Analysis

  • max time kernel
    128s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-04-2023 19:31

General

  • Target

    e92719ed71d0c4f48134eb623fd6c4b50a03a4614dfd5ae6ced700296b4ca759.exe

  • Size

    1.1MB

  • MD5

    c549aa4209f77f264be4b7fdeaeabe0a

  • SHA1

    f1ebc545de0cfa9325a57d2bd3286f8fa6e05c7d

  • SHA256

    e92719ed71d0c4f48134eb623fd6c4b50a03a4614dfd5ae6ced700296b4ca759

  • SHA512

    58806277822cb8a904ec3e0abc007e5be55fe6edb821ac4d6418e8a2e37b344829905e3841f96208083ae400a387971ff62b2847cd797ae65d180728715bee83

  • SSDEEP

    24576:/yLUnHs4AKCDePPyFM++wyyY+F11RLWUO0J/g09xhtdRNVM:KLUnLPOePy8wZXNZtO6x5RNV

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e92719ed71d0c4f48134eb623fd6c4b50a03a4614dfd5ae6ced700296b4ca759.exe
    "C:\Users\Admin\AppData\Local\Temp\e92719ed71d0c4f48134eb623fd6c4b50a03a4614dfd5ae6ced700296b4ca759.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za841267.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za841267.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za183261.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za183261.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za230994.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za230994.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2944.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2944.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3936
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2854Vx.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2854Vx.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4792
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w53Pl13.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w53Pl13.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4620
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w53Pl13.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w53Pl13.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xghHt52.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xghHt52.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y56Hw77.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y56Hw77.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4340
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3268
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:664
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:3628
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:3032
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:3036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y56Hw77.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y56Hw77.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za841267.exe

    Filesize

    918KB

    MD5

    c095e4bc72145a77365ff2baecae5408

    SHA1

    d579f586d55573c83c45e62d37af83076bd4b1be

    SHA256

    c097b27dd224c1a76363a520ab60572c41c568ef3e1965896a1a50743dfd2fb1

    SHA512

    0650dcf8778e97d43308b00300223a3224bbe10343fbe506782ee37bce355ec7fe9bfa30746e15a2115a864e3d6ebce3239660dae4d997b6487955eb8315759a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za841267.exe

    Filesize

    918KB

    MD5

    c095e4bc72145a77365ff2baecae5408

    SHA1

    d579f586d55573c83c45e62d37af83076bd4b1be

    SHA256

    c097b27dd224c1a76363a520ab60572c41c568ef3e1965896a1a50743dfd2fb1

    SHA512

    0650dcf8778e97d43308b00300223a3224bbe10343fbe506782ee37bce355ec7fe9bfa30746e15a2115a864e3d6ebce3239660dae4d997b6487955eb8315759a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xghHt52.exe

    Filesize

    360KB

    MD5

    a77d15168963347c2300c3207cadecf6

    SHA1

    adc81e70c8a4702a1d11a8afa3ff6e19a5f11bfe

    SHA256

    a6a291c24ecaa571f1eb90d2ca2f39f5cd6bfe18b775e1a8ad27b8e509f9a8ea

    SHA512

    0dd3d2fdd760fe040014e71c40459294bd41399933cbbce0a093dfc24a81ec56b669a9110d5884ab4e921158068ce7fe595aaae566bd7a3afb1bae69014930cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xghHt52.exe

    Filesize

    360KB

    MD5

    a77d15168963347c2300c3207cadecf6

    SHA1

    adc81e70c8a4702a1d11a8afa3ff6e19a5f11bfe

    SHA256

    a6a291c24ecaa571f1eb90d2ca2f39f5cd6bfe18b775e1a8ad27b8e509f9a8ea

    SHA512

    0dd3d2fdd760fe040014e71c40459294bd41399933cbbce0a093dfc24a81ec56b669a9110d5884ab4e921158068ce7fe595aaae566bd7a3afb1bae69014930cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za183261.exe

