516

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nm743072.exe

                          Filesize

                          1.3MB

                          MD5

                          6d5cbcc615678086c2bb06775a28e944

                          SHA1

                          0469e6176bef6ad282af3d1c99b8d241acef9e4f

                          SHA256

                          00b3f2e9334d612e4acab13dbde55fe5cef7e31c4f53a9c32122aa40d7884936

                          SHA512

                          fcb70db65f0cd35d1d6445f69297bf24b6a781b784c825edbf2b7dafca7bd8ac3b454f43e3fe027a065b6acd39b93b0547ecb2dd44f3aa40bfcda0114e2d4180

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nm743072.exe

                          Filesize

                          1.3MB

                          MD5

                          6d5cbcc615678086c2bb06775a28e944

                          SHA1

                          0469e6176bef6ad282af3d1c99b8d241acef9e4f

                          SHA256

                          00b3f2e9334d612e4acab13dbde55fe5cef7e31c4f53a9c32122aa40d7884936

                          SHA512

                          fcb70db65f0cd35d1d6445f69297bf24b6a781b784c825edbf2b7dafca7bd8ac3b454f43e3fe027a065b6acd39b93b0547ecb2dd44f3aa40bfcda0114e2d4180

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\427240589.exe

                          Filesize

                          539KB

                          MD5

                          1a4dd8f412f7994ca5977a1d24906f0c

                          SHA1

                          72cfe8f657ad11c0be6108b66ab7610b4bf518f4

                          SHA256

                          ef1ea4a6958832ccc46253bcd49ec686d9c0b0f3b502c2489f0e118161ed3c40

                          SHA512

                          571d136e545084a29914f8482e021d5bae343b22e42161098df414ad08598c33cfa2a3fa097bb8ffd02e3bbc06e75ae1255962c2fadd462661c240ad49fd986f

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\427240589.exe

                          Filesize

                          539KB

                          MD5

                          1a4dd8f412f7994ca5977a1d24906f0c

                          SHA1

                          72cfe8f657ad11c0be6108b66ab7610b4bf518f4

                          SHA256

                          ef1ea4a6958832ccc46253bcd49ec686d9c0b0f3b502c2489f0e118161ed3c40

                          SHA512

                          571d136e545084a29914f8482e021d5bae343b22e42161098df414ad08598c33cfa2a3fa097bb8ffd02e3bbc06e75ae1255962c2fadd462661c240ad49fd986f

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vf751568.exe

                          Filesize

                          871KB

                          MD5

                          ed78ad3060073977ad2da6b0e3c2f170

                          SHA1

                          22b14b1d8441495e374fae8acec5c0dad9a0e10d

                          SHA256

                          c91650a199c5cd458cd46bbe8fdda57d5f004c8390124b95c1541548a5e56d63

                          SHA512

                          09008ca93f5568b7b955d36752d7f94a07bd9404df927b51ca549a60e6f8ab23d4e0b9bed138798ff01bf0d189f5672d57108431f9f5e71b4bf57cc9120c1253

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vf751568.exe

                          Filesize

                          871KB

                          MD5

                          ed78ad3060073977ad2da6b0e3c2f170

                          SHA1

                          22b14b1d8441495e374fae8acec5c0dad9a0e10d

                          SHA256

                          c91650a199c5cd458cd46bbe8fdda57d5f004c8390124b95c1541548a5e56d63

                          SHA512

                          09008ca93f5568b7b955d36752d7f94a07bd9404df927b51ca549a60e6f8ab23d4e0b9bed138798ff01bf0d189f5672d57108431f9f5e71b4bf57cc9120c1253

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\340871956.exe

                          Filesize

                          204KB

                          MD5

                          c357bf96181014cf62d101a5b2cea60d

                          SHA1

                          b8a5ca4b3c8511757fc786fa42cabc0cebbbd52d

                          SHA256

                          51bfc0b00d75a58b7e6a8c902e502d9e593bbd621f45f3edd5e1f3882380fb34

                          SHA512

                          bdda191789a47b4c3f380df19b5c9e85a5e85ba2e9d407a89c3d9ba5df096a4a15b29bcf13f8e8ef850a7f2bb21e6758e31cd57a39813b62e05231211f52573e

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\340871956.exe

                          Filesize

                          204KB

                          MD5

                          c357bf96181014cf62d101a5b2cea60d

                          SHA1

                          b8a5ca4b3c8511757fc786fa42cabc0cebbbd52d

                          SHA256

                          51bfc0b00d75a58b7e6a8c902e502d9e593bbd621f45f3edd5e1f3882380fb34

                          SHA512

                          bdda191789a47b4c3f380df19b5c9e85a5e85ba2e9d407a89c3d9ba5df096a4a15b29bcf13f8e8ef850a7f2bb21e6758e31cd57a39813b62e05231211f52573e

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iJ955093.exe

                          Filesize

                          699KB

                          MD5

                          a9a21a5db85f2f8a1067925c354df2e5

                          SHA1

                          fdd9ba22555b4a258b1e72554bc8487abe8a338c

                          SHA256

                          08f04014c258fdb8682c4b178133e82915bfe1787aeb36b4a7b8e730b48f07bf

                          SHA512

                          39c67e5bf6c994e892bf63f6de495b8e3ee1b8aeec3b33947be2ba6c0e845b641fef8fcf7bb74904837bfa74d453b4ca938b7fcf6e95bb024409f18b77b04b95

