Analysis

  • max time kernel
    129s
  • max time network
    187s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-12-2022 11:48

General

  • Target

    17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe

  • Size

    310KB

  • MD5

    074aea4f0466ec20c9f7b4669578e8ac

  • SHA1

    63ddadae65c4a15c5504c0632bfabcf9a478d603

  • SHA256

    17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e

  • SHA512

    b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca

  • SSDEEP

    3072:IQgpJhlCORXi5lK4d9pptt2OWOra2L8ICgI/q2IC3myueNZ+59hTDw02rwlpRj5f:Y/R6dHptVr8I70J3mMNZEU02slfe2U

Malware Config

Extracted

Family

amadey

Version

3.50

C2

62.204.41.6/p9cWxH/index.php

Extracted

Family

redline

Botnet

NewDef2023

C2

185.106.92.214:2510

Attributes
  • auth_value

    048f34b18865578890538db10b2e9edf

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe
    "C:\Users\Admin\AppData\Local\Temp\17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:3460
      • C:\Users\Admin\AppData\Local\Temp\1000010001\anon.exe
        "C:\Users\Admin\AppData\Local\Temp\1000010001\anon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4756
      • C:\Users\Admin\AppData\Local\Temp\1000011001\linda5.exe
        "C:\Users\Admin\AppData\Local\Temp\1000011001\linda5.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3616
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\A3HE.CPl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4772
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\A3HE.CPl",
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:312
            • C:\Windows\system32\RunDll32.exe
              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\A3HE.CPl",
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2760
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\A3HE.CPl",
                7⤵
                • Loads dropped DLL
                PID:3824
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • outlook_win_path
        PID:4412
  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:924
  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    1⤵
    • Executes dropped EXE
    PID:3860

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1000010001\anon.exe
    Filesize

    330KB

    MD5

    0da15cc2749e7117722946f24f941a52

    SHA1

    466f5d7208af46d10a33efb50235099024ba9d8b

    SHA256

    d510a346e59953f8015eb4f8f014896f25255f28a924a749d54152ebb6cfe4df

    SHA512

    e2af593a8babe932d62b2b8f83f55037f31d8650d140b4b839ff3a5f2220d243e4a5e526065f90b8516db73f7fce6ae53f6c76083c4bdf6335c1ec527fea8000

  • C:\Users\Admin\AppData\Local\Temp\1000010001\anon.exe
    Filesize

    330KB

    MD5

    0da15cc2749e7117722946f24f941a52

    SHA1

    466f5d7208af46d10a33efb50235099024ba9d8b

    SHA256

    d510a346e59953f8015eb4f8f014896f25255f28a924a749d54152ebb6cfe4df

    SHA512

    e2af593a8babe932d62b2b8f83f55037f31d8650d140b4b839ff3a5f2220d243e4a5e526065f90b8516db73f7fce6ae53f6c76083c4bdf6335c1ec527fea8000

  • C:\Users\Admin\AppData\Local\Temp\1000011001\linda5.exe
    Filesize

    1.6MB

    MD5

    2c199298ae06bd824b1a7349bf689121

    SHA1

    38c9703832098397757a9f8bd01411eea459f263

    SHA256

    77b7c841e994b84d073f7e66f1ddb038066b86f608fe68ed8eebe44e5a049f0e

    SHA512

    4bbea89d5c7b9e406ade97ae66f986d7e1378f021dcc21e5bc06d3672be288e79b2fa5d260ee5c2470930e206c0df994830bad12694dfa98e8d9d4d466005f4c

  • C:\Users\Admin\AppData\Local\Temp\1000011001\linda5.exe
    Filesize

    1.6MB

    MD5

    2c199298ae06bd824b1a7349bf689121

    SHA1

    38c9703832098397757a9f8bd01411eea459f263

    SHA256

    77b7c841e994b84d073f7e66f1ddb038066b86f608fe68ed8eebe44e5a049f0e

    SHA512

    4bbea89d5c7b9e406ade97ae66f986d7e1378f021dcc21e5bc06d3672be288e79b2fa5d260ee5c2470930e206c0df994830bad12694dfa98e8d9d4d466005f4c

