Analysis

  • max time kernel
    299s
  • max time network
    303s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-08-2023 03:53

General

  • Target

    1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe

  • Size

    7.5MB

  • MD5

    5e46cc22ddf121ab4001ee5ee664d376

  • SHA1

    cd0475812d4a0b2398beea77dd865e514262635d

  • SHA256

    1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6

  • SHA512

    63b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354

  • SSDEEP

    196608:PoCKFCGSiWz3WsiOL95v55+GHncYSxK+TW+sE4m3pk:QCKkeWixOnx5K8WW+0Wu

Malware Config

Extracted

Family

amadey

Version

3.85

C2

45.9.74.166/b7djSDcPcZ/index.php

45.9.74.141/b7djSDcPcZ/index.php

Extracted

Family

systembc

C2

5.42.65.67:4298

localhost.exchange:4298

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Arechclient2 RAT 2 IoCs

    Arechclient2.

  • Detects DLL dropped by Raspberry Robin. 9 IoCs

    Raspberry Robin.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe
    "C:\Users\Admin\AppData\Local\Temp\1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
      "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3152
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:2188
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "Admin:N"&&CACLS "bstyoops.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "Admin:N"&&CACLS "..\c2868ed41c" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:3468
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "bstyoops.exe" /P "Admin:N"
            4⤵
              PID:2492
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "bstyoops.exe" /P "Admin:R" /E
              4⤵
                PID:5108
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:1432
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\c2868ed41c" /P "Admin:N"
                  4⤵
                    PID:3128
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c2868ed41c" /P "Admin:R" /E
                    4⤵
                      PID:1356
                  • C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4084
                  • C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1464
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll, rundll
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:3684
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll, rundll
                      4⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3968
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll, rundll
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:3740
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll, rundll
                      4⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3156
              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:644

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              1
              T1112

              Credential Access

              Unsecured Credentials

              2
              T1552

              Credentials In Files

              2
              T1552.001

              Discovery

              System Information Discovery

              1
              T1082

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe
                Filesize

                2.7MB

                MD5

                d5bddbbbf64a97dc0e98d4db2b675fb3

                SHA1

                aeef4f429b68100f46f4a91000b7d593f0ef1462

                SHA256

                8a6e1479d2efdd7ef244c34512a6a8b9c23df2b86374641a07473e4f00f5b457

                SHA512

                1f451f7ec3d157756687049ec893aff1997cff60797af33c6209782058b2414c8c77976444928c4d3922db5e4126843f8f99729cbf348c78a9f6c78437d121aa

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe
                Filesize

                2.7MB

                MD5

                d5bddbbbf64a97dc0e98d4db2b675fb3

                SHA1

                aeef4f429b68100f46f4a91000b7d593f0ef1462

                SHA256

                8a6e1479d2efdd7ef244c34512a6a8b9c23df2b86374641a07473e4f00f5b457

                SHA512

                1f451f7ec3d157756687049ec893aff1997cff60797af33c6209782058b2414c8c77976444928c4d3922db5e4126843f8f99729cbf348c78a9f6c78437d121aa

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe
                Filesize

                2.7MB

                MD5

                d5bddbbbf64a97dc0e98d4db2b675fb3

                SHA1

                aeef4f429b68100f46f4a91000b7d593f0ef1462

                SHA256

                8a6e1479d2efdd7ef244c34512a6a8b9c23df2b86374641a07473e4f00f5b457

                SHA512

                1f451f7ec3d157756687049ec893aff1997cff60797af33c6209782058b2414c8c77976444928c4d3922db5e4126843f8f99729cbf348c78a9f6c78437d121aa

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe
                Filesize

                2.7MB

                MD5

                d5bddbbbf64a97dc0e98d4db2b675fb3

                SHA1

                aeef4f429b68100f46f4a91000b7d593f0ef1462

                SHA256

                8a6e1479d2efdd7ef244c34512a6a8b9c23df2b86374641a07473e4f00f5b457

                SHA512

                1f451f7ec3d157756687049ec893aff1997cff60797af33c6209782058b2414c8c77976444928c4d3922db5e4126843f8f99729cbf348c78a9f6c78437d121aa

              • C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll
                Filesize

                6.2MB

                MD5

                374d8e8089ecf5f1a161514d1b346432

                SHA1

                cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0

                SHA256

                a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de

                SHA512

                085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c

              • C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll
                Filesize

