Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2023 16:36

General

  • Target

    d154b3b05dc2aa7aef66b06a8e7d41f6804719243741938fe148d03a76bcd598exe_JC.exe

  • Size

    642KB

  • MD5

    4de84534e40e282b00225cb20c15572c

  • SHA1

    2c906b9c05b35a4ddd0e4b86b3c9d87e2d730620

  • SHA256

    d154b3b05dc2aa7aef66b06a8e7d41f6804719243741938fe148d03a76bcd598

  • SHA512

    10b64b13dadb8bc510fd58557cbe8867352aff9832efe479a2eec8da07ac9903840f0b64492428b356bcd289f14b9b47f6c4d75b0f7793b3b20c2a2bf1ea1fb1

  • SSDEEP

    12288:wMr/y90lakXR+gX1jm2H3IZY/dVUNChCqZjQ2Qntu0wWacXygU:fysXR+Sm2H3rV1hCGencnWahF

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

papik

C2

77.91.124.156:19071

Attributes
  • auth_value

    325a615d8be5db8e2f7a4c2448fdac3a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d154b3b05dc2aa7aef66b06a8e7d41f6804719243741938fe148d03a76bcd598exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\d154b3b05dc2aa7aef66b06a8e7d41f6804719243741938fe148d03a76bcd598exe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9372125.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9372125.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2466822.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2466822.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7513614.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7513614.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4608
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0551620.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0551620.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4784
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3953873.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3953873.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:220
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2476
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:1752
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2192
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:1404
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:3812
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:4168
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:1536
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:4848
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:1480
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4716
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6301349.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6301349.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:1728
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5806248.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5806248.exe
                    3⤵
                    • Executes dropped EXE
                    PID:992
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3884
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4360

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              3
              T1112

              Impair Defenses

              2
              T1562

              Disable or Modify Tools

              2
              T1562.001

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                228KB

                MD5

                30961a6b1664b09f236faacc258cc2ca

                SHA1

                b2f6db06283e60bb008f9a8b5051e4f404b74b34

                SHA256

                74639d53844ade943272615b33385c0320ee87a06931dc424c1f34861677c474

                SHA512

                1c0398e2c18c295723a23e9417ef178b1dc662cc771e3aaba94f750ff1cfdae5b505b017d87f68ff9ec1f20e48b8c65f1326f1bff184d7c5b35bb9074db10d3d

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                228KB

                MD5

                30961a6b1664b09f236faacc258cc2ca

                SHA1

                b2f6db06283e60bb008f9a8b5051e4f404b74b34

                SHA256

                74639d53844ade943272615b33385c0320ee87a06931dc424c1f34861677c474

                SHA512

                1c0398e2c18c295723a23e9417ef178b1dc662cc771e3aaba94f750ff1cfdae5b505b017d87f68ff9ec1f20e48b8c65f1326f1bff184d7c5b35bb9074db10d3d

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                228KB

                MD5

                30961a6b1664b09f236faacc258cc2ca

                SHA1

                b2f6db06283e60bb008f9a8b5051e4f404b74b34

                SHA256

                74639d53844ade943272615b33385c0320ee87a06931dc424c1f34861677c474

                SHA512

                1c0398e2c18c295723a23e9417ef178b1dc662cc771e3aaba94f750ff1cfdae5b505b017d87f68ff9ec1f20e48b8c65f1326f1bff184d7c5b35bb9074db10d3d

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                228KB

                MD5

                30961a6b1664b09f236faacc258cc2ca

                SHA1

                b2f6db06283e60bb008f9a8b5051e4f404b74b34

                SHA256

                74639d53844ade943272615b33385c0320ee87a06931dc424c1f34861677c474

                SHA512

                1c0398e2c18c295723a23e9417ef178b1dc662cc771e3aaba94f750ff1cfdae5b505b017d87f68ff9ec1f20e48b8c65f1326f1bff184d7c5b35bb9074db10d3d

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                Filesize

                228KB

                MD5

                30961a6b1664b09f236faacc258cc2ca

                SHA1

                b2f6db06283e60bb008f9a8b5051e4f404b74b34

                SHA256

                74639d53844ade943272615b33385c0320ee87a06931dc424c1f34861677c474

                SHA512

                1c0398e2c18c295723a23e9417ef178b1dc662cc771e3aaba94f750ff1cfdae5b505b017d87f68ff9ec1f20e48b8c65f1326f1bff184d7c5b35bb9074db10d3d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9372125.exe
                Filesize

