Analysis

  • max time kernel
    211s
  • max time network
    238s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2023 21:40

General

  • Target

    956573562e7d7da152d58e554d8c605dae1566cfcdc6e091511f4fa54b50004b.exe

  • Size

    1.6MB

  • MD5

    bd8179166fc23c803f7d1303a940ae7e

  • SHA1

    ba99075cc9eed7bc43f39078c0cf203e35e985d9

  • SHA256

    956573562e7d7da152d58e554d8c605dae1566cfcdc6e091511f4fa54b50004b

  • SHA512

    4f28e7f1b59bc8e1b4c2f71c04f33a216b18380e940c9d143069dd27f11337cffd1a3dc4fbc121ff529817c7bf75c5eafc28bf8a45d7316416c9518f46e5d702

  • SSDEEP

    24576:BywW+SerRtTFjyw5/TRFu3J0G3alUAZSRsZ14PftEdKQqvtBpHcsNN2bs:0wYe3TFjywBRFuVIzSs4Pf8qvRcsNU

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 4 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 9 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\956573562e7d7da152d58e554d8c605dae1566cfcdc6e091511f4fa54b50004b.exe
    "C:\Users\Admin\AppData\Local\Temp\956573562e7d7da152d58e554d8c605dae1566cfcdc6e091511f4fa54b50004b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bf5BJ73.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bf5BJ73.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sB1JJ95.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sB1JJ95.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Fd1RL26.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Fd1RL26.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4964
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lI5Ee76.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lI5Ee76.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1840
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Th8zP01.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Th8zP01.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:3560
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Xi12JG6.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Xi12JG6.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1084
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2036
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 588
                  8⤵
                  • Program crash
                  PID:3608
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 588
                  8⤵
                  • Program crash
                  PID:380
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2iL2432.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2iL2432.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:116
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:4740
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 540
                      9⤵
                      • Program crash
                      PID:2500
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 584
                    8⤵
                    • Program crash
                    PID:2892
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Ch77tz.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Ch77tz.exe
                6⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:2348
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4vc843wE.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4vc843wE.exe
              5⤵
              • Executes dropped EXE
              PID:1404
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 584
                6⤵
                • Program crash
                PID:2060
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2720
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5Eq5FX8.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5Eq5FX8.exe
              4⤵
                PID:4004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1084 -ip 1084
          1⤵
            PID:3272
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 116 -ip 116
            1⤵
              PID:1164
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4740 -ip 4740
              1⤵
                PID:3392
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1404 -ip 1404
                1⤵
                  PID:3160

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Persistence

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Privilege Escalation

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Defense Evasion

                Modify Registry

                2
                T1112

                Impair Defenses

                1
                T1562

                Disable or Modify Tools

                1
                T1562.001

                Discovery

                Query Registry

                1
                T1012

                Peripheral Device Discovery

                1
                T1120

                System Information Discovery

                1
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                  Filesize

                  226B

                  MD5

                  916851e072fbabc4796d8916c5131092

                  SHA1

                  d48a602229a690c512d5fdaf4c8d77547a88e7a2

                  SHA256

                  7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                  SHA512

                  07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bf5BJ73.exe
                  Filesize

                  1.4MB

                  MD5

                  fa01a41114d5d2e6a174d8b57c112750

                  SHA1

                  fa8ad8c3b05f7329cedd1f5b14619acab08f730f

                  SHA256

                  95bb912795e5103a430b9c84e0c2d06cde9e10a272131a5c9d3c002240c38406

                  SHA512

                  27b2fcb8fb6b53d3f1a9aca0610f25e1a3498c2b2d098ccbff06c46445c843afe713cd9f828683ab680d9b702f5da05444ab2d9371887a160a71f6019680e523

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bf5BJ73.exe
                  Filesize

                  1.4MB

                  MD5

                  fa01a41114d5d2e6a174d8b57c112750

                  SHA1

                  fa8ad8c3b05f7329cedd1f5b14619acab08f730f

                  SHA256

                  95bb912795e5103a430b9c84e0c2d06cde9e10a272131a5c9d3c002240c38406

                  SHA512

                  27b2fcb8fb6b53d3f1a9aca0610f25e1a3498c2b2d098ccbff06c46445c843afe713cd9f828683ab680d9b702f5da05444ab2d9371887a160a71f6019680e523

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sB1JJ95.exe
                  Filesize

