Analysis

  • max time kernel
    96s
  • max time network
    91s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-04-2023 10:50

General

  • Target

    facac21e0e00dc14ed549041d8ef7ca02175cd2de3d1d835f5d6fe0c18fe8b17.exe

  • Size

    707KB

  • MD5

    ffbbc898008f96fd9665e1f4ca9522c0

  • SHA1

    409171d69a98577a0fcbde4c32959f474cf27fcd

  • SHA256

    facac21e0e00dc14ed549041d8ef7ca02175cd2de3d1d835f5d6fe0c18fe8b17

  • SHA512

    a33c91d9fa07d155956f1d22ba018059def7c619f7c916e9505d4df2106b86be0bcedf23684992022ecf24654ba59dc974fee7bfc31024b905a33fd1ebcc9732

  • SSDEEP

    12288:7MrJy905ED6rPmOswpquFIroLQNttzoVRwP1pJ7t5Yp4p/xeDgjCS34RTkprQ:SyPD4PmODquFnQN3zoVRw9pJ7IpCeSCX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nahui

C2

176.113.115.145:4125

Attributes
  • auth_value

    b9ed10946d21e28d58d0c72c535cde6f

Extracted

Family

amadey

Version

3.70

C2

77.91.124.207/plays/chapter/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\facac21e0e00dc14ed549041d8ef7ca02175cd2de3d1d835f5d6fe0c18fe8b17.exe
    "C:\Users\Admin\AppData\Local\Temp\facac21e0e00dc14ed549041d8ef7ca02175cd2de3d1d835f5d6fe0c18fe8b17.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijf5945.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijf5945.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zibi1759.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zibi1759.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it766115.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it766115.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4564
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr604115.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr604115.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp600430.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp600430.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr316774.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr316774.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4172
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:3376
  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:4824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr316774.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr316774.exe
    Filesize

    229KB

    MD5

    6c07711a17452b855149a95cda6fc830

    SHA1

    5b3252c2567de78f9ae68764d4e30511a509fdcc

    SHA256

    eb7e8334a5323f858f1ea97079e958beeb846651b573edc073b29a481b891e9f

    SHA512

    ade99076fc768feb8e6620fe2fd3d5bbf67254844be60ebebaeeb01a2a239e14ff74dfa74ff6f6cd1389351a6b529c5f5f8491b3382f8b57f8a524b7dd0f35e2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijf5945.exe
    Filesize

    525KB

    MD5

    113018c97a54c3ebd7584ba657365508

    SHA1

    cde8e4e73ad7d91f3b66e0f47a673e8836d694ee

    SHA256

    4a7d82d07ec4dd12bda99bfc1b0de4d41428c48e2d4ee4f058edcf70853a0625

    SHA512

    e9405cdadbd393c819ca7d2109ec19b3b0cda5a235dcca208a935428398285758d172633201eba20071a9b32f5f5785d5278730e5465390dc960b35ff6f98f18

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijf5945.exe
    Filesize

    525KB

    MD5

    113018c97a54c3ebd7584ba657365508

    SHA1

    cde8e4e73ad7d91f3b66e0f47a673e8836d694ee

    SHA256

    4a7d82d07ec4dd12bda99bfc1b0de4d41428c48e2d4ee4f058edcf70853a0625

    SHA512

    e9405cdadbd393c819ca7d2109ec19b3b0cda5a235dcca208a935428398285758d172633201eba20071a9b32f5f5785d5278730e5465390dc960b35ff6f98f18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp600430.exe
    Filesize

    175KB

    MD5

    b2e599dec0856d70ebb2ab2327ae6442

    SHA1

    300323436b47ddafa78cb7e835deb1ab09f13698

    SHA256

    b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43

    SHA512

    c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp600430.exe
    Filesize

    175KB

    MD5

    b2e599dec0856d70ebb2ab2327ae6442

    SHA1

    300323436b47ddafa78cb7e835deb1ab09f13698

    SHA256

    b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43

    SHA512

    c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zibi1759.exe
    Filesize

    383KB

    MD5

    c4e9ed2bfc56c44e3618b6fc39598c04

    SHA1

    a7a48805abc7b74e08618fb56c560a755ce4b23f

    SHA256

    2ca9da6029a0f1bf74c5df0d4f8b24145f4fcf8e62e66adeac351c3725cd9115

    SHA512

    bd36dc476f395dd39cb5d75d0fd62e766a991d46f9b2779b0cb419b570ec239f7aa05ac8d33c07a590d532604e514c7a0f1c0faadcb30ab261351b6de383937b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zibi1759.exe
    Filesize

    383KB

    MD5

    c4e9ed2bfc56c44e3618b6fc39598c04

    SHA1

    a7a48805abc7b74e08618fb56c560a755ce4b23f

    SHA256

    2ca9da6029a0f1bf74c5df0d4f8b24145f4fcf8e62e66adeac351c3725cd9115

    SHA512

    bd36dc476f395dd39cb5d75d0fd62e766a991d46f9b2779b0cb419b570ec239f7aa05ac8d33c07a590d532604e514c7a0f1c0faadcb30ab261351b6de383937b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it766115.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it766115.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr604115.exe
    Filesize

