Analysis

  • max time kernel
    99s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-04-2023 15:57

General

  • Target

    82a5250b63e074f87046c45d1ddfc3e52bf42b042fb8b4a27fef6d3641c1a2e3.exe

  • Size

    942KB

  • MD5

    a7c65625f3b87175559429c5d6bb8099

  • SHA1

    db69cc4de86807eb7c5ec9923326611c987c4b14

  • SHA256

    82a5250b63e074f87046c45d1ddfc3e52bf42b042fb8b4a27fef6d3641c1a2e3

  • SHA512

    50143428fce88658ac6cbb59c02feb9b1436e97ff3c4321b43c72226c6112c5bb56673cbd56958eac259a9a693d3e0dba3feddf1b2c21c0626aee2b95cd074d2

  • SSDEEP

    12288:jy902HjUph33sQt0E7YWXLqMk2yi17wOOY2PhGEU6Y/t5XsWiw6BzeI4kUJwYZ9Q:jy7wph33ft9VL/1EW2PPEaWbgFTfn

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82a5250b63e074f87046c45d1ddfc3e52bf42b042fb8b4a27fef6d3641c1a2e3.exe
    "C:\Users\Admin\AppData\Local\Temp\82a5250b63e074f87046c45d1ddfc3e52bf42b042fb8b4a27fef6d3641c1a2e3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za891769.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za891769.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za069137.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za069137.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6378BR.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6378BR.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1564
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w86MY09.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w86MY09.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYNEI87.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYNEI87.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y66pu96.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y66pu96.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1600
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:3024
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:3036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y66pu96.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y66pu96.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za891769.exe

    Filesize

    759KB

    MD5

    87ce9c7c0ed1b772756e37252ec8f6f4

    SHA1

    f538671e769e9bc3bc72509715debebbb42611a0

    SHA256

    aaa806bc2a9db2125a0c56dbf90c392da1d7efb85cffa1421f476b536d76d92c

    SHA512

    97879d1d7a9d55063e579d88ac3a09da36c6daa201d6620d9a47fb564ac5b4ba4e30ac9b48f8ae80af070649f618f6e255a11a88f10ad51fa93ea082d496573b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za891769.exe

    Filesize

    759KB

    MD5

    87ce9c7c0ed1b772756e37252ec8f6f4

    SHA1

    f538671e769e9bc3bc72509715debebbb42611a0

    SHA256

    aaa806bc2a9db2125a0c56dbf90c392da1d7efb85cffa1421f476b536d76d92c

    SHA512

    97879d1d7a9d55063e579d88ac3a09da36c6daa201d6620d9a47fb564ac5b4ba4e30ac9b48f8ae80af070649f618f6e255a11a88f10ad51fa93ea082d496573b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYNEI87.exe

    Filesize

    136KB

    MD5

    e55f559dd07e54f92678ca354fffac02

    SHA1

    b406452190eff45a17b283f7d3af9a202af846bd

    SHA256

    d6a91655837a0be7cd18c706e928f396183d98857946cd3a0e7bfea2db83f308

    SHA512

    ce49f69b31ba5bebac891499010761db4462ba4674a3f8e6c4f6f13a82660bd6ea858d976152c33b850c743a08783cff6617c5c0b7604fd127b06cc2dcd8ec80

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYNEI87.exe

    Filesize

    136KB

    MD5

    e55f559dd07e54f92678ca354fffac02

    SHA1

    b406452190eff45a17b283f7d3af9a202af846bd

    SHA256

    d6a91655837a0be7cd18c706e928f396183d98857946cd3a0e7bfea2db83f308

    SHA512

    ce49f69b31ba5bebac891499010761db4462ba4674a3f8e6c4f6f13a82660bd6ea858d976152c33b850c743a08783cff6617c5c0b7604fd127b06cc2dcd8ec80

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za069137.exe

    Filesize

    605KB

    MD5

    fe513ff03f8886c6b9c3b8700df6758f

    SHA1

    0d9e14ff27480e9b6b4e4bf722cb213ac1b15846

    SHA256

    ebefe43531f5f6aff6a09b12558394b2d07c46c4938096f7113404f7b64c45c5

    SHA512

    edd1b533b9fc83fb78ad56bbdeb9702b4c327a04d0d2e9c1bd428afdf1120b599abae919f2bde4e0032cea1dea2af214ff9e71a3be86ab6ac1dbdd9e175998bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za069137.exe

    Filesize

    605KB

    MD5

    fe513ff03f8886c6b9c3b8700df6758f

    SHA1

    0d9e14ff27480e9b6b4e4bf722cb213ac1b15846

    SHA256

    ebefe43531f5f6aff6a09b12558394b2d07c46c4938096f7113404f7b64c45c5

    SHA512

    edd1b533b9fc83fb78ad56bbdeb9702b4c327a04d0d2e9c1bd428afdf1120b599abae919f2bde4e0032cea1dea2af214ff9e71a3be86ab6ac1dbdd9e175998bb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6378BR.exe

