Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 05:25

General

  • Target

    9f34dfb4cbc230498bb4be758dcd11dbd7529adb226647057dd4e2869bc11b33.exe

  • Size

    189KB

  • MD5

    e542bea8f1d2dac9a954396b7eeceeb4

  • SHA1

    94eb8868dc85e0d5d5df3f65db5b14120742ed0a

  • SHA256

    9f34dfb4cbc230498bb4be758dcd11dbd7529adb226647057dd4e2869bc11b33

  • SHA512

    83d5abb3983807500365de35e59627a2337e5f7d1e9adadddfa6558ede8aeaa96b911e0b4b5fc2d9ecb41938fb65504d26430efd4860be8a7279b99f052ddd7d

  • SSDEEP

    3072:gDpZbM1di2kiLeN+Av/fID5jx0jD5NePvHrMKVBZY:+p4LeN+AveSX5NenLMKVg

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.134.65/o7VsjdSa2f/index.php

193.56.146.194/h49vlBP/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 6 IoCs
  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f34dfb4cbc230498bb4be758dcd11dbd7529adb226647057dd4e2869bc11b33.exe
    "C:\Users\Admin\AppData\Local\Temp\9f34dfb4cbc230498bb4be758dcd11dbd7529adb226647057dd4e2869bc11b33.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3556
  • C:\Users\Admin\AppData\Local\Temp\4B9F.exe
    C:\Users\Admin\AppData\Local\Temp\4B9F.exe
    1⤵
    • Executes dropped EXE
    PID:3980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 436
      2⤵
      • Program crash
      PID:924
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3980 -ip 3980
    1⤵
      PID:2020
    • C:\Users\Admin\AppData\Local\Temp\A8B4.exe
      C:\Users\Admin\AppData\Local\Temp\A8B4.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe
        "C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:1708
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Accesses Microsoft Outlook profiles
          PID:1780
    • C:\Users\Admin\AppData\Local\Temp\C3CF.exe
      C:\Users\Admin\AppData\Local\Temp\C3CF.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        2⤵
          PID:2664
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 260
          2⤵
          • Program crash
          PID:4364
      • C:\Users\Admin\AppData\Local\Temp\C93E.exe
        C:\Users\Admin\AppData\Local\Temp\C93E.exe
        1⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
          "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"
          2⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4432
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F
            3⤵
            • Creates scheduled task(s)
            PID:1520
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Accesses Microsoft Outlook profiles
            • outlook_win_path
            PID:2032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 1256
          2⤵
          • Program crash
          PID:2816
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:2608
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2644 -ip 2644
          1⤵
            PID:2660
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:4960
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:4192
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:3956
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:4492
                  • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe
                    C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4076
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:3840
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:820
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:3156
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:1372
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5068 -ip 5068
                            1⤵
                              PID:3924
                            • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe
                              C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe
                              1⤵
                              • Executes dropped EXE
                              PID:4256
                            • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                              C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2308
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 416
                                2⤵
                                • Program crash
                                PID:4348
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2308 -ip 2308
                              1⤵
                                PID:1988

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\4B9F.exe

                                Filesize

                                1.0MB

                                MD5

                                fc78f5650188734808f725d0934650a1

                                SHA1

                                e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000

                                SHA256

                                319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a

                                SHA512

                                d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0

                              • C:\Users\Admin\AppData\Local\Temp\4B9F.exe

                                Filesize

                                1.0MB

                                MD5

                                fc78f5650188734808f725d0934650a1

                                SHA1

                                e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000

                                SHA256

                                319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a

                                SHA512

                                d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0

                              • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe

                                Filesize

                                248KB

                                MD5

                                32d19986f373641d083394147032df89

                                SHA1

                                df8d10f6eff9b10427257ffc997cbd206556fd47

                                SHA256

                                d327d690cc3406845ca31b5aef1a246ed66418dd841179f1f1551776bd8cc833

                                SHA512

                                547251fdf1fbb94d5fd471a9a9a5153fd5e8082271ca2899c1504a0908e8507e7a64c01d98a28139e9728d9e9adf2843c95680d628b944c12ca6b5ba9b6d011b

                              • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe

                                Filesize

                                248KB

                                MD5

                                32d19986f373641d083394147032df89

                                SHA1

                                df8d10f6eff9b10427257ffc997cbd206556fd47

                                SHA256

                                d327d690cc3406845ca31b5aef1a246ed66418dd841179f1f1551776bd8cc833

                                SHA512

                                547251fdf1fbb94d5fd471a9a9a5153fd5e8082271ca2899c1504a0908e8507e7a64c01d98a28139e9728d9e9adf2843c95680d628b944c12ca6b5ba9b6d011b

