Analysis

  • max time kernel
    212s
  • max time network
    230s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2023 23:32

General

  • Target

    ded6c5d03ad40925fefd165af80098800e966d9abc9010f7314ac628a20b0ae3.exe

  • Size

    1.6MB

  • MD5

    ade10cbc533c8399aa2996b16c3484ca

  • SHA1

    f90a827c38ce6c1269a6ce7e83d2dab2b56a5cab

  • SHA256

    ded6c5d03ad40925fefd165af80098800e966d9abc9010f7314ac628a20b0ae3

  • SHA512

    6c15ecfaf6080927b299a605f68d6725d49663eec6d9d57b35fa0d150b75bb3ca523bd4932f119f84966983a01a7ebb29f82d52724f5e66729f6f0247044335e

  • SSDEEP

    24576:4yhAsIvxrRj9Wbijl2cDJNc09Y26NvILBCG/hFGYQImW3d5ewxHoOwJcf9k:/OV/nLjpLLq3W3iON1

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Mystic stealer payload 4 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ded6c5d03ad40925fefd165af80098800e966d9abc9010f7314ac628a20b0ae3.exe
    "C:\Users\Admin\AppData\Local\Temp\ded6c5d03ad40925fefd165af80098800e966d9abc9010f7314ac628a20b0ae3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bb4sI60.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bb4sI60.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pA6pn03.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pA6pn03.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Cl9Ma70.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Cl9Ma70.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\HF3tF16.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\HF3tF16.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3740
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Wi6vt90.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Wi6vt90.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:3904
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1hx00uM4.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1hx00uM4.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3128
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3388
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 564
                  8⤵
                  • Program crash
                  PID:1316
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Gi2538.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Gi2538.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2820
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:4812
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 540
                      9⤵
                      • Program crash
                      PID:4452
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 584
                    8⤵
                    • Program crash
                    PID:2328
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3ym33tv.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3ym33tv.exe
                6⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:868
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Ls158Jb.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Ls158Jb.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2352
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:3516
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 584
                  6⤵
                  • Program crash
                  PID:556
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5YN9cF8.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5YN9cF8.exe
              4⤵
              • Executes dropped EXE
              PID:4488
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3128 -ip 3128
        1⤵
          PID:2068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2820 -ip 2820
          1⤵
            PID:5032
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4812 -ip 4812
            1⤵
              PID:1376
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2352 -ip 2352
              1⤵
                PID:3968

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Persistence

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Privilege Escalation

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Defense Evasion

              Modify Registry

              2
              T1112

              Impair Defenses

              1
              T1562

              Disable or Modify Tools

              1
              T1562.001

              Discovery

              Query Registry

              1
              T1012

              Peripheral Device Discovery

              1
              T1120

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bb4sI60.exe
                Filesize

                1.4MB

                MD5

                743bf9cdca6ea5adfb9e475227c5f3d5

                SHA1

                250bbd060bb82b4066c92cd20df79619681587da

                SHA256

                2a97859cddc37384d5ef6a7b2f058c822ad9c02eb7e2984459a93d100e4cc099

                SHA512

                7054c7733a9c0193389a5332d4b19290e1642ef0f42bf5c7c0bfe3d74b41677dbd5cf16ca5478defe709bc7833385ebe67541b703299f63b80b38d0be923dcbb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bb4sI60.exe
                Filesize

                1.4MB

                MD5

                743bf9cdca6ea5adfb9e475227c5f3d5

                SHA1

                250bbd060bb82b4066c92cd20df79619681587da

                SHA256

                2a97859cddc37384d5ef6a7b2f058c822ad9c02eb7e2984459a93d100e4cc099

                SHA512

                7054c7733a9c0193389a5332d4b19290e1642ef0f42bf5c7c0bfe3d74b41677dbd5cf16ca5478defe709bc7833385ebe67541b703299f63b80b38d0be923dcbb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pA6pn03.exe
                Filesize

