Analysis

  • max time kernel
    148s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    04-04-2022 03:43

General

  • Target

    s.exe

  • Size

    273KB

  • MD5

    d9a7e822d38ef4624cb6c6d6c058bc30

  • SHA1

    3f48b9031f653d55eb5c53a8c99346b0d4f1bd52

  • SHA256

    adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929

  • SHA512

    3084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f

Score
10/10

Malware Config

Extracted

Family

systembc

C2

31.44.185.6:4001

31.44.185.11:4001

Extracted

Family

amadey

Version

3.08

C2

179.43.154.147/d2VxjasuwS/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\s.exe
    "C:\Users\Admin\AppData\Local\Temp\s.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:772
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {6B791916-CA18-41FB-8BB1-852C2D3C299E} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\ProgramData\pxdbcx\lchi.exe
      C:\ProgramData\pxdbcx\lchi.exe start
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1252
    • C:\Windows\TEMP\akge.exe
      C:\Windows\TEMP\akge.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\TEMP\9d5cca72fb\ftewk.exe
        "C:\Windows\TEMP\9d5cca72fb\ftewk.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Windows\TEMP\9d5cca72fb\
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Windows\TEMP\9d5cca72fb\
            5⤵
            • Modifies data under HKEY_USERS
            PID:1784
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ftewk.exe /TR "C:\Windows\TEMP\9d5cca72fb\ftewk.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:340
        • C:\Windows\TEMP\9d5cca72fb\ftewk.exe
          "C:\Windows\TEMP\9d5cca72fb\ftewk.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1544
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 100
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1676
        • C:\Windows\TEMP\9d5cca72fb\ftewk.exe
          "C:\Windows\TEMP\9d5cca72fb\ftewk.exe"
          4⤵
          • Executes dropped EXE
          PID:1328
        • C:\Windows\TEMP\9d5cca72fb\ftewk.exe
          "C:\Windows\TEMP\9d5cca72fb\ftewk.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1472
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 120
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\pxdbcx\lchi.exe

    Filesize

    273KB

    MD5

    d9a7e822d38ef4624cb6c6d6c058bc30

    SHA1

    3f48b9031f653d55eb5c53a8c99346b0d4f1bd52

    SHA256

    adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929

    SHA512

    3084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f

  • C:\ProgramData\pxdbcx\lchi.exe

    Filesize

    273KB

    MD5

    d9a7e822d38ef4624cb6c6d6c058bc30

    SHA1

    3f48b9031f653d55eb5c53a8c99346b0d4f1bd52

    SHA256

    adb4b3905162013e327b67bbeea18e1473aafb6b00a403634bd10cf8b1770929

    SHA512

    3084f7c27a5b453b8def1c7e8fd0f68ddcc408e57207635192451b92d0885e9ef3fafbb6c20491359a4da8cb06b35b446c11d70fa1fe0185d92d963eed5e9c5f

  • C:\Windows\TEMP\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • C:\Windows\TEMP\akge.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • C:\Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • C:\Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • C:\Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • C:\Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • C:\Windows\Temp\akge.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • \Windows\Temp\9d5cca72fb\ftewk.exe

    Filesize

    383KB

    MD5

    56d9df4afbbaee34afb646e85fb4419d

    SHA1

    0ad215a57d93b70fa3a137060f5f5a3369d4f542

    SHA256

    87995a05b25f0dfbc564f2392434c6f66792cdf5690703bffa5797e1c3d5719c

    SHA512

    1178e68a8ebf530fa71bfe4b63543ea486555b3badfcc144d48920eafbf1f89bfd4a73ea5b04e09f8f9858e6748ae3e25db0c03332939be51131794313e59d31

  • memory/340-82-0x0000000000000000-mapping.dmp

  • memory/772-56-0x000000000062E000-0x0000000000637000-memory.dmp

    Filesize

    36KB

  • memory/772-58-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/772-57-0x0000000000230000-0x0000000000239000-memory.dmp

    Filesize

    36KB

  • memory/772-55-0x0000000076201000-0x0000000076203000-memory.dmp

    Filesize

    8KB

  • memory/772-54-0x000000000062E000-0x0000000000637000-memory.dmp

    Filesize

    36KB

  • memory/1252-60-0x0000000000000000-mapping.dmp

  • memory/1252-62-0x000000000026E000-0x0000000000277000-memory.dmp

    Filesize

    36KB

  • memory/1252-66-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/1252-64-0x000000000026E000-0x0000000000277000-memory.dmp

    Filesize

    36KB

  • memory/1252-65-0x00000000001B0000-0x00000000001B9000-memory.dmp

    Filesize

    36KB

  • memory/1328-116-0x0000000000400000-0x000000000068C000-memory.dmp

    Filesize

    2.5MB

  • memory/1328-114-0x0000000000400000-0x000000000068C000-memory.dmp

    Filesize

    2.5MB

  • memory/1328-121-0x0000000000402000-0x0000000000687C00-memory.dmp

    Filesize

    2.5MB

  • memory/1328-112-0x0000000000400000-0x000000000068C000-memory.dmp

    Filesize

    2.5MB

  • memory/1328-117-0x0000000000687ADE-mapping.dmp

  • memory/1328-115-0x0000000000400000-0x000000000068C000-memory.dmp

    Filesize

    2.5MB

  • memory/1328-111-0x0000000000400000-0x000000000068C000-memory.dmp

    Filesize

    2.5MB

  • memory/1328-120-0x0000000000402000-0x0000000000687C00-memory.dmp

    Filesize

    2.5MB

  • memory/1472-125-0x0000000000400000-0x0000000000752000-memory.dmp

    Filesize

    3.3MB

  • memory/1472-129-0x0000000000400000-0x0000000000752000-memory.dmp

    Filesize

    3.3MB

  • memory/1472-130-0x0000000000738000-mapping.dmp

  • memory/1472-134-0x0000000000400000-0x0000000000752000-memory.dmp

    Filesize

    3.3MB

  • memory/1472-127-0x0000000000400000-0x0000000000752000-memory.dmp

    Filesize

    3.3MB

  • memory/1472-124-0x0000000000400000-0x0000000000752000-memory.dmp

    Filesize

    3.3MB

  • memory/1472-123-0x0000000000400000-0x0000000000752000-memory.dmp

    Filesize

    3.3MB

  • memory/1544-95-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1544-89-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1544-102-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1544-99-0x000000000040266B-mapping.dmp

  • memory/1544-98-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1544-97-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1544-94-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1544-92-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1544-90-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1620-85-0x0000000000220000-0x0000000000258000-memory.dmp

    Filesize

    224KB

  • memory/1620-86-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1620-84-0x00000000005DE000-0x00000000005FC000-memory.dmp

    Filesize

    120KB

  • memory/1620-77-0x0000000000000000-mapping.dmp

  • memory/1620-79-0x00000000005DE000-0x00000000005FC000-memory.dmp

    Filesize

    120KB

  • memory/1676-103-0x0000000000000000-mapping.dmp

  • memory/1784-83-0x0000000000000000-mapping.dmp

  • memory/1956-135-0x0000000000000000-mapping.dmp

  • memory/1984-81-0x0000000000000000-mapping.dmp

  • memory/2012-74-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/2012-73-0x0000000000220000-0x0000000000258000-memory.dmp

    Filesize

    224KB

  • memory/2012-72-0x000000000061E000-0x000000000063C000-memory.dmp

    Filesize

    120KB

  • memory/2012-70-0x000000000061E000-0x000000000063C000-memory.dmp

    Filesize

    120KB

  • memory/2012-68-0x0000000000000000-mapping.dmp