Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/08/2023, 12:11

General

  • Target

    87543bb0b3c0086df066fb579276ee09793ce51360a9ec2df34b2b71332373d9.exe

  • Size

    680KB

  • MD5

    ec48a18336ab182c08db5facb457accb

  • SHA1

    8961973bd67ce260c6dc3e3103254834a8f6180f

  • SHA256

    87543bb0b3c0086df066fb579276ee09793ce51360a9ec2df34b2b71332373d9

  • SHA512

    8fd29c83397ae6e5eeb5cb6dbede7af0068b9bcd04569d40917da47bdee23bf4891687cfb4550f3224969b61b2765dac509e1acd6f081975136e6579b4ff26c4

  • SSDEEP

    12288:jMr8y90P/qqw9+AylB6XMWCE/fYNXvVJIbRMtHTUelnO2JacqTMtoi7c:nyCyeAylw8EOvzDJwelnRac/yi7c

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87543bb0b3c0086df066fb579276ee09793ce51360a9ec2df34b2b71332373d9.exe
    "C:\Users\Admin\AppData\Local\Temp\87543bb0b3c0086df066fb579276ee09793ce51360a9ec2df34b2b71332373d9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3929257.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3929257.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3725268.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3725268.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8774664.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8774664.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2188
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1897314.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1897314.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4656
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9465896.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9465896.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2532
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1224
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4576
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1012
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2580
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:4596
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:3736
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:2420
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:4996
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:4844
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4952
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3123750.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3123750.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:1592
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3821135.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3821135.exe
                    3⤵
                    • Executes dropped EXE
                    PID:4580
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:936
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:100

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                      Filesize

                      232KB

                      MD5

                      ca3ad4a2053fa90e42f02ed67baa8a29

                      SHA1

                      3b4bf5ccc4d5b8e2843a59a0bc74578eb20190e2

                      SHA256

                      a5f54500b55f662e2fc6fe0a3f46a914657a95a540c68c16bf5ea7ea5f786dd1

                      SHA512

                      8a8291d25a8a7d71075599b95b9336088c966e6d8d1eac9d92afd145392112b4e076a3c601ec8417e9c419d4da4c8377afcc65cdd6a1e2de2b0b42aea524b9b2

                    • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                      Filesize

                      232KB

                      MD5

                      ca3ad4a2053fa90e42f02ed67baa8a29

                      SHA1

                      3b4bf5ccc4d5b8e2843a59a0bc74578eb20190e2

                      SHA256

                      a5f54500b55f662e2fc6fe0a3f46a914657a95a540c68c16bf5ea7ea5f786dd1

                      SHA512

                      8a8291d25a8a7d71075599b95b9336088c966e6d8d1eac9d92afd145392112b4e076a3c601ec8417e9c419d4da4c8377afcc65cdd6a1e2de2b0b42aea524b9b2

                    • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                      Filesize

                      232KB

                      MD5

                      ca3ad4a2053fa90e42f02ed67baa8a29

                      SHA1

                      3b4bf5ccc4d5b8e2843a59a0bc74578eb20190e2

                      SHA256

                      a5f54500b55f662e2fc6fe0a3f46a914657a95a540c68c16bf5ea7ea5f786dd1

                      SHA512

                      8a8291d25a8a7d71075599b95b9336088c966e6d8d1eac9d92afd145392112b4e076a3c601ec8417e9c419d4da4c8377afcc65cdd6a1e2de2b0b42aea524b9b2

                    • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                      Filesize

                      232KB

                      MD5

                      ca3ad4a2053fa90e42f02ed67baa8a29

                      SHA1

                      3b4bf5ccc4d5b8e2843a59a0bc74578eb20190e2

                      SHA256

                      a5f54500b55f662e2fc6fe0a3f46a914657a95a540c68c16bf5ea7ea5f786dd1

                      SHA512

                      8a8291d25a8a7d71075599b95b9336088c966e6d8d1eac9d92afd145392112b4e076a3c601ec8417e9c419d4da4c8377afcc65cdd6a1e2de2b0b42aea524b9b2

                    • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                      Filesize

                      232KB

                      MD5

                      ca3ad4a2053fa90e42f02ed67baa8a29

                      SHA1

                      3b4bf5ccc4d5b8e2843a59a0bc74578eb20190e2

                      SHA256

                      a5f54500b55f662e2fc6fe0a3f46a914657a95a540c68c16bf5ea7ea5f786dd1

                      SHA512

                      8a8291d25a8a7d71075599b95b9336088c966e6d8d1eac9d92afd145392112b4e076a3c601ec8417e9c419d4da4c8377afcc65cdd6a1e2de2b0b42aea524b9b2

