Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2023, 09:41

General

  • Target

    7a0a0dbf71442a6dc2195b4785a241f402051bcfafb318ab841664381b7aa84c.exe

  • Size

    1.1MB

  • MD5

    bf557022d047885dd77aeedfbace8906

  • SHA1

    7bafd574db5ea93aea56e502e272c4a844541dff

  • SHA256

    7a0a0dbf71442a6dc2195b4785a241f402051bcfafb318ab841664381b7aa84c

  • SHA512

    0ea9545a966002477e29740f38e0fc20e009bdb6e0e877f44ccb128842bcd6a9f7ecdf88b4acb62001e9fb340c7654230b1116127fd8a3ce193dbed719210cc4

  • SSDEEP

    24576:MyRnARsaC+0kT7UnGTTORA5KPf806Gb84HgO773ogX5GI:7JARsan0QStPRX8iT78Ag

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a0a0dbf71442a6dc2195b4785a241f402051bcfafb318ab841664381b7aa84c.exe
    "C:\Users\Admin\AppData\Local\Temp\7a0a0dbf71442a6dc2195b4785a241f402051bcfafb318ab841664381b7aa84c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za792837.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za792837.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za407906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za407906.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3804
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za610330.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za610330.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:528
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9741.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9741.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3748
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3310QP.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3310QP.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:316
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 2076
              6⤵
              • Program crash
              PID:392
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02cb46.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02cb46.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:752
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 1080
            5⤵
            • Program crash
            PID:1152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xhibV54.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xhibV54.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 1312
          4⤵
          • Program crash
          PID:4308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y60aa93.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y60aa93.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4364
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:3804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 316 -ip 316
    1⤵
      PID:4688
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 752 -ip 752
      1⤵
        PID:4292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3004 -ip 3004
        1⤵
          PID:2792
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:1916
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:4424

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y60aa93.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y60aa93.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za792837.exe

          Filesize

          931KB

          MD5

          4aaa2d72decb7b3dedadf839d5d33ef4

          SHA1

          df5eff7f8e7535f0ea77ddab095f40f1ab5e8c08

          SHA256

          53edabfabe0cf02c98f75f5d922f7eef317faa29389a9e0fe6f4a1fcc6d8c9fc

          SHA512

          590a52f4a5de714cba6acc9bfe471f4af62346e46e04201d0d46c952a1d3a17d9e5641c9acab773ca568fcb69c0587180ca8dad2f1f5e81259f1cef5bcd44580

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za792837.exe

          Filesize

          931KB

          MD5

          4aaa2d72decb7b3dedadf839d5d33ef4

          SHA1

          df5eff7f8e7535f0ea77ddab095f40f1ab5e8c08

          SHA256

          53edabfabe0cf02c98f75f5d922f7eef317faa29389a9e0fe6f4a1fcc6d8c9fc

          SHA512

          590a52f4a5de714cba6acc9bfe471f4af62346e46e04201d0d46c952a1d3a17d9e5641c9acab773ca568fcb69c0587180ca8dad2f1f5e81259f1cef5bcd44580

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xhibV54.exe

          Filesize

          360KB

          MD5

          8193909245fa36bca9471ff1467f1d64

          SHA1

          f127bb326093c64b2d0d8d055eba0c31ab95dde4

          SHA256

          cdbfdbc1361517eaa3efa1905390e613a43c07fa676f9ac73af445ba64b6f3b3

          SHA512

          5d2d8b0e602696368afb5ef9eeb77a4955f34e7d940adcbe3e0e29fba36bf09b1e0c8b0a1d52d26993a010863413f1591784ffca3a1a8d72024f02b86a1ac119

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xhibV54.exe

          Filesize

          360KB

          MD5

          8193909245fa36bca9471ff1467f1d64

          SHA1

          f127bb326093c64b2d0d8d055eba0c31ab95dde4

          SHA256

          cdbfdbc1361517eaa3efa1905390e613a43c07fa676f9ac73af445ba64b6f3b3

          SHA512

          5d2d8b0e602696368afb5ef9eeb77a4955f34e7d940adcbe3e0e29fba36bf09b1e0c8b0a1d52d26993a010863413f1591784ffca3a1a8d72024f02b86a1ac119

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za407906.exe

          Filesize

          695KB

          MD5

          32322b2b41e0e41de7cbe42b7c40c9cc

          SHA1

          d66bedee648884c02b3ba4050903dd6440be97b7

          SHA256

          dc8f1bff329e103c8f4455d248ec46a005b306a26403fb7e58e2e3d428a1be43

          SHA512

          2034dbe01a5152e4069ac33549b8713a0d50ab6a847a78dbe2fe281ac6db797d65320190d5838bfbb55c660f19e04dfa23388b79b3c4c8721a20e5741398b7f1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za407906.exe

          Filesize

          695KB

          MD5

          32322b2b41e0e41de7cbe42b7c40c9cc

          SHA1

          d66bedee648884c02b3ba4050903dd6440be97b7

          SHA256

          dc8f1bff329e103c8f4455d248ec46a005b306a26403fb7e58e2e3d428a1be43

          SHA512

          2034dbe01a5152e4069ac33549b8713a0d50ab6a847a78dbe2fe281ac6db797d65320190d5838bfbb55c660f19e04dfa23388b79b3c4c8721a20e5741398b7f1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02cb46.exe

          Filesize

          277KB

          MD5

          5afa2d668195daf8cde80c83501efa38

          SHA1

          70eb29577a0537f0e02a9f0e84ef75c4bdb7831c

          SHA256

          d239fa51e029369ebc996efac06683501be4530f6467078b1f0f598abb76953d

          SHA512

          785a236af089829f1f5b25aaf2fa1572ec3408347dd69a0df8078baea5f13df7f8fe4b805c022ee60c4ad120014e87b87e959e83d40b4763ce876a169917c165