                6.2MB

                MD5

                374d8e8089ecf5f1a161514d1b346432

                SHA1

                cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0

                SHA256

                a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de

                SHA512

                085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                7.5MB

                MD5

                5e46cc22ddf121ab4001ee5ee664d376

                SHA1

                cd0475812d4a0b2398beea77dd865e514262635d

                SHA256

                1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6

                SHA512

                63b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                7.5MB

                MD5

                5e46cc22ddf121ab4001ee5ee664d376

                SHA1

                cd0475812d4a0b2398beea77dd865e514262635d

                SHA256

                1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6

                SHA512

                63b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                7.5MB

                MD5

                5e46cc22ddf121ab4001ee5ee664d376

                SHA1

                cd0475812d4a0b2398beea77dd865e514262635d

                SHA256

                1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6

                SHA512

                63b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                7.5MB

                MD5

                5e46cc22ddf121ab4001ee5ee664d376

                SHA1

                cd0475812d4a0b2398beea77dd865e514262635d

                SHA256

                1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6

                SHA512

                63b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354

              • \Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll
                Filesize

                6.2MB

                MD5

                374d8e8089ecf5f1a161514d1b346432

                SHA1

                cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0

                SHA256

                a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de

                SHA512

                085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c

              • \Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll
                Filesize

                6.2MB

                MD5

                374d8e8089ecf5f1a161514d1b346432

                SHA1

                cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0

                SHA256

                a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de

                SHA512

                085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c

              • \Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll
                Filesize

                6.2MB

                MD5

                374d8e8089ecf5f1a161514d1b346432

                SHA1

                cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0

                SHA256

                a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de

                SHA512

                085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c

              • \Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll
                Filesize

                6.2MB

                MD5

                374d8e8089ecf5f1a161514d1b346432

                SHA1

                cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0

                SHA256

                a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de

                SHA512

                085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c

              • memory/644-247-0x0000000000E30000-0x0000000001AFE000-memory.dmp
                Filesize

                12.8MB

              • memory/644-241-0x0000000000E20000-0x0000000000E21000-memory.dmp
                Filesize

                4KB

              • memory/644-248-0x0000000001EC0000-0x0000000001EC1000-memory.dmp
                Filesize

                4KB

              • memory/644-252-0x0000000000E30000-0x0000000001AFE000-memory.dmp
                Filesize

                12.8MB

              • memory/644-243-0x0000000001BE0000-0x0000000001BE1000-memory.dmp
                Filesize

                4KB

              • memory/644-244-0x0000000001DA0000-0x0000000001DA1000-memory.dmp
                Filesize

                4KB

              • memory/644-245-0x0000000001DB0000-0x0000000001DB1000-memory.dmp
                Filesize

                4KB

              • memory/644-246-0x0000000000E30000-0x0000000001AFE000-memory.dmp
                Filesize

                12.8MB

              • memory/644-240-0x0000000000E10000-0x0000000000E11000-memory.dmp
                Filesize

                4KB

              • memory/644-242-0x0000000001BD0000-0x0000000001BD1000-memory.dmp
                Filesize

                4KB

              • memory/1464-235-0x0000000006190000-0x00000000061A2000-memory.dmp
                Filesize

                72KB

              • memory/1464-194-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/1464-193-0x0000000000400000-0x0000000000AA0000-memory.dmp
                Filesize

                6.6MB

              • memory/1464-186-0x0000000000400000-0x0000000000AA0000-memory.dmp
                Filesize

                6.6MB

              • memory/1464-182-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/1464-181-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/1464-180-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/1464-176-0x0000000000400000-0x0000000000AA0000-memory.dmp
                Filesize

                6.6MB

              • memory/3152-146-0x0000000000E30000-0x0000000001AFE000-memory.dmp
                Filesize

                12.8MB

              • memory/3152-164-0x0000000000E30000-0x0000000001AFE000-memory.dmp
                Filesize

                12.8MB

              • memory/3152-140-0x0000000000E30000-0x0000000001AFE000-memory.dmp
                Filesize

                12.8MB

              • memory/3152-139-0x0000000002350000-0x0000000002351000-memory.dmp
                Filesize

                4KB

              • memory/3152-142-0x0000000003C40000-0x0000000003C41000-memory.dmp
                Filesize

                4KB

              • memory/3152-141-0x0000000002360000-0x0000000002361000-memory.dmp
                Filesize

                4KB

              • memory/3152-170-0x0000000000E30000-0x0000000001AFE000-memory.dmp
                Filesize

                12.8MB

              • memory/3152-138-0x0000000002340000-0x0000000002341000-memory.dmp
                Filesize

                4KB

              • memory/3152-143-0x0000000003C50000-0x0000000003C51000-memory.dmp
                Filesize

                4KB

              • memory/3152-144-0x0000000003C60000-0x0000000003C61000-memory.dmp
                Filesize

