Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:41

General

  • Target

    061fbbbca78de67a72bbba928fb832169bd2e580e9af957af2fe7bb86cfb29b4.exe

  • Size

    1.2MB

  • MD5

    d7f061dfc7833cb719aa9c47a19c3286

  • SHA1

    eece3a506b4af75f9dcdb410d5423a0b50e63dd0

  • SHA256

    061fbbbca78de67a72bbba928fb832169bd2e580e9af957af2fe7bb86cfb29b4

  • SHA512

    78aab9745b0ea6268c1d9ca7319a5c1e567891ed4a1208fa0fc9b02aa2fd171d05727814833e64f250a34a0aa21120fb966b43d3408cd282c9a774e33c118532

  • SSDEEP

    24576:/yNARkPnUdekrSDtOa/1szq2/BMu8YVxcSVnLBJFjjJPzH:KNARkPkZ4t/1szqUBoYvcwnX5jJr

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\061fbbbca78de67a72bbba928fb832169bd2e580e9af957af2fe7bb86cfb29b4.exe
    "C:\Users\Admin\AppData\Local\Temp\061fbbbca78de67a72bbba928fb832169bd2e580e9af957af2fe7bb86cfb29b4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UZ599477.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UZ599477.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xv591917.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xv591917.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aM983833.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aM983833.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4888
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\198297436.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\198297436.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1892
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\277416057.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\277416057.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3544
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 1084
              6⤵
              • Program crash
              PID:4872
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\398151505.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\398151505.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4972
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1440
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4304
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4228
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  7⤵
                    PID:4780
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:R" /E
                    7⤵
                      PID:4880
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4524
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\cb7ae701b3" /P "Admin:N"
                        7⤵
                          PID:5028
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\cb7ae701b3" /P "Admin:R" /E
                          7⤵
                            PID:4840
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\410559495.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\410559495.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4352
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3544 -ip 3544
                1⤵
                  PID:2524
                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4000
                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1968
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe start wuauserv
                  1⤵
                  • Launches sc.exe
                  PID:3660

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UZ599477.exe

                  Filesize

                  1.0MB

                  MD5

                  ccdf218644badea1a06c4ea70984fcfc

                  SHA1

                  f04d78588448ac2a8189c7c9e938b4a2976f4432

                  SHA256

                  ba926a6967d5d45a000272ef45fe7df7e65515fdb87a1ec296e28447ad4d6ac6

                  SHA512

                  5dae1a06a4ca04d86495d972ae29d97e4f46b563a2f2c04d8d2b781d2ddd6fb0567bc1dcdd85d1cb443798b8766e9cea140685fe738e05b798e066ae4666fbb3

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UZ599477.exe

                  Filesize

                  1.0MB

                  MD5

                  ccdf218644badea1a06c4ea70984fcfc

                  SHA1

                  f04d78588448ac2a8189c7c9e938b4a2976f4432

                  SHA256

                  ba926a6967d5d45a000272ef45fe7df7e65515fdb87a1ec296e28447ad4d6ac6

                  SHA512

                  5dae1a06a4ca04d86495d972ae29d97e4f46b563a2f2c04d8d2b781d2ddd6fb0567bc1dcdd85d1cb443798b8766e9cea140685fe738e05b798e066ae4666fbb3

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\410559495.exe

                  Filesize

                  461KB

                  MD5

                  a5f5471042ed8e96c7565fd2f16eac30

                  SHA1

                  7348c3977d5a43231a787f48880a308fc10b3ea3

                  SHA256

                  9f9a7e912849a7a29954eae21cfb3129d40e9b9011304f62457a27e44ca142ea

                  SHA512

                  c07c3a9dc98d7cde712fdef017f661ad05992f3c2cb204f1e72282b1b673fb82c293df9796e8d118af9b31789c806972bce63c7af04440e7455c341abc0b021f

