Analysis

  • max time kernel
    293s
  • max time network
    298s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-03-2024 22:44

General

  • Target

    bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b.exe

  • Size

    1.9MB

  • MD5

    96963bcaed78a2050dadcfd692889089

  • SHA1

    c3a8f2aa6d4731d152ee7bbd3fce85be1658b2c3

  • SHA256

    bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b

  • SHA512

    1ec9f4baa59e03ccf2c92ab6568b061e1d6af0c9b91433fb71017d1de5da52d1d774ebf7263f77d955bd526ff52394f22c732d38912424df7c5d607d8f49169c

  • SSDEEP

    49152:0L/Xewfrl1sLubHESwnVnqTsn0koWi8DM:k/Xlj7sLoHESwnlqwnvoWnM

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b.exe
    "C:\Users\Admin\AppData\Local\Temp\bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4676
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:936
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\281913400149_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:708
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:60
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2568
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4244
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:5116
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2352
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

      Filesize

      720KB

      MD5

      f4c334706f8cf58aebf5572bc65c4e7b

      SHA1

      1c088506b765d19dc14a5af39d480ee2fcc8b14b

      SHA256

      e6899cbb01cb62eb840dc2391754f10b6fb2149977defcdf6430d6aa1ca39ab3

      SHA512

      b4cb46e2053f0277587f3e7d74aaf7d7ad53852ea28d9c68d07c9ea5efa25dff91deb80e529fc24d2a694c8c0959a71bd9f4c1d26b5c574a21a6f77dad0ad1f5

    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

      Filesize

      1.9MB

      MD5

      96963bcaed78a2050dadcfd692889089

      SHA1

      c3a8f2aa6d4731d152ee7bbd3fce85be1658b2c3

      SHA256

      bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b

      SHA512

      1ec9f4baa59e03ccf2c92ab6568b061e1d6af0c9b91433fb71017d1de5da52d1d774ebf7263f77d955bd526ff52394f22c732d38912424df7c5d607d8f49169c

    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

      Filesize

      1.2MB

      MD5

      d815eeec9055e18860cd05f98ebf11f5

      SHA1

      1946ebac966bb27b4094c5de9a52c29078b1fecd

      SHA256

      0905c58c1ae1341631c75cc19f4f81547b4934e1b5e5704e81df61e4afe5f66e

      SHA512

      47580b89523a6ea900dba5055ad4c2dafb7d7934953cb6309b16cbb45810801dccd1297bd97a0cc6260d24affbe8e70538ed99d4f3e7ab7348ad516a44ce80bc

    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

      Filesize

      1.5MB

      MD5

      9f89e68a6225083c2c0f03cddd21f9d8

      SHA1

      a4a54f6f10d28975de54d421cdcd847a46e99183

      SHA256

      00ec92bb25f5af262dde8b02adfed9fb2e09612941fa64188e785ef4c288331c

      SHA512

      f0050998be4fe2212a02156df78830b03d1d57f8d0a897f5c0b545f41a3483a01fa99257da83027dfc3a6f5819b3ffd19b9c04a88360adde090b0bf031812de5

    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

      Filesize

      1.4MB

      MD5

      917abd4817d3016b434494e305232f2d

      SHA1

      80b514cd10f8af8a841edd7a6a4a278d6f2d478a

      SHA256

      7459329fa48d2b74f36d21cd7ec75ac24c447248a125364bf07a5d0e382f2725

      SHA512

      0c0e12bb27698bedc1f839b4b47daec3e9b85fc47e983ff62728aa8e30cdc45ceb65963011278f12540fa34846898bc97dab4e3f9264fd7c79587a2a92205a83

    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

      Filesize

      1.4MB

      MD5

      d9e921b3a5c0a72c4e766b7c95f56ea4

      SHA1

      5a2050ce9790c7c360547fd148a9998ad0c2a530

      SHA256

      6b22bbf383a5bbe12cc44ec2f82fbeabb5065eaba0bc1bc99103e93cafbcb7c7

      SHA512

      3ac2d946fe1db69a655ca96a8d5418e9efcefe553e6741e5768de843aee804b37a0fb9989d34a3038c553767e534cf8e7158baa3907fa5f015f421fd3cabdbf6

