Analysis

  • max time kernel
    127s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2023, 00:01

General

  • Target

    e0afe22b5369ad77d29600482f93a66f4fcf3fa39de06ca8627a7e7357e0578b.exe

  • Size

    1.1MB

  • MD5

    a4cbe9ab288ac00374553754f553dc3c

  • SHA1

    0a4623800fe55ca5204ef5428c40c77d417fa4fd

  • SHA256

    e0afe22b5369ad77d29600482f93a66f4fcf3fa39de06ca8627a7e7357e0578b

  • SHA512

    25bf38bbb538167139a47419734cf65f8f52dc78e126f7d5c659bdd63bb868dcd3d7a81e64a2d3e9e22fff256bb2c37b5325ee19d7566f3df336436db4792cd8

  • SSDEEP

    24576:wyhMeUqZXFFlwjNAALcbkFgI7MrHopKq7Cl9iIFdJvFt:3hMMqjRL6+gI7MToT7ClhFB

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0afe22b5369ad77d29600482f93a66f4fcf3fa39de06ca8627a7e7357e0578b.exe
    "C:\Users\Admin\AppData\Local\Temp\e0afe22b5369ad77d29600482f93a66f4fcf3fa39de06ca8627a7e7357e0578b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za483559.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za483559.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za775609.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za775609.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za975968.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za975968.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0170.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0170.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2616
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0175rq.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0175rq.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4800
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 1100
              6⤵
              • Program crash
              PID:1656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02FS51.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02FS51.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2968
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 1552
            5⤵
            • Program crash
            PID:1100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqziQ84.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqziQ84.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86Nh47.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86Nh47.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3308
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4808
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:3712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4800 -ip 4800
    1⤵
      PID:2372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2968 -ip 2968
      1⤵
        PID:4792
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:2480
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:3596

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

              Filesize

              229KB

              MD5

              3308051ded87b1863a8d92925202c4b3

              SHA1

              7834ddc23e7976b07118fb580ae38234466dbdfb

              SHA256

              13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

              SHA512

              f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

            • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

              Filesize

              229KB

              MD5

              3308051ded87b1863a8d92925202c4b3

              SHA1

              7834ddc23e7976b07118fb580ae38234466dbdfb

              SHA256

              13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

              SHA512

              f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

            • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

              Filesize

              229KB

              MD5

              3308051ded87b1863a8d92925202c4b3

              SHA1

              7834ddc23e7976b07118fb580ae38234466dbdfb

              SHA256

              13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

              SHA512

              f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

            • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

              Filesize

              229KB

              MD5

              3308051ded87b1863a8d92925202c4b3

              SHA1

              7834ddc23e7976b07118fb580ae38234466dbdfb

              SHA256

              13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

              SHA512

              f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

            • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

              Filesize

              229KB

              MD5

              3308051ded87b1863a8d92925202c4b3

              SHA1

              7834ddc23e7976b07118fb580ae38234466dbdfb

              SHA256

              13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

              SHA512

              f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86Nh47.exe

              Filesize

              229KB

              MD5

              3308051ded87b1863a8d92925202c4b3

              SHA1

              7834ddc23e7976b07118fb580ae38234466dbdfb

              SHA256

              13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

              SHA512

              f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86Nh47.exe

              Filesize

              229KB

              MD5

              3308051ded87b1863a8d92925202c4b3

              SHA1

              7834ddc23e7976b07118fb580ae38234466dbdfb

              SHA256

              13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

              SHA512

              f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za483559.exe

              Filesize

              960KB

              MD5

              56b26b15a131e862eb4521d5c7267dd5

              SHA1

              76b2ea77926824bda331d03c77c1a078e14cc551

              SHA256

              88197099a0047e63f870e9c6f0ac21a4f29d9882b48e5bbed6707f1724325a94

              SHA512

              95f56203b5ec3775ef712ec152d4e1c605b8fc58a6d9b0854023ffa89baf9d541d86cff5d6dd05ee4f1815ca4df49bd3ed6da3fbf1c0de5e339e376ecbb06ef7

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za483559.exe

              Filesize

              960KB

              MD5

              56b26b15a131e862eb4521d5c7267dd5

              SHA1

              76b2ea77926824bda331d03c77c1a078e14cc551

              SHA256

              88197099a0047e63f870e9c6f0ac21a4f29d9882b48e5bbed6707f1724325a94

              SHA512

              95f56203b5ec3775ef712ec152d4e1c605b8fc58a6d9b0854023ffa89baf9d541d86cff5d6dd05ee4f1815ca4df49bd3ed6da3fbf1c0de5e339e376ecbb06ef7

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqziQ84.exe

              Filesize

              136KB

              MD5

              2b344ea5fa66c2fcee9bd2c1a28505aa

              SHA1

              b1ccde5c63b6f129817893a0ed8f09960eae99ad

              SHA256

              33d7b4587b250411aba1ee3d87a595a1640e8330065f96c8839d227c5a13002a

              SHA512

              de67298fe58fd003abd272b97a6e772d08b7e181e259605064669c8257ea9ac28f0c14c7e2282e93dbc2bbba3680a486e5101b14c0204b48bf3a565e6dc449ed