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    310KB

    MD5

    074aea4f0466ec20c9f7b4669578e8ac

    SHA1

    63ddadae65c4a15c5504c0632bfabcf9a478d603

    SHA256

    17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e

    SHA512

    b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    310KB

    MD5

    074aea4f0466ec20c9f7b4669578e8ac

    SHA1

    63ddadae65c4a15c5504c0632bfabcf9a478d603

    SHA256

    17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e

    SHA512

    b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    310KB

    MD5

    074aea4f0466ec20c9f7b4669578e8ac

    SHA1

    63ddadae65c4a15c5504c0632bfabcf9a478d603

    SHA256

    17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e

    SHA512

    b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca

  • C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
    Filesize

    310KB

    MD5

    074aea4f0466ec20c9f7b4669578e8ac

    SHA1

    63ddadae65c4a15c5504c0632bfabcf9a478d603

    SHA256

    17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e

    SHA512

    b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca

  • C:\Users\Admin\AppData\Local\Temp\A3HE.CPl
    Filesize

    2.8MB

    MD5

    41bd04aed995a0c85aade918e354d154

    SHA1

    b89b59708ac1540212422cb0adb57eff61492713

    SHA256

    d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09

    SHA512

    e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    98cc0f811ad5ff43fedc262961002498

    SHA1

    37e48635fcef35c0b3db3c1f0c35833899eb53d8

    SHA256

    62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

    SHA512

    d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

  • \Users\Admin\AppData\Local\Temp\A3HE.cpl
    Filesize

    2.8MB

    MD5

    41bd04aed995a0c85aade918e354d154

    SHA1

    b89b59708ac1540212422cb0adb57eff61492713

    SHA256

    d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09

    SHA512

    e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17

  • \Users\Admin\AppData\Local\Temp\A3HE.cpl
    Filesize

    2.8MB

    MD5

    41bd04aed995a0c85aade918e354d154

    SHA1

    b89b59708ac1540212422cb0adb57eff61492713

    SHA256

    d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09

    SHA512

    e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17

  • \Users\Admin\AppData\Local\Temp\A3HE.cpl
    Filesize

    2.8MB

    MD5

    41bd04aed995a0c85aade918e354d154

    SHA1

    b89b59708ac1540212422cb0adb57eff61492713

    SHA256

    d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09

    SHA512

    e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17

  • \Users\Admin\AppData\Local\Temp\A3HE.cpl
    Filesize

    2.8MB

    MD5

    41bd04aed995a0c85aade918e354d154

    SHA1

    b89b59708ac1540212422cb0adb57eff61492713

    SHA256

    d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09

    SHA512

    e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    98cc0f811ad5ff43fedc262961002498

    SHA1

    37e48635fcef35c0b3db3c1f0c35833899eb53d8

    SHA256

    62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

    SHA512

    d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
    Filesize

    126KB

    MD5

    98cc0f811ad5ff43fedc262961002498

    SHA1

    37e48635fcef35c0b3db3c1f0c35833899eb53d8

    SHA256

    62d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be

    SHA512

    d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1

  • memory/312-617-0x0000000004E60000-0x0000000004F74000-memory.dmp
    Filesize

    1.1MB

  • memory/312-494-0x0000000004E60000-0x0000000004F74000-memory.dmp
    Filesize

    1.1MB

  • memory/312-493-0x0000000004AC0000-0x0000000004D36000-memory.dmp
    Filesize

    2.5MB

  • memory/312-437-0x0000000000000000-mapping.dmp
  • memory/924-607-0x0000000000400000-0x0000000000483000-memory.dmp
    Filesize

    524KB

  • memory/924-606-0x00000000006DB000-0x00000000006FA000-memory.dmp
    Filesize

    124KB

  • memory/2708-136-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-135-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-140-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-141-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-142-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-143-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-144-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-145-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-146-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-147-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-148-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-149-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-150-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-151-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-152-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-153-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-154-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-155-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-156-0x0000000000400000-0x0000000000483000-memory.dmp
    Filesize

    524KB

  • memory/2708-157-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-158-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-159-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-160-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-161-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-162-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-163-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-164-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-165-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-116-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-138-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-137-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-139-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-169-0x0000000002070000-0x00000000020AE000-memory.dmp
    Filesize