    Filesize

    695KB

    MD5

    1c1d8f5362a161b8b0d296a2ba1827ef

    SHA1

    7397f1a161d1bc5868235f7f817e92c2b55c0089

    SHA256

    7be444e9feb5f304bbcea424af2bc0ff2b6d2f10d0dfd12374aef1b8b3f0c15e

    SHA512

    0d73b042cff8c962e8d8934661b5dbab7e8a019ef0ad302dec979b5445b7c43fffbd78d65ea3ab6b95b20e7c6e2bd359cab8456e81279a3ef3ba53fadf78768e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za183261.exe

    Filesize

    695KB

    MD5

    1c1d8f5362a161b8b0d296a2ba1827ef

    SHA1

    7397f1a161d1bc5868235f7f817e92c2b55c0089

    SHA256

    7be444e9feb5f304bbcea424af2bc0ff2b6d2f10d0dfd12374aef1b8b3f0c15e

    SHA512

    0d73b042cff8c962e8d8934661b5dbab7e8a019ef0ad302dec979b5445b7c43fffbd78d65ea3ab6b95b20e7c6e2bd359cab8456e81279a3ef3ba53fadf78768e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w53Pl13.exe

    Filesize

    278KB

    MD5

    80a2839dffa59b0544ef1c25f5f17395

    SHA1

    cf467480b4c01793c511972942a0fd761e55ae3e

    SHA256

    58cbd1cf994e24c9af5751196e89f603df6ca14e7226574a0f0139750ea581e4

    SHA512

    c06f4be8df5182375bfd5c143dacb03e2ac7fe15eea80faf0f3b70774a527af225fa5a95d042ffb38ed8cff48f94526c9d8e1a5e1a3fee3e5f93e804aed6c062

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w53Pl13.exe

    Filesize

    278KB

    MD5

    80a2839dffa59b0544ef1c25f5f17395

    SHA1

    cf467480b4c01793c511972942a0fd761e55ae3e

    SHA256

    58cbd1cf994e24c9af5751196e89f603df6ca14e7226574a0f0139750ea581e4

    SHA512

    c06f4be8df5182375bfd5c143dacb03e2ac7fe15eea80faf0f3b70774a527af225fa5a95d042ffb38ed8cff48f94526c9d8e1a5e1a3fee3e5f93e804aed6c062

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w53Pl13.exe

    Filesize

    278KB

    MD5

    80a2839dffa59b0544ef1c25f5f17395

    SHA1

    cf467480b4c01793c511972942a0fd761e55ae3e

    SHA256

    58cbd1cf994e24c9af5751196e89f603df6ca14e7226574a0f0139750ea581e4

    SHA512

    c06f4be8df5182375bfd5c143dacb03e2ac7fe15eea80faf0f3b70774a527af225fa5a95d042ffb38ed8cff48f94526c9d8e1a5e1a3fee3e5f93e804aed6c062

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za230994.exe

    Filesize

    415KB

    MD5

    fd111caa802680197d977661415eff2f

    SHA1

    a22141dd06937e357e214d007fe23c296c661d5e

    SHA256

    ee029088bb8664899069d1073a93a625bfcfcba9dc3ed7ffd07e716e7b0e68ab

    SHA512

    b684eee6fa46389cb8035b7db1942e7e76d5a66714209634c29bd9aa4f542cc08f9a3b448e3dfacb29b29dcd440f5d72ccf08277da0ddd1dbd06b60ad2f23377

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za230994.exe

    Filesize

    415KB

    MD5

    fd111caa802680197d977661415eff2f

    SHA1

    a22141dd06937e357e214d007fe23c296c661d5e

    SHA256

    ee029088bb8664899069d1073a93a625bfcfcba9dc3ed7ffd07e716e7b0e68ab

    SHA512

    b684eee6fa46389cb8035b7db1942e7e76d5a66714209634c29bd9aa4f542cc08f9a3b448e3dfacb29b29dcd440f5d72ccf08277da0ddd1dbd06b60ad2f23377

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2944.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2944.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2854Vx.exe

