Analysis

  • max time kernel
    16s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 20:31

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    53f24086dc5ae9e8e778e4b6fe6dacac

  • SHA1

    86743fc7837b42371aad3aa62660b5351253c53b

  • SHA256

    53d4b7a917d975149ee9a757ccbb944e5a7f40814b07108358495bef54e1371d

  • SHA512

    42f3b01c4f039995837e2157caf6bada0bb32ecea9ecdc48a92f30b181e741ccd91f1a1de5538f34e3fceb3f13e72b40a6984d513fd421bb1e6dd7561d6ba0cf

  • SSDEEP

    24576:CtGHLU9QqvWZRjmY3N/KQWteLFYxEOw/kMcv8QfMIOXMPKaDafM/Z1aVrQRsAtFQ:CtGg9QbRqK52ehsMc5BLVAvQF

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe
        "C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5468
      • C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe
        "C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3096
        • C:\Windows\system32\reg.exe
          reg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /s
          4⤵
          • Modifies registry key
          PID:5240
        • C:\Windows\system32\reg.exe
          reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Microsoft Windows Service 7953" /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe\" /f
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:6068
        • C:\Windows\system32\reg.exe
          reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v "Microsoft Windows Service 7953" /t REG_BINARY /d 020000000000000000000000 /f
          4⤵
          • Modifies registry key
          PID:4584
        • C:\Windows\system32\reg.exe
          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunNotification /v "StartupTNotiMicrosoft Windows Service 7953" /t REG_DWORD /d 1 /f
          4⤵
          • Modifies registry key
          PID:5524
      • C:\Users\Admin\AppData\Local\Temp\10343440101\5d68e248e9.exe
        "C:\Users\Admin\AppData\Local\Temp\10343440101\5d68e248e9.exe"
        3⤵
          PID:780
          • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
            "C:\Users\Admin\AppData\Local\Temp\10343440101\5d68e248e9.exe"
            4⤵
              PID:2280
          • C:\Users\Admin\AppData\Local\Temp\10343450101\d2c5a227a8.exe
            "C:\Users\Admin\AppData\Local\Temp\10343450101\d2c5a227a8.exe"
            3⤵
              PID:2512
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                "C:\Users\Admin\AppData\Local\Temp\10343450101\d2c5a227a8.exe"
                4⤵
                  PID:1708
              • C:\Users\Admin\AppData\Local\Temp\10343460101\kZZeUXM.exe
                "C:\Users\Admin\AppData\Local\Temp\10343460101\kZZeUXM.exe"
                3⤵
                  PID:3724
                  • C:\Windows\system32\reg.exe
                    reg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /s
                    4⤵
                    • Modifies registry key
                    PID:1888
                  • C:\Windows\system32\reg.exe
                    reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Microsoft Windows Service 7708" /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\10343460101\kZZeUXM.exe\" /f
                    4⤵
                    • Modifies registry key
                    PID:1272
                  • C:\Windows\system32\reg.exe
                    reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v "Microsoft Windows Service 7708" /t REG_BINARY /d 020000000000000000000000 /f
                    4⤵
                    • Modifies registry key
                    PID:4572
                  • C:\Windows\system32\reg.exe
                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunNotification /v "StartupTNotiMicrosoft Windows Service 7708" /t REG_DWORD /d 1 /f
                    4⤵
                    • Modifies registry key
                    PID:440
                • C:\Users\Admin\AppData\Local\Temp\10343470101\kDveTWY.exe
                  "C:\Users\Admin\AppData\Local\Temp\10343470101\kDveTWY.exe"
                  3⤵
                    PID:2484
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      4⤵
                        PID:3744
                    • C:\Users\Admin\AppData\Local\Temp\10343480101\0e3f788b09.exe
                      "C:\Users\Admin\AppData\Local\Temp\10343480101\0e3f788b09.exe"
                      3⤵
                        PID:532
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          4⤵
                            PID:4252
                        • C:\Users\Admin\AppData\Local\Temp\10343490101\dBSGwVB.exe
                          "C:\Users\Admin\AppData\Local\Temp\10343490101\dBSGwVB.exe"
                          3⤵
                            PID:1220
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                              4⤵
                                PID:4508
                                • C:\Windows\SysWOW64\reg.exe
                                  REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                  5⤵
                                    PID:5960
                                  • C:\Users\Public\Netstat\bild.exe
                                    C:\Users\Public\Netstat\bild.exe
                                    5⤵
                                      PID:3896
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:1560
                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                1⤵
                                  PID:3024
                                • C:\Users\Admin\AppData\Local\Temp\random.exe
                                  "C:\Users\Admin\AppData\Local\Temp\random.exe"
                                  1⤵
                                    PID:3496
                                  • C:\Users\Admin\AppData\Local\Temp\random.exe
                                    "C:\Users\Admin\AppData\Local\Temp\random.exe"
                                    1⤵
                                      PID:3256

