Analysis

  • max time kernel
    159s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/02/2023, 20:56

General

  • Target

    file.exe

  • Size

    1.1MB

  • MD5

    b342f8e445b1a8fb5c12191d9240d0e4

  • SHA1

    2003f89fbe0742a87f7424c552073de3a986026d

  • SHA256

    8d144b2d6e3def56a97555bb0a85059dd5e469b01ecd9da21b57f4682cca3883

  • SHA512

    03a42bafe00524ca764cc3730efb68c633dd2b75e556626bab41e65d5b62b46a698537694fccd48edbe43ad5e09d01b12613b3e968416d673f1b268fcd028a84

  • SSDEEP

    24576:NyO35fhvUx0TLj06oYQn/3mI34ZvqGGvv28jn/Q:oO35J82TTv4eIoZNU

Malware Config

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gOI69DB.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gOI69DB.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gHt92kL.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gHt92kL.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gin14nf.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gin14nf.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2104
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\avc47Bu.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\avc47Bu.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1432
            • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
              "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3652
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:3528
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:64
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4816
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "mnolyk.exe" /P "Admin:N"
                    8⤵
                      PID:4380
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "mnolyk.exe" /P "Admin:R" /E
                      8⤵
                        PID:312
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:2360
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\4b9a106e76" /P "Admin:N"
                          8⤵
                            PID:60
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\4b9a106e76" /P "Admin:R" /E
                            8⤵
                              PID:2660
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:744
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bqF41JT.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bqF41JT.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4496
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cyo9192.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cyo9192.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1484
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 1336
                        5⤵
                        • Program crash
                        PID:2376
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwW4303.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwW4303.exe
                    3⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Executes dropped EXE
                    • Windows security modification
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3572
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 1084
                      4⤵
                      • Program crash
                      PID:944
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fAV23.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fAV23.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4476
              • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                1⤵
                • Executes dropped EXE
                PID:940
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1484 -ip 1484
                1⤵
                  PID:2692
                • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                  C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4508
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3572 -ip 3572
                  1⤵
                    PID:1320

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                    Filesize

                    236KB

                    MD5

                    8bb923c4d81284daef7896e5682df6c6

                    SHA1

                    67e34a96b77e44b666c5479f540995bdeacf5de2

                    SHA256

                    9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                    SHA512

                    2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                  • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                    Filesize

                    236KB

                    MD5

                    8bb923c4d81284daef7896e5682df6c6

                    SHA1

                    67e34a96b77e44b666c5479f540995bdeacf5de2

                    SHA256

                    9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                    SHA512

                    2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                  • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                    Filesize

                    236KB

                    MD5

                    8bb923c4d81284daef7896e5682df6c6

                    SHA1

                    67e34a96b77e44b666c5479f540995bdeacf5de2

                    SHA256

                    9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                    SHA512

                    2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                  • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe

                    Filesize

                    236KB

                    MD5

                    8bb923c4d81284daef7896e5682df6c6

                    SHA1

                    67e34a96b77e44b666c5479f540995bdeacf5de2

                    SHA256

                    9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                    SHA512

                    2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fAV23.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fAV23.exe

                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gOI69DB.exe

                    Filesize

                    1.0MB

                    MD5

                    ea22f41ff0a90ca81284aec3dde33593

                    SHA1

                    9c434b1890c2d28ff64a072fd559bcdeeaa8090d

                    SHA256

                    8150a8bd8e0e268226980b3289cc56bf9d0349b41a2f2ddfe523e4478c723600

                    SHA512

                    783f73e711e953c7a057371180e701ad548e2aae0a4545239316fa7e2307169780a558dc856020108e55fb2bde8cd1b96bec1fc32f8513e389dd16c942983c55

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gOI69DB.exe

                    Filesize

                    1.0MB

                    MD5

                    ea22f41ff0a90ca81284aec3dde33593

                    SHA1

                    9c434b1890c2d28ff64a072fd559bcdeeaa8090d

                    SHA256

                    8150a8bd8e0e268226980b3289cc56bf9d0349b41a2f2ddfe523e4478c723600

                    SHA512

                    783f73e711e953c7a057371180e701ad548e2aae0a4545239316fa7e2307169780a558dc856020108e55fb2bde8cd1b96bec1fc32f8513e389dd16c942983c55

