Analysis
-
max time kernel
114s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 14:06
Static task
static1
Behavioral task
behavioral1
Sample
53e9a8f23ca6c6a974eee45ae8b0e651.exe
Resource
win7-20230220-en
General
-
Target
53e9a8f23ca6c6a974eee45ae8b0e651.exe
-
Size
1014KB
-
MD5
53e9a8f23ca6c6a974eee45ae8b0e651
-
SHA1
96b8c650ba39e629b9d6561d31a8110d2af00e94
-
SHA256
f15b30a7c883a9b483cbb47322a7c2b5cdc6d7a0a8db279c92ecf66f186c65fc
-
SHA512
44faacbf4bf6f3d5f610a8adcf0305ff8afc1866e508bf793bf79eea32eec43007969a766714eb61c532e430c3e80b3bb53707140f2fa4d31268250715e48c79
-
SSDEEP
24576:KyGl8fwEUUMvd+MYvri7hzUOMk1yc9Ew:RGlIwEULvwPkQOMO9
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lida
193.233.20.32:4125
-
auth_value
24052aa2e9b85984a98d80cf08623e8d
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
Anh123
199.115.193.116:11300
-
auth_value
db990971ec3911c24ea05eeccc2e1f60
Signatures
-
Processes:
tz6928.exev7281XS.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz6928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz6928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v7281XS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v7281XS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz6928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz6928.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v7281XS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v7281XS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v7281XS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v7281XS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz6928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz6928.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/2740-210-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-211-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-213-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-215-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-217-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-219-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-221-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-223-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-225-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-227-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-229-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-233-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-231-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-236-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-240-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-239-0x00000000073C0000-0x00000000073D0000-memory.dmp family_redline behavioral2/memory/2740-243-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-245-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral2/memory/2740-247-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
y10sK79.exelegenda.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation y10sK79.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation legenda.exe -
Executes dropped EXE 13 IoCs
Processes:
zap6254.exezap9725.exezap9443.exetz6928.exev7281XS.exew13fk31.exexiXvR01.exey10sK79.exelegenda.exeNasalized.exeNasalized.exeNasalized.exelegenda.exepid process 3060 zap6254.exe 1920 zap9725.exe 1172 zap9443.exe 4984 tz6928.exe 4828 v7281XS.exe 2740 w13fk31.exe 1180 xiXvR01.exe 3248 y10sK79.exe 844 legenda.exe 2080 Nasalized.exe 4856 Nasalized.exe 812 Nasalized.exe 3964 legenda.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4988 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tz6928.exev7281XS.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz6928.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v7281XS.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v7281XS.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
53e9a8f23ca6c6a974eee45ae8b0e651.exezap6254.exezap9725.exezap9443.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53e9a8f23ca6c6a974eee45ae8b0e651.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap6254.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap6254.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap9725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap9725.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap9443.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap9443.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 53e9a8f23ca6c6a974eee45ae8b0e651.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Nasalized.exedescription pid process target process PID 2080 set thread context of 812 2080 Nasalized.exe Nasalized.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3892 4828 WerFault.exe v7281XS.exe 4072 2740 WerFault.exe w13fk31.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
tz6928.exev7281XS.exew13fk31.exexiXvR01.exeNasalized.exepid process 4984 tz6928.exe 4984 tz6928.exe 4828 v7281XS.exe 4828 v7281XS.exe 2740 w13fk31.exe 2740 w13fk31.exe 1180 xiXvR01.exe 1180 xiXvR01.exe 812 Nasalized.exe 812 Nasalized.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