    Filesize

    404KB

    MD5

    5450df96d1af223d688b1b48f7b99944

    SHA1

    a7cc40ea689f681104a144e57bd5df7e96bdef01

    SHA256

    b5d524a2fcca9276757a47af6db5c2bf52b9ccff6e0cf4fdff20a4117f9a892a

    SHA512

    2b51041051572ffd2818e44fe51ffa70f5d23e045c97e2abb322e69038d92031dfa85169e3698c542519d2305938baa122365d676ae0166f458ec407efa559d5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6378BR.exe

    Filesize

    404KB

    MD5

    5450df96d1af223d688b1b48f7b99944

    SHA1

    a7cc40ea689f681104a144e57bd5df7e96bdef01

    SHA256

    b5d524a2fcca9276757a47af6db5c2bf52b9ccff6e0cf4fdff20a4117f9a892a

    SHA512

    2b51041051572ffd2818e44fe51ffa70f5d23e045c97e2abb322e69038d92031dfa85169e3698c542519d2305938baa122365d676ae0166f458ec407efa559d5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w86MY09.exe

    Filesize

    487KB

    MD5

    dc6b639b745365753dc47421462bb283

    SHA1

    7231f8d7a2b64cafeafbe2da9fb7fad63189d991

    SHA256

    5804bda4e3f715d77a1d46ed0abd6a8e19172886b7c11940d080f99618a0df1f

    SHA512

    a60da316dc315ea9bfc437650acacb0c6b6f659fa714cab6c64c2d8e23f8bed1e1aba5c1ad58eed1746308b0c02142a6fdff1384130fdc0924c25d3e4f67a6c1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w86MY09.exe

    Filesize

    487KB

    MD5

    dc6b639b745365753dc47421462bb283

    SHA1

    7231f8d7a2b64cafeafbe2da9fb7fad63189d991

    SHA256

    5804bda4e3f715d77a1d46ed0abd6a8e19172886b7c11940d080f99618a0df1f

    SHA512

    a60da316dc315ea9bfc437650acacb0c6b6f659fa714cab6c64c2d8e23f8bed1e1aba5c1ad58eed1746308b0c02142a6fdff1384130fdc0924c25d3e4f67a6c1

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/1564-157-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-175-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-153-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-159-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-161-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-163-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-165-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-169-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-167-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-171-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-173-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-155-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-177-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/1564-180-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/1564-150-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-151-0x00000000026A0000-0x00000000026B2000-memory.dmp

    Filesize

    72KB

  • memory/1564-149-0x00000000026A0000-0x00000000026B8000-memory.dmp

    Filesize

    96KB

  • memory/1564-148-0x0000000004E00000-0x00000000052FE000-memory.dmp

    Filesize

    5.0MB

  • memory/1564-147-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/1564-146-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/1564-145-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/1564-144-0x0000000002350000-0x000000000236A000-memory.dmp

    Filesize

    104KB

  • memory/1564-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4212-196-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-989-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/4212-204-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-206-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-208-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-210-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-212-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-213-0x0000000000930000-0x0000000000976000-memory.dmp

    Filesize

    280KB

  • memory/4212-217-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/4212-216-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-214-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/4212-219-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-222-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-220-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/4212-224-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-983-0x00000000077C0000-0x0000000007DC6000-memory.dmp

    Filesize

    6.0MB

  • memory/4212-984-0x0000000007E60000-0x0000000007E72000-memory.dmp

    Filesize

    72KB

  • memory/4212-985-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/4212-986-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/4212-987-0x0000000008130000-0x000000000817B000-memory.dmp

    Filesize

    300KB

  • memory/4212-988-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/4212-202-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-990-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/4212-991-0x0000000008A40000-0x0000000008AB6000-memory.dmp

    Filesize

    472KB

  • memory/4212-992-0x0000000008B00000-0x0000000008CC2000-memory.dmp

    Filesize

    1.8MB

  • memory/4212-993-0x0000000008CE0000-0x000000000920C000-memory.dmp

    Filesize

    5.2MB

  • memory/4212-994-0x0000000009340000-0x000000000935E000-memory.dmp

    Filesize

    120KB

  • memory/4212-995-0x00000000025F0000-0x0000000002640000-memory.dmp

    Filesize

    320KB

  • memory/4212-997-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/4212-998-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/4212-999-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB

  • memory/4212-185-0x0000000002670000-0x00000000026AC000-memory.dmp

    Filesize

    240KB

  • memory/4212-186-0x00000000052C0000-0x00000000052FA000-memory.dmp

    Filesize

    232KB

  • memory/4212-200-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-198-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-194-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-192-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-190-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-188-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4212-187-0x00000000052C0000-0x00000000052F5000-memory.dmp

    Filesize

    212KB

  • memory/4368-1006-0x0000000007740000-0x000000000778B000-memory.dmp

    Filesize

    300KB

  • memory/4368-1005-0x00000000009A0000-0x00000000009C8000-memory.dmp

    Filesize

    160KB

  • memory/4368-1007-0x0000000007A40000-0x0000000007A50000-memory.dmp

    Filesize

    64KB