    248KB

  • memory/2708-172-0x0000000000400000-0x0000000000483000-memory.dmp
    Filesize

    524KB

  • memory/2708-134-0x0000000002070000-0x00000000020AE000-memory.dmp
    Filesize

    248KB

  • memory/2708-133-0x0000000000590000-0x00000000006DA000-memory.dmp
    Filesize

    1.3MB

  • memory/2708-117-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-132-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-118-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-131-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-129-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-128-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-127-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-119-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-115-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-126-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-125-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-120-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-121-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-124-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-123-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2708-122-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/2760-507-0x0000000000000000-mapping.dmp
  • memory/3460-221-0x0000000000000000-mapping.dmp
  • memory/3616-263-0x0000000000000000-mapping.dmp
  • memory/3824-508-0x0000000000000000-mapping.dmp
  • memory/3824-556-0x0000000004E40000-0x00000000050B6000-memory.dmp
    Filesize

    2.5MB

  • memory/3824-557-0x00000000051E0000-0x00000000052F4000-memory.dmp
    Filesize

    1.1MB

  • memory/3824-616-0x00000000051E0000-0x00000000052F4000-memory.dmp
    Filesize

    1.1MB

  • memory/3860-745-0x0000000000400000-0x0000000000483000-memory.dmp
    Filesize

    524KB

  • memory/4412-625-0x0000000000000000-mapping.dmp
  • memory/4756-469-0x00000000050C0000-0x00000000051CA000-memory.dmp
    Filesize

    1.0MB

  • memory/4756-465-0x00000000058C0000-0x0000000005EC6000-memory.dmp
    Filesize

    6.0MB

  • memory/4756-335-0x0000000000726000-0x0000000000757000-memory.dmp
    Filesize

    196KB

  • memory/4756-336-0x0000000000490000-0x00000000005DA000-memory.dmp
    Filesize

    1.3MB

  • memory/4756-337-0x0000000000400000-0x0000000000488000-memory.dmp
    Filesize

    544KB

  • memory/4756-359-0x0000000002390000-0x00000000023CE000-memory.dmp
    Filesize

    248KB

  • memory/4756-368-0x0000000004A20000-0x0000000004F1E000-memory.dmp
    Filesize

    5.0MB

  • memory/4756-370-0x0000000004F60000-0x0000000004F9C000-memory.dmp
    Filesize

    240KB

  • memory/4756-374-0x0000000004FA0000-0x0000000005032000-memory.dmp
    Filesize

    584KB

  • memory/4756-495-0x00000000053B0000-0x00000000053FB000-memory.dmp
    Filesize

    300KB

  • memory/4756-624-0x0000000000400000-0x0000000000488000-memory.dmp
    Filesize

    544KB

  • memory/4756-498-0x0000000000490000-0x00000000005DA000-memory.dmp
    Filesize

    1.3MB

  • memory/4756-623-0x0000000000726000-0x0000000000757000-memory.dmp
    Filesize

    196KB

  • memory/4756-481-0x0000000005200000-0x0000000005212000-memory.dmp
    Filesize

    72KB

  • memory/4756-568-0x00000000063E0000-0x000000000690C000-memory.dmp
    Filesize

    5.2MB

  • memory/4756-567-0x0000000006200000-0x00000000063C2000-memory.dmp
    Filesize

    1.8MB

  • memory/4756-559-0x0000000005510000-0x0000000005576000-memory.dmp
    Filesize

    408KB

  • memory/4756-490-0x0000000005220000-0x000000000525E000-memory.dmp
    Filesize

    248KB

  • memory/4756-252-0x0000000000000000-mapping.dmp
  • memory/4756-497-0x0000000000726000-0x0000000000757000-memory.dmp
    Filesize

    196KB

  • memory/4772-378-0x0000000000000000-mapping.dmp
  • memory/5044-186-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-181-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-195-0x0000000000590000-0x00000000006DA000-memory.dmp
    Filesize

    1.3MB

  • memory/5044-185-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-184-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-182-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-183-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-180-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-192-0x0000000000776000-0x0000000000795000-memory.dmp
    Filesize

    124KB

  • memory/5044-213-0x0000000000400000-0x0000000000483000-memory.dmp
    Filesize

    524KB

  • memory/5044-249-0x0000000000776000-0x0000000000795000-memory.dmp
    Filesize

    124KB

  • memory/5044-187-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-179-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-178-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-176-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-175-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-250-0x0000000000590000-0x00000000006DA000-memory.dmp
    Filesize

    1.3MB

  • memory/5044-251-0x0000000000400000-0x0000000000483000-memory.dmp
    Filesize

    524KB

  • memory/5044-171-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-174-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-173-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-170-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-168-0x0000000076EA0000-0x000000007702E000-memory.dmp
    Filesize

    1.6MB

  • memory/5044-166-0x0000000000000000-mapping.dmp