tz6928.exev7281XS.exew13fk31.exexiXvR01.exeNasalized.exedescription pid process Token: SeDebugPrivilege 4984 tz6928.exe Token: SeDebugPrivilege 4828 v7281XS.exe Token: SeDebugPrivilege 2740 w13fk31.exe Token: SeDebugPrivilege 1180 xiXvR01.exe Token: SeDebugPrivilege 812 Nasalized.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
53e9a8f23ca6c6a974eee45ae8b0e651.exezap6254.exezap9725.exezap9443.exey10sK79.exelegenda.execmd.exeNasalized.exedescription pid process target process PID 1916 wrote to memory of 3060 1916 53e9a8f23ca6c6a974eee45ae8b0e651.exe zap6254.exe PID 1916 wrote to memory of 3060 1916 53e9a8f23ca6c6a974eee45ae8b0e651.exe zap6254.exe PID 1916 wrote to memory of 3060 1916 53e9a8f23ca6c6a974eee45ae8b0e651.exe zap6254.exe PID 3060 wrote to memory of 1920 3060 zap6254.exe zap9725.exe PID 3060 wrote to memory of 1920 3060 zap6254.exe zap9725.exe PID 3060 wrote to memory of 1920 3060 zap6254.exe zap9725.exe PID 1920 wrote to memory of 1172 1920 zap9725.exe zap9443.exe PID 1920 wrote to memory of 1172 1920 zap9725.exe zap9443.exe PID 1920 wrote to memory of 1172 1920 zap9725.exe zap9443.exe PID 1172 wrote to memory of 4984 1172 zap9443.exe tz6928.exe PID 1172 wrote to memory of 4984 1172 zap9443.exe tz6928.exe PID 1172 wrote to memory of 4828 1172 zap9443.exe v7281XS.exe PID 1172 wrote to memory of 4828 1172 zap9443.exe v7281XS.exe PID 1172 wrote to memory of 4828 1172 zap9443.exe v7281XS.exe PID 1920 wrote to memory of 2740 1920 zap9725.exe w13fk31.exe PID 1920 wrote to memory of 2740 1920 zap9725.exe w13fk31.exe PID 1920 wrote to memory of 2740 1920 zap9725.exe w13fk31.exe PID 3060 wrote to memory of 1180 3060 zap6254.exe xiXvR01.exe PID 3060 wrote to memory of 1180 3060 zap6254.exe xiXvR01.exe PID 3060 wrote to memory of 1180 3060 zap6254.exe xiXvR01.exe PID 1916 wrote to memory of 3248 1916 53e9a8f23ca6c6a974eee45ae8b0e651.exe y10sK79.exe PID 1916 wrote to memory of 3248 1916 53e9a8f23ca6c6a974eee45ae8b0e651.exe y10sK79.exe PID 1916 wrote to memory of 3248 1916 53e9a8f23ca6c6a974eee45ae8b0e651.exe y10sK79.exe PID 3248 wrote to memory of 844 3248 y10sK79.exe legenda.exe PID 3248 wrote to memory of 844 3248 y10sK79.exe legenda.exe PID 3248 wrote to memory of 844 3248 y10sK79.exe legenda.exe PID 844 wrote to memory of 4440 844 legenda.exe schtasks.exe PID 844 wrote to memory of 4440 844 legenda.exe schtasks.exe PID 844 wrote to memory of 4440 844 legenda.exe schtasks.exe PID 844 wrote to memory of 4288 844 legenda.exe cmd.exe PID 844 wrote to memory of 4288 844 legenda.exe cmd.exe PID 844 wrote to memory of 4288 844 legenda.exe cmd.exe PID 4288 wrote to memory of 2704 4288 cmd.exe cmd.exe PID 4288 wrote to memory of 2704 4288 cmd.exe cmd.exe PID 4288 wrote to memory of 2704 4288 cmd.exe cmd.exe PID 4288 wrote to memory of 1000 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 1000 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 1000 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 5096 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 5096 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 5096 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 4984 4288 cmd.exe cmd.exe PID 4288 wrote to memory of 4984 4288 cmd.exe cmd.exe PID 4288 wrote to memory of 4984 4288 cmd.exe cmd.exe PID 4288 wrote to memory of 316 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 316 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 316 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 860 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 860 4288 cmd.exe cacls.exe PID 4288 wrote to memory of 860 4288 cmd.exe cacls.exe PID 844 wrote to memory of 2080 844 legenda.exe Nasalized.exe PID 844 wrote to memory of 2080 844 legenda.exe Nasalized.exe PID 844 wrote to memory of 2080 844 legenda.exe Nasalized.exe PID 2080 wrote to memory of 4856 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 4856 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 4856 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 4856 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 812 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 812 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 812 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 812 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 812 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 812 2080 Nasalized.exe Nasalized.exe PID 2080 wrote to memory of 812 2080 Nasalized.exe Nasalized.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53e9a8f23ca6c6a974eee45ae8b0e651.exe"C:\Users\Admin\AppData\Local\Temp\53e9a8f23ca6c6a974eee45ae8b0e651.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6254.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6254.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9725.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9725.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9443.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9443.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6928.