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\410559495.exe

                  Filesize

                  461KB

                  MD5

                  a5f5471042ed8e96c7565fd2f16eac30

                  SHA1

                  7348c3977d5a43231a787f48880a308fc10b3ea3

                  SHA256

                  9f9a7e912849a7a29954eae21cfb3129d40e9b9011304f62457a27e44ca142ea

                  SHA512

                  c07c3a9dc98d7cde712fdef017f661ad05992f3c2cb204f1e72282b1b673fb82c293df9796e8d118af9b31789c806972bce63c7af04440e7455c341abc0b021f

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xv591917.exe

                  Filesize

                  637KB

                  MD5

                  7d1764d0255a3b04b39570d47dac8b23

                  SHA1

                  f22a7c8224b3203fef0a05bf20c1f986ae3e5e83

                  SHA256

                  4d88b95858993daa7147ea7cdf0ff187fa5f99bc16116eca37b075ba499b1179

                  SHA512

                  9ec2e0dd4ade2c19eb2ab0977d061f006c2e813d679ccf28e7797e7eb510b79a26a21e7da85b5cfbf29903bbfb1bfb80b37867e406e4c3a4eb603e1656555ccf

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xv591917.exe

                  Filesize

                  637KB

                  MD5

                  7d1764d0255a3b04b39570d47dac8b23

                  SHA1

                  f22a7c8224b3203fef0a05bf20c1f986ae3e5e83

                  SHA256

                  4d88b95858993daa7147ea7cdf0ff187fa5f99bc16116eca37b075ba499b1179

                  SHA512

                  9ec2e0dd4ade2c19eb2ab0977d061f006c2e813d679ccf28e7797e7eb510b79a26a21e7da85b5cfbf29903bbfb1bfb80b37867e406e4c3a4eb603e1656555ccf

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\398151505.exe

                  Filesize

                  205KB

                  MD5

                  84de113da0aa74e62e30226a9328b1f7

                  SHA1

                  f35dba00f764aa46bbf3c44a0bb9facf819a5524

                  SHA256

                  ecfa9bc90a96714631401eb3975a98f3b8576be93d102423ba6ccfdd9a262302

                  SHA512

                  31e72e0baebb63c3a9a3ba03b5595bf2ec870e6127ad1d33b89921c56c8ff447d7cb37f6d6e491ff1fc14ed01d1945c3e15a662f99381c08d2d4e6e3e6083992

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\398151505.exe

                  Filesize

                  205KB

                  MD5

                  84de113da0aa74e62e30226a9328b1f7

                  SHA1

                  f35dba00f764aa46bbf3c44a0bb9facf819a5524

                  SHA256

                  ecfa9bc90a96714631401eb3975a98f3b8576be93d102423ba6ccfdd9a262302

                  SHA512

                  31e72e0baebb63c3a9a3ba03b5595bf2ec870e6127ad1d33b89921c56c8ff447d7cb37f6d6e491ff1fc14ed01d1945c3e15a662f99381c08d2d4e6e3e6083992

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aM983833.exe

                  Filesize

                  465KB

                  MD5

                  d0ee626df180b3f6343bbdae4fcdf8c7

                  SHA1

                  e6c4c1f8e273dfe8f99b39e6e7dbf652d17690ee

                  SHA256

                  4421ab8ed4d8b77186945ce53745fcb7d73e60c95a5c15eb48df0396d5f7758f

                  SHA512

                  ca8375d31587bc7eb8d109620f61ff1567b3c9a5e8550bc93f1d08f0e222c3a961b0e4d3c061df72ef7da73afc385d563686ebf42fe8008f0b1027d263ac79c5

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aM983833.exe

                  Filesize

                  465KB

                  MD5

                  d0ee626df180b3f6343bbdae4fcdf8c7

                  SHA1

                  e6c4c1f8e273dfe8f99b39e6e7dbf652d17690ee

                  SHA256

                  4421ab8ed4d8b77186945ce53745fcb7d73e60c95a5c15eb48df0396d5f7758f

                  SHA512

                  ca8375d31587bc7eb8d109620f61ff1567b3c9a5e8550bc93f1d08f0e222c3a961b0e4d3c061df72ef7da73afc385d563686ebf42fe8008f0b1027d263ac79c5

