Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2024 18:52

General

  • Target

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe

  • Size

    442KB

  • MD5

    34468074c946943518ab33be24c01ef9

  • SHA1

    742cf7ff13dcab6a99b372dc99f362f45be3d69c

  • SHA256

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

  • SHA512

    b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

  • SSDEEP

    6144:9qIH8p8GgMyYRhuPTMCGzlmJDZWgECsFjKdJtH3s5ZBjnA:9d8p8GgAWP4CYE4BCsmdJFij0

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

Attributes
  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe
    "C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 744
      2⤵
      • Program crash
      PID:1296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 776
      2⤵
      • Program crash
      PID:5068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 856
      2⤵
      • Program crash
      PID:3596
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 932
      2⤵
      • Program crash
      PID:660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 976
      2⤵
      • Program crash
      PID:1144
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1012
      2⤵
      • Program crash
      PID:4748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1120
      2⤵
      • Program crash
      PID:2696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1184
      2⤵
      • Program crash
      PID:4568
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1120
      2⤵
      • Program crash
      PID:3472
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 552
        3⤵
        • Program crash
        PID:3112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 592
        3⤵
        • Program crash
        PID:1504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 628
        3⤵
        • Program crash
        PID:4204
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 704
        3⤵
        • Program crash
        PID:3584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 756
        3⤵
        • Program crash
        PID:4772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 892
        3⤵
        • Program crash
        PID:452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 924
        3⤵
        • Program crash
        PID:4272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 924
        3⤵
        • Program crash
        PID:2040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 1000
        3⤵
        • Program crash
        PID:3896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 912
        3⤵
        • Program crash
        PID:2904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 912
        3⤵
        • Program crash
        PID:3652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 1320
        3⤵
        • Program crash
        PID:1368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 1460
        3⤵
        • Program crash
        PID:4324
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3656
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:364
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:1464
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\660967641992_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:452
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:3924
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 1092
          3⤵
          • Program crash
          PID:540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 1572
          3⤵
          • Program crash
          PID:4704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1040
        2⤵
        • Program crash
        PID:4244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2848 -ip 2848
      1⤵
        PID:3392
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2848 -ip 2848
        1⤵
          PID:3652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2848 -ip 2848
          1⤵
            PID:1592
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2848 -ip 2848
            1⤵
              PID:2328
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2848 -ip 2848
              1⤵
                PID:1400
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2848 -ip 2848
                1⤵
                  PID:4520
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2848 -ip 2848
                  1⤵
                    PID:1784
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2848 -ip 2848
                    1⤵
                      PID:432
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2848 -ip 2848
                      1⤵
                        PID:3100
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2848 -ip 2848
                        1⤵
                          PID:2304
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3320 -ip 3320
                          1⤵
                            PID:5060
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3320 -ip 3320
                            1⤵
                              PID:2500
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3320 -ip 3320
                              1⤵
                                PID:4920
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3320 -ip 3320
                                1⤵
                                  PID:3824
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3320 -ip 3320
                                  1⤵
                                    PID:364
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3320 -ip 3320
                                    1⤵
                                      PID:3968
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3320 -ip 3320
                                      1⤵
                                        PID:4960
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3320 -ip 3320
                                        1⤵
                                          PID:2360
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3320 -ip 3320
                                          1⤵
                                            PID:396
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3320 -ip 3320
                                            1⤵
                                              PID:4836
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3320 -ip 3320
                                              1⤵
                                                PID:1296
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3320 -ip 3320
                                                1⤵
                                                  PID:1188
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3320 -ip 3320
                                                  1⤵
                                                    PID:4212
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3320 -ip 3320
                                                    1⤵
                                                      PID:4452
                                                    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                      C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:2368
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 440
                                                        2⤵
                                                        • Program crash
                                                        PID:3456
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2368 -ip 2368
                                                      1⤵
                                                        PID:4744
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3320 -ip 3320
                                                        1⤵
                                                          PID:4868
                                                        • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                          C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                          1⤵
                                                          • Executes dropped EXE
                                                          PID:4280
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 440
                                                            2⤵
                                                            • Program crash
                                                            PID:4864
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4280 -ip 4280
                                                          1⤵
                                                            PID:1184

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                                                            Filesize

