Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 04:53

General

  • Target

    c92ec1cea5a09af2f334a2e0d127f41827855c21c5e72.exe

  • Size

    436KB

  • MD5

    f6ee2a295cd2ba584f9a363ade3d55b3

  • SHA1

    c6966445c9adf9a0afe1a62b91d1e4f75c5ac55c

  • SHA256

    c92ec1cea5a09af2f334a2e0d127f41827855c21c5e725afb702ec29e705d1f3

  • SHA512

    7db8c37f43efc0414e394dfe3c335e8073dcc53f11093dd9452a750c34b2e16fc058f83fdddbb17b430ac501aabc6af6b03b23afa7826ccac1678f86546b025b

  • SSDEEP

    6144:vZLBvj27DEXhnzCaknvrhHq6p5Km/OZ2iqzUhYA0FvYgtv3EagG64/dAdUcgf:hd72YmQ/mWZUzGUvYgt8FGBxcg

Malware Config

Extracted

Family

amadey

Version

4.19

Attributes
  • install_dir

    cbb1d94791

  • install_file

    Dctooux.exe

  • strings_key

    fcebaf717c71f51f8908b537784e2bee

  • url_paths

    /8bjndDcoA3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c92ec1cea5a09af2f334a2e0d127f41827855c21c5e72.exe
    "C:\Users\Admin\AppData\Local\Temp\c92ec1cea5a09af2f334a2e0d127f41827855c21c5e72.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 756
      2⤵
      • Program crash
      PID:3732
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 800
      2⤵
      • Program crash
      PID:4552
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 856
      2⤵
      • Program crash
      PID:1480
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 932
      2⤵
      • Program crash
      PID:4836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 928
      2⤵
      • Program crash
      PID:2544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 956
      2⤵
      • Program crash
      PID:1340
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 1124
      2⤵
      • Program crash
      PID:3496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 1156
      2⤵
      • Program crash
      PID:552
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 1196
      2⤵
      • Program crash
      PID:772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 1064
      2⤵
      • Program crash
      PID:4272
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 1600
      2⤵
      • Program crash
      PID:3628
    • C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 560
        3⤵
        • Program crash
        PID:1864
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 596
        3⤵
        • Program crash
        PID:1552
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 556
        3⤵
        • Program crash
        PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 712
        3⤵
        • Program crash
        PID:3312
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 880
        3⤵
        • Program crash
        PID:4248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 888
        3⤵
        • Program crash
        PID:4808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 708
        3⤵
        • Program crash
        PID:2492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 708
        3⤵
        • Program crash
        PID:4584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 920
        3⤵
        • Program crash
        PID:4152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 988
        3⤵
        • Program crash
        PID:4552
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1008
        3⤵
        • Program crash
        PID:1944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1328
        3⤵
        • Program crash
        PID:1080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1564
        3⤵
        • Program crash
        PID:1512
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:3320
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\177723727746_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3756
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:4840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1340
          3⤵
          • Program crash
          PID:1884
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1564
          3⤵
          • Program crash
          PID:4980
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1132
          3⤵
          • Program crash
          PID:1444
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 880
        2⤵
        • Program crash
        PID:5076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 1344
        2⤵
        • Program crash
        PID:4192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1568 -ip 1568
      1⤵
        PID:3900
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1568 -ip 1568
        1⤵
          PID:3844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1568 -ip 1568
          1⤵
            PID:2460
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1568 -ip 1568
            1⤵
              PID:4300
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1568 -ip 1568
              1⤵
                PID:3624
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1568 -ip 1568
                1⤵
                  PID:4688
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1568 -ip 1568
                  1⤵
                    PID:1124
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1568 -ip 1568
                    1⤵
                      PID:1360
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1568 -ip 1568
                      1⤵
                        PID:2504
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1568 -ip 1568
                        1⤵
                          PID:4148
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1568 -ip 1568
                          1⤵
                            PID:2144
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1568 -ip 1568
                            1⤵
                              PID:2712
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1568 -ip 1568
                              1⤵
                                PID:1948
                              • C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe
                                C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe
                                1⤵
                                • Executes dropped EXE
                                PID:4376
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 448
                                  2⤵
                                  • Program crash
                                  PID:116
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2476 -ip 2476
                                1⤵
                                  PID:2828
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2476 -ip 2476
                                  1⤵
                                    PID:3252
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2476 -ip 2476
                                    1⤵
                                      PID:5064
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2476 -ip 2476
                                      1⤵
                                        PID:1256
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2476 -ip 2476
                                        1⤵
                                          PID:1460
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4376 -ip 4376
                                          1⤵
                                            PID:3540
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2476 -ip 2476
                                            1⤵
                                              PID:4348
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2476 -ip 2476
                                              1⤵
                                                PID:1736
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2476 -ip 2476
                                                1⤵
                                                  PID:4980
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2476 -ip 2476
                                                  1⤵
                                                    PID:3780
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2476 -ip 2476
                                                    1⤵
                                                      PID:4696
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2476 -ip 2476
                                                      1⤵
                                                        PID:3328
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2476 -ip 2476
                                                        1⤵
                                                          PID:2672
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2476 -ip 2476
                                                          1⤵
                                                            PID:1612
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2476 -ip 2476
                                                            1⤵
                                                              PID:3808
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2476 -ip 2476
                                                              1⤵
                                                                PID:4420
                                                              • C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe
                                                                C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:4600
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 448
                                                                  2⤵
                                                                  • Program crash
                                                                  PID:1564
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4600 -ip 4600
                                                                1⤵
                                                                  PID:2116
                                                                • C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  PID:1360
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 452
                                                                    2⤵
                                                                    • Program crash
                                                                    PID:1228
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1360 -ip 1360
                                                                  1⤵
                                                                    PID:2184
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2476 -ip 2476
                                                                    1⤵
                                                                      PID:4148

