Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2023 02:55

General

  • Target

    cef0a97ab84a4b4239d22008c571317702775eb85799e544bc1cb13f2aa5ea73.exe

  • Size

    239KB

  • MD5

    f0d2a2754e33271df9ed6ad63ae59cd9

  • SHA1

    ab7205ae24c163bcf533cf24ee49d3c9df2994cf

  • SHA256

    cef0a97ab84a4b4239d22008c571317702775eb85799e544bc1cb13f2aa5ea73

  • SHA512

    7e2f1ca22f8ce25fe2076db33194ca65677db52c6dd6b838e02b8a9950183d437f35e392079d5f8660e25628a054f7f710e983a639ad0271b7f67886aa7bdfcd

  • SSDEEP

    3072:3kXSzOsCMLXmM3EKgs5LiQfD39Erus8rs773lHPAmqIaR27hZY:Q0LfEKga9fD3yus8rs33lTOsZY

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 42 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 43 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cef0a97ab84a4b4239d22008c571317702775eb85799e544bc1cb13f2aa5ea73.exe
    "C:\Users\Admin\AppData\Local\Temp\cef0a97ab84a4b4239d22008c571317702775eb85799e544bc1cb13f2aa5ea73.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1044
  • C:\Users\Admin\AppData\Local\Temp\FBF9.exe
    C:\Users\Admin\AppData\Local\Temp\FBF9.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1020
      2⤵
      • Program crash
      PID:2704
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1080
      2⤵
      • Program crash
      PID:4368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1160
      2⤵
      • Program crash
      PID:2388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1084
      2⤵
      • Program crash
      PID:4660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1084
      2⤵
      • Program crash
      PID:3056
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1188
      2⤵
      • Program crash
      PID:2996
    • C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe
      "C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4188
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 460
        3⤵
        • Program crash
        PID:4492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 1468
      2⤵
      • Program crash
      PID:312
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:552
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 30829
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:5004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 124 -p 4484 -ip 4484
    1⤵
      PID:3572
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4484 -ip 4484
      1⤵
        PID:3092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4484 -ip 4484
        1⤵
          PID:3480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4484 -ip 4484
          1⤵
            PID:2644
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4484 -ip 4484
            1⤵
              PID:4784
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4484 -ip 4484
              1⤵
                PID:5008
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4484 -ip 4484
                1⤵
                  PID:4984
                • C:\Windows\System32\rundll32.exe
                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                  1⤵
                    PID:4772
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4188 -ip 4188
                    1⤵
                      PID:1912
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --silent-launch --disable-backgrounding-occluded-windows --disable-background-timer-throttling --ran-launcher --profile-directory="Default"
                      1⤵
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Enumerates system info in registry
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:4956
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffec8d44f50,0x7ffec8d44f60,0x7ffec8d44f70
                        2⤵
                          PID:2936
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,3795520450452306456,2016984154824982853,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1628 /prefetch:2
                          2⤵
                            PID:1868
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1620,3795520450452306456,2016984154824982853,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1812 /prefetch:8
                            2⤵
                              PID:3712
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1620,3795520450452306456,2016984154824982853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 /prefetch:8
                              2⤵
                                PID:4236
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,3795520450452306456,2016984154824982853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3364 /prefetch:8
                                2⤵
                                  PID:4436
                                • C:\Windows\system32\WerFault.exe
                                  C:\Windows\system32\WerFault.exe -u -p 4956 -s 3692
                                  2⤵
                                  • Program crash
                                  PID:2892
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1924
                                • C:\Windows\system32\WerFault.exe
                                  C:\Windows\system32\WerFault.exe -pss -s 628 -p 4956 -ip 4956
                                  1⤵
                                    PID:1288

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\FBF9.exe

                                    Filesize

                                    6.6MB

                                    MD5

                                    464e8a4fae8ae331f09311dd047a1e45

                                    SHA1

                                    1e4b8d4411c5b95ede1535485b4035b9c3bcefa4

                                    SHA256

                                    49d497d4a38848701d8908078bbc416302e98ae3a21a4ad6b60e2a664d99c33c

                                    SHA512

                                    328750c64040f41d3a036c5e238d30c34a123a0b3fcce346308b3eb6b75f522c045a8bea7bcf104b0d8409cb7f1327d248fae433a389e9eab8cada3d2746b977