                4KB

              • memory/3152-145-0x0000000003C70000-0x0000000003C71000-memory.dmp
                Filesize

                4KB

              • memory/3156-229-0x00007FFD62700000-0x00007FFD63189000-memory.dmp
                Filesize

                10.5MB

              • memory/3156-224-0x00007FFD62700000-0x00007FFD63189000-memory.dmp
                Filesize

                10.5MB

              • memory/3968-211-0x00007FFD62700000-0x00007FFD63189000-memory.dmp
                Filesize

                10.5MB

              • memory/3968-212-0x00007FFD7E560000-0x00007FFD7E562000-memory.dmp
                Filesize

                8KB

              • memory/3968-218-0x00007FFD7B740000-0x00007FFD7B742000-memory.dmp
                Filesize

                8KB

              • memory/3968-217-0x00007FFD7B730000-0x00007FFD7B732000-memory.dmp
                Filesize

                8KB

              • memory/3968-216-0x00007FFD7C630000-0x00007FFD7C632000-memory.dmp
                Filesize

                8KB

              • memory/3968-215-0x00007FFD7C620000-0x00007FFD7C622000-memory.dmp
                Filesize

                8KB

              • memory/3968-214-0x00007FFD62700000-0x00007FFD63189000-memory.dmp
                Filesize

                10.5MB

              • memory/3968-210-0x00007FFD7E550000-0x00007FFD7E552000-memory.dmp
                Filesize

                8KB

              • memory/3968-213-0x00007FFD7E570000-0x00007FFD7E572000-memory.dmp
                Filesize

                8KB

              • memory/4084-183-0x0000000005F20000-0x0000000005F4E000-memory.dmp
                Filesize

                184KB

              • memory/4084-177-0x0000000005740000-0x00000000057B6000-memory.dmp
                Filesize

                472KB

              • memory/4084-166-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/4084-173-0x00000000054D0000-0x0000000005562000-memory.dmp
                Filesize

                584KB

              • memory/4084-174-0x0000000005570000-0x0000000005732000-memory.dmp
                Filesize

                1.8MB

              • memory/4084-184-0x0000000005F50000-0x0000000005F88000-memory.dmp
                Filesize

                224KB

              • memory/4084-167-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/4084-165-0x0000000000400000-0x0000000000AA0000-memory.dmp
                Filesize

                6.6MB

              • memory/4084-191-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/4084-190-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/4084-189-0x0000000000400000-0x0000000000AA0000-memory.dmp
                Filesize

                6.6MB

              • memory/4084-188-0x0000000006A10000-0x0000000006A2E000-memory.dmp
                Filesize

                120KB

              • memory/4084-168-0x0000000074410000-0x00000000745D2000-memory.dmp
                Filesize

                1.8MB

              • memory/4084-179-0x0000000005810000-0x0000000005876000-memory.dmp
                Filesize

                408KB

              • memory/4084-178-0x00000000057C0000-0x0000000005810000-memory.dmp
                Filesize

                320KB

              • memory/4084-187-0x00000000063E0000-0x000000000690C000-memory.dmp
                Filesize

                5.2MB

              • memory/4084-171-0x0000000000400000-0x0000000000AA0000-memory.dmp
                Filesize

                6.6MB

              • memory/4084-236-0x0000000006030000-0x000000000606E000-memory.dmp
                Filesize

                248KB

              • memory/4084-172-0x0000000004FD0000-0x00000000054CE000-memory.dmp
                Filesize

                5.0MB

              • memory/4660-119-0x0000000001540000-0x0000000001541000-memory.dmp
                Filesize

                4KB

              • memory/4660-137-0x00000000003F0000-0x00000000010BE000-memory.dmp
                Filesize

                12.8MB

              • memory/4660-126-0x0000000001980000-0x0000000001981000-memory.dmp
                Filesize

                4KB

              • memory/4660-125-0x0000000001970000-0x0000000001971000-memory.dmp
                Filesize

                4KB

              • memory/4660-124-0x0000000001960000-0x0000000001961000-memory.dmp
                Filesize

                4KB

              • memory/4660-123-0x00000000003F0000-0x00000000010BE000-memory.dmp
                Filesize

                12.8MB

              • memory/4660-122-0x0000000001560000-0x0000000001561000-memory.dmp
                Filesize

                4KB

              • memory/4660-121-0x0000000001550000-0x0000000001551000-memory.dmp
                Filesize

                4KB

              • memory/4660-118-0x00000000011F0000-0x00000000011F1000-memory.dmp
                Filesize

                4KB

              • memory/4660-120-0x00000000003F0000-0x00000000010BE000-memory.dmp
                Filesize

                12.8MB