Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-03-2024 18:52

General

  • Target

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe

  • Size

    442KB

  • MD5

    34468074c946943518ab33be24c01ef9

  • SHA1

    742cf7ff13dcab6a99b372dc99f362f45be3d69c

  • SHA256

    339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

  • SHA512

    b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

  • SSDEEP

    6144:9qIH8p8GgMyYRhuPTMCGzlmJDZWgECsFjKdJtH3s5ZBjnA:9d8p8GgAWP4CYE4BCsmdJFij0

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe
    "C:\Users\Admin\AppData\Local\Temp\339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 772
      2⤵
      • Program crash
      PID:5056
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 820
      2⤵
      • Program crash
      PID:616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 876
      2⤵
      • Program crash
      PID:1708
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 944
      2⤵
      • Program crash
      PID:3876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 932
      2⤵
      • Program crash
      PID:928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 972
      2⤵
      • Program crash
      PID:4904
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 936
      2⤵
      • Program crash
      PID:3964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1056
      2⤵
      • Program crash
      PID:1060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1132
      2⤵
      • Program crash
      PID:1852
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 580
        3⤵
        • Program crash
        PID:4856
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 600
        3⤵
        • Program crash
        PID:1056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 648
        3⤵
        • Program crash
        PID:4984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 748
        3⤵
        • Program crash
        PID:1532
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 892
        3⤵
        • Program crash
        PID:4924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 932
        3⤵
        • Program crash
        PID:4540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 760
        3⤵
        • Program crash
        PID:2308
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 892
        3⤵
        • Program crash
        PID:404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 776
        3⤵
        • Program crash
        PID:1628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1060
        3⤵
        • Program crash
        PID:336
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1068
        3⤵
        • Program crash
        PID:1324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1364
        3⤵
        • Program crash
        PID:4848
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1628
        3⤵
        • Program crash
        PID:4280
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4456
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:760
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:4932
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\930051783255_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:400
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:3120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1488
          3⤵
          • Program crash
          PID:3172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1620
          3⤵
          • Program crash
          PID:3400
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1196
          3⤵
          • Program crash
          PID:3372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1064
          3⤵
          • Program crash
          PID:4924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1564
        2⤵
        • Program crash
        PID:3068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 800
        2⤵
        • Program crash
        PID:4964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4736 -ip 4736
      1⤵
        PID:2548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4736 -ip 4736
        1⤵
          PID:1744
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4736 -ip 4736
          1⤵
            PID:5072
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4736 -ip 4736
            1⤵
              PID:2104
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4736 -ip 4736
              1⤵
                PID:4068
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4736 -ip 4736
                1⤵
                  PID:1412
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4736 -ip 4736
                  1⤵
                    PID:4688
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4736 -ip 4736
                    1⤵
                      PID:4492
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4736 -ip 4736
                      1⤵
                        PID:1408
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4736 -ip 4736
                        1⤵
                          PID:1192
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4736 -ip 4736
                          1⤵
                            PID:3292
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3604 -ip 3604
                            1⤵
                              PID:4568
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3604 -ip 3604
                              1⤵
                                PID:2888
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3604 -ip 3604
                                1⤵
                                  PID:2400
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3604 -ip 3604
                                  1⤵
                                    PID:4664
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3604 -ip 3604
                                    1⤵
                                      PID:2340
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3604 -ip 3604
                                      1⤵
                                        PID:776
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3604 -ip 3604
                                        1⤵
                                          PID:2468
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3604 -ip 3604
                                          1⤵
                                            PID:3896
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3604 -ip 3604
                                            1⤵
                                              PID:4700
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3604 -ip 3604
                                              1⤵
                                                PID:1728
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3604 -ip 3604
                                                1⤵
                                                  PID:2396
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3604 -ip 3604
                                                  1⤵
                                                    PID:4232
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3604 -ip 3604
                                                    1⤵
                                                      PID:1464
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3604 -ip 3604
                                                      1⤵
                                                        PID:2548
                                                      • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                        C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:2840
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 480
                                                          2⤵
                                                          • Program crash
                                                          PID:3184
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2840 -ip 2840
                                                        1⤵
                                                          PID:1540
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3604 -ip 3604
                                                          1⤵
                                                            PID:5032
                                                          • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                            C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
                                                            1⤵
                                                            • Executes dropped EXE
                                                            PID:3832
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 472
                                                              2⤵
                                                              • Program crash
                                                              PID:4040
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3832 -ip 3832
                                                            1⤵
                                                              PID:1508
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3604 -ip 3604
                                                              1⤵
                                                                PID:2156
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3604 -ip 3604
                                                                1⤵
                                                                  PID:4960

