Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 01:00

General

  • Target

    1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe

  • Size

    1.8MB

  • MD5

    08d46090c22ff00bd53e843027e0dc26

  • SHA1

    ec4d86baa8a294a18daf44fcb61eca03c3116c23

  • SHA256

    1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215

  • SHA512

    c9d9214076bd90886b52713287c771264f2a46a76d93b42c6a208bc95e0f5d58a4d41dafe7feadf114f27c1cd430fd90c571e5a30f078c1b9459a8212224b0ed

  • SSDEEP

    24576:z2BoyWmAgwI0L6ul/urTQzxYtarKUKkpOb0A93R8S9D5pbgFqAKzeleH4W+:z2OFe0L6ugiKhxs6pqqAKzCeH

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 34 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe
    "C:\Users\Admin\AppData\Local\Temp\1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe
        "C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2436
      • C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe
        "C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 656
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:3260
      • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe
        "C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Windows\system32\attrib.exe
          attrib +H +S C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
          4⤵
          • Views/modifies file attributes
          PID:3436
        • C:\Windows\system32\attrib.exe
          attrib +H C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
          4⤵
          • Views/modifies file attributes
          PID:3452
        • C:\Windows\system32\schtasks.exe
          schtasks /f /CREATE /TN "MicrosoftEdgeUpdateTaskMachineCoreSC" /TR "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe" /SC MINUTE
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3504
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell ping 127.0.0.1; del DU1zDwm.exe
          4⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3520
          • C:\Windows\system32\PING.EXE
            "C:\Windows\system32\PING.EXE" 127.0.0.1
            5⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3828
      • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe
        "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Windows\system32\cmd.exe
          "cmd" /c wmic path win32_videocontroller get caption
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic path win32_videocontroller get caption
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1972
        • C:\Windows\system32\dxdiag.exe
          "dxdiag" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:652
          • C:\Windows\SysWOW64\dxdiag.exe
            "C:\Windows\SysWOW64\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt
            5⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1108
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3944 -s 1564
          4⤵
            PID:2656
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {D48DFA9B-9C46-4231-9ED9-57E051367DB5} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
      1⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
        C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1884
        • C:\Windows\explorer.exe
          explorer.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1676
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
          3⤵
          • Drops file in System32 directory
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2324
          • C:\Windows\system32\PING.EXE
            "C:\Windows\system32\PING.EXE" 127.1.0.1
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2224
      • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
        C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        PID:1588
        • C:\Windows\explorer.exe
          explorer.exe
          3⤵
            PID:2788
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
            3⤵
            • Drops file in System32 directory
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2616
            • C:\Windows\system32\PING.EXE
              "C:\Windows\system32\PING.EXE" 127.1.0.1
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3296

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe

        Filesize

        217KB

        MD5

        98da391545b4823ca67e6cc3a927dae9

        SHA1

        d2f66837884d6d65dfe21372501cc7ba1d91ef29

        SHA256

        12862b60140f019b0c251da7be59caf90d93eca6a30d016609cf2ff1da4652a7

        SHA512

        59130547c169768310d57c075f2cec01a71704e9658955ef8eb1c6b2c30a24a801623f189eac14a84357aa597f5d5c96c5c9f8e96ee4ddf7bcf911dcf6bcb7b9

      • C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe

        Filesize

        1.5MB

        MD5

        03933b44701e2688a19b6fe5980526b7

        SHA1

        456f586dffa20cc847b3a1f86c2fc958e9cea325

        SHA256

        04510f9d11f433e48517273b05f3f800d73c16bca0b2b4a9afdaf3612550239e

        SHA512

        bb1e6d2e1ffc8ab728295ac07512db3f6a08e0c7f9ec70e65ec75591bb9f697781d0df2096d7f9fc9a4b60b62d427acef46bd9105d713a84f91d33db3bec5d96

      • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe

        Filesize

        2.2MB

        MD5

        4c64aec6c5d6a5c50d80decb119b3c78

        SHA1

        bc97a13e661537be68863667480829e12187a1d7

        SHA256

        75c7692c0f989e63e14c27b4fb7d25f93760068a4ca4e90fa636715432915253

        SHA512

        9054e3c8306999fe851b563a826ca7a87c4ba78c900cd3b445f436e8406f581e5c3437971a1f1dea3f5132c16a1b36c2dd09f2c97800d28e7157bd7dc3ac3e76

      • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe

        Filesize

        560KB

        MD5

        197feb829312be2d9505c1492b6ddd16

        SHA1

        4e521c36e4fd6c7755d93f8281cc028a980b0979

        SHA256

        2a08227ca39953cd8f967682f4f101f8debdc323b63b37aa1e9ddc38b9009a12

        SHA512

        fa9b18fb32f2892a4844fcf3d29823c1375daca8b3c46ce2dd048e3b11ff2ba2acf6ef73c38e57d16712e75304c8961cf7f2dee4213dc10798f645f9d59c8cb9

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        21a0359997ca8c8d2cb877bc2447a614

        SHA1

        ef21f77aeebbe49a3b06ea5b62814c08843559b2

        SHA256

        7080e62202f8b9306b3802cfe9e9a979fd0efaf055ca772baa39b58e8262fbf3

        SHA512

        0343a1efc6456e71a1d7a6fd1d1389b3e81faa445e438fbbcf81e3996b2bdde1a281180301d5333c6afc789eab0544f2fad34ec9b18a70a13d1912507fb9e2dc

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q01SFL7RS6FIPBIZJCIW.temp

        Filesize

        7KB

        MD5

        daa7cca280739dadf8e3ca4ff01abb65

        SHA1

        36b0593ca95894e1299b213b55fb7f97be2bc676

        SHA256

        c36a11a53d271e277d7134e7d07702ebb3c430ec6ca4e610264b3d00f164babd

        SHA512

        87d15e80d7e0615cabdddba3e879d1f61f9c175c66df621ec48b3be746960925b50ff066a2c50a8ede62a3931d17496929e96770d789c0a9089a000875c383f8

      • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

        Filesize

        1.8MB

        MD5

        08d46090c22ff00bd53e843027e0dc26

        SHA1

        ec4d86baa8a294a18daf44fcb61eca03c3116c23

        SHA256

        1ceab2ffb1eeba5856886c108f56de4f25bb0e15b7ff84d75cae17197f3f2215

        SHA512

        c9d9214076bd90886b52713287c771264f2a46a76d93b42c6a208bc95e0f5d58a4d41dafe7feadf114f27c1cd430fd90c571e5a30f078c1b9459a8212224b0ed

      • \Users\Admin\AppData\Roaming\gdi32.dll

        Filesize

        126KB

        MD5

        b48e172f02c22894ad766c52303f087a

        SHA1

        61da0ff26dfc3759f7cd79696430b52f85073141

        SHA256

        712e46f7a4f9da7fabd0b1acd5e848527bd70b6c4444dc92c8479ac108d71753

        SHA512

        5b8a888a9d87a4ee34f57799d3d6baf69cd556a2d1336afb109adc488a5efa1c7cd094c3785cf9af726a0c41be3a56a0ffac933b7fa7fb5dec9643f3af08bdfd