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02cb46.exe

          Filesize

          277KB

          MD5

          5afa2d668195daf8cde80c83501efa38

          SHA1

          70eb29577a0537f0e02a9f0e84ef75c4bdb7831c

          SHA256

          d239fa51e029369ebc996efac06683501be4530f6467078b1f0f598abb76953d

          SHA512

          785a236af089829f1f5b25aaf2fa1572ec3408347dd69a0df8078baea5f13df7f8fe4b805c022ee60c4ad120014e87b87e959e83d40b4763ce876a169917c165

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za610330.exe

          Filesize

          415KB

          MD5

          406758279fa99c9000d14230c4d45969

          SHA1

          2dd2e2852d0da8db616f6ba6d1a3d8414678a698

          SHA256

          410af722aa97e77017c4cb63af047bd6c190f1f5ad5653f3d191c973a6f33af6

          SHA512

          93b145c2bba2eace514f643579acab39ff67f6a67fe95a377be44b2ff2851b1e9135d4b43ae71bd38f3bde8b9dc91840ff1f66e37e4e09c1d864d60a546d2b45

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za610330.exe

          Filesize

          415KB

          MD5

          406758279fa99c9000d14230c4d45969

          SHA1

          2dd2e2852d0da8db616f6ba6d1a3d8414678a698

          SHA256

          410af722aa97e77017c4cb63af047bd6c190f1f5ad5653f3d191c973a6f33af6

          SHA512

          93b145c2bba2eace514f643579acab39ff67f6a67fe95a377be44b2ff2851b1e9135d4b43ae71bd38f3bde8b9dc91840ff1f66e37e4e09c1d864d60a546d2b45

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9741.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9741.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3310QP.exe

          Filesize

          360KB

          MD5

          9d24c45a99461298d17465995b664170

          SHA1

          586e3fdef226805a8b47d51f37e723529e3a9316

          SHA256

          5a61e9ef36940d8c79224483aa3d12e57fdcc0e2935a24ede33c9e1fcc0edd90

          SHA512

          1d84ade1b39906acc304faee37e4c5857d0337d72b8948565966cb170c6ebae29e0e93145ae68bc467273265913f87f58becfdbba7ce50fee1653ce100a4a3f7

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3310QP.exe

          Filesize

          360KB

          MD5

          9d24c45a99461298d17465995b664170

          SHA1

          586e3fdef226805a8b47d51f37e723529e3a9316

          SHA256

          5a61e9ef36940d8c79224483aa3d12e57fdcc0e2935a24ede33c9e1fcc0edd90

          SHA512

          1d84ade1b39906acc304faee37e4c5857d0337d72b8948565966cb170c6ebae29e0e93145ae68bc467273265913f87f58becfdbba7ce50fee1653ce100a4a3f7

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/316-217-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-968-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/316-187-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-189-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-191-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-193-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-195-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-197-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-199-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-201-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-203-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-205-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-207-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-209-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-211-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-213-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-215-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-183-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-219-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-221-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-223-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-225-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-227-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-229-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-231-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-233-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-235-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-964-0x0000000009D40000-0x000000000A358000-memory.dmp

          Filesize

          6.1MB

        • memory/316-965-0x00000000072B0000-0x00000000072C2000-memory.dmp

          Filesize

          72KB

        • memory/316-966-0x000000000A360000-0x000000000A46A000-memory.dmp

          Filesize

          1.0MB

        • memory/316-967-0x000000000A470000-0x000000000A4AC000-memory.dmp

          Filesize

          240KB

        • memory/316-185-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-969-0x000000000A750000-0x000000000A7B6000-memory.dmp

          Filesize

          408KB

        • memory/316-970-0x000000000AE10000-0x000000000AEA2000-memory.dmp

          Filesize

          584KB

        • memory/316-971-0x000000000AEC0000-0x000000000AF10000-memory.dmp

          Filesize

          320KB

        • memory/316-972-0x000000000AF30000-0x000000000AFA6000-memory.dmp

          Filesize

          472KB

        • memory/316-973-0x000000000B220000-0x000000000B23E000-memory.dmp

          Filesize

          120KB

        • memory/316-974-0x000000000B2E0000-0x000000000B4A2000-memory.dmp

          Filesize

          1.8MB

        • memory/316-975-0x000000000B6C0000-0x000000000BBEC000-memory.dmp

          Filesize

          5.2MB

        • memory/316-167-0x0000000007310000-0x00000000078B4000-memory.dmp

          Filesize

          5.6MB

        • memory/316-168-0x00000000046C0000-0x0000000004706000-memory.dmp

          Filesize

          280KB

        • memory/316-169-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/316-170-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/316-171-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/316-172-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-173-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-175-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-177-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-179-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/316-181-0x0000000007160000-0x0000000007195000-memory.dmp

          Filesize

          212KB

        • memory/752-1018-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/752-1019-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/752-1017-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/752-1014-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/752-1013-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/752-1012-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/752-1011-0x00000000046C0000-0x00000000046ED000-memory.dmp

          Filesize

          180KB

        • memory/3004-1820-0x0000000004C00000-0x0000000004C10000-memory.dmp

          Filesize

          64KB

        • memory/3004-1130-0x0000000004C00000-0x0000000004C10000-memory.dmp

          Filesize

          64KB

        • memory/3004-1133-0x0000000004C00000-0x0000000004C10000-memory.dmp

          Filesize

          64KB

        • memory/3004-1129-0x0000000004C00000-0x0000000004C10000-memory.dmp

          Filesize

          64KB

        • memory/3748-161-0x0000000000D80000-0x0000000000D8A000-memory.dmp

          Filesize

          40KB