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FLLW6ZK9\service[1].htm

                                      Filesize

                                      1B

                                      MD5

                                      cfcd208495d565ef66e7dff9f98764da

                                      SHA1

                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                      SHA256

                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                      SHA512

                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                    • C:\Users\Admin\AppData\Local\Temp\10343250101\oalJJxv.exe

                                      Filesize

                                      9.8MB

                                      MD5

                                      9a2147c4532f7fa643ab5792e3fe3d5c

                                      SHA1

                                      80244247bc0bc46884054db9c8ddbc6dee99b529

                                      SHA256

                                      3e8b13abf977519f8aa7ced613234a39ee1a39e07a2915c60c09713677ecdeba

                                      SHA512

                                      c4513062787175cc942cdb0324c1465957bf4d2c48d68a4896daeb427b936ae8d9c78b88f67c456566e8fc32787b1d8b92b3521f7e47e2e90b3f9e10d8498aba

                                    • C:\Users\Admin\AppData\Local\Temp\10343420101\kZZeUXM.exe

                                      Filesize

                                      6.4MB

                                      MD5

                                      b5871f405d4fc3d7d7f149d47c3c55c6

                                      SHA1

                                      38fdc1e1fcf581764cf23f34e6c6fee7be3228b2

                                      SHA256

                                      87a0413f69cc75e47c0720c3af3ab522d2965df2e945bc6f9da03912b2dfd46b

                                      SHA512

                                      a6daba1d5b493ed661775a7a9c9cf0266150ee3365cc36ecd1bfca85fb621f6b5744f35dbfbc6f47d870355033334556363f9a8e20772d7f71c12cd07d83c789

                                    • C:\Users\Admin\AppData\Local\Temp\10343440101\5d68e248e9.exe

                                      Filesize

                                      4.5MB

                                      MD5

                                      dc8a79bc78a1a0600ec101211275eccc

                                      SHA1

                                      8c97e296cc941be66560109ae7847b6ffd68fd36

                                      SHA256

                                      218a7666ce28ca053e21388489d95339ed59f9cf4662be9f3514668439e2032d

                                      SHA512

                                      46bb5a185ea7507376483012ab69960fae952215393ae2411b58e6a2e7a91da52dd4a1ee70e53ea052fef2e56a5d2e68ef89a6598db209e6939325ef3cb58ee7

                                    • C:\Users\Admin\AppData\Local\Temp\10343450101\d2c5a227a8.exe

                                      Filesize

                                      4.3MB

                                      MD5

                                      dfc21cdaa3f4cf680627a41f5a18e772

                                      SHA1

                                      ec93a703400b1bf985e7c76d598e1fb69d398460

                                      SHA256

                                      7c4976fcf064d1c38148014e5730d3621936180c5ab4ca2e8301f96afd3201fb

                                      SHA512

                                      0cd58ba0cb75269937c150700a9e82214d1cf11f77632213848c2dcc62819fad29068965f5b0b4b4ca8c5f39d3ec0b3948bedfddc87448055f60f02727e0bfcb

