Analysis

  • max time kernel
    97s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2023, 08:47

General

  • Target

    1573ac384c5a84d96326a9cb5b8c724ca16e37ba398a7cd1f5a3fb0d5d8032f0.exe

  • Size

    1.2MB

  • MD5

    c069c4b1de55bda6afbfcdf91ea1c801

  • SHA1

    c253678998c251cb9dbd8e4c6c57f05e2a9e2ee5

  • SHA256

    1573ac384c5a84d96326a9cb5b8c724ca16e37ba398a7cd1f5a3fb0d5d8032f0

  • SHA512

    13a3fa7cd25261694521d4d80aa445c79809c13968b06578a9347a23a6c143f955ff69f5181ab0e97035486c08dc6fe21b104c0e0a3ce074c6cdb061833dcba7

  • SSDEEP

    24576:/yzL3rCpySNPOy/p/Dj+J+dxpUvx8ktiHj7TJ9V9h1PeklU32:KX3rRSNPOyhXkAUvxbtiHj7TV4klU3

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1573ac384c5a84d96326a9cb5b8c724ca16e37ba398a7cd1f5a3fb0d5d8032f0.exe
    "C:\Users\Admin\AppData\Local\Temp\1573ac384c5a84d96326a9cb5b8c724ca16e37ba398a7cd1f5a3fb0d5d8032f0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za830664.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za830664.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za653591.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za653591.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za835624.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za835624.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3619.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3619.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:460
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7327Lp.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7327Lp.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4512
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 1348
              6⤵
              • Program crash
              PID:2904
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w25BB97.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w25BB97.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3464
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 1084
            5⤵
            • Program crash
            PID:816
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xLgVH51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xLgVH51.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 1304
          4⤵
          • Program crash
          PID:64
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y41Ik09.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y41Ik09.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3460
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:3716
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4512 -ip 4512
    1⤵
      PID:1664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3464 -ip 3464
      1⤵
        PID:4828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4840 -ip 4840
        1⤵
          PID:1580
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:4868

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y41Ik09.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y41Ik09.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za830664.exe

          Filesize

          1.1MB

          MD5

          77a57224e98607d208eb405d9bb3164f

          SHA1

          41efcfaa688b64ff9b1d83335070a37185acdbd7

          SHA256

          b6e0eb97193565995a31a546f4101370a4230f6f24489d06276453705968ed9a

          SHA512

          f35905eeb23143e090278497c38ccf0a80b33231f6ff2e4b593d24a881ad581ded916407f394cb4be9f3fa11c1fd351337e1742e04ebe0206f48a8de5728db07

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za830664.exe

          Filesize

          1.1MB

          MD5

          77a57224e98607d208eb405d9bb3164f

          SHA1

          41efcfaa688b64ff9b1d83335070a37185acdbd7

          SHA256

          b6e0eb97193565995a31a546f4101370a4230f6f24489d06276453705968ed9a

          SHA512

          f35905eeb23143e090278497c38ccf0a80b33231f6ff2e4b593d24a881ad581ded916407f394cb4be9f3fa11c1fd351337e1742e04ebe0206f48a8de5728db07

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xLgVH51.exe

          Filesize

          486KB

          MD5

          533e620d9a3b8db357d29b45542655db

          SHA1

          49c99f700a731c7f9e217fdf1fb4519a6f9996d1

          SHA256

          e89bcdcbd0ae6eff89e4dd431c611fab2423e3b9a80e43bfe5932fdf5518e9d0

          SHA512

          ba283e968ef4dcf01884a870880b71973c1419a99ee9d8b0fe204a81c88335b1ff739bf602c48057b809ab4bde39a925b703306b107e208d6d5e5242001e9c05