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h4bp2kbg.eku.ps1

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

      Filesize

      765KB

      MD5

      94f6a879e0a45b50ddffe9bfb9bc3588

      SHA1

      dc6ff71e23f957dbf69ff61535cb24b382262a1a

      SHA256

      41d1a307a268d10de6c8ffec0533eabd21737e236d5f54d890941dda419c277a

      SHA512

      c69709f98f2b00781ece6d4bbd634baec68f6d0069415287c60b4757f75d85a6d2a3c946d8a461dc25bf83657b9624c69d8b19c63c59a233bfa7583f95c8e967

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

      Filesize

      371KB

      MD5

      343d873c9aa8bd1c24ddd5d355854341

      SHA1

      fdd510f2046912c2236ea6cfeb84991af323ce37

      SHA256

      3de24091639f893ff630a44d4ee492de8ff1a8fc32a3bcd4893bc9fba9e11690

      SHA512

      b54cfdf7da69b07746ad6a5043c019b67cabeb68cf4165b336466355963cb27f088308e2e275f75f5860ebc6c080f48cf9578da0a9f5293a46201738bcc66092

    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      109KB

      MD5

      726cd06231883a159ec1ce28dd538699

      SHA1

      404897e6a133d255ad5a9c26ac6414d7134285a2

      SHA256

      12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

      SHA512

      9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

      Filesize

      324KB

      MD5

      d36f7da0ac06856fea49ff8328e7298b

      SHA1

      4e4113c4b260ad3c17eb3714bca3c5f68093f020

      SHA256

      5b15b26c952cdd32213ffa9201db7e191fed90d31a2139a17ee3dd19d51525d5

      SHA512

      fa5306d433181e1aaa318de1f4711eb4f34e96e2267f743ad695448999f7fb78539b2e1b0df423f1e9c2bf6a71e45f4a668799d263a3fc65728e8088324e06ac

    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

      Filesize

      267KB

      MD5

      82bbe31f5c290069d2d9af8031ed0fca

      SHA1

      6121bcc40ec96150949d714523a52a950e7f6f82

      SHA256

      fefdb1ad0ba755b716c5dd1ac92c269a8b2cbb0b1a3dca489b5260b5f8081c18

      SHA512

      6124acb7b30543cea4a5d13ffa1cb973d85656d083e2b59bcc9d7f7011fc4c5c7711c0918899957d3b4cbd009523172d009ce7dd26a8c8329cb71c525a0abfb4

    • memory/308-11-0x00000000051F0000-0x00000000051F1000-memory.dmp

      Filesize

      4KB

    • memory/308-5-0x00000000051D0000-0x00000000051D1000-memory.dmp

      Filesize

      4KB

    • memory/308-18-0x0000000000810000-0x0000000000CE3000-memory.dmp

      Filesize

      4.8MB

    • memory/308-10-0x0000000005200000-0x0000000005201000-memory.dmp

      Filesize

      4KB

    • memory/308-1-0x0000000077C34000-0x0000000077C35000-memory.dmp

      Filesize

      4KB

    • memory/308-8-0x0000000005180000-0x0000000005181000-memory.dmp

      Filesize

      4KB

    • memory/308-7-0x0000000005190000-0x0000000005191000-memory.dmp

      Filesize

      4KB

    • memory/308-6-0x0000000005170000-0x0000000005171000-memory.dmp

      Filesize

      4KB

    • memory/308-2-0x0000000000810000-0x0000000000CE3000-memory.dmp

      Filesize

      4.8MB

    • memory/308-3-0x00000000051B0000-0x00000000051B1000-memory.dmp

      Filesize

      4KB

    • memory/308-0-0x0000000000810000-0x0000000000CE3000-memory.dmp

      Filesize

      4.8MB

    • memory/308-4-0x00000000051A0000-0x00000000051A1000-memory.dmp

      Filesize

      4KB

    • memory/708-103-0x000001BAF7860000-0x000001BAF786A000-memory.dmp

      Filesize

      40KB

    • memory/708-49-0x00007FFDD3EA0000-0x00007FFDD488C000-memory.dmp

      Filesize

      9.9MB

    • memory/708-90-0x000001BAF7A00000-0x000001BAF7A12000-memory.dmp

      Filesize

      72KB

    • memory/708-51-0x000001BADF200000-0x000001BADF210000-memory.dmp

      Filesize

      64KB

    • memory/708-112-0x00007FFDD3EA0000-0x00007FFDD488C000-memory.dmp

      Filesize

      9.9MB

    • memory/708-55-0x000001BAF7A20000-0x000001BAF7A96000-memory.dmp

      Filesize

      472KB

    • memory/708-76-0x000001BADF200000-0x000001BADF210000-memory.dmp

      Filesize

      64KB

    • memory/708-53-0x000001BADF200000-0x000001BADF210000-memory.dmp

      Filesize

      64KB

    • memory/708-48-0x000001BAF7870000-0x000001BAF7892000-memory.dmp

      Filesize

      136KB

    • memory/2352-179-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/2352-187-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/2352-180-0x00000000050A0000-0x00000000050A1000-memory.dmp

