Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2023, 15:07

General

  • Target

    d586e8a8fe5a576da33fc0e38c72c84fdae206858af65b3b80c75b2499c4212a.exe

  • Size

    1.2MB

  • MD5

    cbf084a7a29d2885edb579a2b09f3122

  • SHA1

    203c4552b3ac92e6d452ba7f96abf2ca53df562c

  • SHA256

    d586e8a8fe5a576da33fc0e38c72c84fdae206858af65b3b80c75b2499c4212a

  • SHA512

    90eb3034b7fd8ad5d5cf08c58fdff3fc961537a36c20347fd6d4500e76ab99ef8111504c1a1c36e516154a8e452023380778472af8ac14eb783da8166d1f06ee

  • SSDEEP

    24576:3yncS+x/fEHIl+9MPKnZguQKisyhL2qicXwAYGsS3C:CncSY/fqHkKZ3QKisyoDSl

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d586e8a8fe5a576da33fc0e38c72c84fdae206858af65b3b80c75b2499c4212a.exe
    "C:\Users\Admin\AppData\Local\Temp\d586e8a8fe5a576da33fc0e38c72c84fdae206858af65b3b80c75b2499c4212a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za445455.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za445455.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za989057.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za989057.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4484
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za415169.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za415169.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4908
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9645.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9645.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2088
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2836Wv.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2836Wv.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18YI10.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18YI10.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMFqC17.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMFqC17.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y82Kf76.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y82Kf76.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4572
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:2072
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:4484

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y82Kf76.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y82Kf76.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za445455.exe

          Filesize

          1.1MB

          MD5

          7d884a375a92b65188a83dfd067b403a

          SHA1

          a6d8e3db317d0a63d49adebdf146290cf8b6fc61

          SHA256

          a9a72c49c249fb35ef34505abe003a876335bb20844158bdeccb294bcdd0ae5a

          SHA512

          811b93cba4339a94c55e24e3bcf7e133da167eebdcd6ea1afce08d7f7ada6acccc81822f97dac1297b1aa35836bb21f17a4c5fea397cf389f14297126f428483

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za445455.exe

          Filesize

          1.1MB

          MD5

          7d884a375a92b65188a83dfd067b403a

          SHA1

          a6d8e3db317d0a63d49adebdf146290cf8b6fc61

          SHA256

          a9a72c49c249fb35ef34505abe003a876335bb20844158bdeccb294bcdd0ae5a

          SHA512

          811b93cba4339a94c55e24e3bcf7e133da167eebdcd6ea1afce08d7f7ada6acccc81822f97dac1297b1aa35836bb21f17a4c5fea397cf389f14297126f428483

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMFqC17.exe

          Filesize

          486KB

          MD5

          4685752a7c050ad8d3f789b90eb393b2

          SHA1

          00b4d1ed54753c91ef42a4b1bb0945b536d0976e

          SHA256

          1825fea355534cdb8bc7fbd92d4de59386e5d5fada2d1ceabbda5e9d6d5d9c78

          SHA512

          55de1d77256425d0e64319d4148970acbfbdbe67ea3c01041ac3b343181cf5d6609d507afc8a7b38147e39b1109723a5cd490954e860c1454a88fc305e564bc6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMFqC17.exe

          Filesize

          486KB

          MD5

          4685752a7c050ad8d3f789b90eb393b2

          SHA1

          00b4d1ed54753c91ef42a4b1bb0945b536d0976e

          SHA256

          1825fea355534cdb8bc7fbd92d4de59386e5d5fada2d1ceabbda5e9d6d5d9c78

          SHA512

          55de1d77256425d0e64319d4148970acbfbdbe67ea3c01041ac3b343181cf5d6609d507afc8a7b38147e39b1109723a5cd490954e860c1454a88fc305e564bc6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za989057.exe