      • memory/1108-1314-0x00000000024D0000-0x00000000024FA000-memory.dmp

        Filesize

        168KB

      • memory/1108-1308-0x00000000029B0000-0x0000000002A0C000-memory.dmp

        Filesize

        368KB

      • memory/1108-1311-0x00000000024D0000-0x00000000024FA000-memory.dmp

        Filesize

        168KB

      • memory/1108-1312-0x00000000004C0000-0x00000000004CA000-memory.dmp

        Filesize

        40KB

      • memory/1108-1294-0x00000000004C0000-0x00000000004CA000-memory.dmp

        Filesize

        40KB

      • memory/1108-1293-0x00000000004C0000-0x00000000004CA000-memory.dmp

        Filesize

        40KB

      • memory/1108-1306-0x00000000008E0000-0x00000000008EA000-memory.dmp

        Filesize

        40KB

      • memory/1108-1305-0x00000000008E0000-0x00000000008EA000-memory.dmp

        Filesize

        40KB

      • memory/1108-1307-0x00000000029B0000-0x0000000002A0C000-memory.dmp

        Filesize

        368KB

      • memory/1108-1310-0x00000000004C0000-0x00000000004CA000-memory.dmp

        Filesize

        40KB

      • memory/1108-1309-0x00000000029B0000-0x0000000002A0C000-memory.dmp

        Filesize

        368KB

      • memory/1740-17-0x0000000001130000-0x00000000015D3000-memory.dmp

        Filesize

        4.6MB

      • memory/1740-3-0x0000000001130000-0x00000000015D3000-memory.dmp

        Filesize

        4.6MB

      • memory/1740-2-0x0000000001131000-0x000000000115F000-memory.dmp

        Filesize

        184KB

      • memory/1740-1-0x0000000077980000-0x0000000077982000-memory.dmp

        Filesize

        8KB

      • memory/1740-0-0x0000000001130000-0x00000000015D3000-memory.dmp

        Filesize

        4.6MB

      • memory/1740-18-0x0000000006870000-0x0000000006D13000-memory.dmp

        Filesize

        4.6MB

      • memory/1740-4-0x0000000001130000-0x00000000015D3000-memory.dmp

        Filesize

        4.6MB

      • memory/2324-1334-0x000000001B620000-0x000000001B902000-memory.dmp

        Filesize

        2.9MB

      • memory/2324-1335-0x0000000002710000-0x0000000002718000-memory.dmp

        Filesize

        32KB

      • memory/2436-42-0x0000000000550000-0x0000000000556000-memory.dmp

        Filesize

        24KB

      • memory/2436-41-0x0000000000DE0000-0x0000000000E20000-memory.dmp

        Filesize

        256KB

      • memory/2616-1367-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

        Filesize

        32KB

      • memory/2616-1366-0x000000001B5B0000-0x000000001B892000-memory.dmp

        Filesize

        2.9MB

      • memory/2892-48-0x0000000000BA0000-0x0000000001043000-memory.dmp

        Filesize

        4.6MB

      • memory/2892-47-0x0000000000BA0000-0x0000000001043000-memory.dmp

        Filesize

        4.6MB

      • memory/2892-26-0x0000000000BA0000-0x0000000001043000-memory.dmp

        Filesize

        4.6MB

      • memory/2892-24-0x0000000000BA0000-0x0000000001043000-memory.dmp

        Filesize

        4.6MB

      • memory/2892-21-0x0000000000BA1000-0x0000000000BCF000-memory.dmp

        Filesize

        184KB

      • memory/2892-22-0x0000000000BA0000-0x0000000001043000-memory.dmp

        Filesize

        4.6MB

      • memory/2892-23-0x0000000000BA0000-0x0000000001043000-memory.dmp

        Filesize

        4.6MB

      • memory/2892-20-0x0000000000BA0000-0x0000000001043000-memory.dmp

        Filesize

        4.6MB

      • memory/3020-92-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-114-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-90-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-86-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-82-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-80-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-78-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-76-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-72-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-70-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-68-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-66-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-74-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-65-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-1241-0x0000000005300000-0x00000000053B6000-memory.dmp

        Filesize

        728KB

      • memory/3020-1242-0x0000000004880000-0x00000000048CC000-memory.dmp

        Filesize

        304KB

      • memory/3020-1243-0x00000000048D0000-0x0000000004924000-memory.dmp

        Filesize

        336KB

      • memory/3020-96-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-63-0x00000000001F0000-0x000000000037C000-memory.dmp

        Filesize

        1.5MB

      • memory/3020-64-0x0000000004D10000-0x0000000004E54000-memory.dmp

        Filesize

        1.3MB

      • memory/3020-98-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-84-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-88-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-122-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-126-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-124-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-120-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-100-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-102-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-104-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-106-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-108-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-110-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-112-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-94-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-116-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3020-118-0x0000000004D10000-0x0000000004E4F000-memory.dmp

        Filesize

        1.2MB

      • memory/3520-1272-0x0000000002000000-0x0000000002008000-memory.dmp

        Filesize

        32KB

      • memory/3520-1271-0x000000001B630000-0x000000001B912000-memory.dmp

        Filesize

        2.9MB

      • memory/3944-1291-0x0000000000580000-0x000000000059E000-memory.dmp

        Filesize

        120KB

      • memory/3944-1290-0x0000000000570000-0x0000000000578000-memory.dmp

        Filesize

        32KB

      • memory/3944-1289-0x00000000002B0000-0x00000000002BA000-memory.dmp

        Filesize

        40KB

      • memory/3944-1288-0x0000000000270000-0x0000000000296000-memory.dmp

        Filesize

        152KB

      • memory/3944-1287-0x00000000004D0000-0x0000000000570000-memory.dmp

        Filesize

        640KB

      • memory/3944-1286-0x0000000000B60000-0x0000000000BF2000-memory.dmp

        Filesize

        584KB