                1.2MB

                MD5

                b5aa8faa391aa31c3d3776f32a62e2bf

                SHA1

                251bf6b707c1e9eb65269ddfd09634f87c26761b

                SHA256

                febf939eebc8155aea38ac261f8186a76490443b884aa8b03754342c5ac523f1

                SHA512

                fab9bb011cd55af7d2042745730edc570c14556b2728faf0c0d9eaaacba20fc54969dcdc934ffaec9a8d8c80d6ba12b1b0db5487c177619827963ab8e4f72511

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pA6pn03.exe
                Filesize

                1.2MB

                MD5

                b5aa8faa391aa31c3d3776f32a62e2bf

                SHA1

                251bf6b707c1e9eb65269ddfd09634f87c26761b

                SHA256

                febf939eebc8155aea38ac261f8186a76490443b884aa8b03754342c5ac523f1

                SHA512

                fab9bb011cd55af7d2042745730edc570c14556b2728faf0c0d9eaaacba20fc54969dcdc934ffaec9a8d8c80d6ba12b1b0db5487c177619827963ab8e4f72511

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5YN9cF8.exe
                Filesize

                220KB

                MD5

                3d8dec61c2301e71b89f4431164f5d79

                SHA1

                025f61e763a285b5bfcd1b3806504d834063f765

                SHA256

                423b28c786a6076a062e8bdbecc8d61154428067d6c3644b89169164849e3ef0

                SHA512

                591573633664fd4f3dac1c59dcccc0f6a7f9feaaed44922aa51db463ab612cdd9d8c989437a48d9e597c1f09d393322937a3d463d1fff0f5777c964a4bb2cef1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5YN9cF8.exe
                Filesize

                220KB

                MD5

                3d8dec61c2301e71b89f4431164f5d79

                SHA1

                025f61e763a285b5bfcd1b3806504d834063f765

                SHA256

                423b28c786a6076a062e8bdbecc8d61154428067d6c3644b89169164849e3ef0

                SHA512

                591573633664fd4f3dac1c59dcccc0f6a7f9feaaed44922aa51db463ab612cdd9d8c989437a48d9e597c1f09d393322937a3d463d1fff0f5777c964a4bb2cef1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Cl9Ma70.exe
                Filesize

                1.0MB

                MD5

                796e4ec879d848657becd7134a06ab15

                SHA1

                f4f641ed59de0b6bb52d89e5a9e1967ebdbb5a5d

                SHA256

                53833bdb9ec4fb73752975fa7106bfe5e9caa9c22f21652268708c3555a0b936

                SHA512

                8973e2626769f1f9a831853f0444865a84ca7efa3d57ad8449b619fe5d97421027354f25253f8c1b62d6cbf29de4201f6e50489df73de34585a5d0450d19d312

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Cl9Ma70.exe
                Filesize

                1.0MB

                MD5

                796e4ec879d848657becd7134a06ab15

                SHA1

                f4f641ed59de0b6bb52d89e5a9e1967ebdbb5a5d

                SHA256

                53833bdb9ec4fb73752975fa7106bfe5e9caa9c22f21652268708c3555a0b936

                SHA512

                8973e2626769f1f9a831853f0444865a84ca7efa3d57ad8449b619fe5d97421027354f25253f8c1b62d6cbf29de4201f6e50489df73de34585a5d0450d19d312

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Ls158Jb.exe
                Filesize

                1.1MB

                MD5

                c474cb24af058ec68f12ecedb0bd6087

                SHA1

                ba1cdb7706fc2085052d82a3ed402aa443a164d7

                SHA256

                8cbcd459d3ec3e02afb56c45998ee13d21a8cd608872d3a4b34a4e50271691e6

                SHA512

                cd55dee64cdebd241f7c2346eb1a623c039efbcc2d692c779d7fbe7a6b398ac2650f3ce9a7b19d9f0e7ae1c297703161872fbef045c089b052ec97c09a6cccaa

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Ls158Jb.exe
                Filesize

