Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2023 08:08

General

  • Target

    53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057.exe

  • Size

    6.1MB

  • MD5

    65f1271aaa619686af548094f0909871

  • SHA1

    b90b39e4ead147a91b62aee376900c3b15f6ae45

  • SHA256

    53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057

  • SHA512

    c23eb12b735104516c1e440810915930bec1d1defb79ae29b2db5bf6ef3d1c8f18a5a41cffebde3ec6e2ba856989c334c47c1f25457203471ce5ac662e0bef10

  • SSDEEP

    98304:jyIq98BE2YOseQasRCRasGE3YMpktQRxBjvX2DZ4I/7HI4VpnzghDiK6/hXKz8fj:mYt+CbY1t4nyDZHJcDin/hG8r

Malware Config

Extracted

Family

amadey

C2

http://185.172.128.5

Attributes
  • strings_key

    11bb398ff31ee80d2c37571aecd1d36d

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Extracted

Family

amadey

Version

4.13

C2

http://185.172.128.5

Attributes
  • install_dir

    4fdb51ccdc

  • install_file

    Utsysc.exe

  • strings_key

    11bb398ff31ee80d2c37571aecd1d36d

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 41 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057.exe
    "C:\Users\Admin\AppData\Local\Temp\53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3092
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4688
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:856
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:372
  • C:\Windows\system32\netsh.exe
    netsh wlan show profiles
    1⤵
      PID:2892
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Windows\system32\tar.exe
        tar.exe -cf "C:\Users\Admin\AppData\Local\Temp\963151031488_Desktop.tar" "C:\Users\Admin\AppData\Local\Temp\_Files_\*.*"
        2⤵
          PID:4504
      • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3980
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:3740
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2316
        • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
          C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:3464

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

          Filesize

          16KB

          MD5

          2861b076d985e34403b6e64b3483a715

          SHA1

          01da54b48813517ea848d3c4d7eb1089560e8874

          SHA256

          5c8512807b3b803491cad83801b3129066cda6f04bb65cf2720773bbb9bffed7

          SHA512

          6e07ecf60404106fe137c2613e1987555ff20525c4f8da846e36d0088a35e7a0e05ace1922b10788fd13d2d9af47cb989e0e4d5c5962ce6bf8a72679d9620bb1

        • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

          Filesize

          6.1MB

          MD5

          65f1271aaa619686af548094f0909871

          SHA1

          b90b39e4ead147a91b62aee376900c3b15f6ae45

          SHA256

          53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057

          SHA512

          c23eb12b735104516c1e440810915930bec1d1defb79ae29b2db5bf6ef3d1c8f18a5a41cffebde3ec6e2ba856989c334c47c1f25457203471ce5ac662e0bef10

        • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

          Filesize

          6.1MB

          MD5

          65f1271aaa619686af548094f0909871

          SHA1

          b90b39e4ead147a91b62aee376900c3b15f6ae45

          SHA256

          53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057

          SHA512

          c23eb12b735104516c1e440810915930bec1d1defb79ae29b2db5bf6ef3d1c8f18a5a41cffebde3ec6e2ba856989c334c47c1f25457203471ce5ac662e0bef10

        • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

          Filesize

          6.1MB

          MD5

          65f1271aaa619686af548094f0909871

          SHA1

          b90b39e4ead147a91b62aee376900c3b15f6ae45

          SHA256

          53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057

          SHA512

          c23eb12b735104516c1e440810915930bec1d1defb79ae29b2db5bf6ef3d1c8f18a5a41cffebde3ec6e2ba856989c334c47c1f25457203471ce5ac662e0bef10

        • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

          Filesize

          6.1MB

          MD5

          65f1271aaa619686af548094f0909871

          SHA1

          b90b39e4ead147a91b62aee376900c3b15f6ae45

          SHA256

          53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057

          SHA512

          c23eb12b735104516c1e440810915930bec1d1defb79ae29b2db5bf6ef3d1c8f18a5a41cffebde3ec6e2ba856989c334c47c1f25457203471ce5ac662e0bef10

        • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

          Filesize

          6.1MB

          MD5

          65f1271aaa619686af548094f0909871

          SHA1

          b90b39e4ead147a91b62aee376900c3b15f6ae45

          SHA256

          53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057

          SHA512

          c23eb12b735104516c1e440810915930bec1d1defb79ae29b2db5bf6ef3d1c8f18a5a41cffebde3ec6e2ba856989c334c47c1f25457203471ce5ac662e0bef10

        • C:\Users\Admin\AppData\Local\Temp\963151031488

          Filesize

          84KB

          MD5

          c2ece35b0b281ef26610db38d0deead7

          SHA1

          ccf8cdcda8ef98200411cbd4bea100d51348c012

          SHA256

          71c82b4bb4068983105672c2b3748537aba891d29ce2e7225be8f07c3c3e3c7c

          SHA512

          6be7f8bfa328713d02ee9bdf011f74dbc6e3e85148eb87dc743564f02d105e80cb47be767f393264efdee9dc5cd3d92e12cbcf42310d9209b2c5bc66f2d34c1d

        • C:\Users\Admin\AppData\Local\Temp\963151031488_Desktop.tar

          Filesize

          1024B

          MD5

          0f343b0931126a20f133d67c2b018a3b

          SHA1

          60cacbf3d72e1e7834203da608037b1bf83b40e8

          SHA256

          5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef

          SHA512

          8efb4f73c5655351c444eb109230c556d39e2c7624e9c11abc9e3fb4b9b9254218cc5085b454a9698d085cfa92198491f07a723be4574adc70617b73eb0b6461

        • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

          Filesize

          102KB

          MD5

          c06513af505f65393b4ebcd2a11a2ee4

          SHA1

          6e9e8a6b93fc9afbcc781790881d821b0bfb0821

          SHA256

          f5d35a2366cf13312a30c9384f1ac30d9dc9ced46fa6b1b9c2d0621493cc2495

          SHA512

          b90b8dc0571b2dde83c5ceaa4f12f203973bc2049663c0a840fa20a900bc7018f1f392f10273a607e816ccaf8a2b4f70bbc30b354437a2c9aecf5626b7c0a5ce

        • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

          Filesize

          102KB

          MD5

          c06513af505f65393b4ebcd2a11a2ee4

          SHA1

          6e9e8a6b93fc9afbcc781790881d821b0bfb0821

          SHA256

          f5d35a2366cf13312a30c9384f1ac30d9dc9ced46fa6b1b9c2d0621493cc2495

          SHA512

          b90b8dc0571b2dde83c5ceaa4f12f203973bc2049663c0a840fa20a900bc7018f1f392f10273a607e816ccaf8a2b4f70bbc30b354437a2c9aecf5626b7c0a5ce

        • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

          Filesize

          102KB

          MD5

          c06513af505f65393b4ebcd2a11a2ee4

          SHA1

          6e9e8a6b93fc9afbcc781790881d821b0bfb0821

          SHA256

          f5d35a2366cf13312a30c9384f1ac30d9dc9ced46fa6b1b9c2d0621493cc2495

          SHA512

          b90b8dc0571b2dde83c5ceaa4f12f203973bc2049663c0a840fa20a900bc7018f1f392f10273a607e816ccaf8a2b4f70bbc30b354437a2c9aecf5626b7c0a5ce

        • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

          Filesize

          1.2MB

          MD5

          b5cdfc4ca11aa7705c605fd93538a310

          SHA1

          c9c1baac2fe2be6d924cea5affa0518aa665dc3f

          SHA256

          92342e62a3f51b7e205863f58b6a0e0145c4fecc31d40049b91e97ed0bb710ca

          SHA512

          fd7c24e0bdf859a8e2025aa8200e8096af6d392662cfc5ffb0d1b5febdec45612145848facef76582503c893c778390fb676a6b9530d4bf231987fdfc8eb0745

        • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

          Filesize

          1.2MB

          MD5

          b5cdfc4ca11aa7705c605fd93538a310

          SHA1

          c9c1baac2fe2be6d924cea5affa0518aa665dc3f

          SHA256

          92342e62a3f51b7e205863f58b6a0e0145c4fecc31d40049b91e97ed0bb710ca

          SHA512

          fd7c24e0bdf859a8e2025aa8200e8096af6d392662cfc5ffb0d1b5febdec45612145848facef76582503c893c778390fb676a6b9530d4bf231987fdfc8eb0745

        • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

          Filesize

          1.2MB

          MD5

          b5cdfc4ca11aa7705c605fd93538a310

          SHA1

          c9c1baac2fe2be6d924cea5affa0518aa665dc3f

          SHA256

          92342e62a3f51b7e205863f58b6a0e0145c4fecc31d40049b91e97ed0bb710ca

          SHA512

          fd7c24e0bdf859a8e2025aa8200e8096af6d392662cfc5ffb0d1b5febdec45612145848facef76582503c893c778390fb676a6b9530d4bf231987fdfc8eb0745

        • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

          Filesize

          1.2MB

          MD5

          b5cdfc4ca11aa7705c605fd93538a310

          SHA1

          c9c1baac2fe2be6d924cea5affa0518aa665dc3f

          SHA256

          92342e62a3f51b7e205863f58b6a0e0145c4fecc31d40049b91e97ed0bb710ca

          SHA512

          fd7c24e0bdf859a8e2025aa8200e8096af6d392662cfc5ffb0d1b5febdec45612145848facef76582503c893c778390fb676a6b9530d4bf231987fdfc8eb0745

        • memory/3092-38-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-58-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-88-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-89-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3092-91-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3092-104-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-73-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-62-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-61-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-41-0x0000000002590000-0x0000000002591000-memory.dmp

          Filesize

          4KB

        • memory/3092-44-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-43-0x0000000004180000-0x0000000004181000-memory.dmp

          Filesize

          4KB

        • memory/3092-42-0x0000000004170000-0x0000000004171000-memory.dmp

          Filesize

          4KB

        • memory/3092-46-0x00000000041A0000-0x00000000041A1000-memory.dmp

          Filesize

          4KB

        • memory/3092-47-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-45-0x0000000004190000-0x0000000004191000-memory.dmp

          Filesize

          4KB

        • memory/3092-40-0x0000000002580000-0x0000000002581000-memory.dmp

          Filesize

          4KB

        • memory/3092-53-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3092-55-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3092-54-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3092-56-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-57-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-92-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3092-59-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3092-60-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3464-225-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3464-219-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3464-226-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3464-227-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3464-211-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3464-236-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3464-237-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3980-109-0x00000000021C0000-0x00000000021C1000-memory.dmp

          Filesize

          4KB

        • memory/3980-134-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3980-133-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-131-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-130-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-129-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-128-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-127-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-126-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-125-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-124-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3980-123-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/3980-114-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/3980-113-0x00000000024F0000-0x00000000024F1000-memory.dmp

          Filesize

          4KB

        • memory/3980-112-0x00000000024E0000-0x00000000024E1000-memory.dmp

          Filesize

          4KB

        • memory/3980-116-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-115-0x0000000000FE0000-0x0000000002153000-memory.dmp

          Filesize

          17.4MB

        • memory/3980-111-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/3980-110-0x00000000021D0000-0x00000000021D1000-memory.dmp

          Filesize

          4KB

        • memory/3980-122-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/4856-0-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-16-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/4856-17-0x00000000779F4000-0x00000000779F6000-memory.dmp

          Filesize

          8KB

        • memory/4856-18-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-19-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-20-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-21-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-22-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-23-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-24-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-37-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-39-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/4856-15-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/4856-14-0x00000000758A0000-0x0000000075990000-memory.dmp

          Filesize

          960KB

        • memory/4856-5-0x0000000001A80000-0x0000000001A81000-memory.dmp

          Filesize

          4KB

        • memory/4856-6-0x0000000001A90000-0x0000000001A91000-memory.dmp

          Filesize

          4KB

        • memory/4856-7-0x0000000003440000-0x0000000003441000-memory.dmp

          Filesize

          4KB

        • memory/4856-3-0x0000000000390000-0x0000000001503000-memory.dmp

          Filesize

          17.4MB

        • memory/4856-4-0x0000000001A70000-0x0000000001A71000-memory.dmp

          Filesize

          4KB

        • memory/4856-2-0x00000000015F0000-0x00000000015F1000-memory.dmp

          Filesize

          4KB

        • memory/4856-1-0x00000000015E0000-0x00000000015E1000-memory.dmp

          Filesize

          4KB