                                  • C:\Users\Admin\AppData\Local\Temp\FBF9.exe

                                    Filesize

                                    6.6MB

                                    MD5

                                    464e8a4fae8ae331f09311dd047a1e45

                                    SHA1

                                    1e4b8d4411c5b95ede1535485b4035b9c3bcefa4

                                    SHA256

                                    49d497d4a38848701d8908078bbc416302e98ae3a21a4ad6b60e2a664d99c33c

                                    SHA512

                                    328750c64040f41d3a036c5e238d30c34a123a0b3fcce346308b3eb6b75f522c045a8bea7bcf104b0d8409cb7f1327d248fae433a389e9eab8cada3d2746b977

                                  • C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe

                                    Filesize

                                    1.4MB

                                    MD5

                                    526b7ca434081a2cde3a52401145e6d1

                                    SHA1

                                    4a56c2f0a375fd61e8c735b8e01b82c5d937f23d

                                    SHA256

                                    57c3c745da3abd3efb910c157bad430f5dc74a3aab48334e4f8f1a93c68d7d67

                                    SHA512

                                    57b54dcdd7f99cde495e202e2e8f85278afdd6a4bd31c9593975d890942cecac0a482602ddf0e6f04dc4b37517414b65949a2c506c9c7f04197ec53845834f2d

                                  • C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.exe

                                    Filesize

                                    1.4MB

                                    MD5

                                    526b7ca434081a2cde3a52401145e6d1

                                    SHA1

                                    4a56c2f0a375fd61e8c735b8e01b82c5d937f23d

                                    SHA256

                                    57c3c745da3abd3efb910c157bad430f5dc74a3aab48334e4f8f1a93c68d7d67

                                    SHA512

                                    57b54dcdd7f99cde495e202e2e8f85278afdd6a4bd31c9593975d890942cecac0a482602ddf0e6f04dc4b37517414b65949a2c506c9c7f04197ec53845834f2d

                                  • C:\Users\Admin\AppData\Local\Temp\Iqpoqhfidqa.tmp

                                    Filesize

                                    3.5MB

                                    MD5

                                    e46489e6f67972c624a8ef215d26db53

                                    SHA1

                                    304fdfc6918d97480f65c80891baeb63e55ee3e0

                                    SHA256

                                    c34565954052e885c9978fc2b50cf32cc98a67ba9851689101ed5bfffa9bdce4

                                    SHA512

                                    6c65ad50bde38b2d6b5880f998e67ac431daa783be6baf925a84f1bb439b04806d1a612f4537363940325bb2aa6d1e692379215a63d1e80ac997fc1a9eb47ac1

                                  • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                                    Filesize

                                    3KB

                                    MD5

                                    64360c9cc2496f8839b09d274bbbb2af

                                    SHA1

                                    2ba56f1563ce701498307101ab4c304691b74d22

                                    SHA256

                                    3e1be5d84bdf2dc4e2a97a158549c12a993f16cf7509e7aa1ae76c685523be0a

                                    SHA512

                                    6b7ed57bfed481d259dfd9d1b6873e633da46fda2b4a59910748dbd577c482b3f1cb4e08afcc36e0843c5762d7a6389c46cfcafd4613d8c5478ccab6bd2ed7d4

                                  • C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt

                                    Filesize

                                    1KB

                                    MD5

                                    40cf4af9a7b836a42381481df01083dd

                                    SHA1

                                    8a4f8265c71bc762158d42a054f700658b9cba18

                                    SHA256

                                    a71a768e32a456e49cf9346f679b5b4e77e5bbab89e0fc17a817f67607bf0fdf

                                    SHA512

                                    7a66c165744a53e964c55a7b9be62bb2446bb0b9b880640ed9e222f8da537aa99b286f0b11bfed709410d4a17c9e8e1b7ddf3096303ac7924ccb8081da5fea67