                                    • C:\Users\Admin\AppData\Local\Temp\10343470101\kDveTWY.exe

                                      Filesize

                                      1.4MB

                                      MD5

                                      fc6cd346462b85853040586c7af71316

                                      SHA1

                                      fd2e85e7252fb1f4bfba00c823abed3ec3e501e1

                                      SHA256

                                      5a967613fad14a8eb61757b641eb3f84236360e06834800e90e2e28da09da2de

                                      SHA512

                                      382d8cb536172bf3d99d28e92d1056d4bcfe96b08109bdffe9e2745b434cd2d301f320ce4ff836bf6bf90c08ba8859fbd36741b3a572d52bfb1f782e86f8d746

                                    • C:\Users\Admin\AppData\Local\Temp\10343480101\0e3f788b09.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      96fa728730da64d7d6049c305c40232c

                                      SHA1

                                      3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                      SHA256

                                      28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                      SHA512

                                      c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                    • C:\Users\Admin\AppData\Local\Temp\10343490101\dBSGwVB.exe

                                      Filesize

                                      13.1MB

                                      MD5

                                      79a51197969dadee0226635f5977f6ab

                                      SHA1

                                      1785a081523553690d110c4153e3b3c990c08d45

                                      SHA256

                                      868c78f267862af83cf94c9d21615d9c01afe3dbd0da02dc96bbc3a956ccc48d

                                      SHA512

                                      202ea6d421bb7163ba741267543dff4f97012f2489f694f06555b1bbffec3a59fe71d5675755f5d746727eaf93b6d8204eab4e11fd692cf82570b1edf8a80a55

                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      53f24086dc5ae9e8e778e4b6fe6dacac

                                      SHA1

                                      86743fc7837b42371aad3aa62660b5351253c53b

                                      SHA256

                                      53d4b7a917d975149ee9a757ccbb944e5a7f40814b07108358495bef54e1371d

                                      SHA512

                                      42f3b01c4f039995837e2157caf6bada0bb32ecea9ecdc48a92f30b181e741ccd91f1a1de5538f34e3fceb3f13e72b40a6984d513fd421bb1e6dd7561d6ba0cf

                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                      Filesize

                                      2.9MB

                                      MD5

                                      b826dd92d78ea2526e465a34324ebeea

                                      SHA1

                                      bf8a0093acfd2eb93c102e1a5745fb080575372e

                                      SHA256

                                      7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                      SHA512

                                      1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                    • C:\Users\Public\Netstat\PCICHEK.DLL

                                      Filesize

                                      18KB

                                      MD5

                                      a0b9388c5f18e27266a31f8c5765b263

                                      SHA1

                                      906f7e94f841d464d4da144f7c858fa2160e36db

                                      SHA256

                                      313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

                                      SHA512

                                      6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

                                    • C:\Users\Public\Netstat\PCICL32.DLL

                                      Filesize

                                      3.0MB

                                      MD5

                                      a4b303dc02b6bd4a20ce1887b4ed1628

                                      SHA1

                                      138030a4f83d38b19a68189c2df8141a170a30be

                                      SHA256

                                      c9ef292f6f5301eda50c64fc2bb10961da9e3d6b4105f68c23b7f431b5449e56

                                      SHA512

                                      a94befc6c078abe3f0f0a2f000ab4de28945da4bc37ae40734d23cbeb0693806b07a031a31f7de2d26ec58c4010bf6d67e668a102bf31523474521f91a78ee61

                                    • C:\Users\Public\Netstat\PCICL32.dll

                                      Filesize

                                      3.4MB

                                      MD5

                                      c08a82209e0883196262d2505461c86a

                                      SHA1

                                      99b8e9ded07cfa6c4816017d9b67ecc137196b09

                                      SHA256

                                      20f43f6fc6955055b93c0030a14ca0e59dbdb897207b00538c5ddd531f85cac0

                                      SHA512

                                      24e47053e73f95da048c1c2d6d23cf583ae8217a606895c2f9b5b78dc3e9530a8c0fcf4f35e06839efc5dd774526b74f2794262ce8fe5ff5ff289a1dd814243d

                                    • C:\Users\Public\Netstat\bild.exe

                                      Filesize

                                      103KB

                                      MD5

                                      8d9709ff7d9c83bd376e01912c734f0a

                                      SHA1

                                      e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294

                                      SHA256

                                      49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3

                                      SHA512

                                      042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee

                                    • C:\Users\Public\Netstat\msvcr100.dll

                                      Filesize

                                      755KB

                                      MD5

                                      0e37fbfa79d349d672456923ec5fbbe3

                                      SHA1

                                      4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                      SHA256

