Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2024 21:41

General

  • Target

    e4618fdcd51ef710ca424f7710683e49f7e31b9c8f1cf6e4ce6a118a5c14a5b3.exe

  • Size

    223KB

  • MD5

    e5f1b768a60cb6457200a8056398f60b

  • SHA1

    676c1edbeedffb2e18e40181ff241dfa774c285a

  • SHA256

    e4618fdcd51ef710ca424f7710683e49f7e31b9c8f1cf6e4ce6a118a5c14a5b3

  • SHA512

    6ae768714ac49dcc232cad66181ba8e366582cd911ffbab3a7d8f4f76680f0ad9f63c48ef4eb47290a317357c970e094ba321c2dbb59a770c96c1f5dd669cf92

  • SSDEEP

    3072:g2Zy6hujxaMXP3OwoBXYQk9guGjRN+WMvtOAM49uHZZFGGgjaaSpGq/B:g2nEaMmRBIYu6N+1N4HZx9p7

Malware Config

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

smokeloader

Version

2022

C2

http://gxutc2c.com/tmp/index.php

http://proekt8.ru/tmp/index.php

http://mth.com.ua/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.14

C2

http://anfesq.com

http://cbinr.com

http://rimakc.ru

Attributes
  • install_dir

    68fd3d7ade

  • install_file

    Utsysc.exe

  • strings_key

    27ec7fd6f50f63b8af0c1d3deefcc8fe

  • url_paths

    /forum/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 18 IoCs
  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 44 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4618fdcd51ef710ca424f7710683e49f7e31b9c8f1cf6e4ce6a118a5c14a5b3.exe
    "C:\Users\Admin\AppData\Local\Temp\e4618fdcd51ef710ca424f7710683e49f7e31b9c8f1cf6e4ce6a118a5c14a5b3.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1740
  • C:\Users\Admin\AppData\Local\Temp\C7F1.exe
    C:\Users\Admin\AppData\Local\Temp\C7F1.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:2148
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1272
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1332
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1608 -s 308
            5⤵
            • Loads dropped DLL
            PID:412
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main
        3⤵
        • Loads dropped DLL
        PID:952
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main
        3⤵
        • Loads dropped DLL
        PID:2860
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main
        3⤵
        • Loads dropped DLL
        PID:2228
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -u -p 1272 -s 308
    1⤵
    • Loads dropped DLL
    PID:768
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -u -p 1332 -s 308
    1⤵
    • Loads dropped DLL
    PID:2448
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {CD298A20-1782-4F35-9B50-FEAA75D911A8} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\68fd3d7ade\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:696

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\818056530936
    Filesize

    60KB

    MD5

    7321a663f6816ab582bcd5242d55af10

    SHA1

    03d9d90987bef995132028cfd2f7ce9117c699d8

    SHA256

    7d1d56046b311ac860d1b5f0f9d6bc3fbbad69ae27a00ce060671c85ff2b16da

    SHA512

    aee82d7e82f901751834f78e31bb3cc008ec5f0aec3ad2e68f652bc4770d04ce16d7f5b8f513dde7b3cc2a591567c647af3972406414835a4af7f8a8c288d510

  • C:\Users\Admin\AppData\Local\Temp\C7F1.exe
    Filesize

    383KB

    MD5

    8051069ecde0f4c4c7b85597ee595863

    SHA1

    8ed4f41257b5b748d73733af7fb29b25f07ac7fa

    SHA256

    d5f94c6a15bdeddfd70f6b537b28f809e33afa68c183abb25d33015056885838

    SHA512

    21860a0113612f19620ca82afe07c839e2b74c1164eb241165f1ff4efaf5dc96862428f1fa824fa4831cc49ef41e5aa219e529827a2c9de102b68734548c9a81