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3929257.exe

                      Filesize

                      515KB

                      MD5

                      8a79da265874e7c00017aac5fb670399

                      SHA1

                      b280f86695df5b16b88039d8656ad01e5ef865f4

                      SHA256

                      f803294c266d6a7a3e255286f0a8f915e765bb7b94c31ff2381ecf04023af73b

                      SHA512

                      7fc235b7c39b04bb6cc429ea2d398d645d9ef8924631690eeb80385398dc48b6d4662a1ce0a5547bd124a9aa5e8cbb9fcb7cc629c908b66936bf4418df21dacb

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3929257.exe

                      Filesize

                      515KB

                      MD5

                      8a79da265874e7c00017aac5fb670399

                      SHA1

                      b280f86695df5b16b88039d8656ad01e5ef865f4

                      SHA256

                      f803294c266d6a7a3e255286f0a8f915e765bb7b94c31ff2381ecf04023af73b

                      SHA512

                      7fc235b7c39b04bb6cc429ea2d398d645d9ef8924631690eeb80385398dc48b6d4662a1ce0a5547bd124a9aa5e8cbb9fcb7cc629c908b66936bf4418df21dacb

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3821135.exe

                      Filesize

                      177KB

                      MD5

                      a067f6a876f9a2aca35531f35634250e

                      SHA1

                      855dd7dc3885761b5a5821237403f07305d712fe

                      SHA256

                      4df3128e079e89275969c85698a6f57f38e1fafae3e942b8a795d696ad8ec860

                      SHA512

                      b997ea29209b6bf0b4ee1fad6776c1401bb7699dfabe32651a6bd8bf959a953e3e9a1e28b524e32ab741ea5f55c7c7dbf1c6202f03db371a4a37d21f4deb6cf3

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3821135.exe

                      Filesize

                      177KB

                      MD5

                      a067f6a876f9a2aca35531f35634250e

                      SHA1

                      855dd7dc3885761b5a5821237403f07305d712fe

                      SHA256

                      4df3128e079e89275969c85698a6f57f38e1fafae3e942b8a795d696ad8ec860

                      SHA512

                      b997ea29209b6bf0b4ee1fad6776c1401bb7699dfabe32651a6bd8bf959a953e3e9a1e28b524e32ab741ea5f55c7c7dbf1c6202f03db371a4a37d21f4deb6cf3

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3725268.exe

                      Filesize

                      359KB

                      MD5

                      fcd99c9e5646c5767e41618b2e556f37

                      SHA1

                      bd1be8b83a821a3975c57f3d6a77fe0add347619

                      SHA256

                      b2db87338fc82adbdba190bb1a6f8cb040fe0e0610f6ffc00f1aec62a22a71a5

                      SHA512

                      65d7970c3e4e2657f4d06ef3f85034c1afb0b6421387eec6e157aa05e7dbac9c23e23e6c6e59ee4a8053a5375f479e2d0aa014f6bc0b5ce901a7abcce542bfbd

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3725268.exe

                      Filesize

                      359KB

                      MD5

                      fcd99c9e5646c5767e41618b2e556f37

                      SHA1

                      bd1be8b83a821a3975c57f3d6a77fe0add347619

                      SHA256

                      b2db87338fc82adbdba190bb1a6f8cb040fe0e0610f6ffc00f1aec62a22a71a5

                      SHA512

                      65d7970c3e4e2657f4d06ef3f85034c1afb0b6421387eec6e157aa05e7dbac9c23e23e6c6e59ee4a8053a5375f479e2d0aa014f6bc0b5ce901a7abcce542bfbd

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3123750.exe

                      Filesize

                      40KB

                      MD5

                      041bfdefd165df3f26dcf31c710dbf67

                      SHA1

                      480bb0838b38091d61574a77c2d420a88bf52917

                      SHA256

                      0bc6bbe4023ed16bc88c10daccd247c5e7787cb6a6491fbc3c15f2d6bce6fc19

                      SHA512

                      ba43e5eb1e2e91ace71ad1816101461c8dffcd3654acb7d88136ccdd517c7e8a858d839a4101c390d7f02703cf306d19b7232bb6f88d4bf87d332bc95885475c

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3123750.exe

                      Filesize

                      40KB

                      MD5

                      041bfdefd165df3f26dcf31c710dbf67

                      SHA1

                      480bb0838b38091d61574a77c2d420a88bf52917

                      SHA256

                      0bc6bbe4023ed16bc88c10daccd247c5e7787cb6a6491fbc3c15f2d6bce6fc19

                      SHA512

                      ba43e5eb1e2e91ace71ad1816101461c8dffcd3654acb7d88136ccdd517c7e8a858d839a4101c390d7f02703cf306d19b7232bb6f88d4bf87d332bc95885475c

