Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/04/2023, 14:40

General

  • Target

    1b5803f66b61bc627b323bc2a5cac0b40527d214ee4038b28d22614844523ea1.exe

  • Size

    1.0MB

  • MD5

    7ddfdb0e6901edbfb8a43c3aaf12da8d

  • SHA1

    6fbbce929fd39a980263c8f725da1a108b3a1031

  • SHA256

    1b5803f66b61bc627b323bc2a5cac0b40527d214ee4038b28d22614844523ea1

  • SHA512

    4db31bb5c6c7f30f257912fab1e1d33de66b3317f1ee0a00bd18123b69d5f7be2e2fb966e7382b96af977612a5d32d922027c2178cfc5cc67731f20605b5a8c8

  • SSDEEP

    24576:TylyOOMjUHZRrw3GQu7YI064T73JTA0c:mddUHnwW9EI06Y3W0

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b5803f66b61bc627b323bc2a5cac0b40527d214ee4038b28d22614844523ea1.exe
    "C:\Users\Admin\AppData\Local\Temp\1b5803f66b61bc627b323bc2a5cac0b40527d214ee4038b28d22614844523ea1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za148205.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za148205.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za355260.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za355260.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za972101.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za972101.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9552.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9552.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4392
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8969GC.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8969GC.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10fE89.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10fE89.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3932
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10fE89.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10fE89.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCqAw42.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCqAw42.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y75eu72.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y75eu72.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4788
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3560
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:4036
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:2660
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:4744

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y75eu72.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y75eu72.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za148205.exe

          Filesize

          852KB

          MD5

          35887f862a88dd598f01239f96049573

          SHA1

          06ef6733bd7e2349174d1450893df79850ad12b0

          SHA256

          7143db1522406c4a73baf8b6dcf04c84a70b2051d92466676cf54c3d5da79f30

          SHA512

          0d12d155686d9a80e6ff106c73eaa1d63f2904728f333b74e42dc979c0cb0d829f78c343b59cf71dca1f2e3fa370412fcb51fc028b37bd88444447e859288335

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za148205.exe

          Filesize

          852KB

          MD5

          35887f862a88dd598f01239f96049573

          SHA1

          06ef6733bd7e2349174d1450893df79850ad12b0

          SHA256

          7143db1522406c4a73baf8b6dcf04c84a70b2051d92466676cf54c3d5da79f30

          SHA512

          0d12d155686d9a80e6ff106c73eaa1d63f2904728f333b74e42dc979c0cb0d829f78c343b59cf71dca1f2e3fa370412fcb51fc028b37bd88444447e859288335

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCqAw42.exe

          Filesize

          136KB

          MD5

          2b344ea5fa66c2fcee9bd2c1a28505aa

          SHA1

          b1ccde5c63b6f129817893a0ed8f09960eae99ad

          SHA256

          33d7b4587b250411aba1ee3d87a595a1640e8330065f96c8839d227c5a13002a

          SHA512

          de67298fe58fd003abd272b97a6e772d08b7e181e259605064669c8257ea9ac28f0c14c7e2282e93dbc2bbba3680a486e5101b14c0204b48bf3a565e6dc449ed

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCqAw42.exe

          Filesize

          136KB

          MD5

          2b344ea5fa66c2fcee9bd2c1a28505aa

          SHA1

          b1ccde5c63b6f129817893a0ed8f09960eae99ad

          SHA256

          33d7b4587b250411aba1ee3d87a595a1640e8330065f96c8839d227c5a13002a

          SHA512

          de67298fe58fd003abd272b97a6e772d08b7e181e259605064669c8257ea9ac28f0c14c7e2282e93dbc2bbba3680a486e5101b14c0204b48bf3a565e6dc449ed

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za355260.exe

          Filesize

          698KB

          MD5

          10bbeb0c12af3c70819cab651bde8c8d

          SHA1

          922a4c5d1579b3be7fe319c7b3a2d0c1425071e3

          SHA256

          9334b4dbb61b3d55d21cb4c8383f14405cb78585f0c6b00d832c0c69b38d2fad

          SHA512

          01f6575898e74e6cbea69ed053dd48261d8d277fe6e91af97910868d1139ef6925e90287164f2d6a090a26046b534cd068fa3dd6067c062dda571de9084f3c64