                514KB

                MD5

                09292722d8a4cb97c9d2d6e466b3d603

                SHA1

                18ac6605563a765e5147eaf6247b2e184655b852

                SHA256

                8c29a041da4431f04bd4978a9edc89714ba7c7bdd88d1df473a2a76bbab1141d

                SHA512

                e48cc9b738a67b131d2b5e69baaecef30c23af78eb2a264ebec4846e8ab118a18ec50b32a4c0114b13abf32367691888d26a87c5c0487f6ab1093c92ad12e445

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9372125.exe
                Filesize

                514KB

                MD5

                09292722d8a4cb97c9d2d6e466b3d603

                SHA1

                18ac6605563a765e5147eaf6247b2e184655b852

                SHA256

                8c29a041da4431f04bd4978a9edc89714ba7c7bdd88d1df473a2a76bbab1141d

                SHA512

                e48cc9b738a67b131d2b5e69baaecef30c23af78eb2a264ebec4846e8ab118a18ec50b32a4c0114b13abf32367691888d26a87c5c0487f6ab1093c92ad12e445

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5806248.exe
                Filesize

                174KB

                MD5

                b7efcb194a87c0cbb80cda6fbdf7fff1

                SHA1

                ab3f269406a4c16be308fbe1bbf0ea85a58e253f

                SHA256

                7ff2637f38d2903517197f7630d57f526182aa2b5a69c223ee1e9606c9b585a3

                SHA512

                c0be3c11aae1c5d547a1068c4da82e93f14d418585b4c1979ef0ff36d76d1ae32959b01bef80ca4074826a8609d4b248b950de1e9ec6347c7eca6df4944c8aab

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d5806248.exe
                Filesize

                174KB

                MD5

                b7efcb194a87c0cbb80cda6fbdf7fff1

                SHA1

                ab3f269406a4c16be308fbe1bbf0ea85a58e253f

                SHA256

                7ff2637f38d2903517197f7630d57f526182aa2b5a69c223ee1e9606c9b585a3

                SHA512

                c0be3c11aae1c5d547a1068c4da82e93f14d418585b4c1979ef0ff36d76d1ae32959b01bef80ca4074826a8609d4b248b950de1e9ec6347c7eca6df4944c8aab

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2466822.exe
                Filesize

                359KB

                MD5

                4487f40ef2b98bdb1b471b2f1a8b826c

                SHA1

                aaa088ef8933905563c71d10471f925e370b3248

                SHA256

                253effa2c5c4cd22e372d34de5cc039b8a314bb7ff9adc5916e24aa1f3f1553f

                SHA512

                bac97b7217cb49396f32bb292c723a47bcafb33802cc93b77f44b1288b82faf23948d4f9c15017d6b4a02c75aaa4b74349d4d3c626f65cb0fff6e135cff0bb26

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2466822.exe
                Filesize

                359KB

                MD5

                4487f40ef2b98bdb1b471b2f1a8b826c

                SHA1

                aaa088ef8933905563c71d10471f925e370b3248

                SHA256

                253effa2c5c4cd22e372d34de5cc039b8a314bb7ff9adc5916e24aa1f3f1553f

                SHA512

                bac97b7217cb49396f32bb292c723a47bcafb33802cc93b77f44b1288b82faf23948d4f9c15017d6b4a02c75aaa4b74349d4d3c626f65cb0fff6e135cff0bb26

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6301349.exe
                Filesize

                37KB

                MD5

                8ddc0d2b652228d79ce674a3252c96d2

                SHA1

                6c9cb5555dce30efc2ec7fa71e00f540c2ecf0c4

                SHA256

                0746a8fe1f8aa72d93bb4c4b5399f6935c97b469004bf46da368d99f421a9c1e

                SHA512

                f2ba60dd896bc94014aeb911e2b74f109a65cd5b62eda0a51c925f3edda9967698eb9fd2b84586efd532c8760c2dd777a25a518087973d64f9eb90200dca8126

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6301349.exe
                Filesize

                37KB

                MD5

                8ddc0d2b652228d79ce674a3252c96d2

                SHA1

                6c9cb5555dce30efc2ec7fa71e00f540c2ecf0c4

                SHA256

                0746a8fe1f8aa72d93bb4c4b5399f6935c97b469004bf46da368d99f421a9c1e

                SHA512

                f2ba60dd896bc94014aeb911e2b74f109a65cd5b62eda0a51c925f3edda9967698eb9fd2b84586efd532c8760c2dd777a25a518087973d64f9eb90200dca8126

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7513614.exe
                Filesize