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8774664.exe

                      Filesize

                      234KB

                      MD5

                      7dd13db88c5bf29b4e1e8385002f2195

                      SHA1

                      5cd899e37144ee029682bbea243015488dba8baa

                      SHA256

                      37548103c8754290c59645d2f6f2f18276e749621819a73893cee16ddfe39a6e

                      SHA512

                      39277cbd5bbd0c19432f21bf2c493324eb1b8ccda145b3abb940fa42d94e146b15ab1cde0f06ccb08de6e39e1899266061617ef35440be7056fb3bfaff0855e0

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8774664.exe

                      Filesize

                      234KB

                      MD5

                      7dd13db88c5bf29b4e1e8385002f2195

                      SHA1

                      5cd899e37144ee029682bbea243015488dba8baa

                      SHA256

                      37548103c8754290c59645d2f6f2f18276e749621819a73893cee16ddfe39a6e

                      SHA512

                      39277cbd5bbd0c19432f21bf2c493324eb1b8ccda145b3abb940fa42d94e146b15ab1cde0f06ccb08de6e39e1899266061617ef35440be7056fb3bfaff0855e0

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1897314.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1897314.exe

                      Filesize

                      11KB

                      MD5

                      7e93bacbbc33e6652e147e7fe07572a0

                      SHA1

                      421a7167da01c8da4dc4d5234ca3dd84e319e762

                      SHA256

                      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                      SHA512

                      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9465896.exe

                      Filesize

                      232KB

                      MD5

                      ca3ad4a2053fa90e42f02ed67baa8a29

                      SHA1

                      3b4bf5ccc4d5b8e2843a59a0bc74578eb20190e2

                      SHA256

                      a5f54500b55f662e2fc6fe0a3f46a914657a95a540c68c16bf5ea7ea5f786dd1

                      SHA512

                      8a8291d25a8a7d71075599b95b9336088c966e6d8d1eac9d92afd145392112b4e076a3c601ec8417e9c419d4da4c8377afcc65cdd6a1e2de2b0b42aea524b9b2

                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9465896.exe

                      Filesize

                      232KB

                      MD5

                      ca3ad4a2053fa90e42f02ed67baa8a29

                      SHA1

                      3b4bf5ccc4d5b8e2843a59a0bc74578eb20190e2

                      SHA256

                      a5f54500b55f662e2fc6fe0a3f46a914657a95a540c68c16bf5ea7ea5f786dd1

                      SHA512

                      8a8291d25a8a7d71075599b95b9336088c966e6d8d1eac9d92afd145392112b4e076a3c601ec8417e9c419d4da4c8377afcc65cdd6a1e2de2b0b42aea524b9b2

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      2392b231cf4a80739b5cb09bf808127d

                      SHA1

                      41b5cf81c50884954911d96444fe83cfd0da465b

                      SHA256

                      2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                      SHA512

                      19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      2392b231cf4a80739b5cb09bf808127d

                      SHA1

                      41b5cf81c50884954911d96444fe83cfd0da465b

                      SHA256

                      2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                      SHA512

                      19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      2392b231cf4a80739b5cb09bf808127d

                      SHA1

                      41b5cf81c50884954911d96444fe83cfd0da465b

                      SHA256

                      2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                      SHA512

                      19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      273B

                      MD5

                      9851b884bf4aadfade57d911a3f03332

                      SHA1

                      aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                      SHA256

                      03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                      SHA512

                      a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

                    • memory/1592-182-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/1592-185-0x0000000000400000-0x0000000000409000-memory.dmp

                      Filesize

                      36KB

                    • memory/3144-183-0x0000000002C50000-0x0000000002C66000-memory.dmp

                      Filesize

                      88KB

                    • memory/4580-193-0x000000000ACA0000-0x000000000ADAA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4580-192-0x000000000B120000-0x000000000B738000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/4580-195-0x000000000ABE0000-0x000000000ABF2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4580-194-0x0000000005770000-0x0000000005780000-memory.dmp

                      Filesize

                      64KB

                    • memory/4580-196-0x000000000AC40000-0x000000000AC7C000-memory.dmp

                      Filesize

                      240KB

                    • memory/4580-191-0x0000000000CF0000-0x0000000000D20000-memory.dmp

                      Filesize

                      192KB

                    • memory/4580-198-0x0000000072D10000-0x00000000734C0000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4580-199-0x0000000005770000-0x0000000005780000-memory.dmp

                      Filesize

                      64KB

                    • memory/4580-190-0x0000000072D10000-0x00000000734C0000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4656-165-0x00007FFCB47B0000-0x00007FFCB5271000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4656-163-0x00007FFCB47B0000-0x00007FFCB5271000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4656-162-0x00007FFCB47B0000-0x00007FFCB5271000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4656-161-0x0000000000480000-0x000000000048A000-memory.dmp

                      Filesize

                      40KB