Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2023 15:49

General

  • Target

    b39939a4c2e4297c1d1732aba7135a8ef70f2822d8d96e2b05ad593e64fd78bbexe_JC.exe

  • Size

    631KB

  • MD5

    be2fe1b8ac744751a57baf81af167425

  • SHA1

    1c394fc7f0621feabc28fa5a2e578afea6b511ac

  • SHA256

    b39939a4c2e4297c1d1732aba7135a8ef70f2822d8d96e2b05ad593e64fd78bb

  • SHA512

    10058229741d7f70ef872ba554cbdd6cb053a4a09fa818edda8fff7de5c3626f660b6434c9ac76cd37d5ba10f106b727bcd1e474e60ea8ac114fc465a0dd69f4

  • SSDEEP

    12288:RMrBy90oDtcHb1dmHaZCiygHdGlU0MJ6rj5XemyMJ4:wyrtUAaZCzgHdUsJ6f5o+4

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

papik

C2

77.91.124.156:19071

Attributes
  • auth_value

    325a615d8be5db8e2f7a4c2448fdac3a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b39939a4c2e4297c1d1732aba7135a8ef70f2822d8d96e2b05ad593e64fd78bbexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\b39939a4c2e4297c1d1732aba7135a8ef70f2822d8d96e2b05ad593e64fd78bbexe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7246822.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7246822.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5031443.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5031443.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1260
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2596875.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2596875.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1512
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7605384.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7605384.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4220
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3562925.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3562925.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2508
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1648
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:844
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:952
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3440
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:4964
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:4188
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4532
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:4892
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:2656
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4160
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6525274.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6525274.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:4504
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5716586.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5716586.exe
                    3⤵
                    • Executes dropped EXE
                    PID:1468
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:2176
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3828

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Impair Defenses

              2
              T1562

              Disable or Modify Tools

              2
              T1562.001

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                227KB

                MD5

                9d84c69d29cbd995d0359af290ad15b3

                SHA1

                c76aad56252ae111649571afa74c02a6431f7a0d

                SHA256

                18a0fa6cf3bb9ad6f6943e987c43b4b52d6e82803fe9191e8d2a80abd405e439

                SHA512

                92a5e63b593c6725c3753fcfb6c2df69b1be9c975b40cbf6bda9b49894a66923fac28cd633929a59c9d49cf409e980dcbf484cf7cc222fb2323c6f8cf06a2296

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                227KB

                MD5

                9d84c69d29cbd995d0359af290ad15b3

                SHA1

                c76aad56252ae111649571afa74c02a6431f7a0d

                SHA256

                18a0fa6cf3bb9ad6f6943e987c43b4b52d6e82803fe9191e8d2a80abd405e439

                SHA512

                92a5e63b593c6725c3753fcfb6c2df69b1be9c975b40cbf6bda9b49894a66923fac28cd633929a59c9d49cf409e980dcbf484cf7cc222fb2323c6f8cf06a2296

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                227KB

                MD5

                9d84c69d29cbd995d0359af290ad15b3

                SHA1

                c76aad56252ae111649571afa74c02a6431f7a0d

                SHA256

                18a0fa6cf3bb9ad6f6943e987c43b4b52d6e82803fe9191e8d2a80abd405e439

                SHA512

                92a5e63b593c6725c3753fcfb6c2df69b1be9c975b40cbf6bda9b49894a66923fac28cd633929a59c9d49cf409e980dcbf484cf7cc222fb2323c6f8cf06a2296

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                227KB

                MD5

                9d84c69d29cbd995d0359af290ad15b3

                SHA1

                c76aad56252ae111649571afa74c02a6431f7a0d

                SHA256

                18a0fa6cf3bb9ad6f6943e987c43b4b52d6e82803fe9191e8d2a80abd405e439

                SHA512

                92a5e63b593c6725c3753fcfb6c2df69b1be9c975b40cbf6bda9b49894a66923fac28cd633929a59c9d49cf409e980dcbf484cf7cc222fb2323c6f8cf06a2296

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                227KB

                MD5

                9d84c69d29cbd995d0359af290ad15b3

                SHA1

                c76aad56252ae111649571afa74c02a6431f7a0d

                SHA256

                18a0fa6cf3bb9ad6f6943e987c43b4b52d6e82803fe9191e8d2a80abd405e439

                SHA512

                92a5e63b593c6725c3753fcfb6c2df69b1be9c975b40cbf6bda9b49894a66923fac28cd633929a59c9d49cf409e980dcbf484cf7cc222fb2323c6f8cf06a2296

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7246822.exe
                Filesize