                                      8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                      SHA512

                                      2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                    • C:\Users\Public\Netstat\netsup.bat

                                      Filesize

                                      161B

                                      MD5

                                      bb8869e7e80234a30633bd0301b57deb

                                      SHA1

                                      13790ad2bc012431324093b16c19b1e532c94e63

                                      SHA256

                                      d6f183097bf12a7f68632efecc6dc7ddac16002839229502b32cd40826dd472c

                                      SHA512

                                      7d043054fcde4c73e9e5988330a94a737360adf1b0d806efc4660d1e336e27a66149494b611969a29b873d76bc4b1278b47d1efc27a9c7bd50a1f8cdf346937a

                                    • C:\Users\Public\Netstat\pcicapi.dll

                                      Filesize

                                      32KB

                                      MD5

                                      dcde2248d19c778a41aa165866dd52d0

                                      SHA1

                                      7ec84be84fe23f0b0093b647538737e1f19ebb03

                                      SHA256

                                      9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

                                      SHA512

                                      c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

                                    • memory/780-89-0x0000000000400000-0x0000000000E18000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/780-81-0x0000000000400000-0x0000000000E18000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/1560-0-0x0000000000480000-0x0000000000933000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1560-2-0x0000000000481000-0x00000000004AF000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/1560-1-0x0000000077394000-0x0000000077396000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/1560-3-0x0000000000480000-0x0000000000933000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1560-17-0x0000000000480000-0x0000000000933000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1560-4-0x0000000000480000-0x0000000000933000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1708-112-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/1708-244-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/1708-110-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/1708-175-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/2280-180-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/2280-85-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/2280-132-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/2280-152-0x0000000010000000-0x000000001001C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/2280-88-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/2512-109-0x0000000000400000-0x0000000000CD9000-memory.dmp

                                      Filesize

                                      8.8MB

                                    • memory/2512-113-0x0000000000400000-0x0000000000CD9000-memory.dmp

                                      Filesize

                                      8.8MB

                                    • memory/3024-183-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3024-181-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3096-91-0x0000000000860000-0x00000000015F8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3096-185-0x0000000000860000-0x00000000015F8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3096-90-0x0000000000860000-0x00000000015F8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3096-133-0x0000000000860000-0x00000000015F8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3096-61-0x0000000000860000-0x00000000015F8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3256-200-0x0000000000480000-0x0000000000933000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3256-211-0x0000000000480000-0x0000000000933000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3496-188-0x0000000000480000-0x0000000000933000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3724-130-0x0000000000830000-0x00000000015C8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3724-245-0x0000000000830000-0x00000000015C8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3724-177-0x0000000000830000-0x00000000015C8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3724-176-0x0000000000830000-0x00000000015C8000-memory.dmp

                                      Filesize

                                      13.6MB

                                    • memory/3744-149-0x0000000000400000-0x0000000000464000-memory.dmp

                                      Filesize

                                      400KB

                                    • memory/3744-148-0x0000000000400000-0x0000000000464000-memory.dmp

                                      Filesize

                                      400KB

                                    • memory/4252-173-0x0000000000400000-0x0000000000464000-memory.dmp

                                      Filesize

                                      400KB

                                    • memory/4252-172-0x0000000000400000-0x0000000000464000-memory.dmp

                                      Filesize

                                      400KB

                                    • memory/4932-174-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-46-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-129-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-18-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-19-0x00000000007E1000-0x000000000080F000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/4932-45-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-82-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-41-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-243-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-20-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-42-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-24-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-23-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-22-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4932-21-0x00000000007E0000-0x0000000000C93000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5468-44-0x0000000000890000-0x0000000000990000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/5468-43-0x0000000000CD0000-0x0000000001AB9000-memory.dmp

                                      Filesize

                                      13.9MB

                                    • memory/5468-80-0x0000000000890000-0x0000000000990000-memory.dmp

                                      Filesize

                                      1024KB