  • C:\Users\Admin\AppData\Local\Temp\C7F1.exe
    Filesize

    45KB

    MD5

    d027701c1362e36bf6f343af936d9d01

    SHA1

    9a3260f72aba54c5c9bd16e6353d5f7b359c241b

    SHA256

    6f96e01431b528c493014ba227b0f19b026c59029e36495942b8d1043700046c

    SHA512

    2806db4522e5ae77d6662b7a867ea4d20f9f7168c2adc403ed7858e43b15e96dedbb02ef13ffb41adf96433eb6e6c713e72874a5b95c5bbed53004c5647cd818

  • C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll
    Filesize

    102KB

    MD5

    4194e9b8b694b1e9b672c36f0d868e32

    SHA1

    252f27fe313c7bf8e9f36aef0c7b676383872efb

    SHA256

    97e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125

    SHA512

    f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7

  • C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    1.1MB

    MD5

    f01f5bc76b9596e0cfeab8a272cba3a5

    SHA1

    19cab1291e4e518ae636f2fb3d41567e4e6e4722

    SHA256

    83ef6d2414a5c0c9cb6cfe502cb40cdda5c425ee7408a4075e32891f4599d938

    SHA512

    ccfa16f0bbcdb909446fc4d47c1732e0b1baa759d78866fcce9ac7c5c12f1299e74df03b23881f3e37627b358bc6ddd2941c9110e030f6d68dd79f67c9e39f63

  • C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    452KB

    MD5

    1e610848c4255e4152b63adc1a333f21

    SHA1

    d8ab7e3bee496bc242faf67887d12ffd28311037

    SHA256

    65c2ba2e48777e746501c8eff775418f14703904f9bfad2ab5add06c4cb3b45d

    SHA512

    d93c467a0f277fd192189f3f7566d00ec49d332cb575bdb240a2b68c64a2974398f00e612dd3b74474a5c531e2b23cdf9cd5b33675a76277d50d8fa128656cd1

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    299KB

    MD5

    6f6a7c158c1fb54ada74d85d25abfdfc

    SHA1

    40b61a8807370a81e67b0e2986545b86fd8f2d78

    SHA256

    c770d6bebc1dd37cb17726d1c244e93cf7c6dac4ccedf88ab8c2c9b4af618aeb

    SHA512

    f7869e17d566272e9cd17665cd4cf40cafb7be39367872be57b93dab6a545e2821a47676b40ab251aa08d5dc0279eb5450b75daee896fdf74bde5b67b8b6c729

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    357KB

    MD5

    6bb6f383c583b98dda85663656365c90

    SHA1

    4748dd457d509bb41cd42e155f24bc4a6dcd2fc0

    SHA256

    b886c7a846bd3f3a7af519fbcad2e695ece985a5f2b6a7a4f6863763d70e7223

    SHA512

    6b22d6aa6685e9903c4e9e1c7069632b8ad331e2c0639487edf632fb81ac27d5f025cb0b646c2ed8fbffb5bd9ad4ec11a163351be655d53a9ea22231f240231c

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    360KB

    MD5

    6221ccea1549f44ee779a5c891093de5

    SHA1

    d251ee25bd24e91a527cd178e5731cf876daa961

    SHA256

    6354c65b2ae281ad730673bc17788006cf6a116609e83abf962806cc9647ea57

    SHA512

    f87ae13c2787a441c03a698e2a2e9ea5da98c7397512db7842823376c940cad098269a7aa92f3068fa8dd447a5be8fc592be68c997023f77085d74b808a07c0a

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    226KB

    MD5

    e775f89757ef2d9d9067772870a0656f

    SHA1

    da76721435e30ff7fcb2a8360ce88eb9ed1712e9

    SHA256

    8463c2187118fe033a8d2103c9195a29e574f0df0ff77036c0394141d7ac75e0

    SHA512

    e30d18ba82d1a0c0ca9e6112d28be308d48e9f1f356eceeb48f491b9929067841bbffc77f8fb56b19923f4b8cb6dbd849eeac6dd716d65fa9f09cabe793fa87e

