Analysis

  • max time kernel
    591s
  • max time network
    594s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2022 02:09

General

  • Target

    nppshell.exe

  • Size

    2.1MB

  • MD5

    14babf2e06fda6c120cbe98c0746a984

  • SHA1

    57ccbb753fa2a6ea8e6f45c1ced3326404969b04

  • SHA256

    202a9c874e794f55e31ef038652d20e16672372539c71394ddeda724deb3a3ab

  • SHA512

    20917024c4ae78de051457d65a7f4d192542bea4aab39dc289c71e92a578fc353e396d95c6a3a5001c6480c040ce735b2d4550820a8b1fa092afdbf0c45a1e57

  • SSDEEP

    49152:0Dv5ESHLhxCaOAJpMG5uozbf1T8zhNjox1l5fr3Wyx2:++CL7TOAJ2G5uoNT5x1bfr3nQ

Malware Config

Extracted

Family

amadey

Version

3.60

C2

85.209.135.11/gjend7w/index.php

Extracted

Family

systembc

C2

89.22.236.225:4193

176.124.205.5:4193

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nppshell.exe
    "C:\Users\Admin\AppData\Local\Temp\nppshell.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1908
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\acc0b83959" /P "Admin:N"&&CACLS "..\acc0b83959" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1228
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "gntuud.exe" /P "Admin:N"
            4⤵
              PID:924
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "gntuud.exe" /P "Admin:R" /E
              4⤵
                PID:1708
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:768
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\acc0b83959" /P "Admin:N"
                  4⤵
                    PID:2012
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\acc0b83959" /P "Admin:R" /E
                    4⤵
                      PID:1808
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:1352
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll
                      4⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:792
                  • C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                    "C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: GetForegroundWindowSpam
                    PID:188
                  • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1612
                    • C:\Windows\SysWOW64\schtasks.exe
                      "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                      4⤵
                      • Creates scheduled task(s)
                      PID:1680
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
                    3⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Accesses Microsoft Outlook profiles
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • outlook_win_path
                    PID:1776
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {1CF5EE4D-FEF6-4EA4-89E5-3AA1F86AF8DC} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:1668
                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1096
                • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                  C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1500

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              1
              T1112

              Credential Access

              Credentials in Files

              1
              T1081

              Discovery

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              1
              T1005

              Email Collection

              1
              T1114

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                Filesize

                239KB

                MD5

                4efaf3c856cbc3a0a9078e8105c4c2a1

                SHA1

                5258925002bbc57405578a59375dff67edfdfb6f

                SHA256

                ec22fe1001066151dcaba55d013dd5a69886ec09d947118a9682f4a673890512

                SHA512

                4949819f589a6042604879aae0424c9d172cf6e18b1e6ca01a53de6d136249a59fa3fe77e3cac56942499d7c319b7156b83db5c31711d36a58a219808e3a3f2f

              • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                Filesize

                239KB

                MD5

                4efaf3c856cbc3a0a9078e8105c4c2a1

                SHA1

                5258925002bbc57405578a59375dff67edfdfb6f

                SHA256

                ec22fe1001066151dcaba55d013dd5a69886ec09d947118a9682f4a673890512

                SHA512

                4949819f589a6042604879aae0424c9d172cf6e18b1e6ca01a53de6d136249a59fa3fe77e3cac56942499d7c319b7156b83db5c31711d36a58a219808e3a3f2f

              • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                Filesize

                2.1MB

                MD5

                14babf2e06fda6c120cbe98c0746a984

                SHA1

                57ccbb753fa2a6ea8e6f45c1ced3326404969b04

                SHA256

                202a9c874e794f55e31ef038652d20e16672372539c71394ddeda724deb3a3ab

                SHA512

                20917024c4ae78de051457d65a7f4d192542bea4aab39dc289c71e92a578fc353e396d95c6a3a5001c6480c040ce735b2d4550820a8b1fa092afdbf0c45a1e57

              • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                Filesize

                2.1MB

                MD5

                14babf2e06fda6c120cbe98c0746a984

                SHA1

                57ccbb753fa2a6ea8e6f45c1ced3326404969b04

                SHA256

                202a9c874e794f55e31ef038652d20e16672372539c71394ddeda724deb3a3ab

                SHA512

                20917024c4ae78de051457d65a7f4d192542bea4aab39dc289c71e92a578fc353e396d95c6a3a5001c6480c040ce735b2d4550820a8b1fa092afdbf0c45a1e57

              • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                Filesize

                2.1MB

                MD5

                14babf2e06fda6c120cbe98c0746a984

                SHA1

                57ccbb753fa2a6ea8e6f45c1ced3326404969b04

                SHA256

                202a9c874e794f55e31ef038652d20e16672372539c71394ddeda724deb3a3ab

                SHA512

                20917024c4ae78de051457d65a7f4d192542bea4aab39dc289c71e92a578fc353e396d95c6a3a5001c6480c040ce735b2d4550820a8b1fa092afdbf0c45a1e57

              • C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                Filesize

                1.9MB

                MD5

                fa4585a17f8e15aa04639bbee25b57ac

                SHA1

                2511480cee33c955128c8746ddd01c0f62c0e7e1

                SHA256

                067d0fbfbf0bfe4b668904b606145ba840620653c2197dd6358cf9635af6360d

                SHA512

                c3edbecd878f0f66ff18861126b5620275a932472b4a8035c1489f6c7f405513cc137e63afd574c12b1edb7d3e21036c3b84761ffe6443d513ee70968e0da652

              • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                Filesize

                642.1MB

                MD5

                8b30688cfba39660d67305b5f1db679b

                SHA1

                e4bc010147b0eb67274dccd131dacfcf1a49ebb5

                SHA256

                21b64c8bea19be984baeb3b6804a1641121e5488509861e8dc76d289b8c398fe

                SHA512

                fb8f071af8c9d31e0ab28f39e2ef3d00eea1d602883b9b92afb2170068d2756a4d8b54250019cfa1ebf2e72d1fa3f3cc4683bb54fd7b9ab361dd527d11d7f75f

              • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                Filesize

                647.8MB

                MD5

                aba91d605b122bceacc21fabc797d3d6

                SHA1

                8d7360e50c08a5f3f1b9f81e6741db9ff6ed0132

                SHA256

                f79fbe7db81740638accb0627ea5216966089ef59885e0c5039159f4ce95deb3

                SHA512

                af6522766c87d19eed02dcaa86a459314377d31bca162a975cfbcc49052642c4e9c280cda8567d3ff10fe00908b760826f4501376dc93c7cf2db4846c8481bc8

              • C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll
                Filesize

                7.3MB

                MD5

                e3024c1667894acf4391a3ec838777d2

                SHA1

                d0cb9012aa2a6029f1b558fed17a12553919f4b1

                SHA256

                0be3489d010af16e7447e2dcca3ce3fd6165c70a86bf4327201c60d7749d6cbf

                SHA512

                15e6c0a429adf5ac1afe44ef9450461e5a4b56168166655acfdc29184c7f31b1ec14866c4808940ecc80ddf5704d3dfd8e9161511ac99be3f08f6e9c81bd7af7

              • \Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • \Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • \Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • \Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • \Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • \Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • \Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • \Users\Admin\1000003062\syncfiles.dll
                Filesize

                6.4MB

                MD5

                2f781ea76036a17bbd0c0f63be7cff12

                SHA1

                b9b4c756949a038e87f4efd3569ba12c41a8e810

                SHA256

                3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                SHA512

                c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

              • \Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                Filesize

                239KB

                MD5

                4efaf3c856cbc3a0a9078e8105c4c2a1

                SHA1

                5258925002bbc57405578a59375dff67edfdfb6f

                SHA256

                ec22fe1001066151dcaba55d013dd5a69886ec09d947118a9682f4a673890512

                SHA512

                4949819f589a6042604879aae0424c9d172cf6e18b1e6ca01a53de6d136249a59fa3fe77e3cac56942499d7c319b7156b83db5c31711d36a58a219808e3a3f2f

              • \Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                Filesize

                2.1MB

                MD5

                14babf2e06fda6c120cbe98c0746a984

                SHA1

                57ccbb753fa2a6ea8e6f45c1ced3326404969b04

                SHA256

                202a9c874e794f55e31ef038652d20e16672372539c71394ddeda724deb3a3ab

                SHA512

                20917024c4ae78de051457d65a7f4d192542bea4aab39dc289c71e92a578fc353e396d95c6a3a5001c6480c040ce735b2d4550820a8b1fa092afdbf0c45a1e57

