Analysis

  • max time kernel
    141s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2022 19:20

General

  • Target

    d5241af9dd7e7fe48fc043b520f3366a806269d869d9add684bcb37d2582b1ad.exe

  • Size

    209KB

  • MD5

    0429ffc783c6c4e2897966e485bdf9a3

  • SHA1

    04aa9bb13bbd3f47b37ad38cdf289ab1127d1323

  • SHA256

    d5241af9dd7e7fe48fc043b520f3366a806269d869d9add684bcb37d2582b1ad

  • SHA512

    995b9d0c69607f12490f5ea23a863c303a87cbb4bab9bbe3326f7f1e0cd10c797e9fd825ef4d6b5c23924427286142ce94198b8fd0e3b397168af875d24eca07

  • SSDEEP

    3072:C/OIaP6Z+NuX0LhfWcq5zNm6Ao7Ex5D+XjhumpktHm5I2txtfsXx:C/E6wNukLhfUNDAo7EmzkmpWHMpvtk

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 27 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5241af9dd7e7fe48fc043b520f3366a806269d869d9add684bcb37d2582b1ad.exe
    "C:\Users\Admin\AppData\Local\Temp\d5241af9dd7e7fe48fc043b520f3366a806269d869d9add684bcb37d2582b1ad.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4404
  • C:\Users\Admin\AppData\Local\Temp\C033.exe
    C:\Users\Admin\AppData\Local\Temp\C033.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 924
      2⤵
      • Program crash
      PID:1084
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 992
      2⤵
      • Program crash
      PID:332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1144
      2⤵
      • Program crash
      PID:4768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1124
      2⤵
      • Program crash
      PID:220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1140
      2⤵
      • Program crash
      PID:4784
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1144
      2⤵
      • Program crash
      PID:5088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1000
      2⤵
      • Program crash
      PID:3540
    • C:\Users\Admin\AppData\Local\Temp\C033.exe
      "C:\Users\Admin\AppData\Local\Temp\C033.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 600
        3⤵
        • Program crash
        PID:1068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 996
        3⤵
        • Program crash
        PID:4828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 992
        3⤵
        • Program crash
        PID:312
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 1096
        3⤵
        • Program crash
        PID:3796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 1128
        3⤵
        • Program crash
        PID:4036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 1136
        3⤵
        • Program crash
        PID:3640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 1004
        3⤵
        • Program crash
        PID:1780
      • C:\Users\Admin\AppData\Local\Temp\C033.exe
        "C:\Users\Admin\AppData\Local\Temp\C033.exe"
        3⤵
        • Executes dropped EXE
        PID:1684
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 608
          4⤵
          • Program crash
          PID:3532
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 996
          4⤵
          • Program crash
          PID:3260
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1004
          4⤵
          • Program crash
          PID:1056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1004
          4⤵
          • Program crash
          PID:1600
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1064
          4⤵
          • Program crash
          PID:3164
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1108
          4⤵
          • Program crash
          PID:4488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1128
          4⤵
          • Program crash
          PID:2576
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1080
          4⤵
          • Program crash
          PID:3856
        • C:\Users\Admin\AppData\Local\Temp\C033.exe
          "C:\Users\Admin\AppData\Local\Temp\C033.exe"
          4⤵
            PID:1512
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 600
              5⤵
              • Program crash
              PID:3792
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 984
            4⤵
            • Program crash
            PID:5016
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll,start
            4⤵
              PID:1672
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 984
            3⤵
            • Program crash
            PID:4324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1068
          2⤵
          • Program crash
          PID:4104
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll,start
          2⤵
            PID:3628
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1316
            2⤵
            • Program crash
            PID:2740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4684 -ip 4684
          1⤵
            PID:4432
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4684 -ip 4684
            1⤵
              PID:4384
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4684 -ip 4684
              1⤵
                PID:2272
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4684 -ip 4684
                1⤵
                  PID:1300
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4684 -ip 4684
                  1⤵
                    PID:5116
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4684 -ip 4684
                    1⤵
                      PID:2288
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4684 -ip 4684
                      1⤵
                        PID:4200
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4684 -ip 4684
                        1⤵
                          PID:3092
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4684 -ip 4684
                          1⤵
                            PID:1964
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4868 -ip 4868
                            1⤵
                              PID:1100
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4868 -ip 4868
                              1⤵
                                PID:4832
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4868 -ip 4868
                                1⤵
                                  PID:2528
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4868 -ip 4868
                                  1⤵
                                    PID:4900
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4868 -ip 4868
                                    1⤵
                                      PID:4960
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4868 -ip 4868
                                      1⤵
                                        PID:1500
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4868 -ip 4868
                                        1⤵
                                          PID:4556
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4868 -ip 4868
                                          1⤵
                                            PID:408
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1684 -ip 1684
                                            1⤵
                                              PID:932
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1684 -ip 1684
                                              1⤵
                                                PID:3152
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1684 -ip 1684
                                                1⤵
                                                  PID:4824
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1684 -ip 1684
                                                  1⤵
                                                    PID:3044
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1684 -ip 1684
                                                    1⤵
                                                      PID:4208
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1684 -ip 1684
                                                      1⤵
                                                        PID:3224
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4684 -ip 4684
                                                        1⤵
                                                          PID:4624
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1684 -ip 1684
                                                          1⤵
                                                            PID:3196
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1684 -ip 1684
                                                            1⤵
                                                              PID:1740
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1684 -ip 1684
                                                              1⤵
                                                                PID:2016
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1512 -ip 1512
                                                                1⤵
                                                                  PID:1060