          Filesize

          805KB

          MD5

          0ad02b21a81a008fbfc8d1b328b13335

          SHA1

          05ecb0393750178ecf484a7e816c9b500331929f

          SHA256

          130665d734707f2b3ee71bbcdf0cce88e2a34096c02751b27cd4d632458ecdaf

          SHA512

          0c08e96638cd546900bdac89e56d32828d2177053aa5c5e083e9bbab37b3a229c266ebd28677c72b070cd1041ff993a9039394205bd576fb522677e008290333

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za989057.exe

          Filesize

          805KB

          MD5

          0ad02b21a81a008fbfc8d1b328b13335

          SHA1

          05ecb0393750178ecf484a7e816c9b500331929f

          SHA256

          130665d734707f2b3ee71bbcdf0cce88e2a34096c02751b27cd4d632458ecdaf

          SHA512

          0c08e96638cd546900bdac89e56d32828d2177053aa5c5e083e9bbab37b3a229c266ebd28677c72b070cd1041ff993a9039394205bd576fb522677e008290333

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18YI10.exe

          Filesize

          403KB

          MD5

          aa8e2ee0561f38c93122ac039d82416d

          SHA1

          1610e288162dfe43a2043a930d5d4234cb2f30f3

          SHA256

          dedbdef04c04d707195d75b4a3c0af1151d9c5915e3738b91a1bf8c3fe134b72

          SHA512

          5bed7d457f9dcbf4d518e19747af3ad914d16eba04ec5aa96208e04b2f93a72d45b957d59ad00fe2d9b652191aa5f7009b9b4b9cc20d504ace74bf9d5c740eb9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18YI10.exe

          Filesize

          403KB

          MD5

          aa8e2ee0561f38c93122ac039d82416d

          SHA1

          1610e288162dfe43a2043a930d5d4234cb2f30f3

          SHA256

          dedbdef04c04d707195d75b4a3c0af1151d9c5915e3738b91a1bf8c3fe134b72

          SHA512

          5bed7d457f9dcbf4d518e19747af3ad914d16eba04ec5aa96208e04b2f93a72d45b957d59ad00fe2d9b652191aa5f7009b9b4b9cc20d504ace74bf9d5c740eb9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za415169.exe

          Filesize

          469KB

          MD5

          6c894150e959a7d5e0f91e3385b5d9b8

          SHA1

          ec311c8c9139254694f6c57cc92bdf5539b7adff

          SHA256

          2d20d446147d015c4f356e9f7aa8974dcf6f11e96177489d232bc5a4c60f1d71

          SHA512

          69e07a6ef82a14374804ab7d0de43a40c537305c355eb5cbe583b2d991416719ac319d24a577f8d0602a7557655d65c2a8a5e22ebd74060ca71d05d1d5bdc17a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za415169.exe

          Filesize

          469KB

          MD5

          6c894150e959a7d5e0f91e3385b5d9b8

          SHA1

          ec311c8c9139254694f6c57cc92bdf5539b7adff

          SHA256

          2d20d446147d015c4f356e9f7aa8974dcf6f11e96177489d232bc5a4c60f1d71

          SHA512

          69e07a6ef82a14374804ab7d0de43a40c537305c355eb5cbe583b2d991416719ac319d24a577f8d0602a7557655d65c2a8a5e22ebd74060ca71d05d1d5bdc17a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9645.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9645.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2836Wv.exe

          Filesize

          486KB

          MD5

          b19ae4ce8c89ee8b3188774cc4c289bc

          SHA1

          abd946fc9097859dda63e3bc5a175a3aea44711e

          SHA256

          70db4317cb47470fb27d6adc8121e0fc837454cc1f2d412f1c939442ef8be37c

          SHA512

          8e6d170bb68238b7926adbfd77ba08960e3903cea3f0a90372d7d0574a40ba4803064e1f416eeb5fac231939fb421c7b23beb4f682312566d013338637c14e3a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2836Wv.exe

          Filesize

          486KB

          MD5

          b19ae4ce8c89ee8b3188774cc4c289bc

          SHA1

          abd946fc9097859dda63e3bc5a175a3aea44711e

          SHA256

          70db4317cb47470fb27d6adc8121e0fc837454cc1f2d412f1c939442ef8be37c

          SHA512

          8e6d170bb68238b7926adbfd77ba08960e3903cea3f0a90372d7d0574a40ba4803064e1f416eeb5fac231939fb421c7b23beb4f682312566d013338637c14e3a