                                                            442KB

                                                            MD5

                                                            34468074c946943518ab33be24c01ef9

                                                            SHA1

                                                            742cf7ff13dcab6a99b372dc99f362f45be3d69c

                                                            SHA256

                                                            339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

                                                            SHA512

                                                            b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

                                                          • C:\Users\Admin\AppData\Local\Temp\660967641992

                                                            Filesize

                                                            81KB

                                                            MD5

                                                            7651643a8dc92015360ee49bb507abcc

                                                            SHA1

                                                            f6b337ce9e687fc921b0f60dcbc2028cfef0981e

                                                            SHA256

                                                            8991b4ce0ef54407ac65aa6fd01fd931b0af436259c84578639e0ee8b93eff8b

                                                            SHA512

                                                            99718974b53bc7109d682c018cde6aeb0c95ef19245dbd4e87cc5d54add05268b933b88d1bccb50cf812bf473c48fdb28cfb16a06450e66f0d5d7cc3c78f82d1

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ey03pu5l.l32.ps1

                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                            Filesize

                                                            109KB

                                                            MD5

                                                            ca684dc5ebed4381701a39f1cc3a0fb2

                                                            SHA1

                                                            8c4a375aa583bd1c705597a7f45fd18934276770

                                                            SHA256

                                                            b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                                                            SHA512

                                                            8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            4876ee75ce2712147c41ff1277cd2d30

                                                            SHA1

                                                            3733dc92318f0c6b92cb201e49151686281acda6

                                                            SHA256

                                                            bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

                                                            SHA512

                                                            9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                            Filesize

                                                            963KB

                                                            MD5

                                                            dd6f1c7e4efd4848e6588f9424ced11a

                                                            SHA1

                                                            9d554e41bafb2e3d85b97fc236a9728bbd35a217

                                                            SHA256

                                                            b6ed52a1c1058ff4d2578c08e1933074029fb7af05b1a1cedb3a2d73ba1ea81a

                                                            SHA512

                                                            f30f10317c07f1f9124d8915431bd89d641c7fa94fcadf562c27e6ed38d9f585cbffd531236a531f5296d908fbf888d34c89ba078257e11c93eef8876f6d1aac

                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                            Filesize

                                                            610KB

                                                            MD5

                                                            4b5bc0a64223e816baa40b83b614f780

                                                            SHA1

                                                            964dae125ab33a30893428401baf0478de463d2c

                                                            SHA256

                                                            2570a6acb6bc678a9783541db3d72dc5e2cc64c742c7d40293debd436c2a723d

                                                            SHA512

                                                            fcf906f78761745ba4c23f5c588b23874241e189b16510ec4a90d9c4415d48ba5da7de5364e8dcd7c54e19494204f71621d7d07d1d5f898b910679bd8247cdc1

                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                            Filesize

                                                            564KB

                                                            MD5

                                                            7ce94a9117e765665b334321f7f501dd

                                                            SHA1

                                                            a898a1ffac771499d6bb9f4938b80422c0a5fe39

                                                            SHA256

                                                            9a33c75cf95688a254b0768649624d1d3aebcf7c01515f1c890e4861097e8303

                                                            SHA512

                                                            19dd62656f077e3cad95f351250e38d0040b6ad8c5236e0b9057021cfa80a0ea67b520ebe507eaf610deaaffd09caf82ee89ef7e346a33fc908a9f9c56fab24b

                                                          • memory/452-44-0x00007FF9B8250000-0x00007FF9B8D11000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/452-57-0x000001DB71240000-0x000001DB71252000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/452-64-0x00007FF9B8250000-0x00007FF9B8D11000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/452-58-0x000001DB71190000-0x000001DB7119A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/452-56-0x000001DB711F0000-0x000001DB71200000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/452-46-0x000001DB711F0000-0x000001DB71200000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/452-45-0x000001DB711F0000-0x000001DB71200000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/452-43-0x000001DB711A0000-0x000001DB711C2000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/2368-80-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/2368-79-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/2368-78-0x0000000000C80000-0x0000000000D80000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/2848-2-0x0000000000C60000-0x0000000000CCF000-memory.dmp

                                                            Filesize

                                                            444KB

                                                          • memory/2848-3-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/2848-1-0x0000000000EC0000-0x0000000000FC0000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/2848-19-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/3320-18-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/3320-65-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/3320-30-0x0000000000E90000-0x0000000000F90000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/3320-29-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/3320-17-0x0000000000DC0000-0x0000000000E2F000-memory.dmp

                                                            Filesize

                                                            444KB

                                                          • memory/3320-16-0x0000000000E90000-0x0000000000F90000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/3320-81-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/4280-89-0x0000000000D40000-0x0000000000E40000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/4280-90-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB

                                                          • memory/4280-91-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                            Filesize

                                                            7.1MB