Analysis

  • max time kernel
    104s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-04-2023 21:40

General

  • Target

    89b6e82967c1ae4e3fbed36194ffd3ec430aef520cffdca973fc9298df777f2b.exe

  • Size

    1.2MB

  • MD5

    1149bcbf5f3300ff59f7902adc9c4990

  • SHA1

    0a98993095ebcb9e9f8d04efc0377134f8c975eb

  • SHA256

    89b6e82967c1ae4e3fbed36194ffd3ec430aef520cffdca973fc9298df777f2b

  • SHA512

    63af0ddbc09c224e3a3d8395189dcb02bd8eb4cbe9b29f1e1ce4d1fae1f8c197767133a6db1c539cc702422c8259359a0e75311a667ec1cc189c334b7f3314b7

  • SSDEEP

    24576:uGxKz+TDUpS+Nmj4NGQpy6X6yzjKdFuU40KUcDL0lNp/bPm:uGMOKSUDNGQp9qKqFR4JUcDLqNp/b

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89b6e82967c1ae4e3fbed36194ffd3ec430aef520cffdca973fc9298df777f2b.exe
    "C:\Users\Admin\AppData\Local\Temp\89b6e82967c1ae4e3fbed36194ffd3ec430aef520cffdca973fc9298df777f2b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gE166412.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gE166412.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yx563456.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yx563456.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1368
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\161965264.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\161965264.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\247750528.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\247750528.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\356365016.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\356365016.exe
        3⤵
        • Executes dropped EXE
        PID:4396
        • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1548
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4772
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2144
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                6⤵
                  PID:1540
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  6⤵
                    PID:4136
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1956
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\cb7ae701b3" /P "Admin:N"
                      6⤵
                        PID:4992
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\cb7ae701b3" /P "Admin:R" /E
                        6⤵
                          PID:4184
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:1060
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\407037637.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\407037637.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1832
              • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                1⤵
                  PID:1532
                • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                  1⤵
                    PID:1196

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\407037637.exe

                    Filesize

                    459KB

                    MD5

                    9c4b2b6e4320f4740e205d8bca31b884

                    SHA1

                    6820f95c8e0851a0e28170877b9270eebbc3376c

                    SHA256

                    4f2672a06638a9dcf98f0f525c288573905bae5a841a1579e5e4697b10af6ad1

                    SHA512

                    f2a102382e3e75bda46ded0e39f12538dc9e0c2f63f9492e56d1d2d1196170cfd0750fbc17331f730716d2300261f1b0091f8801b5413ca5821466da5b60117c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\407037637.exe

                    Filesize

                    459KB

                    MD5

                    9c4b2b6e4320f4740e205d8bca31b884

                    SHA1

                    6820f95c8e0851a0e28170877b9270eebbc3376c

                    SHA256

                    4f2672a06638a9dcf98f0f525c288573905bae5a841a1579e5e4697b10af6ad1

                    SHA512

                    f2a102382e3e75bda46ded0e39f12538dc9e0c2f63f9492e56d1d2d1196170cfd0750fbc17331f730716d2300261f1b0091f8801b5413ca5821466da5b60117c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gE166412.exe

                    Filesize

                    764KB

                    MD5

                    c6335c0a2c1ff34926e5059187fea778

                    SHA1

                    47ba414bcea12df8297a1b1a518ab48af68d6a73

                    SHA256

                    b60defc60d5c20848132dea613d554a165e7ffe18281d553d43e8669874e3d25

                    SHA512

                    ff7ad4f0ab4ad74e43545ff12de51014efc0f89a409dc0ab2eed0e2b40f3c3bbe94c78aa43a6f5f26f72c7ec0dae3ba90d77f94b961d6d2d7671880c042af058

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gE166412.exe

                    Filesize

                    764KB

                    MD5

                    c6335c0a2c1ff34926e5059187fea778

                    SHA1

                    47ba414bcea12df8297a1b1a518ab48af68d6a73

                    SHA256

                    b60defc60d5c20848132dea613d554a165e7ffe18281d553d43e8669874e3d25

                    SHA512

                    ff7ad4f0ab4ad74e43545ff12de51014efc0f89a409dc0ab2eed0e2b40f3c3bbe94c78aa43a6f5f26f72c7ec0dae3ba90d77f94b961d6d2d7671880c042af058

