Analysis

  • max time kernel
    189s
  • max time network
    230s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 20:59

General

  • Target

    2378a089e86fe43035b8d0fa3705cd28.exe

  • Size

    1.1MB

  • MD5

    2378a089e86fe43035b8d0fa3705cd28

  • SHA1

    5ce4651a5e00d94c5b51c6f44a12f8d167223b43

  • SHA256

    bdf0f48d5fe2fbc3e89e5a370afea4306980daef0e4db38b3f48fb5979513f53

  • SHA512

    6c88e726a772da47fb5f99ab98c7aa7816f788a1fc316f0ee54007fc01ad882e9e1d995c4753fce192e748771056511da73f6a12ed8891368a37bad1209785fb

  • SSDEEP

    24576:qyRHOXfDEmTl0Z8ctUEQeWKS8iCBL9SLckRME1+uFVlUozHwFIW:xEX1dct+7TlMAL1+DuLlHkF

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2378a089e86fe43035b8d0fa3705cd28.exe
    "C:\Users\Admin\AppData\Local\Temp\2378a089e86fe43035b8d0fa3705cd28.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fF269465.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fF269465.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\le137535.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\le137535.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4936
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ve690686.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ve690686.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4368
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\106718830.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\106718830.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4592
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\282773176.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\282773176.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2252
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 1088
              6⤵
              • Program crash
              PID:4764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\389074692.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\389074692.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:528
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1752
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:544
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3348
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:2508
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  7⤵
                    PID:1916
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:R" /E
                    7⤵
                      PID:3008
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:3700
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\cb7ae701b3" /P "Admin:N"
                        7⤵
                          PID:3492
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\cb7ae701b3" /P "Admin:R" /E
                          7⤵
                            PID:5028
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\457879449.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\457879449.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3676
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2252 -ip 2252
                1⤵
                  PID:5088
                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3252
                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1820

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fF269465.exe

                  Filesize

                  993KB

                  MD5

                  80aaf67aec35cb8d3d85a224cb04eee2

                  SHA1

                  1ec3ec9015cf7338fde523a70cb0c4e8dc34d4bf

                  SHA256

                  21f51c99566f597b5d1808499b25dd25f75a7a202fc86d3472eda333f207c46a

                  SHA512

                  83ab28f5b56a82a37a66f62e7b2a8cfb9350649a87f5ac5bb4db72d0c9668ffe3c1f20518b15e60269e6137ae1bf96af959a0ba05255bcce5053801389a26aa4

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fF269465.exe

                  Filesize

                  993KB

                  MD5

                  80aaf67aec35cb8d3d85a224cb04eee2

                  SHA1

                  1ec3ec9015cf7338fde523a70cb0c4e8dc34d4bf

                  SHA256

                  21f51c99566f597b5d1808499b25dd25f75a7a202fc86d3472eda333f207c46a

                  SHA512

                  83ab28f5b56a82a37a66f62e7b2a8cfb9350649a87f5ac5bb4db72d0c9668ffe3c1f20518b15e60269e6137ae1bf96af959a0ba05255bcce5053801389a26aa4

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\457879449.exe

                  Filesize

                  415KB

                  MD5

                  bb5734e6ce0ce7c53702701160ed351f

                  SHA1

                  425fd1c9f583496089d3aa3ef481d8db3a864085

                  SHA256

                  b58952c85508aec56b9312bdd5ca71e085123227b754ad8797243ef6a1846c90

                  SHA512

                  6ab9684c270587c568d5d70eae6e0bd1efb0f70d5420a6d0cd66a009841988b31c9db65ffa605e209018a807aae57c68750b484254733a4d4d2833cc7fca52b8

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\457879449.exe

                  Filesize

                  415KB

                  MD5

                  bb5734e6ce0ce7c53702701160ed351f

                  SHA1

                  425fd1c9f583496089d3aa3ef481d8db3a864085

                  SHA256

                  b58952c85508aec56b9312bdd5ca71e085123227b754ad8797243ef6a1846c90

                  SHA512

                  6ab9684c270587c568d5d70eae6e0bd1efb0f70d5420a6d0cd66a009841988b31c9db65ffa605e209018a807aae57c68750b484254733a4d4d2833cc7fca52b8