    299KB

    MD5

    f263c14a73fc0a39a6a164bc6a343efc

    SHA1

    5ba926ab1e6fade046b1e6ff2e8e75f7a96d2df2

    SHA256

    53e238937e9ed8cc8dfddc5552c65aa042dd2be063ad61b570282dbba5a2d3eb

    SHA512

    47fca16281e12cd5bccc8fbd872313281cf0145965cf62e04a61cda6debdfea5c4f99ad69dd45cf22eea918fcd44c605e55611e2f95de2198d63604e21b79277

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr604115.exe
    Filesize

    299KB

    MD5

    f263c14a73fc0a39a6a164bc6a343efc

    SHA1

    5ba926ab1e6fade046b1e6ff2e8e75f7a96d2df2

    SHA256

    53e238937e9ed8cc8dfddc5552c65aa042dd2be063ad61b570282dbba5a2d3eb

    SHA512

    47fca16281e12cd5bccc8fbd872313281cf0145965cf62e04a61cda6debdfea5c4f99ad69dd45cf22eea918fcd44c605e55611e2f95de2198d63604e21b79277

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
    Filesize

    89KB

    MD5

    4061d8dd5006b99d06fa208c0063dfcf

    SHA1

    38e7df8d8e631f3e9b227df3b9326d187e18cce5

    SHA256

    b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0

    SHA512

    71de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314

  • memory/4564-141-0x00000000005C0000-0x00000000005CA000-memory.dmp
    Filesize

    40KB

  • memory/4756-193-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-213-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-161-0x00000000008A0000-0x00000000008B0000-memory.dmp
    Filesize

    64KB

  • memory/4756-163-0x00000000008A0000-0x00000000008B0000-memory.dmp
    Filesize

    64KB

  • memory/4756-165-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-162-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-167-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-169-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-171-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-173-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-175-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-177-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-181-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-183-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-179-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-185-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-187-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-189-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-191-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-156-0x00000000004C0000-0x000000000050B000-memory.dmp
    Filesize

    300KB

  • memory/4756-195-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-197-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-199-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-201-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-203-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-205-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-207-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-209-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-211-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-159-0x00000000008A0000-0x00000000008B0000-memory.dmp
    Filesize

    64KB

  • memory/4756-215-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-217-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-1060-0x00000000056B0000-0x0000000005CB6000-memory.dmp
    Filesize

    6.0MB

  • memory/4756-1061-0x00000000050A0000-0x00000000051AA000-memory.dmp
    Filesize

    1.0MB

  • memory/4756-1062-0x0000000002730000-0x0000000002742000-memory.dmp
    Filesize

    72KB

  • memory/4756-1063-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/4756-1064-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/4756-1065-0x00000000008A0000-0x00000000008B0000-memory.dmp
    Filesize

    64KB

  • memory/4756-1066-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4756-1067-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/4756-1069-0x0000000006470000-0x00000000064E6000-memory.dmp
    Filesize

    472KB

  • memory/4756-1070-0x00000000064F0000-0x0000000006540000-memory.dmp
    Filesize

    320KB

  • memory/4756-1071-0x00000000008A0000-0x00000000008B0000-memory.dmp
    Filesize

    64KB

  • memory/4756-1072-0x00000000008A0000-0x00000000008B0000-memory.dmp
    Filesize

    64KB

  • memory/4756-1073-0x00000000008A0000-0x00000000008B0000-memory.dmp
    Filesize

    64KB

  • memory/4756-1074-0x0000000006580000-0x0000000006742000-memory.dmp
    Filesize

    1.8MB

  • memory/4756-1075-0x0000000006750000-0x0000000006C7C000-memory.dmp
    Filesize

    5.2MB

  • memory/4756-1076-0x00000000008A0000-0x00000000008B0000-memory.dmp
    Filesize

    64KB

  • memory/4756-147-0x0000000002330000-0x0000000002376000-memory.dmp
    Filesize

    280KB

  • memory/4756-158-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-153-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-155-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-151-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-150-0x00000000024E0000-0x000000000251F000-memory.dmp
    Filesize

    252KB

  • memory/4756-149-0x00000000024E0000-0x0000000002524000-memory.dmp
    Filesize

    272KB

  • memory/4756-148-0x0000000004BA0000-0x000000000509E000-memory.dmp
    Filesize

    5.0MB

  • memory/4928-1082-0x0000000000C70000-0x0000000000CA2000-memory.dmp
    Filesize

    200KB

  • memory/4928-1083-0x0000000005820000-0x0000000005830000-memory.dmp
    Filesize

    64KB

  • memory/4928-1084-0x0000000005540000-0x000000000558B000-memory.dmp
    Filesize

    300KB