      Filesize

      4KB

    • memory/2352-181-0x00000000050B0000-0x00000000050B1000-memory.dmp

      Filesize

      4KB

    • memory/2352-178-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/2568-130-0x00000000057C0000-0x00000000057C1000-memory.dmp

      Filesize

      4KB

    • memory/2568-135-0x00000000057F0000-0x00000000057F1000-memory.dmp

      Filesize

      4KB

    • memory/2568-136-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/2568-128-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/2568-129-0x00000000057D0000-0x00000000057D1000-memory.dmp

      Filesize

      4KB

    • memory/2568-131-0x0000000005800000-0x0000000005801000-memory.dmp

      Filesize

      4KB

    • memory/2568-132-0x0000000005790000-0x0000000005791000-memory.dmp

      Filesize

      4KB

    • memory/2568-133-0x00000000057B0000-0x00000000057B1000-memory.dmp

      Filesize

      4KB

    • memory/2568-134-0x00000000057A0000-0x00000000057A1000-memory.dmp

      Filesize

      4KB

    • memory/2568-127-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4208-203-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4244-148-0x0000000004FB0000-0x0000000004FB1000-memory.dmp

      Filesize

      4KB

    • memory/4244-151-0x0000000004F60000-0x0000000004F61000-memory.dmp

      Filesize

      4KB

    • memory/4244-150-0x0000000004F70000-0x0000000004F71000-memory.dmp

      Filesize

      4KB

    • memory/4244-149-0x0000000004F50000-0x0000000004F51000-memory.dmp

      Filesize

      4KB

    • memory/4244-144-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4244-152-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

      Filesize

      4KB

    • memory/4244-147-0x0000000004F90000-0x0000000004F91000-memory.dmp

      Filesize

      4KB

    • memory/4244-146-0x0000000004F80000-0x0000000004F81000-memory.dmp

      Filesize

      4KB

    • memory/4244-153-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4244-145-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-154-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-175-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-140-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-141-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-142-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-23-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

      Filesize

      4KB

    • memory/4484-138-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-137-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-22-0x0000000001960000-0x0000000001961000-memory.dmp

      Filesize

      4KB

    • memory/4484-21-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-125-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-124-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-30-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

      Filesize

      4KB

    • memory/4484-113-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-29-0x0000000004F00000-0x0000000004F01000-memory.dmp

      Filesize

      4KB

    • memory/4484-31-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-54-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-155-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-156-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-157-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-158-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-159-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-24-0x0000000001950000-0x0000000001951000-memory.dmp

      Filesize

      4KB

    • memory/4484-204-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-46-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-193-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-192-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-191-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-190-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-189-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-188-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-20-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-28-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

      Filesize

      4KB

    • memory/4484-171-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-172-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-173-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-174-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-139-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-176-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/4484-25-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

      Filesize

      4KB

    • memory/4484-26-0x00000000015F0000-0x00000000015F1000-memory.dmp

      Filesize

      4KB

    • memory/4484-27-0x0000000001940000-0x0000000001941000-memory.dmp

      Filesize

      4KB

    • memory/5116-170-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/5116-162-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB

    • memory/5116-163-0x0000000005610000-0x0000000005611000-memory.dmp

      Filesize

      4KB

    • memory/5116-164-0x0000000005620000-0x0000000005621000-memory.dmp

      Filesize

      4KB

    • memory/5116-165-0x0000000005600000-0x0000000005601000-memory.dmp

      Filesize

      4KB

    • memory/5116-166-0x0000000005640000-0x0000000005641000-memory.dmp

      Filesize

      4KB

    • memory/5116-167-0x00000000055E0000-0x00000000055E1000-memory.dmp

      Filesize

      4KB

    • memory/5116-168-0x00000000055F0000-0x00000000055F1000-memory.dmp

      Filesize

      4KB

    • memory/5116-169-0x0000000005630000-0x0000000005631000-memory.dmp

      Filesize

      4KB

    • memory/5116-161-0x0000000001100000-0x00000000015D3000-memory.dmp

      Filesize

      4.8MB