              • \Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                Filesize

                1.9MB

                MD5

                fa4585a17f8e15aa04639bbee25b57ac

                SHA1

                2511480cee33c955128c8746ddd01c0f62c0e7e1

                SHA256

                067d0fbfbf0bfe4b668904b606145ba840620653c2197dd6358cf9635af6360d

                SHA512

                c3edbecd878f0f66ff18861126b5620275a932472b4a8035c1489f6c7f405513cc137e63afd574c12b1edb7d3e21036c3b84761ffe6443d513ee70968e0da652

              • \Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                Filesize

                1.9MB

                MD5

                fa4585a17f8e15aa04639bbee25b57ac

                SHA1

                2511480cee33c955128c8746ddd01c0f62c0e7e1

                SHA256

                067d0fbfbf0bfe4b668904b606145ba840620653c2197dd6358cf9635af6360d

                SHA512

                c3edbecd878f0f66ff18861126b5620275a932472b4a8035c1489f6c7f405513cc137e63afd574c12b1edb7d3e21036c3b84761ffe6443d513ee70968e0da652

              • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll
                Filesize

                7.3MB

                MD5

                e3024c1667894acf4391a3ec838777d2

                SHA1

                d0cb9012aa2a6029f1b558fed17a12553919f4b1

                SHA256

                0be3489d010af16e7447e2dcca3ce3fd6165c70a86bf4327201c60d7749d6cbf

                SHA512

                15e6c0a429adf5ac1afe44ef9450461e5a4b56168166655acfdc29184c7f31b1ec14866c4808940ecc80ddf5704d3dfd8e9161511ac99be3f08f6e9c81bd7af7

              • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll
                Filesize

                7.3MB

                MD5

                e3024c1667894acf4391a3ec838777d2

                SHA1

                d0cb9012aa2a6029f1b558fed17a12553919f4b1

                SHA256

                0be3489d010af16e7447e2dcca3ce3fd6165c70a86bf4327201c60d7749d6cbf

                SHA512

                15e6c0a429adf5ac1afe44ef9450461e5a4b56168166655acfdc29184c7f31b1ec14866c4808940ecc80ddf5704d3dfd8e9161511ac99be3f08f6e9c81bd7af7

              • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll
                Filesize

                7.3MB

                MD5

                e3024c1667894acf4391a3ec838777d2

                SHA1

                d0cb9012aa2a6029f1b558fed17a12553919f4b1

                SHA256

                0be3489d010af16e7447e2dcca3ce3fd6165c70a86bf4327201c60d7749d6cbf

                SHA512

                15e6c0a429adf5ac1afe44ef9450461e5a4b56168166655acfdc29184c7f31b1ec14866c4808940ecc80ddf5704d3dfd8e9161511ac99be3f08f6e9c81bd7af7

              • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll
                Filesize

                7.3MB

                MD5

                e3024c1667894acf4391a3ec838777d2

                SHA1

                d0cb9012aa2a6029f1b558fed17a12553919f4b1

                SHA256

                0be3489d010af16e7447e2dcca3ce3fd6165c70a86bf4327201c60d7749d6cbf

                SHA512

                15e6c0a429adf5ac1afe44ef9450461e5a4b56168166655acfdc29184c7f31b1ec14866c4808940ecc80ddf5704d3dfd8e9161511ac99be3f08f6e9c81bd7af7

              • memory/188-116-0x0000000002580000-0x000000000271D000-memory.dmp
                Filesize

                1.6MB

              • memory/188-94-0x0000000000000000-mapping.dmp
              • memory/188-119-0x0000000002580000-0x000000000271D000-memory.dmp
                Filesize

                1.6MB

              • memory/768-86-0x0000000000000000-mapping.dmp
              • memory/792-100-0x0000000000000000-mapping.dmp
              • memory/792-105-0x000007FEF4B00000-0x000007FEF54FD000-memory.dmp
                Filesize