                1.1MB

                MD5

                c474cb24af058ec68f12ecedb0bd6087

                SHA1

                ba1cdb7706fc2085052d82a3ed402aa443a164d7

                SHA256

                8cbcd459d3ec3e02afb56c45998ee13d21a8cd608872d3a4b34a4e50271691e6

                SHA512

                cd55dee64cdebd241f7c2346eb1a623c039efbcc2d692c779d7fbe7a6b398ac2650f3ce9a7b19d9f0e7ae1c297703161872fbef045c089b052ec97c09a6cccaa

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\HF3tF16.exe
                Filesize

                650KB

                MD5

                f62eceb3fc4bfd927e27fa19e756940d

                SHA1

                189fe79fb7f49bb5caa45533469414d3c068dfcd

                SHA256

                b68a25e474556269133d2b5d9e2d87c734d17a3d8fcdc36509e35318f454d157

                SHA512

                c440f576674f8c0fbc161a71bacf18624c67e1f1606f203544a81eb4cd93a8ed5268637135ec157a38fb47bab97cd8a7f9a78c06c0872d0dcf50e12ad2a12127

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\HF3tF16.exe
                Filesize

                650KB

                MD5

                f62eceb3fc4bfd927e27fa19e756940d

                SHA1

                189fe79fb7f49bb5caa45533469414d3c068dfcd

                SHA256

                b68a25e474556269133d2b5d9e2d87c734d17a3d8fcdc36509e35318f454d157

                SHA512

                c440f576674f8c0fbc161a71bacf18624c67e1f1606f203544a81eb4cd93a8ed5268637135ec157a38fb47bab97cd8a7f9a78c06c0872d0dcf50e12ad2a12127

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3ym33tv.exe
                Filesize

                30KB

                MD5

                30ec45fd1a7be1935df3aa3d1111e8b1

                SHA1

                3ccca92612e7499ec8a6e64bb0e3fb6ef8acca1c

                SHA256

                e684530f18f278535a6e18cd0333933a9655c27ed3a93a72092fa99be4b9580f

                SHA512

                a2e0f9bf141d747ed5d980a7f3b6b9af69a4662f5c615762805f60b1ee89078b7c14c536ea2b8514ae712b5b94620ddebdb934091a4db18075d8907cf9a3ffba

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3ym33tv.exe
                Filesize

                30KB

                MD5

                30ec45fd1a7be1935df3aa3d1111e8b1

                SHA1

                3ccca92612e7499ec8a6e64bb0e3fb6ef8acca1c

                SHA256

                e684530f18f278535a6e18cd0333933a9655c27ed3a93a72092fa99be4b9580f

                SHA512

                a2e0f9bf141d747ed5d980a7f3b6b9af69a4662f5c615762805f60b1ee89078b7c14c536ea2b8514ae712b5b94620ddebdb934091a4db18075d8907cf9a3ffba

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Wi6vt90.exe
                Filesize

                525KB

                MD5

                74681a07f8f98d658a6469447868388a

                SHA1

                d0777184718687027f99064967877cbf6ced8e6f

                SHA256

                7fad3d06e94f57d01beae8fe2c3a7fc4555a96916914e87bc3d2050d785d0232

                SHA512

                b51cf8637e2a79066978d37d4de1537998395597910afa3ede6845ed28036aa3094e045a1a5224155e906838723f0301e88843e7e7f94aff29d2870ef492513e

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Wi6vt90.exe
                Filesize

                525KB

                MD5

                74681a07f8f98d658a6469447868388a

                SHA1

                d0777184718687027f99064967877cbf6ced8e6f

                SHA256

                7fad3d06e94f57d01beae8fe2c3a7fc4555a96916914e87bc3d2050d785d0232

                SHA512

                b51cf8637e2a79066978d37d4de1537998395597910afa3ede6845ed28036aa3094e045a1a5224155e906838723f0301e88843e7e7f94aff29d2870ef492513e

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1hx00uM4.exe
                Filesize