                              • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe

                                Filesize

                                248KB

                                MD5

                                32d19986f373641d083394147032df89

                                SHA1

                                df8d10f6eff9b10427257ffc997cbd206556fd47

                                SHA256

                                d327d690cc3406845ca31b5aef1a246ed66418dd841179f1f1551776bd8cc833

                                SHA512

                                547251fdf1fbb94d5fd471a9a9a5153fd5e8082271ca2899c1504a0908e8507e7a64c01d98a28139e9728d9e9adf2843c95680d628b944c12ca6b5ba9b6d011b

                              • C:\Users\Admin\AppData\Local\Temp\A8B4.exe

                                Filesize

                                777KB

                                MD5

                                47f9d8570bbbfd172ee66015af682251

                                SHA1

                                2040636052aed433a453ef4c0a1a6a16186e7c90

                                SHA256

                                2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                                SHA512

                                e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                              • C:\Users\Admin\AppData\Local\Temp\A8B4.exe

                                Filesize

                                777KB

                                MD5

                                47f9d8570bbbfd172ee66015af682251

                                SHA1

                                2040636052aed433a453ef4c0a1a6a16186e7c90

                                SHA256

                                2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                                SHA512

                                e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                              • C:\Users\Admin\AppData\Local\Temp\C3CF.exe

                                Filesize

                                3.7MB

                                MD5

                                27b75158dcfeba6b3419bdbb15397584

                                SHA1

                                8a135c4fc3fa7e06bf29537f9cb0298cc2f1c1de

                                SHA256

                                a6ffd97ca5d47f2251a53ccd3ab891a9fec5b7d0f316b4c11e7d88f19765b1b4

                                SHA512

                                eb9acc530d9c20dc26a00489572fe5b21075181f5f25d6598ebd5292aef5bbce9c2dc89fac04201ea7ce5c5faec545e44c02e54356ae6dfda7d2f70255a930b3

                              • C:\Users\Admin\AppData\Local\Temp\C3CF.exe

                                Filesize

                                3.7MB

                                MD5

                                27b75158dcfeba6b3419bdbb15397584

                                SHA1

                                8a135c4fc3fa7e06bf29537f9cb0298cc2f1c1de

                                SHA256

                                a6ffd97ca5d47f2251a53ccd3ab891a9fec5b7d0f316b4c11e7d88f19765b1b4

                                SHA512

                                eb9acc530d9c20dc26a00489572fe5b21075181f5f25d6598ebd5292aef5bbce9c2dc89fac04201ea7ce5c5faec545e44c02e54356ae6dfda7d2f70255a930b3

                              • C:\Users\Admin\AppData\Local\Temp\C93E.exe

                                Filesize

                                248KB

                                MD5

                                32d19986f373641d083394147032df89

                                SHA1

                                df8d10f6eff9b10427257ffc997cbd206556fd47

                                SHA256

                                d327d690cc3406845ca31b5aef1a246ed66418dd841179f1f1551776bd8cc833

                                SHA512

                                547251fdf1fbb94d5fd471a9a9a5153fd5e8082271ca2899c1504a0908e8507e7a64c01d98a28139e9728d9e9adf2843c95680d628b944c12ca6b5ba9b6d011b

                              • C:\Users\Admin\AppData\Local\Temp\C93E.exe

                                Filesize

                                248KB

                                MD5

                                32d19986f373641d083394147032df89

                                SHA1

                                df8d10f6eff9b10427257ffc997cbd206556fd47

                                SHA256

                                d327d690cc3406845ca31b5aef1a246ed66418dd841179f1f1551776bd8cc833

                                SHA512

                                547251fdf1fbb94d5fd471a9a9a5153fd5e8082271ca2899c1504a0908e8507e7a64c01d98a28139e9728d9e9adf2843c95680d628b944c12ca6b5ba9b6d011b

                              • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe

                                Filesize

                                777KB

                                MD5

                                47f9d8570bbbfd172ee66015af682251

                                SHA1

                                2040636052aed433a453ef4c0a1a6a16186e7c90

                                SHA256

                                2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                                SHA512

                                e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                              • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe

                                Filesize

                                777KB

                                MD5

                                47f9d8570bbbfd172ee66015af682251

                                SHA1

                                2040636052aed433a453ef4c0a1a6a16186e7c90

                                SHA256

                                2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                                SHA512

                                e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                              • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe

                                Filesize

                                777KB

                                MD5

                                47f9d8570bbbfd172ee66015af682251

                                SHA1

                                2040636052aed433a453ef4c0a1a6a16186e7c90

                                SHA256

                                2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                                SHA512

                                e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                              • C:\Users\Admin\AppData\Local\Temp\f338f622fb\gntuud.exe