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xqziQ84.exe

              Filesize

              136KB

              MD5

              2b344ea5fa66c2fcee9bd2c1a28505aa

              SHA1

              b1ccde5c63b6f129817893a0ed8f09960eae99ad

              SHA256

              33d7b4587b250411aba1ee3d87a595a1640e8330065f96c8839d227c5a13002a

              SHA512

              de67298fe58fd003abd272b97a6e772d08b7e181e259605064669c8257ea9ac28f0c14c7e2282e93dbc2bbba3680a486e5101b14c0204b48bf3a565e6dc449ed

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za775609.exe

              Filesize

              806KB

              MD5

              59deebb9d63af9e0a290d0c912afadd1

              SHA1

              2ccc9b705bd3b71cbdff83210208a45189904290

              SHA256

              eae1d4ab2358abed1b1b6db6b7f53434e6184d2e9560a53951a79093e044e428

              SHA512

              0f26cff316908015f734f7ebebb7750d0458d3169f2a2e68493a1e76ed38ac2f9ae214809c04e3d70bedb5785acf43be4a7e3ed897ef1d3972ab204a83e70d0d

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za775609.exe

              Filesize

              806KB

              MD5

              59deebb9d63af9e0a290d0c912afadd1

              SHA1

              2ccc9b705bd3b71cbdff83210208a45189904290

              SHA256

              eae1d4ab2358abed1b1b6db6b7f53434e6184d2e9560a53951a79093e044e428

              SHA512

              0f26cff316908015f734f7ebebb7750d0458d3169f2a2e68493a1e76ed38ac2f9ae214809c04e3d70bedb5785acf43be4a7e3ed897ef1d3972ab204a83e70d0d

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02FS51.exe

              Filesize

              486KB

              MD5

              3a57b8d659f41dc375411ac708b7014d

              SHA1

              992d98be8f52aa45bd7607e483291925788a2cef

              SHA256

              031a1918e33082d36267e57e49a00dd5c3bf0a75f4f940fc4f12030b9de08bd2

              SHA512

              1b0df12d3e977e297006f29d28fcb42e573d3e1a1b750a3fe7c7144395d1b9e09aa88108c683881c4e77c86973798ba3730d7789335b44048a14dd84d0661cd4

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02FS51.exe

              Filesize

              486KB

              MD5

              3a57b8d659f41dc375411ac708b7014d

              SHA1

              992d98be8f52aa45bd7607e483291925788a2cef

              SHA256

              031a1918e33082d36267e57e49a00dd5c3bf0a75f4f940fc4f12030b9de08bd2

              SHA512

              1b0df12d3e977e297006f29d28fcb42e573d3e1a1b750a3fe7c7144395d1b9e09aa88108c683881c4e77c86973798ba3730d7789335b44048a14dd84d0661cd4

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za975968.exe

              Filesize

              388KB

              MD5

              159b6280d8a66e5123a0112901341292

              SHA1

              42d7a18f1bc59e5da050c3db6b15abd568fd297d

              SHA256

              aa2a5b2d839546a93a2a2396e8e641663d65f847cb227c3855c8f9a9a3331398

              SHA512

              35c0448206da59a6d536ee834d012ceeaea56840b2974db81c430a3c1c288cc2d9bd387fe160b541f1cf0e489a65edb4e4e933716d013b747e4edbdcedb31d50

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za975968.exe

              Filesize

              388KB

              MD5

              159b6280d8a66e5123a0112901341292

              SHA1

              42d7a18f1bc59e5da050c3db6b15abd568fd297d

              SHA256

              aa2a5b2d839546a93a2a2396e8e641663d65f847cb227c3855c8f9a9a3331398

              SHA512

              35c0448206da59a6d536ee834d012ceeaea56840b2974db81c430a3c1c288cc2d9bd387fe160b541f1cf0e489a65edb4e4e933716d013b747e4edbdcedb31d50

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0170.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0170.exe

              Filesize

              11KB

              MD5

              7e93bacbbc33e6652e147e7fe07572a0

              SHA1

              421a7167da01c8da4dc4d5234ca3dd84e319e762

              SHA256

              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

              SHA512

              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0175rq.exe

              Filesize

              404KB

              MD5

              7b5ad68d3f9db4e3ffe54aaac63e290c

              SHA1

              e0e1936ab3474bfdbed7cbcc7eb4547255d0513b

              SHA256

              58314d9e9ba7fec96b40167e05cd4f12491917ae22871e5524a8a8ddb16684c4

              SHA512

              7c209495ec20bc1edc505b8f81fd23dc400704062248bad2acf0f4f5ff456a1fc919d943250c7e8d26f67fe884a074756253007129d477c6ce464a2a52194a2c