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za355260.exe

          Filesize

          698KB

          MD5

          10bbeb0c12af3c70819cab651bde8c8d

          SHA1

          922a4c5d1579b3be7fe319c7b3a2d0c1425071e3

          SHA256

          9334b4dbb61b3d55d21cb4c8383f14405cb78585f0c6b00d832c0c69b38d2fad

          SHA512

          01f6575898e74e6cbea69ed053dd48261d8d277fe6e91af97910868d1139ef6925e90287164f2d6a090a26046b534cd068fa3dd6067c062dda571de9084f3c64

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10fE89.exe

          Filesize

          338KB

          MD5

          2e938f9c9d51a19b7343c5008457fe7c

          SHA1

          aa237bbf231730bb46f0ab6fb1cf4b2f437fa0e2

          SHA256

          8416df9f70b5d9ea8c20f164549527e3c4f7b60110745e9a52688f5ce1e129c9

          SHA512

          e0c826a107dffc24a7a63e9d34957910cf0f46d7ec49f49abded201d43a22bb53f51ed463372906cfe0b995ecd9d28a79ec3f3a9f23586aceed9a0aee064ff06

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10fE89.exe

          Filesize

          338KB

          MD5

          2e938f9c9d51a19b7343c5008457fe7c

          SHA1

          aa237bbf231730bb46f0ab6fb1cf4b2f437fa0e2

          SHA256

          8416df9f70b5d9ea8c20f164549527e3c4f7b60110745e9a52688f5ce1e129c9

          SHA512

          e0c826a107dffc24a7a63e9d34957910cf0f46d7ec49f49abded201d43a22bb53f51ed463372906cfe0b995ecd9d28a79ec3f3a9f23586aceed9a0aee064ff06

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10fE89.exe

          Filesize

          338KB

          MD5

          2e938f9c9d51a19b7343c5008457fe7c

          SHA1

          aa237bbf231730bb46f0ab6fb1cf4b2f437fa0e2

          SHA256

          8416df9f70b5d9ea8c20f164549527e3c4f7b60110745e9a52688f5ce1e129c9

          SHA512

          e0c826a107dffc24a7a63e9d34957910cf0f46d7ec49f49abded201d43a22bb53f51ed463372906cfe0b995ecd9d28a79ec3f3a9f23586aceed9a0aee064ff06

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za972101.exe

          Filesize

          333KB

          MD5

          c07868eeeec3f1ae3e016f9b194b2eb2

          SHA1

          f3b32be769587f25ec90b3a3d65e36dcc14ed773

          SHA256

          9391b266c713e60f285746a8337d21156207e6d534b35bb7327e78ab642c37a6

          SHA512

          f3de56087b8cc54dd9a1e43a05719669295bc0e1cf41f1cf1cd901099b8a10ca5e4936aee0ab3152ca026230fbef21a10d40a8bf1ff5e10822099b19ee2d8a87

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za972101.exe

          Filesize

          333KB

          MD5

          c07868eeeec3f1ae3e016f9b194b2eb2

          SHA1

          f3b32be769587f25ec90b3a3d65e36dcc14ed773

          SHA256

          9391b266c713e60f285746a8337d21156207e6d534b35bb7327e78ab642c37a6

          SHA512

          f3de56087b8cc54dd9a1e43a05719669295bc0e1cf41f1cf1cd901099b8a10ca5e4936aee0ab3152ca026230fbef21a10d40a8bf1ff5e10822099b19ee2d8a87

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9552.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9552.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8969GC.exe

          Filesize

          254KB

          MD5

          9eb5bd90c68ca10a0f730e99ba8cda7c

          SHA1

          260d9e14abac7663f8a6efd7aa184a88247a0630

          SHA256

          e712e97bf6bb630f68655e618dae05db6044a85c0366fffb438c8f6e8614ebad

          SHA512

          b3b8376b0381f3b2eb6b75d05a38cef730b2c254863ee9f301b58ebd75b8d185b94277de92b45e5991193f10464856aee407f01644c2d6e4cbab328c3630086c