                514KB

                MD5

                a8378cb7bffe5187a79ec22be48d7dc9

                SHA1

                940eb2a5ebb4e3fe6637c4d57cd9e46fccf1e70e

                SHA256

                e64991e535dfb0377573cd8de676b7bb17a3f84e50d38b64d68ef5d1a98fd312

                SHA512

                d714a230b8c5889af6fd1be884974a5a0cc43c471e7db995e6f28aa4709e5b7fad55a19e7e46e9b5c7ee97db0037d4a9c63de9f5bb8875500439a30a85187b8a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7246822.exe
                Filesize

                514KB

                MD5

                a8378cb7bffe5187a79ec22be48d7dc9

                SHA1

                940eb2a5ebb4e3fe6637c4d57cd9e46fccf1e70e

                SHA256

                e64991e535dfb0377573cd8de676b7bb17a3f84e50d38b64d68ef5d1a98fd312

                SHA512

                d714a230b8c5889af6fd1be884974a5a0cc43c471e7db995e6f28aa4709e5b7fad55a19e7e46e9b5c7ee97db0037d4a9c63de9f5bb8875500439a30a85187b8a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5716586.exe
                Filesize

                173KB

                MD5

                76eaf61ee4371bb6a344fd9345a04b06

                SHA1

                eba8550dedb7b24fbb92fd7bbd04ba3dcfc88406

                SHA256

                1f35416a1e03c27c6960f79b6e8960b08bd3f3c0f5a27af76423a1b99a8d1104

                SHA512

                259fe2ac980fe8d44476a9519b42cd72cb7dafc9dc4f541fffe684340fc5e61fc97c17e7eaff35a1fb083c9e615bd8cd74d5a62e9e932b8f82f2640aae45a90c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5716586.exe
                Filesize

                173KB

                MD5

                76eaf61ee4371bb6a344fd9345a04b06

                SHA1

                eba8550dedb7b24fbb92fd7bbd04ba3dcfc88406

                SHA256

                1f35416a1e03c27c6960f79b6e8960b08bd3f3c0f5a27af76423a1b99a8d1104

                SHA512

                259fe2ac980fe8d44476a9519b42cd72cb7dafc9dc4f541fffe684340fc5e61fc97c17e7eaff35a1fb083c9e615bd8cd74d5a62e9e932b8f82f2640aae45a90c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5031443.exe
                Filesize

                359KB

                MD5

                07c97b259d209b0d302a975b34a931b7

                SHA1

                f8a6deaa57a5320605983e8da823063fee940369

                SHA256

                ea2e2fc2e619a48e8d0451aa70988e2196cfa3aa7151233c471cb2521f21fb1d

                SHA512

                d2aa17b6143514ab95a1a3b0e99b44637eec838aaf1a147f22c01a6ae54eed3a0b9684cea10d5ba742d194ee081478c9bc3f4631b9b14e880b77ffe07c15ffe0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5031443.exe
                Filesize

                359KB

                MD5

                07c97b259d209b0d302a975b34a931b7

                SHA1

                f8a6deaa57a5320605983e8da823063fee940369

                SHA256

                ea2e2fc2e619a48e8d0451aa70988e2196cfa3aa7151233c471cb2521f21fb1d

                SHA512

                d2aa17b6143514ab95a1a3b0e99b44637eec838aaf1a147f22c01a6ae54eed3a0b9684cea10d5ba742d194ee081478c9bc3f4631b9b14e880b77ffe07c15ffe0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6525274.exe
                Filesize

                37KB

                MD5

                2b83fae92edafaa6be5d5c8b3b5f6537

                SHA1

                f252bade2e64bdf97dcceb919969815cc1498b3c

                SHA256

                af520a4cb6beb444cf1bb06c9491f82e339ea08aef0a9584f09ae966bb9ba68c

                SHA512

                0ed7e54b08c4740088058296c0a374457e7937b7835c12d3fd564cc21110e6bc3659ccc65e4ec34ac77ab5a8ad715cddbb7b56cfca477b8dc8f5537a6f0c04c6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6525274.exe
                Filesize

                37KB

                MD5

                2b83fae92edafaa6be5d5c8b3b5f6537

                SHA1

                f252bade2e64bdf97dcceb919969815cc1498b3c

                SHA256

                af520a4cb6beb444cf1bb06c9491f82e339ea08aef0a9584f09ae966bb9ba68c

                SHA512

                0ed7e54b08c4740088058296c0a374457e7937b7835c12d3fd564cc21110e6bc3659ccc65e4ec34ac77ab5a8ad715cddbb7b56cfca477b8dc8f5537a6f0c04c6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2596875.exe
                Filesize