                10.0MB

              • memory/924-83-0x0000000000000000-mapping.dmp
              • memory/1096-117-0x0000000000400000-0x00000000009EF000-memory.dmp
                Filesize

                5.9MB

              • memory/1096-112-0x0000000000400000-0x00000000009EF000-memory.dmp
                Filesize

                5.9MB

              • memory/1096-114-0x0000000002240000-0x0000000002357000-memory.dmp
                Filesize

                1.1MB

              • memory/1096-109-0x0000000000000000-mapping.dmp
              • memory/1096-118-0x0000000002240000-0x0000000002357000-memory.dmp
                Filesize

                1.1MB

              • memory/1228-82-0x0000000000000000-mapping.dmp
              • memory/1352-89-0x0000000000000000-mapping.dmp
              • memory/1380-59-0x000000000EE30000-0x000000000EFF4000-memory.dmp
                Filesize

                1.8MB

              • memory/1380-60-0x0000000000D40000-0x0000000000D83000-memory.dmp
                Filesize

                268KB

              • memory/1380-67-0x0000000000400000-0x00000000009EF000-memory.dmp
                Filesize

                5.9MB

              • memory/1380-68-0x0000000002410000-0x0000000002527000-memory.dmp
                Filesize

                1.1MB

              • memory/1380-58-0x000000000EF30000-0x000000000F1B2000-memory.dmp
                Filesize

                2.5MB

              • memory/1380-54-0x0000000075A11000-0x0000000075A13000-memory.dmp
                Filesize

                8KB

              • memory/1380-57-0x0000000002410000-0x0000000002527000-memory.dmp
                Filesize

                1.1MB

              • memory/1380-56-0x0000000002410000-0x0000000002527000-memory.dmp
                Filesize

                1.1MB

              • memory/1380-55-0x0000000000400000-0x00000000009EF000-memory.dmp
                Filesize

                5.9MB

              • memory/1400-69-0x0000000000400000-0x00000000009EF000-memory.dmp
                Filesize

                5.9MB

              • memory/1400-65-0x0000000000000000-mapping.dmp
              • memory/1400-71-0x0000000002370000-0x0000000002487000-memory.dmp
                Filesize

                1.1MB

              • memory/1400-72-0x0000000000400000-0x00000000009EF000-memory.dmp
                Filesize

                5.9MB

              • memory/1400-73-0x0000000002370000-0x0000000002487000-memory.dmp
                Filesize

                1.1MB

              • memory/1400-74-0x000000000D830000-0x000000000DAB2000-memory.dmp
                Filesize

                2.5MB

              • memory/1400-75-0x000000000D730000-0x000000000D8F4000-memory.dmp
                Filesize

                1.8MB

              • memory/1400-111-0x000000000D730000-0x000000000D8F4000-memory.dmp
                Filesize

                1.8MB

              • memory/1400-76-0x0000000002230000-0x0000000002273000-memory.dmp
                Filesize

                268KB

              • memory/1500-141-0x0000000000090000-0x00000000000A9000-memory.dmp
                Filesize

                100KB

              • memory/1500-137-0x0000000000000000-mapping.dmp
              • memory/1596-81-0x0000000000000000-mapping.dmp
              • memory/1612-125-0x0000000000230000-0x0000000000249000-memory.dmp
                Filesize

                100KB

              • memory/1612-123-0x0000000000230000-0x0000000000249000-memory.dmp
                Filesize

                100KB

              • memory/1612-120-0x0000000000230000-0x0000000000249000-memory.dmp
                Filesize

                100KB

              • memory/1612-107-0x0000000000000000-mapping.dmp
              • memory/1680-124-0x0000000000000000-mapping.dmp
              • memory/1708-85-0x0000000000000000-mapping.dmp
              • memory/1776-126-0x0000000000000000-mapping.dmp
              • memory/1776-133-0x0000000001E30000-0x00000000029C5000-memory.dmp
                Filesize

                11.6MB

              • memory/1776-135-0x0000000001E30000-0x00000000029C5000-memory.dmp
                Filesize

                11.6MB

              • memory/1808-88-0x0000000000000000-mapping.dmp
              • memory/1908-80-0x0000000000000000-mapping.dmp
              • memory/2012-87-0x0000000000000000-mapping.dmp