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xLgVH51.exe

          Filesize

          486KB

          MD5

          533e620d9a3b8db357d29b45542655db

          SHA1

          49c99f700a731c7f9e217fdf1fb4519a6f9996d1

          SHA256

          e89bcdcbd0ae6eff89e4dd431c611fab2423e3b9a80e43bfe5932fdf5518e9d0

          SHA512

          ba283e968ef4dcf01884a870880b71973c1419a99ee9d8b0fe204a81c88335b1ff739bf602c48057b809ab4bde39a925b703306b107e208d6d5e5242001e9c05

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za653591.exe

          Filesize

          807KB

          MD5

          38903894b509662601f1182685aa4773

          SHA1

          23fc26936e47f647eee67260bd0d033a4584246a

          SHA256

          86eb5d2db886828f1aa37a225d04ee11376b4908304acc4d05af743100c8215f

          SHA512

          eed5bc1ada66623ca88892675473fbd3e239a1eba51e93164bd86d823e2e72a15afa1c5a0f2bc61bde3d0bfb1cd9d17091423f8d56c4f8311bb4722c89514578

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za653591.exe

          Filesize

          807KB

          MD5

          38903894b509662601f1182685aa4773

          SHA1

          23fc26936e47f647eee67260bd0d033a4584246a

          SHA256

          86eb5d2db886828f1aa37a225d04ee11376b4908304acc4d05af743100c8215f

          SHA512

          eed5bc1ada66623ca88892675473fbd3e239a1eba51e93164bd86d823e2e72a15afa1c5a0f2bc61bde3d0bfb1cd9d17091423f8d56c4f8311bb4722c89514578

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w25BB97.exe

          Filesize

          403KB

          MD5

          b6895a506b969a6308804489f4c270db

          SHA1

          345ab8c457f2704b6b0203465102edf5f5434c48

          SHA256

          ff11258c394cbf7039cdf36d7ded5fc5b304ad1ef5bf142ff848a64e6d499f39

          SHA512

          9928b885d8bf3e8a4e4a1fe8e3e418fb241a99bb674f8a25e903213a9c29bdf478543c8ae278dd0af233b00f37366596a023b42aeda5031e7855cc96ba3d14da

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w25BB97.exe

          Filesize

          403KB

          MD5

          b6895a506b969a6308804489f4c270db

          SHA1

          345ab8c457f2704b6b0203465102edf5f5434c48

          SHA256

          ff11258c394cbf7039cdf36d7ded5fc5b304ad1ef5bf142ff848a64e6d499f39

          SHA512

          9928b885d8bf3e8a4e4a1fe8e3e418fb241a99bb674f8a25e903213a9c29bdf478543c8ae278dd0af233b00f37366596a023b42aeda5031e7855cc96ba3d14da

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za835624.exe

          Filesize

          470KB

          MD5

          c311df8993bf09505efbdbea5cd80a9a

          SHA1

          02f6b746b78cc080d84d093d1bee6bda115ac5ef

          SHA256

          a7bbd9952ee76a7add23bf3dc1b0c675b9bb4cc62627d7ba82eed5e3de29c0e5

          SHA512

          ea25104dfcf68b0807262a6159ddf43d04307872a4a80ef6cd4eb901ce3b3abce13362d4f90d5560e7a7fff4925ea9a88a575f048fc28160810b448ee0422d88

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za835624.exe

          Filesize

          470KB

          MD5

          c311df8993bf09505efbdbea5cd80a9a

          SHA1

          02f6b746b78cc080d84d093d1bee6bda115ac5ef

          SHA256

          a7bbd9952ee76a7add23bf3dc1b0c675b9bb4cc62627d7ba82eed5e3de29c0e5

          SHA512

          ea25104dfcf68b0807262a6159ddf43d04307872a4a80ef6cd4eb901ce3b3abce13362d4f90d5560e7a7fff4925ea9a88a575f048fc28160810b448ee0422d88

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3619.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3619.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7327Lp.exe