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\356365016.exe

                    Filesize

                    204KB

                    MD5

                    1304f384653e08ae497008ff13498608

                    SHA1

                    d9a76ed63d74d4217c5027757cb9a7a0d0093080

                    SHA256

                    2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                    SHA512

                    4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yx563456.exe

                    Filesize

                    593KB

                    MD5

                    8f221f63a4b89072b185fd5c0c0db853

                    SHA1

                    c13d25faf4c60a435ed2984a5336abf9afb1e351

                    SHA256

                    f03de23203170f559ed5427435a3684a17166fa1f1df31bfa16b34935acc4a22

                    SHA512

                    983d2c86f6975f2166bfb2bd0d0785bd02b1f18fccfaf9fe72cbf27fa26b2db205fcc8bbbf2371787264f67d3585d8403d9f9353eeabddb679512f0bd8eb6656

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Yx563456.exe

                    Filesize

                    593KB

                    MD5

                    8f221f63a4b89072b185fd5c0c0db853

                    SHA1

                    c13d25faf4c60a435ed2984a5336abf9afb1e351

                    SHA256

                    f03de23203170f559ed5427435a3684a17166fa1f1df31bfa16b34935acc4a22

                    SHA512

                    983d2c86f6975f2166bfb2bd0d0785bd02b1f18fccfaf9fe72cbf27fa26b2db205fcc8bbbf2371787264f67d3585d8403d9f9353eeabddb679512f0bd8eb6656

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\161965264.exe

                    Filesize

                    377KB

                    MD5

                    5fa4a7916def4bc9c1d11c63ef4896a7

                    SHA1

                    f294789c7fc64eebf552838a8aed837d335fd236

                    SHA256

                    156b0deb3ab0bf545b6847fbacb2a6e1f6bfc00616b6f165ce3e2a4330c15210

                    SHA512

                    f9946ff838f32987d9b84eb66fd92a6bce12b868aabf77f896b7ee360805c143ddbd643cc92de9ce1aae9072d5803bf47b48c7c8335ab0427692e3adc35d43ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\161965264.exe

                    Filesize

                    377KB

                    MD5

                    5fa4a7916def4bc9c1d11c63ef4896a7

                    SHA1

                    f294789c7fc64eebf552838a8aed837d335fd236

                    SHA256

                    156b0deb3ab0bf545b6847fbacb2a6e1f6bfc00616b6f165ce3e2a4330c15210

                    SHA512

                    f9946ff838f32987d9b84eb66fd92a6bce12b868aabf77f896b7ee360805c143ddbd643cc92de9ce1aae9072d5803bf47b48c7c8335ab0427692e3adc35d43ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\247750528.exe

                    Filesize

                    459KB

                    MD5

                    bb0616de76770a360d2952b1c7d57d7f

                    SHA1

                    1e55af5e66a576a34ef55f0ed7b033101c284883

                    SHA256

                    8ca7664fe8080deb4be556ceda8d7df7f48edaa6acd31ebe9ee8e0ae64c4e39c

                    SHA512

                    dc486d43808fd3492a34ea2172faeb67be096b1bc79b667108f96fcf6cddd628b244ece608c1d3caceea58dacf1f40ce6435913600bb0e59babcc47541e65d5b

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\247750528.exe

                    Filesize

                    459KB

                    MD5

                    bb0616de76770a360d2952b1c7d57d7f

                    SHA1

                    1e55af5e66a576a34ef55f0ed7b033101c284883

                    SHA256

                    8ca7664fe8080deb4be556ceda8d7df7f48edaa6acd31ebe9ee8e0ae64c4e39c

                    SHA512

                    dc486d43808fd3492a34ea2172faeb67be096b1bc79b667108f96fcf6cddd628b244ece608c1d3caceea58dacf1f40ce6435913600bb0e59babcc47541e65d5b

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    cfe2ef912f30ac9bc36d8686888ca0d3

                    SHA1

                    ddbbb63670b2f5bd903dadcff54ff8270825499b

                    SHA256

                    675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d

                    SHA512

                    5e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    cfe2ef912f30ac9bc36d8686888ca0d3