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    287KB

    MD5

    6145b341340e68ad803b06ae9aa95f7a

    SHA1

    c4cb99de43ebf43846927f1e3f6cb8173a7bab2e

    SHA256

    216bd46ca85a060e72b3344d3335a2bcf5b773333ed7eb2ea0ea74482193dccd

    SHA512

    91073a257d12aa4d126d96b5131a0dce021cfad5c8715b7a0dd5277a3665afcf43a571de612e671b310994eb6bf9e55f4cdd3ff5bf990fb97f1e8e58c1819840

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    269KB

    MD5

    2a7b151c5ab0cedd492da9322b7c85e5

    SHA1

    e61fc0800a36c39aba17435a50d778319eeee8bc

    SHA256

    2b956466894950a9976d27c0d182bc158e0d387e33dac59cdf3ade5db6eabd0f

    SHA512

    156997ccd935ec6fad9eee04e858ee3124dc09d58e9357c074612c26409546b6de441b132943b240aef7cb00fd1d4917752d3d7c19db7e5e4b63afdd3e4ec37b

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    318KB

    MD5

    4d9c3b89f7633ea748de3a217f68074a

    SHA1

    008a9e7b990c03a028f8a5822de300623a58c14b

    SHA256

    f26f62033c630b3a9b7be4c6826af7d96a015d590ea070bfef4c93f1befae79d

    SHA512

    3b82962f77323392e72be1064b40be6ad23bba4408c7d4f40c77988feac850bde1de453b144fcb31277adac31940530609d2dc8dc6e4c371390a722608591be3

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    274KB

    MD5

    a1f347c82aba9eaa2828824454a23ba3

    SHA1

    33a37b9f94c754a415c2facc1d69a6601c61b690

    SHA256

    aef2ba3edffc998814f11d6c428340b32849153c3341ffab6e1c9cd0745c6082

    SHA512

    f1a127a824901f1afaa1fdfed354816e6ad1cf81cda33339413344c4b9acaf7cad6017350cd04d0dff2f763325b52f2abb3709fea69d6e8aaba6281cbf53258a

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    193KB

    MD5

    77e0980d0e64b0a9ebd3cef8ea22b07c

    SHA1

    0d077ed5523048ae0cd2bb0799a503e6bc632a7e

    SHA256

    8df19bc42b91174b6239d9835de17206ddb2bb9ac9c1d0c85efd761c85698d80

    SHA512

    b4dffcdcf418c4caca3ddf750532d1d13a2392f23ae57d5372cb5433fff423bc0af61c9cdbb37da0b7d4b2d1d6818e3760d55e7f2d07367f95be643662e4ca64

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    385KB

    MD5

    72196285d6b672c7c528284b0e233abb

    SHA1

    b7d3428b4b10227c4cce16a0cf85f3a986807e4c

    SHA256

    fbcf3bb01bfa3b265585ccf2258aa39283b6ff0d1edf8ef27082211861423e58

    SHA512

    3e515b843a0fc09a031817dd70103004b71f7b38b693dafaa488c8150dc5e9d985f1f67a07e16bb58c56f89d224c6b92904266fc962aab418cfb9f97a890a233

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    779KB

    MD5

    40f31c71d3ae577665d00865e5b96178

    SHA1

    3ecabdd26a7c34cd436879754b78b761fd15be3d

    SHA256

    1dcf66f07470f58e8c5d760011cadf8813a88b84b1c58d8ec9cdcb23741cb180

    SHA512

    2330ddd44917a0a2c0db84db4c7dae4a37b701eb87dff35a2f6097c2d0d50c551ca9fc53fb712c9e33477acbba32190173ec97f275929c9deda1aad4aa9cf9f1

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    787KB

    MD5

    1fa5694e1ab2db33e0d0a3bdf50af739

    SHA1

    6dd9546bd60b171bec9db70aef6244ac826e8961

    SHA256

    0b25327ca6718aaff4f55daca5e1383fae04b31532a4af84fb0ee14d68114aeb

    SHA512

    78bb8600f25727d369611f59408c8e55d01b8ce3e0bc7a089a1257742e404dfca63dc501d1acebf0224faf7fb12b2c4180fdf522dfe11c459b3f8db8b188d72a

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    867KB

    MD5

    52ee7ad2df433cbdda61ee6189bde983

    SHA1

    da49514be785cbd7b6d6c00600b68e02db4142ff

    SHA256

    4b83800bf1ecac3211206b9a6e3fb8ab2e855d0e567e89d7f8054421eb2d72a6

    SHA512

    2a8acba216951d26e102abd5d4d2396c91f45ee66ebf0d9a28f9127c52bb91282da1e822517996473155ba45282a160b7f02a10fd62bcbfe73f565c52ae90f95

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    445KB

    MD5

    7f425b01f2af5f0160986f92220fccac

    SHA1

    95f68592edef7fb8ef4d29cb22fe002c2c693d34

    SHA256

    c594e73430339f28b2add1518b61981e2f11f29a7d1f018e109378ccaba3d44c

    SHA512

    9784bfef667e3421ffc2dc676238b8bd4a48c7f5439a291d5b2e6e8d1cc92e4b3e8aa2b19b43d36e8b28a047f17fd3bf78da3f6890b685f2f1929e5e9f1b3c1e

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    824KB

    MD5

    f3e62fc0a371f10724eee5c92f6817ba

    SHA1

    75464e1bf967bcc81b84a94a24a5ed722960b4f8

    SHA256

    8948ddbe1c20d6f933bc28f0950b0f7de8ccebfc11cfb3804e1c213c34b43461

    SHA512

    ed9cf5265e5b15c964802d2f2aff80f79b4696ffc412fe7b8ead4cc863c6e610e48285337a9393f3eb70850cc359afca0296420c60140121906be0bcaf9cd575

  • \Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll
    Filesize

    1.0MB

    MD5

    d932bb8aa9b9defa82db29de4f55e2ea

    SHA1

    47d0e20ba57734a4ce67029dcec572d4344f6ad6

    SHA256

    c157c12b9fa4bd77577c78359999c52d1280c1422a88e574663b3cb96805c0cc

    SHA512

    6411124fc66924ba41aedef45a2b893b7b6c60fc27bb49887da2a271258e10e7a56110490f61d61012dcd03baf8c6d315fbdfc57f5f3039c8649203de06aa5f1

  • memory/696-119-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/696-118-0x0000000001C60000-0x0000000001CCF000-memory.dmp
    Filesize

    444KB

  • memory/696-117-0x0000000000250000-0x0000000000350000-memory.dmp
    Filesize

    1024KB

  • memory/1204-4-0x0000000002E90000-0x0000000002EA6000-memory.dmp
    Filesize

    88KB

  • memory/1740-2-0x0000000000220000-0x000000000022B000-memory.dmp
    Filesize

    44KB

  • memory/1740-1-0x00000000005B0000-0x00000000006B0000-memory.dmp
    Filesize

    1024KB

  • memory/1740-5-0x0000000000400000-0x000000000043D000-memory.dmp
    Filesize

    244KB

  • memory/1740-3-0x0000000000400000-0x000000000043D000-memory.dmp
    Filesize

    244KB

  • memory/2748-99-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2748-116-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2748-76-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2748-129-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2748-77-0x0000000000600000-0x0000000000700000-memory.dmp
    Filesize

    1024KB

  • memory/2748-124-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2748-88-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2748-38-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2748-48-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2748-37-0x0000000000600000-0x0000000000700000-memory.dmp
    Filesize

    1024KB

  • memory/2856-20-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2856-36-0x00000000005A0000-0x00000000006A0000-memory.dmp
    Filesize

    1024KB

  • memory/2856-34-0x0000000000400000-0x0000000000471000-memory.dmp
    Filesize

    452KB

  • memory/2856-21-0x0000000001EA0000-0x0000000001EA1000-memory.dmp
    Filesize

    4KB

  • memory/2856-19-0x0000000000350000-0x00000000003BF000-memory.dmp
    Filesize

    444KB

  • memory/2856-18-0x00000000005A0000-0x00000000006A0000-memory.dmp
    Filesize

    1024KB