          Filesize

          486KB

          MD5

          a49e6e7865a0c2bb7503c87dafc094fa

          SHA1

          8d4b60527e6e3c12a2e75e903d273cbef092fc37

          SHA256

          892d60f06efd7e1fe98301655ca8a77dbbb90a6ee9ca978d11f9a36e937df9b7

          SHA512

          7b86d44e26decb82c30fd27d9f75f4b7f6a4c45d93ddab335933737f152552414be308d9be76bff730edfaf69d5f602d92ccce9b847b77499041929ddd47d43b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7327Lp.exe

          Filesize

          486KB

          MD5

          a49e6e7865a0c2bb7503c87dafc094fa

          SHA1

          8d4b60527e6e3c12a2e75e903d273cbef092fc37

          SHA256

          892d60f06efd7e1fe98301655ca8a77dbbb90a6ee9ca978d11f9a36e937df9b7

          SHA512

          7b86d44e26decb82c30fd27d9f75f4b7f6a4c45d93ddab335933737f152552414be308d9be76bff730edfaf69d5f602d92ccce9b847b77499041929ddd47d43b

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/460-161-0x0000000000E30000-0x0000000000E3A000-memory.dmp

          Filesize

          40KB

        • memory/3464-1015-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3464-1014-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3464-1013-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3464-1012-0x0000000002420000-0x000000000244D000-memory.dmp

          Filesize

          180KB

        • memory/4512-220-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-972-0x0000000008D60000-0x0000000008DB0000-memory.dmp

          Filesize

          320KB

        • memory/4512-204-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-206-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-208-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-210-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-212-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-215-0x00000000026F0000-0x0000000002700000-memory.dmp

          Filesize

          64KB

        • memory/4512-217-0x00000000026F0000-0x0000000002700000-memory.dmp

          Filesize

          64KB

        • memory/4512-214-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-218-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-200-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-222-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-224-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-226-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-228-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-230-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-232-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-234-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-236-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-965-0x00000000078B0000-0x0000000007EC8000-memory.dmp

          Filesize

          6.1MB

        • memory/4512-966-0x0000000007F70000-0x0000000007F82000-memory.dmp

          Filesize

          72KB

        • memory/4512-967-0x0000000007F90000-0x000000000809A000-memory.dmp

          Filesize

          1.0MB

        • memory/4512-968-0x00000000080C0000-0x00000000080FC000-memory.dmp

          Filesize

          240KB

        • memory/4512-969-0x00000000026F0000-0x0000000002700000-memory.dmp

          Filesize

          64KB

        • memory/4512-970-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/4512-971-0x0000000008A80000-0x0000000008B12000-memory.dmp

          Filesize

          584KB

        • memory/4512-202-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-973-0x0000000008DD0000-0x0000000008E46000-memory.dmp

          Filesize

          472KB

        • memory/4512-974-0x0000000008EB0000-0x0000000009072000-memory.dmp

          Filesize

          1.8MB

        • memory/4512-975-0x0000000009090000-0x00000000095BC000-memory.dmp

          Filesize

          5.2MB

        • memory/4512-976-0x00000000096C0000-0x00000000096DE000-memory.dmp

          Filesize

          120KB

        • memory/4512-198-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-196-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-194-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-192-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-190-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-188-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-186-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-184-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-168-0x0000000002450000-0x0000000002496000-memory.dmp

          Filesize

          280KB

        • memory/4512-169-0x00000000026F0000-0x0000000002700000-memory.dmp

          Filesize

          64KB

        • memory/4512-170-0x0000000004E30000-0x00000000053D4000-memory.dmp

          Filesize

          5.6MB

        • memory/4512-182-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-180-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-178-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-176-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-174-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-172-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4512-171-0x0000000002980000-0x00000000029B5000-memory.dmp

          Filesize

          212KB

        • memory/4840-1817-0x0000000002B30000-0x0000000002B40000-memory.dmp

          Filesize

          64KB

        • memory/4840-1143-0x0000000002B30000-0x0000000002B40000-memory.dmp

          Filesize

          64KB

        • memory/4840-1142-0x0000000002B30000-0x0000000002B40000-memory.dmp

          Filesize

          64KB