                234KB

                MD5

                3f11bf3a8a103ce4a9b3f9882b21cf53

                SHA1

                3c7941dfd28f79388bde2a536a2bdbc608e2cf2e

                SHA256

                ba161cac2b6ee7e9a8017e0b184e2bd46be5a04481b67d99218a6c8bc3f4cfc4

                SHA512

                9d3aaed4ddccce830e73cb62b95372a02df97dac41f18a69e3277d877a8ff56b071bd4d9858b18365b3e67a38f674e6741bdd84c6392b7798cb56ad0a275e583

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7513614.exe
                Filesize

                234KB

                MD5

                3f11bf3a8a103ce4a9b3f9882b21cf53

                SHA1

                3c7941dfd28f79388bde2a536a2bdbc608e2cf2e

                SHA256

                ba161cac2b6ee7e9a8017e0b184e2bd46be5a04481b67d99218a6c8bc3f4cfc4

                SHA512

                9d3aaed4ddccce830e73cb62b95372a02df97dac41f18a69e3277d877a8ff56b071bd4d9858b18365b3e67a38f674e6741bdd84c6392b7798cb56ad0a275e583

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0551620.exe
                Filesize

                11KB

                MD5

                fe2d320eaa2c3a81365d16b0bd48bb08

                SHA1

                bdd82503642efb6f34a377f68429544a03a1e0b6

                SHA256

                e85e79e86e6afcb3990d66257f7a6e9df043573d0d9d67ebc9c1f506287e0ca0

                SHA512

                31a86cb4ada00ab76b46db20f69d4e63c0ebabf8326d356fa14c76a72f21fba5cdd65c00c09b62cc787a7eaf453152dffb8ef108b711f2b78a2fa70a55e1bdc2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0551620.exe
                Filesize

                11KB

                MD5

                fe2d320eaa2c3a81365d16b0bd48bb08

                SHA1

                bdd82503642efb6f34a377f68429544a03a1e0b6

                SHA256

                e85e79e86e6afcb3990d66257f7a6e9df043573d0d9d67ebc9c1f506287e0ca0

                SHA512

                31a86cb4ada00ab76b46db20f69d4e63c0ebabf8326d356fa14c76a72f21fba5cdd65c00c09b62cc787a7eaf453152dffb8ef108b711f2b78a2fa70a55e1bdc2

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3953873.exe
                Filesize

                228KB

                MD5

                30961a6b1664b09f236faacc258cc2ca

                SHA1

                b2f6db06283e60bb008f9a8b5051e4f404b74b34

                SHA256

                74639d53844ade943272615b33385c0320ee87a06931dc424c1f34861677c474

                SHA512

                1c0398e2c18c295723a23e9417ef178b1dc662cc771e3aaba94f750ff1cfdae5b505b017d87f68ff9ec1f20e48b8c65f1326f1bff184d7c5b35bb9074db10d3d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3953873.exe
                Filesize

                228KB

                MD5

                30961a6b1664b09f236faacc258cc2ca

                SHA1

                b2f6db06283e60bb008f9a8b5051e4f404b74b34

                SHA256

                74639d53844ade943272615b33385c0320ee87a06931dc424c1f34861677c474

                SHA512

                1c0398e2c18c295723a23e9417ef178b1dc662cc771e3aaba94f750ff1cfdae5b505b017d87f68ff9ec1f20e48b8c65f1326f1bff184d7c5b35bb9074db10d3d

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/992-193-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                Filesize

                64KB

              • memory/992-196-0x0000000072AA0000-0x0000000073250000-memory.dmp
                Filesize

                7.7MB

              • memory/992-191-0x000000000A950000-0x000000000AF68000-memory.dmp
                Filesize

                6.1MB

              • memory/992-192-0x000000000A490000-0x000000000A59A000-memory.dmp
                Filesize

                1.0MB

              • memory/992-189-0x00000000004E0000-0x0000000000510000-memory.dmp
                Filesize

                192KB

              • memory/992-194-0x000000000A3D0000-0x000000000A3E2000-memory.dmp
                Filesize

                72KB

              • memory/992-195-0x000000000A430000-0x000000000A46C000-memory.dmp
                Filesize

                240KB

              • memory/992-190-0x0000000072AA0000-0x0000000073250000-memory.dmp
                Filesize

                7.7MB

              • memory/992-197-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                Filesize

                64KB

              • memory/1728-184-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/1728-181-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/3156-182-0x0000000002340000-0x0000000002356000-memory.dmp
                Filesize

                88KB

              • memory/4784-164-0x00007FFC2C700000-0x00007FFC2D1C1000-memory.dmp
                Filesize

                10.8MB

              • memory/4784-162-0x00007FFC2C700000-0x00007FFC2D1C1000-memory.dmp
                Filesize

                10.8MB

              • memory/4784-161-0x0000000000F00000-0x0000000000F0A000-memory.dmp
                Filesize

                40KB