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwW4303.exe

                    Filesize

                    427KB

                    MD5

                    0c87b90de994371b24beb289ca177975

                    SHA1

                    a8d63494cd9372a0cb408c414fc0de7e277e2f5b

                    SHA256

                    65135f1312b6dcd8db495ab0c61f516c46c2afe5e5ef5de76b4b58adfd264edb

                    SHA512

                    9248a9d20964c8a798be1f188ef5170125da10c4dee4c295f98c75e8409beddaa64cf101d349a30e40bdafbfba56aebe541e6094a2946d2c249c34a0c7955edd

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dwW4303.exe

                    Filesize

                    427KB

                    MD5

                    0c87b90de994371b24beb289ca177975

                    SHA1

                    a8d63494cd9372a0cb408c414fc0de7e277e2f5b

                    SHA256

                    65135f1312b6dcd8db495ab0c61f516c46c2afe5e5ef5de76b4b58adfd264edb

                    SHA512

                    9248a9d20964c8a798be1f188ef5170125da10c4dee4c295f98c75e8409beddaa64cf101d349a30e40bdafbfba56aebe541e6094a2946d2c249c34a0c7955edd

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gHt92kL.exe

                    Filesize

                    693KB

                    MD5

                    9341a2c0efdbf22a634a1bd07b602f85

                    SHA1

                    f7cb9a692f7a02138ae365ada03d6911c536e0b8

                    SHA256

                    330972007687423f812cb184b15637fcb7e50a22aeb0ebdc15232eaee88e2cb7

                    SHA512

                    66d2ba4cf4eae5d134850ae5736c6480166f5c9c4845cf26230d87d303a84df00634ccd3a9c2f8e18ea48054b8364a86af678164541ec61d50eb1b97bb0c0f3f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gHt92kL.exe

                    Filesize

                    693KB

                    MD5

                    9341a2c0efdbf22a634a1bd07b602f85

                    SHA1

                    f7cb9a692f7a02138ae365ada03d6911c536e0b8

                    SHA256

                    330972007687423f812cb184b15637fcb7e50a22aeb0ebdc15232eaee88e2cb7

                    SHA512

                    66d2ba4cf4eae5d134850ae5736c6480166f5c9c4845cf26230d87d303a84df00634ccd3a9c2f8e18ea48054b8364a86af678164541ec61d50eb1b97bb0c0f3f

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cyo9192.exe

                    Filesize

                    484KB

                    MD5

                    614b12058b54048770b9be8b5bccc40f

                    SHA1

                    21d66d0750eef2292da5ff77ea538545961f43bc

                    SHA256

                    8c1b47fe3390ff214919d66d919b6b4f0d1e069e90629126441e6505f267e43e

                    SHA512

                    8aa943bab153a21e8c34239818ba085853fdc4a1ae5351f85ed35f3d234ebdbef2ff228d489cf6b6f788a814b7fb3af3a457ff94a0725a20ee9f985464742c90

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cyo9192.exe

                    Filesize

                    484KB

                    MD5

                    614b12058b54048770b9be8b5bccc40f

                    SHA1

                    21d66d0750eef2292da5ff77ea538545961f43bc

                    SHA256

                    8c1b47fe3390ff214919d66d919b6b4f0d1e069e90629126441e6505f267e43e

                    SHA512

                    8aa943bab153a21e8c34239818ba085853fdc4a1ae5351f85ed35f3d234ebdbef2ff228d489cf6b6f788a814b7fb3af3a457ff94a0725a20ee9f985464742c90

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gin14nf.exe

                    Filesize

                    286KB

                    MD5

                    172d8b15c89b535b5269d3cf0ebb4589

                    SHA1

                    f67af17c7444ff1ddd7810ae34ef65eebd65e2a3

                    SHA256

                    2cbd7a163647366aa65b31910e59ce93acb0aa3c9327bb339e11d24f9667d69f

                    SHA512

                    d430276ac6a463000a199628a7551a4c405a44cb9e232284762d7942190dd7c38645f52b489fe8fe590c6fa9cc88edafda3e63284801555b2e9055b77aeefe8a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gin14nf.exe

                    Filesize

                    286KB

                    MD5

                    172d8b15c89b535b5269d3cf0ebb4589

                    SHA1

                    f67af17c7444ff1ddd7810ae34ef65eebd65e2a3

                    SHA256

                    2cbd7a163647366aa65b31910e59ce93acb0aa3c9327bb339e11d24f9667d69f

                    SHA512

                    d430276ac6a463000a199628a7551a4c405a44cb9e232284762d7942190dd7c38645f52b489fe8fe590c6fa9cc88edafda3e63284801555b2e9055b77aeefe8a