                  1.2MB

                  MD5

                  becf4e9ece5623031dd6cba7b23abfe0

                  SHA1

                  fe3ca8ec79b99b0cfafe8adc3927f5b4cfc2bee9

                  SHA256

                  850053baf978511494338e2a78395e76ef23db1abb5c4397ee86e096a6dade53

                  SHA512

                  3040f7857ae27555dae5281e08abc9c73fa0c1ac1684b7d314723f1918b9623789159c9400a37a33fae270288c7576408249b3202efb6de28faf7ded75c54c74

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sB1JJ95.exe
                  Filesize

                  1.2MB

                  MD5

                  becf4e9ece5623031dd6cba7b23abfe0

                  SHA1

                  fe3ca8ec79b99b0cfafe8adc3927f5b4cfc2bee9

                  SHA256

                  850053baf978511494338e2a78395e76ef23db1abb5c4397ee86e096a6dade53

                  SHA512

                  3040f7857ae27555dae5281e08abc9c73fa0c1ac1684b7d314723f1918b9623789159c9400a37a33fae270288c7576408249b3202efb6de28faf7ded75c54c74

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5Eq5FX8.exe
                  Filesize

                  220KB

                  MD5

                  d7bde57170d752006a6e19c61b72557a

                  SHA1

                  0c5f14564931bc2fd7b8a4476b9700462ef25e9c

                  SHA256

                  e65734e4fc0b243f36baa1e0cd4eab2933af1d0cbb344f3ce10b3dcaf2d9ba5d

                  SHA512

                  79d67e8b9e1b1e6b28c4e12018204f51540f9827653a663f490bce88d2cccbbb3009ac43a972a88e866a8ddd8aef0c5801bce544b49d229a05a2f38d36ade1b3

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5Eq5FX8.exe
                  Filesize

                  220KB

                  MD5

                  d7bde57170d752006a6e19c61b72557a

                  SHA1

                  0c5f14564931bc2fd7b8a4476b9700462ef25e9c

                  SHA256

                  e65734e4fc0b243f36baa1e0cd4eab2933af1d0cbb344f3ce10b3dcaf2d9ba5d

                  SHA512

                  79d67e8b9e1b1e6b28c4e12018204f51540f9827653a663f490bce88d2cccbbb3009ac43a972a88e866a8ddd8aef0c5801bce544b49d229a05a2f38d36ade1b3

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Fd1RL26.exe
                  Filesize

                  1.0MB

                  MD5

                  c5e837c4f8def62b260d40f9b81c451f

                  SHA1

                  27e5d3431a3ba7189508ee1426788c4d86c55465

                  SHA256

                  48d4b3fbf76f2f399db486fb56b2793503c33ef0ed491d04dde441fd223d6b36

                  SHA512

                  acd169c9df402e04e5a6ac010f8828cede01a073d422701508625713482533a555d5abcd05abd45c7748784b395b7c320b14d44508035cb79598ffc8df93b9eb

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Fd1RL26.exe
                  Filesize

                  1.0MB

                  MD5

                  c5e837c4f8def62b260d40f9b81c451f

                  SHA1

                  27e5d3431a3ba7189508ee1426788c4d86c55465

                  SHA256

                  48d4b3fbf76f2f399db486fb56b2793503c33ef0ed491d04dde441fd223d6b36

                  SHA512

                  acd169c9df402e04e5a6ac010f8828cede01a073d422701508625713482533a555d5abcd05abd45c7748784b395b7c320b14d44508035cb79598ffc8df93b9eb

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4vc843wE.exe
                  Filesize

                  1.1MB

                  MD5

                  c474cb24af058ec68f12ecedb0bd6087

                  SHA1

                  ba1cdb7706fc2085052d82a3ed402aa443a164d7

                  SHA256

                  8cbcd459d3ec3e02afb56c45998ee13d21a8cd608872d3a4b34a4e50271691e6

                  SHA512

                  cd55dee64cdebd241f7c2346eb1a623c039efbcc2d692c779d7fbe7a6b398ac2650f3ce9a7b19d9f0e7ae1c297703161872fbef045c089b052ec97c09a6cccaa

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4vc843wE.exe
                  Filesize