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\le137535.exe

                  Filesize

                  609KB

                  MD5

                  9e835d999a4690b0c2973cecb4450f31

                  SHA1

                  c34402c03c106d931602e0ea8554a6de71f55a89

                  SHA256

                  7ecdfb4c57e4e03fcab03eb57e7da29347cc64c5620b51fdeb764e7e5f48f249

                  SHA512

                  cd9f39a1c11bdd4dce9c3ea62709e2b648deb14bd0386a4c3872d1aeb95bb3fe14c87ef54e2570091a638a7d952e151ac96e50930b64f47b0b8bbec6f2a41cf3

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\le137535.exe

                  Filesize

                  609KB

                  MD5

                  9e835d999a4690b0c2973cecb4450f31

                  SHA1

                  c34402c03c106d931602e0ea8554a6de71f55a89

                  SHA256

                  7ecdfb4c57e4e03fcab03eb57e7da29347cc64c5620b51fdeb764e7e5f48f249

                  SHA512

                  cd9f39a1c11bdd4dce9c3ea62709e2b648deb14bd0386a4c3872d1aeb95bb3fe14c87ef54e2570091a638a7d952e151ac96e50930b64f47b0b8bbec6f2a41cf3

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\389074692.exe

                  Filesize

                  204KB

                  MD5

                  c4852145b0b71f65b513ebbc0bdc0fbb

                  SHA1

                  b63fe8c5313a89a76f82c4c6843da4b34a3991a4

                  SHA256

                  171663052a944cb6f45b1b41432620a5834e8ec8a954dca658e294a28b99cff5

                  SHA512

                  38f7842ffebb2a0b7d092c505bd8cdf41d925609b61dfc6c8457f27d6ddaeee46c11040b53823bba0756e4eb9a7a4bbb799eabcfdb24ee773cd2c1c821aea767

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\389074692.exe

                  Filesize

                  204KB

                  MD5

                  c4852145b0b71f65b513ebbc0bdc0fbb

                  SHA1

                  b63fe8c5313a89a76f82c4c6843da4b34a3991a4

                  SHA256

                  171663052a944cb6f45b1b41432620a5834e8ec8a954dca658e294a28b99cff5

                  SHA512

                  38f7842ffebb2a0b7d092c505bd8cdf41d925609b61dfc6c8457f27d6ddaeee46c11040b53823bba0756e4eb9a7a4bbb799eabcfdb24ee773cd2c1c821aea767

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ve690686.exe

                  Filesize

                  437KB

                  MD5

                  c2cbbdcf64bbc03e78d8b229cd07ec55

                  SHA1

                  669927c6ad5e3f386196e62512d0ff3f970112d8

                  SHA256

                  990be1d0d55861f39655f3f9e61d4c8cba8ed5923e7719bca34576807b39a72c

                  SHA512

                  040214cc5d0a646a62a5cdecb6f2c33d99bb5ef4dd55bef223b2855a7ffe8ceb8a347e7d69d3058c03176681ae2583d605ec859ccc1e42480f83dc1aed512f66

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ve690686.exe

                  Filesize

                  437KB

                  MD5

                  c2cbbdcf64bbc03e78d8b229cd07ec55

                  SHA1

                  669927c6ad5e3f386196e62512d0ff3f970112d8

                  SHA256

                  990be1d0d55861f39655f3f9e61d4c8cba8ed5923e7719bca34576807b39a72c

                  SHA512

                  040214cc5d0a646a62a5cdecb6f2c33d99bb5ef4dd55bef223b2855a7ffe8ceb8a347e7d69d3058c03176681ae2583d605ec859ccc1e42480f83dc1aed512f66

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\106718830.exe

                  Filesize

                  175KB

                  MD5

                  2150ad95f5185c58e92e74d081b11440

                  SHA1

                  1fc797085a90335b61e126966a182acc4a23b643

                  SHA256

                  d2a4c04d79c06939a99978d0525dacb9e5c9f4947001fce704a2104391763f83

                  SHA512

                  7848bb43aea63192ae53027639291cb50f69a205ffa24fd77adbb00fee857d6a4632ba56d59939fb17f37f96e43932780164b15e321693fa1d5bbe320f567228