                                  • C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI15DD.txt

                                    Filesize

                                    11KB

                                    MD5

                                    cd5de129f0a12b726ff1ea230014a322

                                    SHA1

                                    8451c3e2902467525934d004a282e5b7cc6a4c63

                                    SHA256

                                    d75268976b4af6319bba73e4b0112004edf825096ed6977f3b5873d59d7f3a96

                                    SHA512

                                    7cd75fc762f3926f6d8ca2f709c38664f4ac2307e399b5b71d05d922dac928dc512620d01ae355e02df0a1d4cf643174c98f61773af5290f9c1772ee81f7efe1

                                  • memory/372-182-0x000000000AFD0000-0x000000000B0F8000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/372-198-0x000000000AFD0000-0x000000000B0F8000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/372-196-0x000000000AFD0000-0x000000000B0F8000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-169-0x00000000037E0000-0x0000000003920000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-162-0x00000000037E0000-0x0000000003920000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-160-0x00000000037E0000-0x0000000003920000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-184-0x00000000037E0000-0x0000000003920000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-159-0x0000000002BA0000-0x00000000036F2000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/552-194-0x0000000002BA0000-0x00000000036F2000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/552-188-0x00000000037E0000-0x0000000003920000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-168-0x00000000037E0000-0x0000000003920000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-163-0x0000000002BA0000-0x00000000036F2000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/552-185-0x00000000037E0000-0x0000000003920000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-187-0x00000000037E0000-0x0000000003920000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/552-161-0x0000000000B50000-0x0000000001582000-memory.dmp

                                    Filesize

                                    10.2MB

                                  • memory/1044-133-0x0000000002190000-0x0000000002199000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/1044-134-0x0000000000400000-0x0000000000459000-memory.dmp

                                    Filesize

                                    356KB

                                  • memory/1044-132-0x000000000067E000-0x000000000068E000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1044-135-0x0000000000400000-0x0000000000459000-memory.dmp

                                    Filesize

                                    356KB

                                  • memory/4188-181-0x00000000023C0000-0x0000000002515000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/4188-175-0x00000000027A0000-0x00000000028D4000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4188-177-0x00000000027A0000-0x00000000028D4000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4188-183-0x0000000000400000-0x0000000000588000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/4188-180-0x00000000027A0000-0x00000000028D4000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4188-179-0x000000000227C000-0x00000000023BC000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4188-178-0x00000000027A0000-0x00000000028D4000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4188-170-0x00000000027A0000-0x00000000028D4000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4188-176-0x00000000027A0000-0x00000000028D4000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4188-174-0x00000000027A0000-0x00000000028D4000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-150-0x0000000005740000-0x0000000005880000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-143-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                    Filesize

                                    8.8MB

                                  • memory/4484-151-0x0000000005740000-0x0000000005880000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-152-0x0000000005740000-0x0000000005880000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-153-0x0000000005740000-0x0000000005880000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-149-0x0000000005740000-0x0000000005880000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-154-0x0000000005740000-0x0000000005880000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-148-0x0000000004B10000-0x0000000005662000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/4484-156-0x0000000004B10000-0x0000000005662000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/4484-147-0x0000000004B10000-0x0000000005662000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/4484-157-0x0000000005740000-0x0000000005880000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-155-0x0000000005740000-0x0000000005880000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4484-186-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                    Filesize

                                    8.8MB

                                  • memory/4484-142-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                    Filesize

                                    8.8MB

                                  • memory/4484-139-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                    Filesize

                                    8.8MB

                                  • memory/4484-140-0x0000000002A6E000-0x00000000030E4000-memory.dmp

                                    Filesize

                                    6.5MB

                                  • memory/4484-195-0x0000000004B10000-0x0000000005662000-memory.dmp

                                    Filesize

                                    11.3MB

                                  • memory/4484-141-0x00000000030F0000-0x00000000039B3000-memory.dmp

                                    Filesize

                                    8.8MB

                                  • memory/5004-193-0x00000297BCE20000-0x00000297BD0D5000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/5004-192-0x0000000000900000-0x0000000000BA3000-memory.dmp

                                    Filesize

                                    2.6MB

                                  • memory/5004-190-0x00000297BE6F0000-0x00000297BE830000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/5004-191-0x00000297BE6F0000-0x00000297BE830000-memory.dmp

                                    Filesize

                                    1.2MB