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8969GC.exe

          Filesize

          254KB

          MD5

          9eb5bd90c68ca10a0f730e99ba8cda7c

          SHA1

          260d9e14abac7663f8a6efd7aa184a88247a0630

          SHA256

          e712e97bf6bb630f68655e618dae05db6044a85c0366fffb438c8f6e8614ebad

          SHA512

          b3b8376b0381f3b2eb6b75d05a38cef730b2c254863ee9f301b58ebd75b8d185b94277de92b45e5991193f10464856aee407f01644c2d6e4cbab328c3630086c

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • memory/1100-234-0x0000000007BA0000-0x0000000007BEB000-memory.dmp

          Filesize

          300KB

        • memory/1100-227-0x0000000007C20000-0x0000000007D2A000-memory.dmp

          Filesize

          1.0MB

        • memory/1100-254-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/1100-1013-0x0000000008D90000-0x0000000008DAE000-memory.dmp

          Filesize

          120KB

        • memory/1100-1012-0x0000000009B80000-0x000000000A0AC000-memory.dmp

          Filesize

          5.2MB

        • memory/1100-229-0x0000000007B50000-0x0000000007B8E000-memory.dmp

          Filesize

          248KB

        • memory/1100-218-0x00000000080A0000-0x00000000086A6000-memory.dmp

          Filesize

          6.0MB

        • memory/1100-335-0x0000000007EA0000-0x0000000007F06000-memory.dmp

          Filesize

          408KB

        • memory/1100-221-0x0000000007AF0000-0x0000000007B02000-memory.dmp

          Filesize

          72KB

        • memory/1100-471-0x0000000008A50000-0x0000000008AE2000-memory.dmp

          Filesize

          584KB

        • memory/1100-1010-0x0000000008D10000-0x0000000008D86000-memory.dmp

          Filesize

          472KB

        • memory/1100-1009-0x0000000008BF0000-0x0000000008C40000-memory.dmp

          Filesize

          320KB

        • memory/1100-1011-0x0000000009480000-0x0000000009642000-memory.dmp

          Filesize

          1.8MB

        • memory/1100-202-0x0000000000E00000-0x0000000000E28000-memory.dmp

          Filesize

          160KB

        • memory/2996-238-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-236-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-196-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/2996-201-0x0000000002180000-0x00000000021BC000-memory.dmp

          Filesize

          240KB

        • memory/2996-1028-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/2996-192-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/2996-203-0x00000000049B0000-0x00000000049EA000-memory.dmp

          Filesize

          232KB

        • memory/2996-204-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-205-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-207-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-209-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-211-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-213-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-216-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-219-0x0000000004A30000-0x0000000004A40000-memory.dmp

          Filesize

          64KB

        • memory/2996-220-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-222-0x0000000004A30000-0x0000000004A40000-memory.dmp

          Filesize

          64KB

        • memory/2996-225-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-224-0x0000000004A30000-0x0000000004A40000-memory.dmp

          Filesize

          64KB

        • memory/2996-1008-0x0000000004A30000-0x0000000004A40000-memory.dmp

          Filesize

          64KB

        • memory/2996-228-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-242-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-240-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-215-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/2996-195-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/2996-231-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/2996-233-0x00000000049B0000-0x00000000049E5000-memory.dmp

          Filesize

          212KB

        • memory/3932-194-0x0000000002140000-0x0000000002187000-memory.dmp

          Filesize

          284KB

        • memory/4056-166-0x00000000008F0000-0x0000000000900000-memory.dmp

          Filesize

          64KB

        • memory/4056-152-0x0000000004CB0000-0x00000000051AE000-memory.dmp

          Filesize

          5.0MB

        • memory/4056-184-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-185-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/4056-176-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-174-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-172-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-187-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/4056-170-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-167-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-168-0x00000000008F0000-0x0000000000900000-memory.dmp

          Filesize

          64KB

        • memory/4056-180-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-178-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-161-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-163-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-159-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-157-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-155-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-182-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-154-0x00000000024A0000-0x00000000024B2000-memory.dmp

          Filesize

          72KB

        • memory/4056-153-0x00000000024A0000-0x00000000024B8000-memory.dmp

          Filesize

          96KB

        • memory/4056-164-0x00000000008F0000-0x0000000000900000-memory.dmp

          Filesize

          64KB

        • memory/4056-151-0x0000000002300000-0x000000000231A000-memory.dmp

          Filesize

          104KB

        • memory/4056-150-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4392-144-0x0000000000670000-0x000000000067A000-memory.dmp

          Filesize

          40KB