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\106718830.exe

                  Filesize

                  175KB

                  MD5

                  2150ad95f5185c58e92e74d081b11440

                  SHA1

                  1fc797085a90335b61e126966a182acc4a23b643

                  SHA256

                  d2a4c04d79c06939a99978d0525dacb9e5c9f4947001fce704a2104391763f83

                  SHA512

                  7848bb43aea63192ae53027639291cb50f69a205ffa24fd77adbb00fee857d6a4632ba56d59939fb17f37f96e43932780164b15e321693fa1d5bbe320f567228

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\282773176.exe

                  Filesize

                  332KB

                  MD5

                  92f61c1366d0e36062f9cea8c74f1970

                  SHA1

                  8d008c94c79add745979dcab1cc02eb670a53bd7

                  SHA256

                  65b781d9af30a3a59d4c027ce750b3fc654845da7cb83947ad4db5ef441567a9

                  SHA512

                  00e8116bef4a9c270f3f31e4f7b4737bd4114fabce3bcdb381894392ae5222a0d8156e1fd18c442964176c9981d166516b5255f8cc208c703b42a18666f903b9

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\282773176.exe

                  Filesize

                  332KB

                  MD5

                  92f61c1366d0e36062f9cea8c74f1970

                  SHA1

                  8d008c94c79add745979dcab1cc02eb670a53bd7

                  SHA256

                  65b781d9af30a3a59d4c027ce750b3fc654845da7cb83947ad4db5ef441567a9

                  SHA512

                  00e8116bef4a9c270f3f31e4f7b4737bd4114fabce3bcdb381894392ae5222a0d8156e1fd18c442964176c9981d166516b5255f8cc208c703b42a18666f903b9

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  204KB

                  MD5

                  c4852145b0b71f65b513ebbc0bdc0fbb

                  SHA1

                  b63fe8c5313a89a76f82c4c6843da4b34a3991a4

                  SHA256

                  171663052a944cb6f45b1b41432620a5834e8ec8a954dca658e294a28b99cff5

                  SHA512

                  38f7842ffebb2a0b7d092c505bd8cdf41d925609b61dfc6c8457f27d6ddaeee46c11040b53823bba0756e4eb9a7a4bbb799eabcfdb24ee773cd2c1c821aea767

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  204KB

                  MD5

                  c4852145b0b71f65b513ebbc0bdc0fbb

                  SHA1

                  b63fe8c5313a89a76f82c4c6843da4b34a3991a4

                  SHA256

                  171663052a944cb6f45b1b41432620a5834e8ec8a954dca658e294a28b99cff5

                  SHA512

                  38f7842ffebb2a0b7d092c505bd8cdf41d925609b61dfc6c8457f27d6ddaeee46c11040b53823bba0756e4eb9a7a4bbb799eabcfdb24ee773cd2c1c821aea767

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  204KB

                  MD5

                  c4852145b0b71f65b513ebbc0bdc0fbb

                  SHA1

                  b63fe8c5313a89a76f82c4c6843da4b34a3991a4

                  SHA256

                  171663052a944cb6f45b1b41432620a5834e8ec8a954dca658e294a28b99cff5

                  SHA512

                  38f7842ffebb2a0b7d092c505bd8cdf41d925609b61dfc6c8457f27d6ddaeee46c11040b53823bba0756e4eb9a7a4bbb799eabcfdb24ee773cd2c1c821aea767

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  204KB

                  MD5

                  c4852145b0b71f65b513ebbc0bdc0fbb

                  SHA1

                  b63fe8c5313a89a76f82c4c6843da4b34a3991a4

                  SHA256

                  171663052a944cb6f45b1b41432620a5834e8ec8a954dca658e294a28b99cff5

                  SHA512

                  38f7842ffebb2a0b7d092c505bd8cdf41d925609b61dfc6c8457f27d6ddaeee46c11040b53823bba0756e4eb9a7a4bbb799eabcfdb24ee773cd2c1c821aea767