                    SHA1

                    ddbbb63670b2f5bd903dadcff54ff8270825499b

                    SHA256

                    675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d

                    SHA512

                    5e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    cfe2ef912f30ac9bc36d8686888ca0d3

                    SHA1

                    ddbbb63670b2f5bd903dadcff54ff8270825499b

                    SHA256

                    675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d

                    SHA512

                    5e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a

                  • memory/1708-149-0x0000000004F30000-0x0000000004F40000-memory.dmp

                    Filesize

                    64KB

                  • memory/1708-182-0x0000000000400000-0x0000000000803000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1708-159-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-161-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-163-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-165-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-167-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-169-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-171-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-173-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-175-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-177-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-179-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-157-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-184-0x0000000000400000-0x0000000000803000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1708-155-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-153-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-152-0x0000000004D50000-0x0000000004D62000-memory.dmp

                    Filesize

                    72KB

                  • memory/1708-151-0x0000000004D50000-0x0000000004D68000-memory.dmp

                    Filesize

                    96KB

                  • memory/1708-147-0x0000000000810000-0x000000000083D000-memory.dmp

                    Filesize

                    180KB

                  • memory/1708-148-0x00000000025C0000-0x00000000025DA000-memory.dmp

                    Filesize

                    104KB

                  • memory/1708-150-0x0000000004F40000-0x000000000543E000-memory.dmp

                    Filesize

                    5.0MB

                  • memory/1832-1023-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1832-1021-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1832-1025-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1832-1814-0x0000000008030000-0x000000000807B000-memory.dmp

                    Filesize

                    300KB

                  • memory/1832-1815-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2912-206-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-212-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-214-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-216-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-218-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-220-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-222-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-243-0x0000000000A30000-0x0000000000A76000-memory.dmp

                    Filesize

                    280KB

                  • memory/2912-245-0x0000000005000000-0x0000000005010000-memory.dmp

                    Filesize

                    64KB

                  • memory/2912-247-0x0000000005000000-0x0000000005010000-memory.dmp

                    Filesize

                    64KB

                  • memory/2912-248-0x0000000005000000-0x0000000005010000-memory.dmp

                    Filesize

                    64KB

                  • memory/2912-987-0x0000000007890000-0x0000000007E96000-memory.dmp

                    Filesize

                    6.0MB

                  • memory/2912-988-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

                    Filesize

                    72KB

                  • memory/2912-989-0x0000000007EA0000-0x0000000007FAA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/2912-990-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

                    Filesize

                    248KB

                  • memory/2912-991-0x0000000008130000-0x000000000817B000-memory.dmp

                    Filesize

                    300KB

                  • memory/2912-993-0x0000000005000000-0x0000000005010000-memory.dmp

                    Filesize

                    64KB

                  • memory/2912-994-0x00000000082C0000-0x0000000008326000-memory.dmp

                    Filesize

                    408KB

                  • memory/2912-995-0x00000000089A0000-0x0000000008A32000-memory.dmp

                    Filesize

                    584KB

                  • memory/2912-996-0x0000000008B40000-0x0000000008B90000-memory.dmp

                    Filesize

                    320KB

                  • memory/2912-997-0x0000000008B90000-0x0000000008C06000-memory.dmp

                    Filesize

                    472KB

                  • memory/2912-998-0x0000000008C30000-0x0000000008C4E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2912-999-0x0000000008E30000-0x0000000008FF2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/2912-1000-0x0000000009010000-0x000000000953C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/2912-210-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-208-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-204-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-202-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-200-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-198-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-196-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-194-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-192-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-191-0x0000000002970000-0x00000000029A5000-memory.dmp

                    Filesize

                    212KB

                  • memory/2912-190-0x0000000002970000-0x00000000029AA000-memory.dmp

                    Filesize

                    232KB

                  • memory/2912-189-0x0000000002480000-0x00000000024BC000-memory.dmp

                    Filesize

                    240KB

                  • memory/4404-124-0x0000000004810000-0x0000000004916000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4404-180-0x0000000000400000-0x00000000008E0000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/4404-181-0x0000000004810000-0x0000000004916000-memory.dmp

                    Filesize

                    1.0MB