                  1.1MB

                  MD5

                  c474cb24af058ec68f12ecedb0bd6087

                  SHA1

                  ba1cdb7706fc2085052d82a3ed402aa443a164d7

                  SHA256

                  8cbcd459d3ec3e02afb56c45998ee13d21a8cd608872d3a4b34a4e50271691e6

                  SHA512

                  cd55dee64cdebd241f7c2346eb1a623c039efbcc2d692c779d7fbe7a6b398ac2650f3ce9a7b19d9f0e7ae1c297703161872fbef045c089b052ec97c09a6cccaa

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lI5Ee76.exe
                  Filesize

                  650KB

                  MD5

                  534b9c2a5c78809198234e1d90942a72

                  SHA1

                  4b7b713a0314d1e0f28cab84dd4d38d245f5ca74

                  SHA256

                  dc3721ab38d1b02ac815a40c4ff6d85cc2e75cbcb2e38548cc608b0b19e8cece

                  SHA512

                  04d8e93fa933510e9f287dbbd96a3720854c64e5639c115813795388533022a8e651ad35ba128ff68c32e4140832550d2610b2c924bc8350ef736e6fd081e4ea

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lI5Ee76.exe
                  Filesize

                  650KB

                  MD5

                  534b9c2a5c78809198234e1d90942a72

                  SHA1

                  4b7b713a0314d1e0f28cab84dd4d38d245f5ca74

                  SHA256

                  dc3721ab38d1b02ac815a40c4ff6d85cc2e75cbcb2e38548cc608b0b19e8cece

                  SHA512

                  04d8e93fa933510e9f287dbbd96a3720854c64e5639c115813795388533022a8e651ad35ba128ff68c32e4140832550d2610b2c924bc8350ef736e6fd081e4ea

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Ch77tz.exe
                  Filesize

                  30KB

                  MD5

                  6353e286d29c1d4f03a173a95c1df4bc

                  SHA1

                  a2a140a73632bd3ce305c5e2d5c7153ab38d5c42

                  SHA256

                  33c157915c50f1e4ad272082b8cf2dfc6edbd57c50d006068b1e907922e05bf3

                  SHA512

                  d4384402b8c07b1dce2ac54134d55bf84373ea0a536c5880dacb530453dfdb9b0c650f3e22e82cb339cb52c057d911d67944498995ae48ba39cdd72cde8c9d6e

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Ch77tz.exe
                  Filesize

                  30KB

                  MD5

                  6353e286d29c1d4f03a173a95c1df4bc

                  SHA1

                  a2a140a73632bd3ce305c5e2d5c7153ab38d5c42

                  SHA256

                  33c157915c50f1e4ad272082b8cf2dfc6edbd57c50d006068b1e907922e05bf3

                  SHA512

                  d4384402b8c07b1dce2ac54134d55bf84373ea0a536c5880dacb530453dfdb9b0c650f3e22e82cb339cb52c057d911d67944498995ae48ba39cdd72cde8c9d6e

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Th8zP01.exe
                  Filesize

                  525KB

                  MD5

                  12aa1e240e8932379c0b0ea329a881f1

                  SHA1

                  dba21ea4b4c0bd742584bf8f0e9b91993958d132

                  SHA256

                  2e8c50fa61d2bac1863fdf3fe8e68ab41fbc4f09e6bec837d06d463f6d149e5d

                  SHA512

                  f692876127cab883ece3c92bb9fb1b3998132cd91b1bbdf7bf88a1408378f235db3e6bc84815b2bbab286309418af6bec94c4c64875fd3dc8727585d4e56a71b

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Th8zP01.exe
                  Filesize

                  525KB

                  MD5

                  12aa1e240e8932379c0b0ea329a881f1

                  SHA1

                  dba21ea4b4c0bd742584bf8f0e9b91993958d132

                  SHA256

                  2e8c50fa61d2bac1863fdf3fe8e68ab41fbc4f09e6bec837d06d463f6d149e5d

                  SHA512

                  f692876127cab883ece3c92bb9fb1b3998132cd91b1bbdf7bf88a1408378f235db3e6bc84815b2bbab286309418af6bec94c4c64875fd3dc8727585d4e56a71b

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Xi12JG6.exe
                  Filesize

                  890KB

                  MD5

                  e978c7e1a5be84e958419fdcecd0e1f0

                  SHA1

                  16990d1c40986a496472fe3221d9ceb981e25f4a

                  SHA256

                  e72e37b2e1966aa59d99102486d99e0cded9faded978cdb8e7b1e59e49c4cb14

                  SHA512

                  9fb36bc7791fa24cd8e87ab2fbe02079361f299a84866882b945fab775e44408d112543aced0735cb4aa6267fe8c325925a20ca643cd47b2bb3e07a2ba49484a