    Filesize

    360KB

    MD5

    c09fa07754432acdec5b7af979077305

    SHA1

    ba21cd11012061f147ebce43283bdda05e82b16f

    SHA256

    e701905444cabb9384ac199149f253e8a89791a2e32ab9c2cf422da3f5c2be61

    SHA512

    6075c31013ca7b2cb2437cf722723b9be4cfad72e407f5cbb90345c4b6625a45def6a594a5d002e60599cb75a60e68b437b671ae6a30a56d0ba5584a7f677b67

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2854Vx.exe

    Filesize

    360KB

    MD5

    c09fa07754432acdec5b7af979077305

    SHA1

    ba21cd11012061f147ebce43283bdda05e82b16f

    SHA256

    e701905444cabb9384ac199149f253e8a89791a2e32ab9c2cf422da3f5c2be61

    SHA512

    6075c31013ca7b2cb2437cf722723b9be4cfad72e407f5cbb90345c4b6625a45def6a594a5d002e60599cb75a60e68b437b671ae6a30a56d0ba5584a7f677b67

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/356-1022-0x0000000004780000-0x0000000004790000-memory.dmp

    Filesize

    64KB

  • memory/356-1813-0x0000000004780000-0x0000000004790000-memory.dmp

    Filesize

    64KB

  • memory/356-1027-0x0000000004780000-0x0000000004790000-memory.dmp

    Filesize

    64KB

  • memory/356-1025-0x0000000004780000-0x0000000004790000-memory.dmp

    Filesize

    64KB

  • memory/3936-146-0x0000000000850000-0x000000000085A000-memory.dmp

    Filesize

    40KB

  • memory/4268-1013-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/4268-1017-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/4268-1020-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/4268-1010-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4268-985-0x00000000022D0000-0x00000000022E8000-memory.dmp

    Filesize

    96KB

  • memory/4268-1830-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/4268-983-0x00000000005D0000-0x00000000005EA000-memory.dmp

    Filesize

    104KB

  • memory/4268-1829-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/4268-1833-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4268-1828-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/4620-976-0x00000000001D0000-0x00000000001FE000-memory.dmp

    Filesize

    184KB

  • memory/4792-170-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-202-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-208-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-214-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-212-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-216-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-218-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-220-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-222-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-951-0x000000000A190000-0x000000000A796000-memory.dmp

    Filesize

    6.0MB

  • memory/4792-952-0x0000000009BF0000-0x0000000009C02000-memory.dmp

    Filesize

    72KB

  • memory/4792-953-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/4792-954-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/4792-955-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4792-956-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

    Filesize

    300KB

  • memory/4792-957-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/4792-958-0x000000000AD10000-0x000000000ADA2000-memory.dmp

    Filesize

    584KB

  • memory/4792-959-0x000000000AEE0000-0x000000000AF56000-memory.dmp

    Filesize

    472KB

  • memory/4792-960-0x000000000AFA0000-0x000000000B162000-memory.dmp

    Filesize

    1.8MB

  • memory/4792-961-0x000000000B180000-0x000000000B6AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4792-962-0x000000000B7E0000-0x000000000B7FE000-memory.dmp

    Filesize

    120KB

  • memory/4792-964-0x0000000004AD0000-0x0000000004B20000-memory.dmp

    Filesize

    320KB

  • memory/4792-965-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4792-966-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4792-968-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4792-204-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-206-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-210-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-200-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-198-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-196-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-190-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-194-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-192-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-188-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-186-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-184-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-182-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-180-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-178-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-176-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-174-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-172-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-168-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-166-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-164-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-160-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-162-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-159-0x0000000007170000-0x00000000071A5000-memory.dmp

    Filesize

    212KB

  • memory/4792-158-0x0000000007170000-0x00000000071AA000-memory.dmp

    Filesize

    232KB

  • memory/4792-157-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4792-156-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4792-154-0x0000000007200000-0x00000000076FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4792-155-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4792-153-0x00000000070F0000-0x000000000712C000-memory.dmp

    Filesize

    240KB

  • memory/4792-152-0x0000000002BC0000-0x0000000002C06000-memory.dmp

    Filesize

    280KB