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\avc47Bu.exe

                    Filesize

                    236KB

                    MD5

                    8bb923c4d81284daef7896e5682df6c6

                    SHA1

                    67e34a96b77e44b666c5479f540995bdeacf5de2

                    SHA256

                    9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                    SHA512

                    2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\avc47Bu.exe

                    Filesize

                    236KB

                    MD5

                    8bb923c4d81284daef7896e5682df6c6

                    SHA1

                    67e34a96b77e44b666c5479f540995bdeacf5de2

                    SHA256

                    9b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21

                    SHA512

                    2daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bqF41JT.exe

                    Filesize

                    175KB

                    MD5

                    69f79e05d0c83aee310d9adfe5aa7f2b

                    SHA1

                    485c490180380051a14316564fbda07723be11b1

                    SHA256

                    c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

                    SHA512

                    f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bqF41JT.exe

                    Filesize

                    175KB

                    MD5

                    69f79e05d0c83aee310d9adfe5aa7f2b

                    SHA1

                    485c490180380051a14316564fbda07723be11b1

                    SHA256

                    c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

                    SHA512

                    f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    c79b74d8fec5e7e2ba2f1789fd582a15

                    SHA1

                    78a1e5d99dbaccc5e07b125e1dfb280112cb3128

                    SHA256

                    b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3

                    SHA512

                    0debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    c79b74d8fec5e7e2ba2f1789fd582a15

                    SHA1

                    78a1e5d99dbaccc5e07b125e1dfb280112cb3128

                    SHA256

                    b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3

                    SHA512

                    0debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba

                  • memory/1484-177-0x00000000005B3000-0x00000000005E1000-memory.dmp

                    Filesize

                    184KB

                  • memory/1484-178-0x0000000002150000-0x000000000219B000-memory.dmp

                    Filesize

                    300KB

                  • memory/1484-180-0x00000000005B3000-0x00000000005E1000-memory.dmp

                    Filesize

                    184KB

                  • memory/1484-181-0x00000000005B3000-0x00000000005E1000-memory.dmp

                    Filesize

                    184KB

                  • memory/1484-179-0x0000000000400000-0x00000000004E0000-memory.dmp

                    Filesize

                    896KB

                  • memory/1484-182-0x0000000000400000-0x00000000004E0000-memory.dmp

                    Filesize

                    896KB

                  • memory/3572-188-0x0000000000400000-0x00000000004D1000-memory.dmp

                    Filesize

                    836KB

                  • memory/3572-186-0x0000000000733000-0x0000000000753000-memory.dmp

                    Filesize

                    128KB

                  • memory/3572-187-0x0000000000660000-0x000000000068D000-memory.dmp

                    Filesize

                    180KB

                  • memory/3572-190-0x0000000000400000-0x00000000004D1000-memory.dmp

                    Filesize

                    836KB

                  • memory/4476-194-0x0000000000560000-0x000000000056A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4496-168-0x0000000006020000-0x00000000065C4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4496-170-0x0000000005F50000-0x0000000005FC6000-memory.dmp

                    Filesize

                    472KB

                  • memory/4496-161-0x0000000004D90000-0x0000000004DA2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4496-173-0x0000000006EA0000-0x00000000073CC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4496-172-0x00000000067A0000-0x0000000006962000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4496-171-0x0000000002330000-0x0000000002380000-memory.dmp

                    Filesize

                    320KB

                  • memory/4496-162-0x0000000004F70000-0x0000000004FAC000-memory.dmp

                    Filesize

                    240KB

                  • memory/4496-169-0x0000000005BE0000-0x0000000005C46000-memory.dmp

                    Filesize

                    408KB

                  • memory/4496-160-0x0000000004E60000-0x0000000004F6A000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4496-167-0x00000000059D0000-0x0000000005A62000-memory.dmp

                    Filesize

                    584KB

                  • memory/4496-158-0x00000000003C0000-0x00000000003F2000-memory.dmp

                    Filesize

                    200KB

                  • memory/4496-159-0x00000000052E0000-0x00000000058F8000-memory.dmp

                    Filesize

                    6.1MB