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Xi12JG6.exe
                  Filesize

                  890KB

                  MD5

                  e978c7e1a5be84e958419fdcecd0e1f0

                  SHA1

                  16990d1c40986a496472fe3221d9ceb981e25f4a

                  SHA256

                  e72e37b2e1966aa59d99102486d99e0cded9faded978cdb8e7b1e59e49c4cb14

                  SHA512

                  9fb36bc7791fa24cd8e87ab2fbe02079361f299a84866882b945fab775e44408d112543aced0735cb4aa6267fe8c325925a20ca643cd47b2bb3e07a2ba49484a

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2iL2432.exe
                  Filesize

                  1.1MB

                  MD5

                  8a4f92e7bae66ff53f4af5d0b94d7f0b

                  SHA1

                  4a3e2802afd48fddcad3b3badc28261aac260ea7

                  SHA256

                  791eedb3d2a4b678426283d48a53a6b1d9a1e059d5ca71c942b4b854ea4f2cc5

                  SHA512

                  1d2140f8792e3ab56e1fbd956f4b2cc7a31efa698284644a858c43e373b2053840d76870a45eeac43cae5eca9bd6b9c2b1f5704e26b0b2c0732f0bec0fe96027

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2iL2432.exe
                  Filesize

                  1.1MB

                  MD5

                  8a4f92e7bae66ff53f4af5d0b94d7f0b

                  SHA1

                  4a3e2802afd48fddcad3b3badc28261aac260ea7

                  SHA256

                  791eedb3d2a4b678426283d48a53a6b1d9a1e059d5ca71c942b4b854ea4f2cc5

                  SHA512

                  1d2140f8792e3ab56e1fbd956f4b2cc7a31efa698284644a858c43e373b2053840d76870a45eeac43cae5eca9bd6b9c2b1f5704e26b0b2c0732f0bec0fe96027

                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                  Filesize

                  220KB

                  MD5

                  d7bde57170d752006a6e19c61b72557a

                  SHA1

                  0c5f14564931bc2fd7b8a4476b9700462ef25e9c

                  SHA256

                  e65734e4fc0b243f36baa1e0cd4eab2933af1d0cbb344f3ce10b3dcaf2d9ba5d

                  SHA512

                  79d67e8b9e1b1e6b28c4e12018204f51540f9827653a663f490bce88d2cccbbb3009ac43a972a88e866a8ddd8aef0c5801bce544b49d229a05a2f38d36ade1b3

                • memory/2036-46-0x0000000073C50000-0x0000000074400000-memory.dmp
                  Filesize

                  7.7MB

                • memory/2036-42-0x0000000000400000-0x000000000040A000-memory.dmp
                  Filesize

                  40KB

                • memory/2036-43-0x0000000073C50000-0x0000000074400000-memory.dmp
                  Filesize

                  7.7MB

                • memory/2036-44-0x0000000073C50000-0x0000000074400000-memory.dmp
                  Filesize

                  7.7MB

                • memory/2348-60-0x0000000000400000-0x0000000000409000-memory.dmp
                  Filesize

                  36KB

                • memory/2348-57-0x0000000000400000-0x0000000000409000-memory.dmp
                  Filesize

                  36KB

                • memory/2720-68-0x00000000738B0000-0x0000000074060000-memory.dmp
                  Filesize

                  7.7MB

                • memory/2720-66-0x0000000000400000-0x000000000043E000-memory.dmp
                  Filesize

                  248KB

                • memory/2720-69-0x0000000007D90000-0x0000000008334000-memory.dmp
                  Filesize

                  5.6MB

                • memory/2720-70-0x00000000078C0000-0x0000000007952000-memory.dmp
                  Filesize

                  584KB

                • memory/2720-76-0x0000000007A30000-0x0000000007A40000-memory.dmp
                  Filesize

                  64KB

                • memory/2720-77-0x00000000079C0000-0x00000000079CA000-memory.dmp
                  Filesize

                  40KB

                • memory/3196-59-0x0000000003340000-0x0000000003356000-memory.dmp
                  Filesize

                  88KB

                • memory/4740-50-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/4740-54-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/4740-51-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB

                • memory/4740-52-0x0000000000400000-0x0000000000434000-memory.dmp
                  Filesize

                  208KB