                                                                Network

                                                                MITRE ATT&CK Enterprise v6

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Local\Temp\C033.exe

                                                                  Filesize

                                                                  6.1MB

                                                                  MD5

                                                                  be5a8b97d052c3b1948bc79b8eeb7fa7

                                                                  SHA1

                                                                  0d4ace733fa6277b66e22d895c394a61dbc7531e

                                                                  SHA256

                                                                  dab2b4dd7e40fcb026d0815a5fd4fcf94e3b47dada1c0be92cd893d9cd4b833c

                                                                  SHA512

                                                                  5c359568a6ca293a4d90cb7f060dfd70feb4de08360f13964bb35fc3a8f51383800ab84aeadaea6f93c45f00973a815c47cabfbc07cbd741c04af0f130677b7b

                                                                • C:\Users\Admin\AppData\Local\Temp\C033.exe

                                                                  Filesize

                                                                  6.1MB

                                                                  MD5

                                                                  be5a8b97d052c3b1948bc79b8eeb7fa7

                                                                  SHA1

                                                                  0d4ace733fa6277b66e22d895c394a61dbc7531e

                                                                  SHA256

                                                                  dab2b4dd7e40fcb026d0815a5fd4fcf94e3b47dada1c0be92cd893d9cd4b833c

                                                                  SHA512

                                                                  5c359568a6ca293a4d90cb7f060dfd70feb4de08360f13964bb35fc3a8f51383800ab84aeadaea6f93c45f00973a815c47cabfbc07cbd741c04af0f130677b7b

                                                                • C:\Users\Admin\AppData\Local\Temp\C033.exe

                                                                  Filesize

                                                                  6.1MB

                                                                  MD5

                                                                  be5a8b97d052c3b1948bc79b8eeb7fa7

                                                                  SHA1

                                                                  0d4ace733fa6277b66e22d895c394a61dbc7531e

                                                                  SHA256

                                                                  dab2b4dd7e40fcb026d0815a5fd4fcf94e3b47dada1c0be92cd893d9cd4b833c

                                                                  SHA512

                                                                  5c359568a6ca293a4d90cb7f060dfd70feb4de08360f13964bb35fc3a8f51383800ab84aeadaea6f93c45f00973a815c47cabfbc07cbd741c04af0f130677b7b

                                                                • C:\Users\Admin\AppData\Local\Temp\C033.exe

                                                                  Filesize

                                                                  6.1MB

                                                                  MD5

                                                                  be5a8b97d052c3b1948bc79b8eeb7fa7

                                                                  SHA1

                                                                  0d4ace733fa6277b66e22d895c394a61dbc7531e

                                                                  SHA256

                                                                  dab2b4dd7e40fcb026d0815a5fd4fcf94e3b47dada1c0be92cd893d9cd4b833c

                                                                  SHA512

                                                                  5c359568a6ca293a4d90cb7f060dfd70feb4de08360f13964bb35fc3a8f51383800ab84aeadaea6f93c45f00973a815c47cabfbc07cbd741c04af0f130677b7b

                                                                • C:\Users\Admin\AppData\Local\Temp\C033.exe

                                                                  Filesize

                                                                  1.5MB

                                                                  MD5

                                                                  e74dcf46ba9020ef7a60970199f43bcd

                                                                  SHA1

                                                                  1b845051223385da27b116849f2aed1255e64ac3

                                                                  SHA256

                                                                  3814674d5e44fbbade9df5469974c8df4940c6ffa392c55382de0965cac3e332

                                                                  SHA512

                                                                  9fcaeb0797f39023bc45849c672a93de66749bcd9e6dc065809900c24797ddeee1208d0d94064b20a8d0c254a09fcfd5c8e862e1ae45b27c6fd2019147ce6798

                                                                • C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll

                                                                  Filesize

                                                                  3.2MB

                                                                  MD5

                                                                  ac6e0568c63f76df2bfd34c0467c7e6e

                                                                  SHA1

                                                                  6ed9fed7e268f5f0da3b8c8578f1f7a27160c3f3

                                                                  SHA256

                                                                  e657e9b3be98017b27c5a99be3d2b2c287b7a40742669ba1ca95a987e4a91f9d

                                                                  SHA512

                                                                  16ffed40ad84e9ef3dba5d9a45d90583e838b339efc4755277d4554892bd8a43983d2b8006b7cb91a8a6e86555d3380de4b5686018769629ac0bb741653496c7