                                Filesize

                                777KB

                                MD5

                                47f9d8570bbbfd172ee66015af682251

                                SHA1

                                2040636052aed433a453ef4c0a1a6a16186e7c90

                                SHA256

                                2a1ba44054891a211ce5b2e36e91303cfc19c025af1fd8c4534f078cc7b41be3

                                SHA512

                                e65a6f651a46ae69b1b259e34029655503f1c54a2ed0f634495d55d8ed5283be84eda39c5a7e42d73bd41156826079d21917d6116296e70a6627fbb8d6307a9c

                              • C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll

                                Filesize

                                126KB

                                MD5

                                f6d14701e7c568254151e153f7763672

                                SHA1

                                4501ffb7284f29cca51b06deba0262b8d33f93f6

                                SHA256

                                e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d

                                SHA512

                                62c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2

                              • C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll

                                Filesize

                                126KB

                                MD5

                                f6d14701e7c568254151e153f7763672

                                SHA1

                                4501ffb7284f29cca51b06deba0262b8d33f93f6

                                SHA256

                                e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d

                                SHA512

                                62c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2

                              • C:\Users\Admin\AppData\Roaming\8f80aeaa2e33b8\cred64.dll

                                Filesize

                                126KB

                                MD5

                                f6d14701e7c568254151e153f7763672

                                SHA1

                                4501ffb7284f29cca51b06deba0262b8d33f93f6

                                SHA256

                                e246c844a272e80f2819e754e79a394e0fc964ad583ae90110dc38a01100b44d

                                SHA512

                                62c1d6cbe6531a6b5d2a9fcdddd91cc3971dd81f1f5208e88c02d97d066e1b04665122817acb228894937279c49ac627bdb3c42cb32e130e39201f3108cde8f2

                              • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll

                                Filesize

                                126KB

                                MD5

                                674cec24e36e0dfaec6290db96dda86e

                                SHA1

                                581e3a7a541cc04641e751fc850d92e07236681f

                                SHA256

                                de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

                                SHA512

                                6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

                              • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll

                                Filesize

                                126KB

                                MD5

                                674cec24e36e0dfaec6290db96dda86e

                                SHA1

                                581e3a7a541cc04641e751fc850d92e07236681f

                                SHA256

                                de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

                                SHA512

                                6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

                              • memory/820-193-0x00000000008A0000-0x00000000008A6000-memory.dmp

                                Filesize

                                24KB

                              • memory/820-187-0x0000000000000000-mapping.dmp

                              • memory/820-190-0x0000000000890000-0x000000000089B000-memory.dmp

                                Filesize

                                44KB

                              • memory/820-211-0x00000000008A0000-0x00000000008A6000-memory.dmp

                                Filesize

                                24KB

                              • memory/1372-196-0x0000000000000000-mapping.dmp

                              • memory/1372-197-0x0000000000450000-0x0000000000458000-memory.dmp

                                Filesize

                                32KB

                              • memory/1372-198-0x0000000000440000-0x000000000044B000-memory.dmp

                                Filesize

                                44KB

                              • memory/1372-216-0x0000000000450000-0x0000000000458000-memory.dmp

                                Filesize

                                32KB

                              • memory/1520-213-0x0000000000000000-mapping.dmp

                              • memory/1708-147-0x0000000000000000-mapping.dmp

                              • memory/1780-223-0x00000000007E0000-0x0000000000804000-memory.dmp

                                Filesize

                                144KB

                              • memory/1780-219-0x0000000000000000-mapping.dmp

                              • memory/2032-227-0x0000000000000000-mapping.dmp

                              • memory/2308-231-0x0000000000400000-0x000000000065C000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/2308-230-0x0000000000A5B000-0x0000000000A7B000-memory.dmp

                                Filesize

                                128KB

                              • memory/2608-164-0x0000000000000000-mapping.dmp

                              • memory/2608-171-0x0000000000F80000-0x0000000000F87000-memory.dmp

                                Filesize

                                28KB

                              • memory/2608-205-0x0000000000F80000-0x0000000000F87000-memory.dmp

                                Filesize

                                28KB

                              • memory/2608-172-0x0000000000F70000-0x0000000000F7B000-memory.dmp

                                Filesize

                                44KB

                              • memory/2644-157-0x0000000000740000-0x0000000000AEE000-memory.dmp

                                Filesize

                                3.7MB

                              • memory/2644-149-0x0000000000000000-mapping.dmp

                              • memory/2664-170-0x0000000000B00000-0x0000000000D6F000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/2664-153-0x0000000000B00000-0x0000000000D6F000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/2664-152-0x0000000000000000-mapping.dmp