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6928.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7281XS.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7281XS.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 10846⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w13fk31.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w13fk31.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 13365⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xiXvR01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xiXvR01.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y10sK79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y10sK79.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe"C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeC:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeC:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4828 -ip 48281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2740 -ip 27401⤵
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Nasalized.exe.logFilesize
1KB
MD599f88b99e0d77c5607bb7826596c5340
SHA14d2902c0c3a8c134139e9e85f4ca557750c7b21a
SHA256baa2292d20266e157ecc8340d1c201b82dcce67629a1c95ec27fea646624c56d
SHA512ff3ee0ad2a99c952f3fb709f9c3159138d66abb16f022e8f62f717c2edf621f43967fc3d7418b3bdd78b1399567fcc899c1e38aaf44abf97032d2c696b928a60
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y10sK79.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y10sK79.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6254.exeFilesize
830KB
MD5a2bdfd2b7028cb605cb3be9aff02ef66
SHA114fe4bc4cc9b08444021c450d3e1cc5f4c5d870a
SHA2561336684b5b562561b91689070b3cec8873bc4d61d02957b2802e7e63727fc3de
SHA512b9d7058a3a0d9db655560d1fe67a738dfe743cec35ee50d87a9ffdf5097fba1fcca919d25bb3e55cd9895ce1e3661747e75ad40d9d3f417594542ac7e1137625
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6254.exeFilesize
830KB
MD5a2bdfd2b7028cb605cb3be9aff02ef66
SHA114fe4bc4cc9b08444021c450d3e1cc5f4c5d870a
SHA2561336684b5b562561b91689070b3cec8873bc4d61d02957b2802e7e63727fc3de
SHA512b9d7058a3a0d9db655560d1fe67a738dfe743cec35ee50d87a9ffdf5097fba1fcca919d25bb3e55cd9895ce1e3661747e75ad40d9d3f417594542ac7e1137625
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xiXvR01.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xiXvR01.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9725.exeFilesize
688KB
MD59570af08d56af34db6c93bf576466f5e
SHA1a201049fac78d85935dd23e3f57ccc84de23ac58
SHA2562db0d4db56ad8c27e22c988cab97692127604fbaff285f6242eca2a2924cd040
SHA5125ce1c8ad4cc5d66ccd3618575d7fb1bc1ae7b6332a2c9b6a023ac002b517d13d41d68fae099bdad81f9b93832df2213fc2d63c9ff921c08e504fd5c705f8132d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9725.exeFilesize
688KB
MD59570af08d56af34db6c93bf576466f5e
SHA1a201049fac78d85935dd23e3f57ccc84de23ac58
SHA2562db0d4db56ad8c27e22c988cab97692127604fbaff285f6242eca2a2924cd040
SHA5125ce1c8ad4cc5d66ccd3618575d7fb1bc1ae7b6332a2c9b6a023ac002b517d13d41d68fae099bdad81f9b93832df2213fc2d63c9ff921c08e504fd5c705f8132d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w13fk31.exeFilesize
357KB
MD5eeedc8cc046653c9b62fbd4c9c25621f
SHA10eb47463ea14d6931f696876bfbab3d0a1005936
SHA25675e54632839e8b21a08d18202f7a72f0415e2fd8087dc5cf489ad28106302373
SHA5123283ae53355f3404d3dbe52ab9085d5d77b7e14821d7c99bb29030232c5c1b3a950c02b65fb172456c43797f49cf220d7bff403bcfac4bc22853e1fdc5974975
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w13fk31.exeFilesize
357KB
MD5eeedc8cc046653c9b62fbd4c9c25621f
SHA10eb47463ea14d6931f696876bfbab3d0a1005936
SHA25675e54632839e8b21a08d18202f7a72f0415e2fd8087dc5cf489ad28106302373
SHA5123283ae53355f3404d3dbe52ab9085d5d77b7e14821d7c99bb29030232c5c1b3a950c02b65fb172456c43797f49cf220d7bff403bcfac4bc22853e1fdc5974975
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9443.exeFilesize
339KB
MD55b86a83d893eb9cef16487eb4ea06f9a
SHA1aeadec39de205e53dec2d011d16c1ce407bfff95
SHA25614c399667d7f28fadeb562c82d1d31010ecc23837154567a8c8ee2cc7d352270
SHA5129899388cdcfde0290107d461f7a8f4e7f2012b5decd948e4fc871f231b53b35897250738d644b85ee9d5b78e5c2f0b561b3bccbb492d99636b6f72f5b9471aa3
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9443.exeFilesize
339KB
MD55b86a83d893eb9cef16487eb4ea06f9a
SHA1aeadec39de205e53dec2d011d16c1ce407bfff95
SHA25614c399667d7f28fadeb562c82d1d31010ecc23837154567a8c8ee2cc7d352270
SHA5129899388cdcfde0290107d461f7a8f4e7f2012b5decd948e4fc871f231b53b35897250738d644b85ee9d5b78e5c2f0b561b3bccbb492d99636b6f72f5b9471aa3
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6928.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6928.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7281XS.exeFilesize
298KB
MD545a3992ce5267cb6ec809c7d637e4ae9
SHA1dbebded9919d32994f06c3d77297c6d3b35f3ecc
SHA256bb73b567aab21d08c00cda3ebecc3d52bbb0076044561631510c5adecea8282f
SHA5126fbaa13d2e3c24f38c010eb278d41a646dcd1622a9dbcf9fcebb15716da01b1e9ee730552b7e5ff41ed39d15a57f77f15d1fd0f840fb428ca523e74e80df01a6
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7281XS.exeFilesize