                                                                • C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll

                                                                  Filesize

                                                                  3.2MB

                                                                  MD5

                                                                  ac6e0568c63f76df2bfd34c0467c7e6e

                                                                  SHA1

                                                                  6ed9fed7e268f5f0da3b8c8578f1f7a27160c3f3

                                                                  SHA256

                                                                  e657e9b3be98017b27c5a99be3d2b2c287b7a40742669ba1ca95a987e4a91f9d

                                                                  SHA512

                                                                  16ffed40ad84e9ef3dba5d9a45d90583e838b339efc4755277d4554892bd8a43983d2b8006b7cb91a8a6e86555d3380de4b5686018769629ac0bb741653496c7

                                                                • C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll

                                                                  Filesize

                                                                  3.2MB

                                                                  MD5

                                                                  ac6e0568c63f76df2bfd34c0467c7e6e

                                                                  SHA1

                                                                  6ed9fed7e268f5f0da3b8c8578f1f7a27160c3f3

                                                                  SHA256

                                                                  e657e9b3be98017b27c5a99be3d2b2c287b7a40742669ba1ca95a987e4a91f9d

                                                                  SHA512

                                                                  16ffed40ad84e9ef3dba5d9a45d90583e838b339efc4755277d4554892bd8a43983d2b8006b7cb91a8a6e86555d3380de4b5686018769629ac0bb741653496c7

                                                                • C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll

                                                                  Filesize

                                                                  1.6MB

                                                                  MD5

                                                                  0b4e72c2c2673836f55be4807319fb7d

                                                                  SHA1

                                                                  4af8a882505bfb3ce2e1032a3820c2fa25c75550

                                                                  SHA256

                                                                  65429c8a7606d2b5909b0091dbe8ed6c132008371738ec1a77a9dd02be5fc55c

                                                                  SHA512

                                                                  e0749538e57fd1be684504127006fb63c766e9112ac6bfeb22f6774e7e4c30c406c4b7cd09b0beee43c1f85caee6515da2fa0c5a9e9672823a5d3af9633ec870

                                                                • C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll

                                                                  Filesize

                                                                  1.1MB

                                                                  MD5

                                                                  961a6036520b86b65e40d2ef147a3fd2

                                                                  SHA1

                                                                  27d532eccce6af9b89ad6b5def367f3f83cd0bf4

                                                                  SHA256

                                                                  e476755a9fb86cc44735c9e213726c3ae61147fbdf4c71057c6cf63c17903595

                                                                  SHA512

                                                                  639d64795a000817cc83ec60e472678706f4e4c5834e3469d235f829de6a3148d67eb2337aa63e4b22f35cfd67595c4a52b63cc64803a4ff1f1584958e831fc2

                                                                • memory/1512-159-0x0000000000000000-mapping.dmp

                                                                • memory/1672-160-0x0000000000000000-mapping.dmp

                                                                • memory/1672-164-0x00000000023F0000-0x000000000273D000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/1672-165-0x00000000023F0000-0x000000000273D000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/1684-150-0x0000000000400000-0x0000000000B72000-memory.dmp

                                                                  Filesize

                                                                  7.4MB

                                                                • memory/1684-147-0x0000000000000000-mapping.dmp

                                                                • memory/1684-149-0x000000000294B000-0x0000000002F35000-memory.dmp

                                                                  Filesize

                                                                  5.9MB

                                                                • memory/3628-151-0x0000000000000000-mapping.dmp

                                                                • memory/3628-155-0x0000000001F90000-0x00000000022DD000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/3628-158-0x0000000001F90000-0x00000000022DD000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/4404-132-0x00000000007CD000-0x00000000007DD000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4404-135-0x0000000000400000-0x0000000000598000-memory.dmp

                                                                  Filesize

                                                                  1.6MB

                                                                • memory/4404-133-0x0000000002190000-0x0000000002199000-memory.dmp

                                                                  Filesize

                                                                  36KB

                                                                • memory/4404-134-0x0000000000400000-0x0000000000598000-memory.dmp

                                                                  Filesize

                                                                  1.6MB

                                                                • memory/4684-140-0x0000000002DD0000-0x00000000033F0000-memory.dmp

                                                                  Filesize

                                                                  6.1MB

                                                                • memory/4684-157-0x0000000000400000-0x0000000000B72000-memory.dmp

                                                                  Filesize

                                                                  7.4MB

                                                                • memory/4684-142-0x0000000002DD0000-0x00000000033F0000-memory.dmp

                                                                  Filesize

                                                                  6.1MB

                                                                • memory/4684-141-0x0000000000400000-0x0000000000B72000-memory.dmp

                                                                  Filesize

                                                                  7.4MB

                                                                • memory/4684-139-0x00000000027D8000-0x0000000002DC2000-memory.dmp

                                                                  Filesize

                                                                  5.9MB

                                                                • memory/4684-136-0x0000000000000000-mapping.dmp

                                                                • memory/4868-156-0x0000000000400000-0x0000000000B72000-memory.dmp

                                                                  Filesize

                                                                  7.4MB

                                                                • memory/4868-146-0x0000000000400000-0x0000000000B72000-memory.dmp

                                                                  Filesize

                                                                  7.4MB

                                                                • memory/4868-145-0x0000000002855000-0x0000000002E3F000-memory.dmp

                                                                  Filesize

                                                                  5.9MB

                                                                • memory/4868-143-0x0000000000000000-mapping.dmp