                              • memory/3156-192-0x0000000000000000-mapping.dmp

                              • memory/3156-212-0x0000000000390000-0x0000000000397000-memory.dmp

                                Filesize

                                28KB

                              • memory/3156-195-0x0000000000380000-0x000000000038D000-memory.dmp

                                Filesize

                                52KB

                              • memory/3156-194-0x0000000000390000-0x0000000000397000-memory.dmp

                                Filesize

                                28KB

                              • memory/3556-132-0x0000000000898000-0x00000000008A9000-memory.dmp

                                Filesize

                                68KB

                              • memory/3556-134-0x0000000000400000-0x000000000064D000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/3556-135-0x0000000000400000-0x000000000064D000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/3556-133-0x0000000002380000-0x0000000002389000-memory.dmp

                                Filesize

                                36KB

                              • memory/3840-188-0x0000000000560000-0x0000000000565000-memory.dmp

                                Filesize

                                20KB

                              • memory/3840-186-0x0000000000000000-mapping.dmp

                              • memory/3840-189-0x0000000000550000-0x0000000000559000-memory.dmp

                                Filesize

                                36KB

                              • memory/3840-210-0x0000000000560000-0x0000000000565000-memory.dmp

                                Filesize

                                20KB

                              • memory/3956-208-0x0000000000D30000-0x0000000000D36000-memory.dmp

                                Filesize

                                24KB

                              • memory/3956-179-0x0000000000000000-mapping.dmp

                              • memory/3956-181-0x0000000000D20000-0x0000000000D2C000-memory.dmp

                                Filesize

                                48KB

                              • memory/3956-180-0x0000000000D30000-0x0000000000D36000-memory.dmp

                                Filesize

                                24KB

                              • memory/3980-136-0x0000000000000000-mapping.dmp

                              • memory/4076-191-0x0000000000400000-0x00000000004C8000-memory.dmp

                                Filesize

                                800KB

                              • memory/4192-178-0x0000000000110000-0x0000000000119000-memory.dmp

                                Filesize

                                36KB

                              • memory/4192-207-0x0000000000120000-0x0000000000125000-memory.dmp

                                Filesize

                                20KB

                              • memory/4192-177-0x0000000000120000-0x0000000000125000-memory.dmp

                                Filesize

                                20KB

                              • memory/4192-176-0x0000000000000000-mapping.dmp

                              • memory/4256-226-0x0000000000400000-0x00000000004C8000-memory.dmp

                                Filesize

                                800KB

                              • memory/4432-217-0x0000000000718000-0x0000000000738000-memory.dmp

                                Filesize

                                128KB

                              • memory/4432-215-0x0000000000400000-0x000000000065C000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/4432-199-0x0000000000000000-mapping.dmp

                              • memory/4432-218-0x0000000000400000-0x000000000065C000-memory.dmp

                                Filesize

                                2.4MB

                              • memory/4432-214-0x0000000000718000-0x0000000000738000-memory.dmp

                                Filesize

                                128KB

                              • memory/4492-182-0x0000000000000000-mapping.dmp

                              • memory/4492-184-0x0000000000A00000-0x0000000000A22000-memory.dmp

                                Filesize

                                136KB

                              • memory/4492-209-0x0000000000A00000-0x0000000000A22000-memory.dmp

                                Filesize

                                136KB

                              • memory/4492-185-0x00000000007D0000-0x00000000007F7000-memory.dmp

                                Filesize

                                156KB

                              • memory/4852-145-0x00000000023E0000-0x000000000243C000-memory.dmp

                                Filesize

                                368KB

                              • memory/4852-139-0x0000000000000000-mapping.dmp

                              • memory/4852-146-0x0000000000400000-0x00000000004C8000-memory.dmp

                                Filesize

                                800KB

                              • memory/4960-206-0x0000000000320000-0x0000000000329000-memory.dmp

                                Filesize

                                36KB

                              • memory/4960-175-0x0000000000310000-0x000000000031F000-memory.dmp

                                Filesize

                                60KB

                              • memory/4960-174-0x0000000000320000-0x0000000000329000-memory.dmp

                                Filesize

                                36KB

                              • memory/4960-173-0x0000000000000000-mapping.dmp

                              • memory/5048-142-0x0000000000000000-mapping.dmp

                              • memory/5048-148-0x0000000000400000-0x00000000004C8000-memory.dmp

                                Filesize

                                800KB

                              • memory/5068-202-0x0000000000A48000-0x0000000000A67000-memory.dmp

                                Filesize

                                124KB

                              • memory/5068-156-0x0000000000000000-mapping.dmp

                              • memory/5068-203-0x00000000022A0000-0x00000000022DE000-memory.dmp

                                Filesize

                                248KB

                              • memory/5068-204-0x0000000000400000-0x000000000065C000-memory.dmp

                                Filesize

                                2.4MB