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iJ955093.exe

                          Filesize

                          699KB

                          MD5

                          a9a21a5db85f2f8a1067925c354df2e5

                          SHA1

                          fdd9ba22555b4a258b1e72554bc8487abe8a338c

                          SHA256

                          08f04014c258fdb8682c4b178133e82915bfe1787aeb36b4a7b8e730b48f07bf

                          SHA512

                          39c67e5bf6c994e892bf63f6de495b8e3ee1b8aeec3b33947be2ba6c0e845b641fef8fcf7bb74904837bfa74d453b4ca938b7fcf6e95bb024409f18b77b04b95

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\193814145.exe

                          Filesize

                          300KB

                          MD5

                          c6b8731ffb0664b68f72c0494ea46d7d

                          SHA1

                          c9fbbee4feefb1b6287f6328b02b176899d4067a

                          SHA256

                          d1cff365a0d4d6cbfe9d0448636e36a1af9e6c1be04e98e260d05bdb1cbd7188

                          SHA512

                          067732581b3e23ae7ac016cad5e09f4b65e95ad580734de1c239c86d7ab5ffe070bb30f21ca11fb5150da59af02442cd0e5126c16887ddc906779a1697017471

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\193814145.exe

                          Filesize

                          300KB

                          MD5

                          c6b8731ffb0664b68f72c0494ea46d7d

                          SHA1

                          c9fbbee4feefb1b6287f6328b02b176899d4067a

                          SHA256

                          d1cff365a0d4d6cbfe9d0448636e36a1af9e6c1be04e98e260d05bdb1cbd7188

                          SHA512

                          067732581b3e23ae7ac016cad5e09f4b65e95ad580734de1c239c86d7ab5ffe070bb30f21ca11fb5150da59af02442cd0e5126c16887ddc906779a1697017471

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\258442745.exe

                          Filesize

                          479KB

                          MD5

                          1e9707de3719c8164e31032640370d79

                          SHA1

                          b37f71501cd8e89f25b13f7aecc3d47e096e0793

                          SHA256

                          8bfaf687ad5382bc3bd60f1580c9dda9debd9f17167a68df5b98d6239b16cf9c

                          SHA512

                          e4ff3f6dbe532dab15108281672fa566af8ba73e56c52276973c613fc017f6b8f0cc2a61bafb081cfd2582ca6547f96bee6429f1ca8ef9c3d87686d6936bfb33

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\258442745.exe

                          Filesize

                          479KB

                          MD5

                          1e9707de3719c8164e31032640370d79

                          SHA1

                          b37f71501cd8e89f25b13f7aecc3d47e096e0793

                          SHA256

                          8bfaf687ad5382bc3bd60f1580c9dda9debd9f17167a68df5b98d6239b16cf9c

                          SHA512

                          e4ff3f6dbe532dab15108281672fa566af8ba73e56c52276973c613fc017f6b8f0cc2a61bafb081cfd2582ca6547f96bee6429f1ca8ef9c3d87686d6936bfb33

                        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                          Filesize

                          204KB

                          MD5

                          c357bf96181014cf62d101a5b2cea60d

                          SHA1

                          b8a5ca4b3c8511757fc786fa42cabc0cebbbd52d

                          SHA256

                          51bfc0b00d75a58b7e6a8c902e502d9e593bbd621f45f3edd5e1f3882380fb34

                          SHA512

                          bdda191789a47b4c3f380df19b5c9e85a5e85ba2e9d407a89c3d9ba5df096a4a15b29bcf13f8e8ef850a7f2bb21e6758e31cd57a39813b62e05231211f52573e

                        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                          Filesize

                          204KB

                          MD5

                          c357bf96181014cf62d101a5b2cea60d

                          SHA1

                          b8a5ca4b3c8511757fc786fa42cabc0cebbbd52d

                          SHA256

                          51bfc0b00d75a58b7e6a8c902e502d9e593bbd621f45f3edd5e1f3882380fb34

                          SHA512

                          bdda191789a47b4c3f380df19b5c9e85a5e85ba2e9d407a89c3d9ba5df096a4a15b29bcf13f8e8ef850a7f2bb21e6758e31cd57a39813b62e05231211f52573e

                        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                          Filesize

                          204KB

                          MD5

                          c357bf96181014cf62d101a5b2cea60d

                          SHA1

                          b8a5ca4b3c8511757fc786fa42cabc0cebbbd52d

                          SHA256

                          51bfc0b00d75a58b7e6a8c902e502d9e593bbd621f45f3edd5e1f3882380fb34

                          SHA512

                          bdda191789a47b4c3f380df19b5c9e85a5e85ba2e9d407a89c3d9ba5df096a4a15b29bcf13f8e8ef850a7f2bb21e6758e31cd57a39813b62e05231211f52573e

                        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                          Filesize