                                                                    Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Temp\177723727746

                                                                            Filesize

                                                                            82KB

                                                                            MD5

                                                                            20d0180d2a26625f9ebee1b0a2ec963e

                                                                            SHA1

                                                                            7a9a63ab53bcfd89ffedd4323a03ea43e5707132

                                                                            SHA256

                                                                            a63e9004dd5bc66d5f989c378c586fe3234e3bf01aaab3805a770399179a12c1

                                                                            SHA512

                                                                            cddca870962cd42bd61875f383eaa30a3c2fbadd5034806937fe33c30686517beca26ed250ea6224e8ec57bf8b6c978d1f15aad9fd9beea93c1ade83871b9cc4

                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m4aqoaya.lcg.ps1

                                                                            Filesize

                                                                            60B

                                                                            MD5

                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                            SHA1

                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                            SHA256

                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                            SHA512

                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                          • C:\Users\Admin\AppData\Local\Temp\cbb1d94791\Dctooux.exe

                                                                            Filesize

                                                                            436KB

                                                                            MD5

                                                                            f6ee2a295cd2ba584f9a363ade3d55b3

                                                                            SHA1

                                                                            c6966445c9adf9a0afe1a62b91d1e4f75c5ac55c

                                                                            SHA256

                                                                            c92ec1cea5a09af2f334a2e0d127f41827855c21c5e725afb702ec29e705d1f3

                                                                            SHA512

                                                                            7db8c37f43efc0414e394dfe3c335e8073dcc53f11093dd9452a750c34b2e16fc058f83fdddbb17b430ac501aabc6af6b03b23afa7826ccac1678f86546b025b

                                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

                                                                            Filesize

                                                                            109KB

                                                                            MD5

                                                                            647ac550e51ad6d7e47a6f1e94e11fd2

                                                                            SHA1

                                                                            433991b760cbfd265d45240891300c3652aefe6f

                                                                            SHA256

                                                                            4d743335ff8cdf1e505f4bd82b0efafde077b9bf0f88a615db99feada880e3ba

                                                                            SHA512

                                                                            5a2905133e53490dcfdad84b65525f2925d1e82a609ad0ff551d8d90a3c61a3a58b370056b84aa5c33db71f49fffb86e58284dc317a3541d6f5572438e428bfb

                                                                          • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

                                                                            Filesize

                                                                            1.2MB

                                                                            MD5

                                                                            877cb2f10c78a046d81f678f88d7a6a1

                                                                            SHA1

                                                                            0ecc4a6282a412802756dc5bfd1e60cf789f2687

                                                                            SHA256

                                                                            2caf66964f582a9a1add1f13205f8797f2f4e791d980000ea6b55c719c174ed2

                                                                            SHA512

                                                                            9a8ea29fcfcf2a4e274095819ba27261bf551c976b697ccc6fe0598d13c309042e317ec8a32d2a9dec38ebd8223fc6c9e08daf5c611cdc72c11c8fe91baf3399

                                                                          • memory/1360-102-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/1360-100-0x0000000002E80000-0x0000000002F80000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/1360-101-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/1568-20-0x0000000002DD0000-0x0000000002E3F000-memory.dmp

                                                                            Filesize

                                                                            444KB

                                                                          • memory/1568-19-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/1568-3-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/1568-1-0x0000000002FC0000-0x00000000030C0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/1568-2-0x0000000002DD0000-0x0000000002E3F000-memory.dmp

                                                                            Filesize

                                                                            444KB

                                                                          • memory/2476-22-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/2476-21-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/2476-37-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/2476-71-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/2476-83-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/2476-72-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/3756-59-0x00007FF96FB70000-0x00007FF970631000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/3756-54-0x00000245D66F0000-0x00000245D6712000-memory.dmp

                                                                            Filesize

                                                                            136KB

                                                                          • memory/3756-64-0x00000245D8A30000-0x00000245D8A3A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/3756-70-0x00007FF96FB70000-0x00007FF970631000-memory.dmp

                                                                            Filesize

                                                                            10.8MB

                                                                          • memory/3756-62-0x00000245D6870000-0x00000245D6880000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3756-61-0x00000245D6870000-0x00000245D6880000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3756-60-0x00000245D6870000-0x00000245D6880000-memory.dmp

                                                                            Filesize

                                                                            64KB

                                                                          • memory/3756-63-0x00000245D8A50000-0x00000245D8A62000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/4376-28-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/4376-26-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/4376-25-0x0000000002CC0000-0x0000000002DC0000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/4600-89-0x0000000002E40000-0x0000000002F40000-memory.dmp

                                                                            Filesize

                                                                            1024KB

                                                                          • memory/4600-90-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB

                                                                          • memory/4600-91-0x0000000000400000-0x0000000002C4F000-memory.dmp

                                                                            Filesize

                                                                            40.3MB