                890KB

                MD5

                e978c7e1a5be84e958419fdcecd0e1f0

                SHA1

                16990d1c40986a496472fe3221d9ceb981e25f4a

                SHA256

                e72e37b2e1966aa59d99102486d99e0cded9faded978cdb8e7b1e59e49c4cb14

                SHA512

                9fb36bc7791fa24cd8e87ab2fbe02079361f299a84866882b945fab775e44408d112543aced0735cb4aa6267fe8c325925a20ca643cd47b2bb3e07a2ba49484a

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1hx00uM4.exe
                Filesize

                890KB

                MD5

                e978c7e1a5be84e958419fdcecd0e1f0

                SHA1

                16990d1c40986a496472fe3221d9ceb981e25f4a

                SHA256

                e72e37b2e1966aa59d99102486d99e0cded9faded978cdb8e7b1e59e49c4cb14

                SHA512

                9fb36bc7791fa24cd8e87ab2fbe02079361f299a84866882b945fab775e44408d112543aced0735cb4aa6267fe8c325925a20ca643cd47b2bb3e07a2ba49484a

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Gi2538.exe
                Filesize

                1.1MB

                MD5

                8a4f92e7bae66ff53f4af5d0b94d7f0b

                SHA1

                4a3e2802afd48fddcad3b3badc28261aac260ea7

                SHA256

                791eedb3d2a4b678426283d48a53a6b1d9a1e059d5ca71c942b4b854ea4f2cc5

                SHA512

                1d2140f8792e3ab56e1fbd956f4b2cc7a31efa698284644a858c43e373b2053840d76870a45eeac43cae5eca9bd6b9c2b1f5704e26b0b2c0732f0bec0fe96027

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Gi2538.exe
                Filesize

                1.1MB

                MD5

                8a4f92e7bae66ff53f4af5d0b94d7f0b

                SHA1

                4a3e2802afd48fddcad3b3badc28261aac260ea7

                SHA256

                791eedb3d2a4b678426283d48a53a6b1d9a1e059d5ca71c942b4b854ea4f2cc5

                SHA512

                1d2140f8792e3ab56e1fbd956f4b2cc7a31efa698284644a858c43e373b2053840d76870a45eeac43cae5eca9bd6b9c2b1f5704e26b0b2c0732f0bec0fe96027

              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                Filesize

                220KB

                MD5

                3d8dec61c2301e71b89f4431164f5d79

                SHA1

                025f61e763a285b5bfcd1b3806504d834063f765

                SHA256

                423b28c786a6076a062e8bdbecc8d61154428067d6c3644b89169164849e3ef0

                SHA512

                591573633664fd4f3dac1c59dcccc0f6a7f9feaaed44922aa51db463ab612cdd9d8c989437a48d9e597c1f09d393322937a3d463d1fff0f5777c964a4bb2cef1

              • memory/868-60-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/868-57-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/3196-59-0x00000000032A0000-0x00000000032B6000-memory.dmp
                Filesize

                88KB

              • memory/3388-44-0x0000000073C50000-0x0000000074400000-memory.dmp
                Filesize

                7.7MB

              • memory/3388-46-0x0000000073C50000-0x0000000074400000-memory.dmp
                Filesize

                7.7MB

              • memory/3388-43-0x0000000073C50000-0x0000000074400000-memory.dmp
                Filesize

                7.7MB

              • memory/3388-42-0x0000000000400000-0x000000000040A000-memory.dmp
                Filesize

                40KB

              • memory/3516-68-0x00000000738B0000-0x0000000074060000-memory.dmp
                Filesize

                7.7MB

              • memory/3516-66-0x0000000000400000-0x000000000043E000-memory.dmp
                Filesize

                248KB

              • memory/3516-69-0x0000000007790000-0x0000000007D34000-memory.dmp
                Filesize

                5.6MB

              • memory/3516-70-0x0000000007280000-0x0000000007312000-memory.dmp
                Filesize

                584KB

              • memory/3516-76-0x00000000738B0000-0x0000000074060000-memory.dmp
                Filesize

                7.7MB

              • memory/4812-54-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/4812-51-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/4812-52-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB

              • memory/4812-50-0x0000000000400000-0x0000000000434000-memory.dmp
                Filesize

                208KB