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\198297436.exe

                  Filesize

                  177KB

                  MD5

                  90f545766d9e2a95a68c869d349787f6

                  SHA1

                  782ced50b5d813a4d637e5369214d2c312f6d6fd

                  SHA256

                  419e2459ecdea1235104898c1ee2e69a97831a660a4d6a6020b5c4788720f8a2

                  SHA512

                  3a2ee764bba5436c96cf191320271a567ef25b159db215ac6afb5043de148d32742bf0ff051038a67e7b663fd3e645b36b0f8853a2ba735dc8ee3207c8ab5e29

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\198297436.exe

                  Filesize

                  177KB

                  MD5

                  90f545766d9e2a95a68c869d349787f6

                  SHA1

                  782ced50b5d813a4d637e5369214d2c312f6d6fd

                  SHA256

                  419e2459ecdea1235104898c1ee2e69a97831a660a4d6a6020b5c4788720f8a2

                  SHA512

                  3a2ee764bba5436c96cf191320271a567ef25b159db215ac6afb5043de148d32742bf0ff051038a67e7b663fd3e645b36b0f8853a2ba735dc8ee3207c8ab5e29

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\277416057.exe

                  Filesize

                  377KB

                  MD5

                  aa68f4002d2b26331ba9ba537853738f

                  SHA1

                  c6eaf006dbe6c8dd1fc048041580f7fd20de0f47

                  SHA256

                  564bff6fcac692679216ef33aa37dbacc93e9dba5a47017b2e2a5840ffc9dac5

                  SHA512

                  9f60280f79ba1661ff9c8ceb57b1f3c5b0f9326daa2cc105492867907caf1f9f17f051454c6a58f187e67c366d75c6da874e8ee9d58b491eed5a1bc6057e8eb9

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\277416057.exe

                  Filesize

                  377KB

                  MD5

                  aa68f4002d2b26331ba9ba537853738f

                  SHA1

                  c6eaf006dbe6c8dd1fc048041580f7fd20de0f47

                  SHA256

                  564bff6fcac692679216ef33aa37dbacc93e9dba5a47017b2e2a5840ffc9dac5

                  SHA512

                  9f60280f79ba1661ff9c8ceb57b1f3c5b0f9326daa2cc105492867907caf1f9f17f051454c6a58f187e67c366d75c6da874e8ee9d58b491eed5a1bc6057e8eb9

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  205KB

                  MD5

                  84de113da0aa74e62e30226a9328b1f7

                  SHA1

                  f35dba00f764aa46bbf3c44a0bb9facf819a5524

                  SHA256

                  ecfa9bc90a96714631401eb3975a98f3b8576be93d102423ba6ccfdd9a262302

                  SHA512

                  31e72e0baebb63c3a9a3ba03b5595bf2ec870e6127ad1d33b89921c56c8ff447d7cb37f6d6e491ff1fc14ed01d1945c3e15a662f99381c08d2d4e6e3e6083992

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  205KB

                  MD5

                  84de113da0aa74e62e30226a9328b1f7

                  SHA1

                  f35dba00f764aa46bbf3c44a0bb9facf819a5524

                  SHA256

                  ecfa9bc90a96714631401eb3975a98f3b8576be93d102423ba6ccfdd9a262302

                  SHA512

                  31e72e0baebb63c3a9a3ba03b5595bf2ec870e6127ad1d33b89921c56c8ff447d7cb37f6d6e491ff1fc14ed01d1945c3e15a662f99381c08d2d4e6e3e6083992

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  205KB

                  MD5

                  84de113da0aa74e62e30226a9328b1f7

                  SHA1

                  f35dba00f764aa46bbf3c44a0bb9facf819a5524

                  SHA256

                  ecfa9bc90a96714631401eb3975a98f3b8576be93d102423ba6ccfdd9a262302

                  SHA512

                  31e72e0baebb63c3a9a3ba03b5595bf2ec870e6127ad1d33b89921c56c8ff447d7cb37f6d6e491ff1fc14ed01d1945c3e15a662f99381c08d2d4e6e3e6083992