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

                                                                  Filesize

                                                                  442KB

                                                                  MD5

                                                                  34468074c946943518ab33be24c01ef9

                                                                  SHA1

                                                                  742cf7ff13dcab6a99b372dc99f362f45be3d69c

                                                                  SHA256

                                                                  339f7bd2b39364138d088ddd6cfc4541b6c18da0f24315388bcf80af0ee3ac99

                                                                  SHA512

                                                                  b13def10893e34d5efcb52d5b11b16c14881c27aca7f263d59a19fdad99e27681cd8cee85ba83762772ecbbf4e32eb373006627b932047eff00cbb725e9f942b

                                                                • C:\Users\Admin\AppData\Local\Temp\930051783255

                                                                  Filesize

                                                                  75KB

                                                                  MD5

                                                                  83930350dc29fad869034695a36201cb

                                                                  SHA1

                                                                  4bc0af17dd2748e39305993c50deec49a128e45c

                                                                  SHA256

                                                                  7298089a8c62ab2e8da4bd1ef09b5bad3b0fc8e9d9b48b60f6711940f24fd995

                                                                  SHA512

                                                                  cd8c9305376f1ef67b85959ffc3181de9aba64d54bfe5b93e1e9fe90cee9bec180bbf00ebd8bf4884f59134a80eb9dafb4070b9ff7f093e7eaa4b23141b28d59

                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xjvrsqsf.h1c.ps1

                                                                  Filesize

                                                                  60B

                                                                  MD5

                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                  SHA1

                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                  SHA256

                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                  SHA512

                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                                  Filesize

                                                                  109KB

                                                                  MD5

                                                                  ca684dc5ebed4381701a39f1cc3a0fb2

                                                                  SHA1

                                                                  8c4a375aa583bd1c705597a7f45fd18934276770

                                                                  SHA256

                                                                  b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

                                                                  SHA512

                                                                  8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

                                                                • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                  Filesize

                                                                  1.2MB

                                                                  MD5

                                                                  4876ee75ce2712147c41ff1277cd2d30

                                                                  SHA1

                                                                  3733dc92318f0c6b92cb201e49151686281acda6

                                                                  SHA256

                                                                  bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

                                                                  SHA512

                                                                  9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

                                                                • memory/400-63-0x00007FFBF5650000-0x00007FFBF6112000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/400-47-0x0000029FDC790000-0x0000029FDC7B2000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/400-56-0x0000029FDC840000-0x0000029FDC852000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/400-57-0x0000029FDC820000-0x0000029FDC82A000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/400-55-0x0000029FDC610000-0x0000029FDC620000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/400-53-0x0000029FDC610000-0x0000029FDC620000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/400-52-0x0000029FDC610000-0x0000029FDC620000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/400-51-0x00007FFBF5650000-0x00007FFBF6112000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/2840-77-0x0000000000DE0000-0x0000000000EE0000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/2840-78-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/2840-79-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/3604-29-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/3604-41-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/3604-54-0x0000000000C90000-0x0000000000D90000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/3604-17-0x0000000002860000-0x00000000028CF000-memory.dmp

                                                                  Filesize

                                                                  444KB

                                                                • memory/3604-16-0x0000000000C90000-0x0000000000D90000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/3604-18-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/3604-74-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/3832-89-0x0000000000EB0000-0x0000000000FB0000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/3832-90-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/3832-91-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/4736-2-0x0000000002970000-0x00000000029DF000-memory.dmp

                                                                  Filesize

                                                                  444KB

                                                                • memory/4736-1-0x0000000000DD0000-0x0000000000ED0000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/4736-19-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB

                                                                • memory/4736-3-0x0000000000400000-0x0000000000B17000-memory.dmp

                                                                  Filesize

                                                                  7.1MB