                          204KB

                          MD5

                          c357bf96181014cf62d101a5b2cea60d

                          SHA1

                          b8a5ca4b3c8511757fc786fa42cabc0cebbbd52d

                          SHA256

                          51bfc0b00d75a58b7e6a8c902e502d9e593bbd621f45f3edd5e1f3882380fb34

                          SHA512

                          bdda191789a47b4c3f380df19b5c9e85a5e85ba2e9d407a89c3d9ba5df096a4a15b29bcf13f8e8ef850a7f2bb21e6758e31cd57a39813b62e05231211f52573e

                        • C:\Windows\Temp\1.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Windows\Temp\1.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Windows\Temp\1.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Windows\Temp\1.exe

                          Filesize

                          168KB

                          MD5

                          f16fb63d4e551d3808e8f01f2671b57e

                          SHA1

                          781153ad6235a1152da112de1fb39a6f2d063575

                          SHA256

                          8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

                          SHA512

                          fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

                        • C:\Windows\Temp\1.exe

                          Filesize

                          168KB

                          MD5

                          f16fb63d4e551d3808e8f01f2671b57e

                          SHA1

                          781153ad6235a1152da112de1fb39a6f2d063575

                          SHA256

                          8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

                          SHA512

                          fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

                        • C:\Windows\Temp\1.exe

                          Filesize

                          168KB

                          MD5

                          f16fb63d4e551d3808e8f01f2671b57e

                          SHA1

                          781153ad6235a1152da112de1fb39a6f2d063575

                          SHA256

                          8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

                          SHA512

                          fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

                        • memory/1412-6646-0x00000000004B0000-0x00000000004DE000-memory.dmp

                          Filesize

                          184KB

                        • memory/3048-4489-0x0000000002470000-0x0000000002480000-memory.dmp

                          Filesize

                          64KB

                        • memory/3048-4487-0x0000000000900000-0x000000000095B000-memory.dmp

                          Filesize

                          364KB

                        • memory/3048-4491-0x0000000002470000-0x0000000002480000-memory.dmp

                          Filesize

                          64KB

                        • memory/3048-4492-0x0000000002470000-0x0000000002480000-memory.dmp

                          Filesize

                          64KB

                        • memory/3048-6626-0x0000000002470000-0x0000000002480000-memory.dmp

                          Filesize

                          64KB

                        • memory/3048-6644-0x0000000002470000-0x0000000002480000-memory.dmp

                          Filesize

                          64KB

                        • memory/3048-6630-0x0000000002470000-0x0000000002480000-memory.dmp

                          Filesize

                          64KB

                        • memory/3048-6629-0x0000000002470000-0x0000000002480000-memory.dmp

                          Filesize

                          64KB

                        • memory/3048-6628-0x0000000002470000-0x0000000002480000-memory.dmp

                          Filesize

                          64KB

                        • memory/3572-4448-0x0000000004F10000-0x0000000004F20000-memory.dmp

                          Filesize

                          64KB

                        • memory/3572-4446-0x0000000004F10000-0x0000000004F20000-memory.dmp

                          Filesize

                          64KB

                        • memory/3572-2344-0x0000000004F10000-0x0000000004F20000-memory.dmp

                          Filesize

                          64KB

                        • memory/3572-2340-0x0000000000A10000-0x0000000000A5C000-memory.dmp

                          Filesize

                          304KB

                        • memory/3572-2342-0x0000000004F10000-0x0000000004F20000-memory.dmp

                          Filesize

                          64KB

                        • memory/3572-4449-0x0000000004F10000-0x0000000004F20000-memory.dmp

                          Filesize

                          64KB

                        • memory/3572-4450-0x0000000004F10000-0x0000000004F20000-memory.dmp

                          Filesize

                          64KB

                        • memory/3572-4451-0x0000000004F10000-0x0000000004F20000-memory.dmp

                          Filesize

                          64KB

                        • memory/3572-4455-0x00000000059E0000-0x0000000005A72000-memory.dmp

                          Filesize

                          584KB

                        • memory/4920-182-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-200-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-2293-0x0000000004A50000-0x0000000004A60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4920-2294-0x0000000004A50000-0x0000000004A60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4920-2295-0x0000000004A50000-0x0000000004A60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4920-2297-0x0000000004A50000-0x0000000004A60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4920-2298-0x0000000004A50000-0x0000000004A60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4920-226-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-222-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-224-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-220-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-218-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-216-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-214-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-212-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-161-0x0000000004A50000-0x0000000004A60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4920-210-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-208-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-206-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-204-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-202-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-228-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-198-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-196-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-194-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-192-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-190-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-188-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-186-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-184-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-180-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-178-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-176-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-174-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-172-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-170-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-168-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-166-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-165-0x00000000049C0000-0x0000000004A11000-memory.dmp

                          Filesize

                          324KB

                        • memory/4920-164-0x0000000004A50000-0x0000000004A60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4920-163-0x0000000004A50000-0x0000000004A60000-memory.dmp

                          Filesize

                          64KB

                        • memory/4920-162-0x0000000004A60000-0x0000000005004000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/4992-2435-0x00000000000F0000-0x00000000000FA000-memory.dmp

                          Filesize

                          40KB