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  205KB

                  MD5

                  84de113da0aa74e62e30226a9328b1f7

                  SHA1

                  f35dba00f764aa46bbf3c44a0bb9facf819a5524

                  SHA256

                  ecfa9bc90a96714631401eb3975a98f3b8576be93d102423ba6ccfdd9a262302

                  SHA512

                  31e72e0baebb63c3a9a3ba03b5595bf2ec870e6127ad1d33b89921c56c8ff447d7cb37f6d6e491ff1fc14ed01d1945c3e15a662f99381c08d2d4e6e3e6083992

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  205KB

                  MD5

                  84de113da0aa74e62e30226a9328b1f7

                  SHA1

                  f35dba00f764aa46bbf3c44a0bb9facf819a5524

                  SHA256

                  ecfa9bc90a96714631401eb3975a98f3b8576be93d102423ba6ccfdd9a262302

                  SHA512

                  31e72e0baebb63c3a9a3ba03b5595bf2ec870e6127ad1d33b89921c56c8ff447d7cb37f6d6e491ff1fc14ed01d1945c3e15a662f99381c08d2d4e6e3e6083992

                • memory/1892-180-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-182-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-184-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-188-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-186-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-190-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-178-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-176-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-161-0x00000000049E0000-0x00000000049F0000-memory.dmp

                  Filesize

                  64KB

                • memory/1892-162-0x00000000049F0000-0x0000000004F94000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1892-163-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-164-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-166-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-168-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-170-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-172-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/1892-174-0x0000000002500000-0x0000000002513000-memory.dmp

                  Filesize

                  76KB

                • memory/3544-231-0x0000000002770000-0x0000000002780000-memory.dmp

                  Filesize

                  64KB

                • memory/3544-199-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-221-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-219-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-223-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-213-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-224-0x00000000008E0000-0x000000000090D000-memory.dmp

                  Filesize

                  180KB

                • memory/3544-225-0x0000000002770000-0x0000000002780000-memory.dmp

                  Filesize

                  64KB

                • memory/3544-226-0x0000000002770000-0x0000000002780000-memory.dmp

                  Filesize

                  64KB

                • memory/3544-227-0x0000000002770000-0x0000000002780000-memory.dmp

                  Filesize

                  64KB

                • memory/3544-228-0x0000000000400000-0x0000000000803000-memory.dmp

                  Filesize

                  4.0MB

                • memory/3544-230-0x0000000002770000-0x0000000002780000-memory.dmp

                  Filesize

                  64KB

                • memory/3544-215-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-232-0x0000000002770000-0x0000000002780000-memory.dmp

                  Filesize

                  64KB

                • memory/3544-233-0x0000000000400000-0x0000000000803000-memory.dmp

                  Filesize

                  4.0MB

                • memory/3544-211-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-209-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-207-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-205-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-203-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-201-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-217-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-196-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/3544-197-0x0000000002580000-0x0000000002592000-memory.dmp

                  Filesize

                  72KB

                • memory/4352-1049-0x0000000007970000-0x0000000007A7A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4352-1050-0x0000000007A90000-0x0000000007ACC000-memory.dmp

                  Filesize

                  240KB

                • memory/4352-256-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4352-258-0x0000000004DD0000-0x0000000004E05000-memory.dmp

                  Filesize

                  212KB

                • memory/4352-257-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4352-260-0x0000000004DD0000-0x0000000004E05000-memory.dmp

                  Filesize

                  212KB

                • memory/4352-1047-0x0000000007F40000-0x0000000008558000-memory.dmp

                  Filesize

                  6.1MB

                • memory/4352-1048-0x0000000007950000-0x0000000007962000-memory.dmp

                  Filesize

                  72KB

                • memory/4352-253-0x0000000004DD0000-0x0000000004E05000-memory.dmp

                  Filesize

                  212KB

                • memory/4352-1051-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4352-254-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4352-1053-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4352-1054-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4352-1055-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4352-1056-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4352-251-0x0000000000970000-0x00000000009B6000-memory.dmp

                  Filesize

                  280KB

                • memory/4352-252-0x0000000004DD0000-0x0000000004E05000-memory.dmp

                  Filesize

                  212KB