                234KB

                MD5

                66f7f502d24796a10dcccf985e119e82

                SHA1

                de836f7099629494930860c55c083dc2dfe5f21a

                SHA256

                46773665464880d269bf0825dcd1a1b3c6c71db6711f0aea4dce659eed9feb5f

                SHA512

                1a353fcc92e274821d1194a4e75160d4740f61978468c8b4960050b11e3b8307bd6f54a64f6da42e62a9642f9d5c027adb284519a12c920833227015856b594f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2596875.exe
                Filesize

                234KB

                MD5

                66f7f502d24796a10dcccf985e119e82

                SHA1

                de836f7099629494930860c55c083dc2dfe5f21a

                SHA256

                46773665464880d269bf0825dcd1a1b3c6c71db6711f0aea4dce659eed9feb5f

                SHA512

                1a353fcc92e274821d1194a4e75160d4740f61978468c8b4960050b11e3b8307bd6f54a64f6da42e62a9642f9d5c027adb284519a12c920833227015856b594f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7605384.exe
                Filesize

                11KB

                MD5

                32fcd91addcb80b14233ff90b900f4c7

                SHA1

                27b8bfdc671ac09b33ac9445d68c65523f59a09d

                SHA256

                b84c8f6d6f9c24f7b315a1d16601a69979fd2a12c9f71d4d70819208da3e6def

                SHA512

                398a27d9c69caa31fdd56515a3254f49053c84b885299cb33252d21d9dea3b0f2239d341d563551b0666d78bbae758b01996ac63be2445a9738f647d8884e69a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7605384.exe
                Filesize

                11KB

                MD5

                32fcd91addcb80b14233ff90b900f4c7

                SHA1

                27b8bfdc671ac09b33ac9445d68c65523f59a09d

                SHA256

                b84c8f6d6f9c24f7b315a1d16601a69979fd2a12c9f71d4d70819208da3e6def

                SHA512

                398a27d9c69caa31fdd56515a3254f49053c84b885299cb33252d21d9dea3b0f2239d341d563551b0666d78bbae758b01996ac63be2445a9738f647d8884e69a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3562925.exe
                Filesize

                227KB

                MD5

                9d84c69d29cbd995d0359af290ad15b3

                SHA1

                c76aad56252ae111649571afa74c02a6431f7a0d

                SHA256

                18a0fa6cf3bb9ad6f6943e987c43b4b52d6e82803fe9191e8d2a80abd405e439

                SHA512

                92a5e63b593c6725c3753fcfb6c2df69b1be9c975b40cbf6bda9b49894a66923fac28cd633929a59c9d49cf409e980dcbf484cf7cc222fb2323c6f8cf06a2296

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3562925.exe
                Filesize

                227KB

                MD5

                9d84c69d29cbd995d0359af290ad15b3

                SHA1

                c76aad56252ae111649571afa74c02a6431f7a0d

                SHA256

                18a0fa6cf3bb9ad6f6943e987c43b4b52d6e82803fe9191e8d2a80abd405e439

                SHA512

                92a5e63b593c6725c3753fcfb6c2df69b1be9c975b40cbf6bda9b49894a66923fac28cd633929a59c9d49cf409e980dcbf484cf7cc222fb2323c6f8cf06a2296

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/408-182-0x0000000000F70000-0x0000000000F86000-memory.dmp
                Filesize

                88KB

              • memory/1468-189-0x0000000000010000-0x0000000000040000-memory.dmp
                Filesize

                192KB

              • memory/1468-191-0x00000000050A0000-0x00000000056B8000-memory.dmp
                Filesize

                6.1MB

              • memory/1468-192-0x0000000004BA0000-0x0000000004CAA000-memory.dmp
                Filesize

                1.0MB

              • memory/1468-193-0x0000000004A70000-0x0000000004A80000-memory.dmp
                Filesize

                64KB

              • memory/1468-194-0x0000000004AE0000-0x0000000004AF2000-memory.dmp
                Filesize

                72KB

              • memory/1468-195-0x0000000004B40000-0x0000000004B7C000-memory.dmp
                Filesize

                240KB

              • memory/1468-196-0x0000000073030000-0x00000000737E0000-memory.dmp
                Filesize

                7.7MB

              • memory/1468-197-0x0000000004A70000-0x0000000004A80000-memory.dmp
                Filesize

                64KB

              • memory/1468-190-0x0000000073030000-0x00000000737E0000-memory.dmp
                Filesize

                7.7MB

              • memory/4220-162-0x00007FF9BE960000-0x00007FF9BF421000-memory.dmp
                Filesize

                10.8MB

              • memory/4220-164-0x00007FF9BE960000-0x00007FF9BF421000-memory.dmp
                Filesize

                10.8MB

              • memory/4220-161-0x0000000000430000-0x000000000043A000-memory.dmp
                Filesize

                40KB

              • memory/4504-183-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/4504-180-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB