Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    19-05-2022 01:48

General

  • Target

    69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e.exe

  • Size

    319KB

  • MD5

    00abc3cdf40d724b3bbaf8cb2de12d95

  • SHA1

    529cfe8010a6541a0c7accd33ae02a5237f58301

  • SHA256

    69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

  • SHA512

    414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

Malware Config

Extracted

Family

amadey

Version

3.10

C2

199.188.204.245/f8dfksdj3/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • suricata: ET MALWARE Amadey CnC Check-In

    suricata: ET MALWARE Amadey CnC Check-In

  • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e.exe
    "C:\Users\Admin\AppData\Local\Temp\69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      "C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\70d66d8271\
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\70d66d8271\
          4⤵
            PID:1916
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN orxds.exe /TR "C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:856
        • C:\Users\Admin\AppData\Local\Temp\1000006001\mine3.exe
          "C:\Users\Admin\AppData\Local\Temp\1000006001\mine3.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2020
          • C:\Windows\system32\schtasks.exe
            "schtasks.exe" /create /tn TxMT8hHkO8fBB5FlBurdwljpn /tr "C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe" /st 04:22 /du 23:59 /sc daily /ri 1 /f
            4⤵
            • Creates scheduled task(s)
            PID:1492
          • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
            "C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 1800 -s 2384
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:2016
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA2D5.tmp.bat""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:760
            • C:\Windows\system32\timeout.exe
              timeout 6
              5⤵
              • Delays execution with timeout.exe
              PID:1872
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Accesses Microsoft Outlook profiles
          • outlook_win_path
          PID:1812
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {B8CCBE4F-94C4-44BF-8503-FCB188E1B025} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
        C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
        2⤵
        • Executes dropped EXE
        PID:272
      • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
        C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
        2⤵
        • Executes dropped EXE
        PID:444

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      347.6MB

      MD5

      ead823df3db47dddb43920629a5508f3

      SHA1

      0a0f6ca87bda5fa31656b7714ce7c3048366731b

      SHA256

      de5031a2b0a254a7d4be3282585eb5b3be76b26a35d5caedc48add39813d1427

      SHA512

      3cf83b9ee5f6ae83b529a056212cd1bea3ef3b4ea62007093e9f850602f44ec4c1af779f9a477f9018ef0c1621d3bde245e0fb90757bf5e36a8f4fea6f36a079

    • C:\ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      357.7MB

      MD5

      f0d98d3428542b36519174e6cb1b609d

      SHA1

      2b8c8018363611c73e16204ef749858173820ea3

      SHA256

      661cb1aa34968a39d30b01f2c30e19fca2e820867303e282e1ef1390632fe63a

      SHA512

      52e28585bc2d70d453736e0e31d7f19fd41940202ede45c36c631d0eefc19b8ab6decddf803db2c4047694099a006a99ba2f2c681e6d416eeaabb86b4d8f7af4

    • C:\Users\Admin\AppData\Local\Temp\1000006001\mine3.exe
      Filesize

      809KB

      MD5

      ff72b295ded9889cee24320db368bcf1

      SHA1

      5d7991f8495d56088710dd558faba639ffd05292

      SHA256

      e54ccfd9a2ab15b4461eb38baec21eb828f7757ca3e67db3b7acb261be34adcd

      SHA512

      37ab209741e90c78565d170ab48d7ee83c8633e93e646a4c8f639c305c8b6528841668b6aa7797870612d24e11e1ff1aaae0f5622e9a2195957f9142e93a7b1b

    • C:\Users\Admin\AppData\Local\Temp\1000006001\mine3.exe
      Filesize

      809KB

      MD5

      ff72b295ded9889cee24320db368bcf1

      SHA1

      5d7991f8495d56088710dd558faba639ffd05292

      SHA256

      e54ccfd9a2ab15b4461eb38baec21eb828f7757ca3e67db3b7acb261be34adcd

      SHA512

      37ab209741e90c78565d170ab48d7ee83c8633e93e646a4c8f639c305c8b6528841668b6aa7797870612d24e11e1ff1aaae0f5622e9a2195957f9142e93a7b1b

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • C:\Users\Admin\AppData\Local\Temp\tmpA2D5.tmp.bat
      Filesize

      168B

      MD5

      813eaa7b54e30f85aa9aaf83667cac3e

      SHA1

      5891920e05678f65e8190b8138c5d9f196ac3cdd

      SHA256

      6a654312ad3ef94fb1994bd0f617398d265e8e198e54b806026dbc157cff03b5

      SHA512

      d27d8f4be8b4fe5455022e4dcdbfdd96f1c14f4089efa4cf66bdf46602ce23ff7f6e961246afdcbfa123b4703e1dd976988b0ef0847cdde5462c01b542eff0be

    • C:\Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • \ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      85.4MB

      MD5

      6c583fcd8fb7985e8314004724b0541f

      SHA1

      bb3994586e9f7c6316acab3d94e721c3dd10bdc3

      SHA256

      3cb96e997db33873ec945ab94e1ef356dc4c0f6e6c558fc41cd2e3568006faa3

      SHA512

      e94b1903ed7d96f31be5cd2aef6c4029c2f206fec2e4fb784065d4547a7dfc834fe3cf9cac45373bb091f25ab055c60ea8e62409353b4292cca56ef35a7d1015

    • \ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      83.6MB

      MD5

      77bf8995cf8ef2b3c2d177cc72c48470

      SHA1

      55ce86ace7b5e41becd6845578e970adb9af1264

      SHA256

      a8adcf8e68c3446e2955ca8c66b366b980785b6de9728292cc7ae848042625ae

      SHA512

      1c8f09de9b424a618986b69377d25c16fd0e3c6162430f7329092fbdd495fdd5b0002c9120c2416d7b5ec03092e7d11b2478952c9d96873262d9ee8da6976b1d

    • \ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      89.6MB

      MD5

      73dfea579f78c00b4352f68e0e8c1e75

      SHA1

      3b46ff85993d9d5a82bd37e658b461d1ef6a91fe

      SHA256

      ad0091151596f25581067d417f5e2fda2d6a09a64737cb36e02611088ec009f7

      SHA512

      c49e52c416f8355dfb3799f3aae00c91112088354cbcfc4730bbce579f7472d51660a3fb4933933371039c84166f14eaee9a223b19de1e850b77ac9dde5e7157

    • \ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      87.9MB

      MD5

      d2f497b45ee14a62624ebea0970e8641

      SHA1

      bf110d3b05969001bfb5fe0204428ebba789794a

      SHA256

      b0b679b853d7feb518f4c947bdb68783cd54ec7ffc17e4415c708e4c8f1417c4

      SHA512

      8371a07bf8788879cf20a756f0dca36f3c2d0c7c5aaa84780c5fbbff82ab956d86b9072eee876c7c8cf24ccbdd0d6c157b8dc25f5a052dc11b4894c0001de7d1

    • \ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      87.0MB

      MD5

      40670405c7482373d917cc8dc167c572

      SHA1

      478d6966727d42861026fc7d24c7a99978ad6892

      SHA256

      9a055061e9148da3910d72799606f3530dd98b69b4b1a2924ed98d885688367f

      SHA512

      6d9348aef5b561e3bda02fe471b2d177942d36e0995f1d4269ad9d72b61ae3349ba41a809e296529177398f56b734978de69eeff20a47f66fa7756718bc5a7a8

    • \ProgramData\4vFAHkNczECIXuLdvBZKuXofw\IFMb39aGmCsqJcthXwNQEToq7.exe
      Filesize

      340.5MB

      MD5

      d6b1a627e8372b8483954d06add599a1

      SHA1

      0ed5c22dfcee9e4c6832548f5a6af3b2b1db355b

      SHA256

      9649ce9ba21722bd8e93343626e3128a063b65114985dfac7fc5d49f7a8a9867

      SHA512

      eab3dfad7b8cf2fc2bf931586c8cb1981cd59a9fb8dfa5f073873d1e703ed10d755dc82c9c8825e60450ba000788fc3a642ff0a18dcb0458a86d248e68b13d96

    • \Users\Admin\AppData\Local\Temp\1000006001\mine3.exe
      Filesize

      809KB

      MD5

      ff72b295ded9889cee24320db368bcf1

      SHA1

      5d7991f8495d56088710dd558faba639ffd05292

      SHA256

      e54ccfd9a2ab15b4461eb38baec21eb828f7757ca3e67db3b7acb261be34adcd

      SHA512

      37ab209741e90c78565d170ab48d7ee83c8633e93e646a4c8f639c305c8b6528841668b6aa7797870612d24e11e1ff1aaae0f5622e9a2195957f9142e93a7b1b

    • \Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • \Users\Admin\AppData\Local\Temp\70d66d8271\orxds.exe
      Filesize

      319KB

      MD5

      00abc3cdf40d724b3bbaf8cb2de12d95

      SHA1

      529cfe8010a6541a0c7accd33ae02a5237f58301

      SHA256

      69db771b992adb89ed17465f8c448b1a44c5f99ef7e73fe1dae45982790cae5e

      SHA512

      414218603c46f6a8e0fe27dc8ec9c83979dd7be8ebc4c89cfd1d795dadaaf3466ef6d0ef953b3ce0d660dfa6b615b31e878ccd57c21aedb1b09f886e7dfb830e

    • \Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • \Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • \Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • \Users\Admin\AppData\Roaming\95ae2649e6d72d\cred.dll
      Filesize

      126KB

      MD5

      210d9d14509f0bc2c26c87ba5fef4108

      SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

      SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

      SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • memory/272-90-0x000000000096E000-0x000000000098C000-memory.dmp
      Filesize

      120KB

    • memory/272-86-0x0000000000000000-mapping.dmp
    • memory/272-91-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/444-110-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/444-106-0x0000000000000000-mapping.dmp
    • memory/444-109-0x000000000059E000-0x00000000005BC000-memory.dmp
      Filesize

      120KB

    • memory/684-59-0x00000000002EE000-0x000000000030C000-memory.dmp
      Filesize

      120KB

    • memory/684-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
      Filesize

      8KB

    • memory/684-61-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/684-60-0x00000000001C0000-0x00000000001F8000-memory.dmp
      Filesize

      224KB

    • memory/760-81-0x0000000000000000-mapping.dmp
    • memory/856-64-0x0000000000000000-mapping.dmp
    • memory/956-67-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/956-66-0x000000000030E000-0x000000000032C000-memory.dmp
      Filesize

      120KB

    • memory/956-57-0x0000000000000000-mapping.dmp
    • memory/1472-63-0x0000000000000000-mapping.dmp
    • memory/1492-76-0x0000000000000000-mapping.dmp
    • memory/1800-92-0x000000001AC76000-0x000000001AC95000-memory.dmp
      Filesize

      124KB

    • memory/1800-82-0x000000013F760000-0x000000013F82E000-memory.dmp
      Filesize

      824KB

    • memory/1800-78-0x0000000000000000-mapping.dmp
    • memory/1800-88-0x000000001CD30000-0x000000001CDFA000-memory.dmp
      Filesize

      808KB

    • memory/1812-93-0x0000000000000000-mapping.dmp
    • memory/1872-84-0x0000000000000000-mapping.dmp
    • memory/1916-65-0x0000000000000000-mapping.dmp
    • memory/2016-100-0x0000000000000000-mapping.dmp
    • memory/2020-74-0x0000000000540000-0x0000000000546000-memory.dmp
      Filesize

      24KB

    • memory/2020-69-0x0000000000000000-mapping.dmp
    • memory/2020-72-0x000000013FE90000-0x000000013FF5E000-memory.dmp
      Filesize

      824KB

    • memory/2020-73-0x000000001BF10000-0x000000001BFE6000-memory.dmp
      Filesize

      856KB

    • memory/2020-75-0x000000001BA56000-0x000000001BA75000-memory.dmp
      Filesize

      124KB