298KB
MD545a3992ce5267cb6ec809c7d637e4ae9
SHA1dbebded9919d32994f06c3d77297c6d3b35f3ecc
SHA256bb73b567aab21d08c00cda3ebecc3d52bbb0076044561631510c5adecea8282f
SHA5126fbaa13d2e3c24f38c010eb278d41a646dcd1622a9dbcf9fcebb15716da01b1e9ee730552b7e5ff41ed39d15a57f77f15d1fd0f840fb428ca523e74e80df01a6
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
memory/812-1184-0x00000000055F0000-0x0000000005600000-memory.dmpFilesize
64KB
-
memory/812-1183-0x00000000055F0000-0x0000000005600000-memory.dmpFilesize
64KB
-
memory/812-1182-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1180-1142-0x0000000005640000-0x0000000005650000-memory.dmpFilesize
64KB
-
memory/1180-1141-0x0000000000AA0000-0x0000000000AD2000-memory.dmpFilesize
200KB
-
memory/2080-1176-0x00000000058B0000-0x00000000058C0000-memory.dmpFilesize
64KB
-
memory/2080-1175-0x0000000000EC0000-0x0000000000FA6000-memory.dmpFilesize
920KB
-
memory/2740-231-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-1129-0x00000000083C0000-0x0000000008426000-memory.dmpFilesize
408KB
-
memory/2740-211-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-213-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-215-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-217-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-219-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-221-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-223-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-225-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-227-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-229-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-233-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-1136-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/2740-236-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-235-0x0000000002B90000-0x0000000002BDB000-memory.dmpFilesize
300KB
-
memory/2740-237-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/2740-240-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-239-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/2740-241-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/2740-243-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-245-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-247-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-1120-0x0000000007980000-0x0000000007F98000-memory.dmpFilesize
6.1MB
-
memory/2740-1121-0x0000000007FA0000-0x00000000080AA000-memory.dmpFilesize
1.0MB
-
memory/2740-1122-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/2740-1123-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/2740-1124-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/2740-1126-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/2740-1128-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/2740-1127-0x00000000073C0000-0x00000000073D0000-memory.dmpFilesize
64KB
-
memory/2740-210-0x0000000004D00000-0x0000000004D3F000-memory.dmpFilesize
252KB
-
memory/2740-1130-0x0000000008BD0000-0x0000000008C62000-memory.dmpFilesize
584KB
-
memory/2740-1131-0x0000000008F00000-0x0000000008F76000-memory.dmpFilesize
472KB
-
memory/2740-1132-0x0000000008F90000-0x0000000008FE0000-memory.dmpFilesize
320KB
-
memory/2740-1133-0x0000000009020000-0x00000000091E2000-memory.dmpFilesize
1.8MB
-
memory/2740-1134-0x00000000091F0000-0x000000000971C000-memory.dmpFilesize
5.2MB
-
memory/4828-185-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-202-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/4828-183-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-181-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-200-0x0000000000400000-0x0000000002B79000-memory.dmpFilesize
39.5MB
-
memory/4828-199-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-197-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-195-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-193-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-191-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-189-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-187-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-205-0x0000000000400000-0x0000000002B79000-memory.dmpFilesize
39.5MB
-
memory/4828-203-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/4828-201-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/4828-179-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-177-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-175-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-173-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-172-0x0000000004A40000-0x0000000004A52000-memory.dmpFilesize
72KB
-
memory/4828-171-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/4828-170-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/4828-169-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/4828-168-0x0000000002D80000-0x0000000002DAD000-memory.dmpFilesize
180KB
-
memory/4828-167-0x00000000073B0000-0x0000000007954000-memory.dmpFilesize
5.6MB
-
memory/4984-161-0x0000000000770000-0x000000000077A000-memory.dmpFilesize
40KB