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0175rq.exe

              Filesize

              404KB

              MD5

              7b5ad68d3f9db4e3ffe54aaac63e290c

              SHA1

              e0e1936ab3474bfdbed7cbcc7eb4547255d0513b

              SHA256

              58314d9e9ba7fec96b40167e05cd4f12491917ae22871e5524a8a8ddb16684c4

              SHA512

              7c209495ec20bc1edc505b8f81fd23dc400704062248bad2acf0f4f5ff456a1fc919d943250c7e8d26f67fe884a074756253007129d477c6ce464a2a52194a2c

            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

              Filesize

              89KB

              MD5

              73df88d68a4f5e066784d462788cf695

              SHA1

              e4bfed336848d0b622fa464d40cf4bd9222aab3f

              SHA256

              f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

              SHA512

              64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

              Filesize

              89KB

              MD5

              73df88d68a4f5e066784d462788cf695

              SHA1

              e4bfed336848d0b622fa464d40cf4bd9222aab3f

              SHA256

              f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

              SHA512

              64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

              Filesize

              89KB

              MD5

              73df88d68a4f5e066784d462788cf695

              SHA1

              e4bfed336848d0b622fa464d40cf4bd9222aab3f

              SHA256

              f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

              SHA512

              64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

              Filesize

              162B

              MD5

              1b7c22a214949975556626d7217e9a39

              SHA1

              d01c97e2944166ed23e47e4a62ff471ab8fa031f

              SHA256

              340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

              SHA512

              ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

            • memory/2472-1023-0x0000000007DF0000-0x0000000007E00000-memory.dmp

              Filesize

              64KB

            • memory/2472-1022-0x0000000000CB0000-0x0000000000CD8000-memory.dmp

              Filesize

              160KB

            • memory/2616-161-0x0000000000300000-0x000000000030A000-memory.dmp

              Filesize

              40KB

            • memory/2968-1009-0x0000000005000000-0x0000000005010000-memory.dmp

              Filesize

              64KB

            • memory/2968-244-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-1016-0x0000000002790000-0x00000000027E0000-memory.dmp

              Filesize

              320KB

            • memory/2968-1015-0x0000000009530000-0x000000000954E000-memory.dmp

              Filesize

              120KB

            • memory/2968-1014-0x0000000008EF0000-0x000000000941C000-memory.dmp

              Filesize

              5.2MB

            • memory/2968-1013-0x0000000008D20000-0x0000000008EE2000-memory.dmp

              Filesize

              1.8MB

            • memory/2968-1012-0x0000000008C40000-0x0000000008CB6000-memory.dmp

              Filesize

              472KB

            • memory/2968-1011-0x0000000008A80000-0x0000000008B12000-memory.dmp

              Filesize

              584KB

            • memory/2968-1010-0x00000000083B0000-0x0000000008416000-memory.dmp

              Filesize

              408KB

            • memory/2968-1008-0x00000000080C0000-0x00000000080FC000-memory.dmp

              Filesize

              240KB

            • memory/2968-211-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-213-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-210-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-215-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-217-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-219-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-221-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-223-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-225-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-228-0x00000000024A0000-0x00000000024E6000-memory.dmp

              Filesize

              280KB

            • memory/2968-227-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-231-0x0000000005000000-0x0000000005010000-memory.dmp

              Filesize

              64KB

            • memory/2968-230-0x0000000005000000-0x0000000005010000-memory.dmp

              Filesize

              64KB

            • memory/2968-232-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-234-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-236-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-238-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-240-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-242-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-1007-0x0000000007F90000-0x000000000809A000-memory.dmp

              Filesize

              1.0MB

            • memory/2968-246-0x0000000002880000-0x00000000028B5000-memory.dmp

              Filesize

              212KB

            • memory/2968-1005-0x0000000007940000-0x0000000007F58000-memory.dmp

              Filesize

              6.1MB

            • memory/2968-1006-0x0000000007F70000-0x0000000007F82000-memory.dmp

              Filesize

              72KB

            • memory/4800-185-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-170-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

              Filesize

              64KB

            • memory/4800-191-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-195-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-205-0x0000000000400000-0x000000000080A000-memory.dmp

              Filesize

              4.0MB

            • memory/4800-203-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

              Filesize

              64KB

            • memory/4800-202-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

              Filesize

              64KB

            • memory/4800-201-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

              Filesize

              64KB

            • memory/4800-200-0x0000000000400000-0x000000000080A000-memory.dmp

              Filesize

              4.0MB

            • memory/4800-199-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-189-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-187-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-193-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-181-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-197-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-179-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-177-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-175-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-173-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-172-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-171-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

              Filesize

              64KB

            • memory/4800-183-0x0000000002610000-0x0000000002622000-memory.dmp

              Filesize

              72KB

            • memory/4800-169-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

              Filesize

              64KB

            • memory/4800-168-0x0000000000990000-0x00000000009BD000-memory.dmp

              Filesize

              180KB

            • memory/4800-167-0x0000000004FD0000-0x0000000005574000-memory.dmp

              Filesize

              5.6MB