                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                  Filesize

                  204KB

                  MD5

                  c4852145b0b71f65b513ebbc0bdc0fbb

                  SHA1

                  b63fe8c5313a89a76f82c4c6843da4b34a3991a4

                  SHA256

                  171663052a944cb6f45b1b41432620a5834e8ec8a954dca658e294a28b99cff5

                  SHA512

                  38f7842ffebb2a0b7d092c505bd8cdf41d925609b61dfc6c8457f27d6ddaeee46c11040b53823bba0756e4eb9a7a4bbb799eabcfdb24ee773cd2c1c821aea767

                • memory/2252-214-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-230-0x0000000000400000-0x0000000000466000-memory.dmp

                  Filesize

                  408KB

                • memory/2252-235-0x0000000000400000-0x0000000000466000-memory.dmp

                  Filesize

                  408KB

                • memory/2252-234-0x0000000004C20000-0x0000000004C30000-memory.dmp

                  Filesize

                  64KB

                • memory/2252-233-0x0000000004C20000-0x0000000004C30000-memory.dmp

                  Filesize

                  64KB

                • memory/2252-232-0x0000000004C20000-0x0000000004C30000-memory.dmp

                  Filesize

                  64KB

                • memory/2252-229-0x0000000004C20000-0x0000000004C30000-memory.dmp

                  Filesize

                  64KB

                • memory/2252-228-0x0000000004C20000-0x0000000004C30000-memory.dmp

                  Filesize

                  64KB

                • memory/2252-227-0x00000000005F0000-0x000000000061D000-memory.dmp

                  Filesize

                  180KB

                • memory/2252-226-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-224-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-199-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-200-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-202-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-204-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-206-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-208-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-210-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-212-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-222-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-216-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-220-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/2252-218-0x00000000022B0000-0x00000000022C2000-memory.dmp

                  Filesize

                  72KB

                • memory/3676-1050-0x0000000007BF0000-0x0000000007CFA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/3676-254-0x0000000004A20000-0x0000000004A55000-memory.dmp

                  Filesize

                  212KB

                • memory/3676-1057-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/3676-1056-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/3676-1055-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/3676-1054-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/3676-1052-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/3676-1051-0x0000000007D10000-0x0000000007D4C000-memory.dmp

                  Filesize

                  240KB

                • memory/3676-1049-0x0000000004B70000-0x0000000004B82000-memory.dmp

                  Filesize

                  72KB

                • memory/3676-253-0x0000000004A20000-0x0000000004A55000-memory.dmp

                  Filesize

                  212KB

                • memory/3676-1048-0x00000000075D0000-0x0000000007BE8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/3676-261-0x0000000004A20000-0x0000000004A55000-memory.dmp

                  Filesize

                  212KB

                • memory/3676-259-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/3676-258-0x0000000004A20000-0x0000000004A55000-memory.dmp

                  Filesize

                  212KB

                • memory/3676-257-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                  Filesize

                  64KB

                • memory/3676-256-0x00000000006F0000-0x0000000000736000-memory.dmp

                  Filesize

                  280KB

                • memory/4592-185-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-183-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-177-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-179-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-165-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-167-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-169-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-171-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-173-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-193-0x0000000004A20000-0x0000000004A30000-memory.dmp

                  Filesize

                  64KB

                • memory/4592-187-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-175-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-189-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-181-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-191-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-192-0x0000000004A20000-0x0000000004A30000-memory.dmp

                  Filesize

                  64KB

                • memory/4592-163-0x0000000004A20000-0x0000000004A30000-memory.dmp

                  Filesize

                  64KB

                • memory/4592-164-0x0000000004960000-0x0000000004973000-memory.dmp

                  Filesize

                  76KB

                • memory/4592-162-0x0000000004A20000-0x0000000004A30000-memory.dmp

                  Filesize

                  64KB

                • memory/4592-161-0x0000000004A30000-0x0000000004FD4000-memory.dmp

                  Filesize

                  5.6MB