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • memory/2068-202-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-950-0x0000000007E60000-0x0000000007E72000-memory.dmp

          Filesize

          72KB

        • memory/2068-166-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-168-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-170-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-172-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-174-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-178-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-176-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-180-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-182-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-184-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-186-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-188-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-190-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-192-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-194-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-196-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-198-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-200-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-162-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-204-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-206-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-208-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-210-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-212-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-214-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-216-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-218-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-220-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-949-0x00000000077F0000-0x0000000007DF6000-memory.dmp

          Filesize

          6.0MB

        • memory/2068-164-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-951-0x0000000007E90000-0x0000000007F9A000-memory.dmp

          Filesize

          1.0MB

        • memory/2068-952-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

          Filesize

          248KB

        • memory/2068-953-0x0000000008130000-0x000000000817B000-memory.dmp

          Filesize

          300KB

        • memory/2068-954-0x0000000004F60000-0x0000000004F70000-memory.dmp

          Filesize

          64KB

        • memory/2068-955-0x00000000082C0000-0x0000000008326000-memory.dmp

          Filesize

          408KB

        • memory/2068-956-0x0000000008970000-0x0000000008A02000-memory.dmp

          Filesize

          584KB

        • memory/2068-957-0x0000000008B30000-0x0000000008B80000-memory.dmp

          Filesize

          320KB

        • memory/2068-958-0x0000000008B90000-0x0000000008C06000-memory.dmp

          Filesize

          472KB

        • memory/2068-959-0x0000000008C70000-0x0000000008E32000-memory.dmp

          Filesize

          1.8MB

        • memory/2068-960-0x0000000008E40000-0x000000000936C000-memory.dmp

          Filesize

          5.2MB

        • memory/2068-961-0x0000000009480000-0x000000000949E000-memory.dmp

          Filesize

          120KB

        • memory/2068-150-0x00000000024A0000-0x00000000024DC000-memory.dmp

          Filesize

          240KB

        • memory/2068-151-0x0000000004F70000-0x000000000546E000-memory.dmp

          Filesize

          5.0MB

        • memory/2068-152-0x0000000002790000-0x00000000027CA000-memory.dmp

          Filesize

          232KB

        • memory/2068-153-0x0000000000900000-0x0000000000946000-memory.dmp

          Filesize

          280KB

        • memory/2068-154-0x0000000004F60000-0x0000000004F70000-memory.dmp

          Filesize

          64KB

        • memory/2068-155-0x0000000004F60000-0x0000000004F70000-memory.dmp

          Filesize

          64KB

        • memory/2068-156-0x0000000004F60000-0x0000000004F70000-memory.dmp

          Filesize

          64KB

        • memory/2068-157-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-158-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2068-160-0x0000000002790000-0x00000000027C5000-memory.dmp

          Filesize

          212KB

        • memory/2088-144-0x0000000000430000-0x000000000043A000-memory.dmp

          Filesize

          40KB

        • memory/2752-1001-0x0000000002530000-0x0000000002540000-memory.dmp

          Filesize

          64KB

        • memory/2752-1000-0x0000000002530000-0x0000000002540000-memory.dmp

          Filesize

          64KB

        • memory/2752-999-0x0000000002530000-0x0000000002540000-memory.dmp

          Filesize

          64KB

        • memory/2752-998-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2752-969-0x0000000002590000-0x00000000025A8000-memory.dmp

          Filesize

          96KB

        • memory/2752-968-0x00000000023B0000-0x00000000023CA000-memory.dmp

          Filesize

          104KB

        • memory/3556-1804-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

          Filesize

          64KB

        • memory/3556-1010-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

          Filesize

          64KB

        • memory/3556-1012-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

          Filesize

          64KB

        • memory/3556-1009-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

          Filesize

          64KB