Analysis

  • max time kernel
    139s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2023, 21:13

General

  • Target

    662218f199e549590823824f9bc4064e6dca203b3de728cb29897139f027e865.exe

  • Size

    1.1MB

  • MD5

    e49ce7039b5d9525fdce58e0348fd405

  • SHA1

    699be061277447dbdc79191332f356c33804057f

  • SHA256

    662218f199e549590823824f9bc4064e6dca203b3de728cb29897139f027e865

  • SHA512

    2bf143ca574000810451d3c0f6456c7036064e4184bbd8e5ae0b7da4c388afd3157b7b256cc1dcbfca274cc2c7a9edcbb2ca885f3cfb19b7187ed27d66259bcd

  • SSDEEP

    24576:yyGMtWY9tZfcmL+AJbBEkskTmmjyRJQ8JAlmtBzeF+4:ZGcrZUmL+iskuRJZW1

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\662218f199e549590823824f9bc4064e6dca203b3de728cb29897139f027e865.exe
    "C:\Users\Admin\AppData\Local\Temp\662218f199e549590823824f9bc4064e6dca203b3de728cb29897139f027e865.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za810327.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za810327.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za795315.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za795315.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za293566.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za293566.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6168.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6168.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2712
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7584gr.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7584gr.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4624
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 1324
              6⤵
              • Program crash
              PID:3116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05Hy18.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05Hy18.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1624
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1080
            5⤵
            • Program crash
            PID:1296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xDKyn27.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xDKyn27.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 1684
          4⤵
          • Program crash
          PID:4984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38KE30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38KE30.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3288
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1628
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2964
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:392
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4624 -ip 4624
    1⤵
      PID:960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1624 -ip 1624
      1⤵
        PID:1708
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4036 -ip 4036
        1⤵
          PID:3512
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:1984
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:2256

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

                Filesize

                229KB

                MD5

                3308051ded87b1863a8d92925202c4b3

                SHA1

                7834ddc23e7976b07118fb580ae38234466dbdfb

                SHA256

                13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                SHA512

                f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

              • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

                Filesize

                229KB

                MD5

                3308051ded87b1863a8d92925202c4b3

                SHA1

                7834ddc23e7976b07118fb580ae38234466dbdfb

                SHA256

                13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                SHA512

                f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

              • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

                Filesize

                229KB

                MD5

                3308051ded87b1863a8d92925202c4b3

                SHA1

                7834ddc23e7976b07118fb580ae38234466dbdfb

                SHA256

                13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                SHA512

                f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

              • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

                Filesize

                229KB

                MD5

                3308051ded87b1863a8d92925202c4b3

                SHA1

                7834ddc23e7976b07118fb580ae38234466dbdfb

                SHA256

                13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                SHA512

                f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

              • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

                Filesize

                229KB

                MD5

                3308051ded87b1863a8d92925202c4b3

                SHA1

                7834ddc23e7976b07118fb580ae38234466dbdfb

                SHA256

                13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                SHA512

                f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38KE30.exe

                Filesize

                229KB

                MD5

                3308051ded87b1863a8d92925202c4b3

                SHA1

                7834ddc23e7976b07118fb580ae38234466dbdfb

                SHA256

                13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                SHA512

                f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38KE30.exe

                Filesize

                229KB

                MD5

                3308051ded87b1863a8d92925202c4b3

                SHA1

                7834ddc23e7976b07118fb580ae38234466dbdfb

                SHA256

                13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                SHA512

                f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za810327.exe

                Filesize

                930KB

                MD5

                9dd57fad364136f6563bfbb1ab941fdf

                SHA1

                99ba6832074248fce0cbac3a071e2f3e863aed93

                SHA256

                b856d68942096666c9f0fb7e732f8c7a98bc0846c681bdd5d3c519d3cbf50c75

                SHA512

                d26ebc96619355a3848c46992e92c17c1f2b109f7ae3f236b6a062245bf9d72050b92d716ddba148ce858847b60deb81a718def526be1015050b29efe8d82a9e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za810327.exe

                Filesize

                930KB

                MD5

                9dd57fad364136f6563bfbb1ab941fdf

                SHA1

                99ba6832074248fce0cbac3a071e2f3e863aed93

                SHA256

                b856d68942096666c9f0fb7e732f8c7a98bc0846c681bdd5d3c519d3cbf50c75

                SHA512

                d26ebc96619355a3848c46992e92c17c1f2b109f7ae3f236b6a062245bf9d72050b92d716ddba148ce858847b60deb81a718def526be1015050b29efe8d82a9e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xDKyn27.exe

                Filesize

                360KB

                MD5

                f0b16b0dc313b1f76b1c071ac7962d0a

                SHA1

                c57cab8241be1dfe4664ba19996fcdcd37f6f4e1

                SHA256

                53a9a07f8633f9cfa347f078dd70be1ef9cf5a40a60ee62de6d650bf05f60c22

                SHA512

                1b747357769befb7e17fd90c4a8bdb58ae74f4e635e3d067a0b2296cc3772f5a956a7c20c32d0d61c59f44c0d7ffaefae4e9845f4fff61be87fa880b4f62bb4e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xDKyn27.exe

                Filesize

                360KB

                MD5

                f0b16b0dc313b1f76b1c071ac7962d0a

                SHA1

                c57cab8241be1dfe4664ba19996fcdcd37f6f4e1

                SHA256

                53a9a07f8633f9cfa347f078dd70be1ef9cf5a40a60ee62de6d650bf05f60c22

                SHA512

                1b747357769befb7e17fd90c4a8bdb58ae74f4e635e3d067a0b2296cc3772f5a956a7c20c32d0d61c59f44c0d7ffaefae4e9845f4fff61be87fa880b4f62bb4e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za795315.exe

                Filesize

                695KB

                MD5

                e11159868069fe2cd3c1bf55d1240798

                SHA1

                1a5077d470cb80d140ade186a50db1bf139b7e71

                SHA256

                e182c2fce99e1d0c4aae0c8d9e624b4e0a8033d1f051ca36a722ed272d63fe05

                SHA512

                c9a01a13f3aba6c02310819ef0a355dc4954e69c7f66fb8fe0498ddb08950cfe50dc0c8b29648c2c6a708ee94aaf5874221e4dec86df10fcfbb1675ac9ae7817

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za795315.exe

                Filesize

                695KB

                MD5

                e11159868069fe2cd3c1bf55d1240798

                SHA1

                1a5077d470cb80d140ade186a50db1bf139b7e71

                SHA256

                e182c2fce99e1d0c4aae0c8d9e624b4e0a8033d1f051ca36a722ed272d63fe05

                SHA512

                c9a01a13f3aba6c02310819ef0a355dc4954e69c7f66fb8fe0498ddb08950cfe50dc0c8b29648c2c6a708ee94aaf5874221e4dec86df10fcfbb1675ac9ae7817

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05Hy18.exe

                Filesize

                278KB

                MD5

                f0cb0469a71ea33836a86a55ef392f91

                SHA1

                cbccb15673b9c9df81f3924a7f2d8825eb7e8fbb

                SHA256

                1fe2e43dc4bc6b88d4d09664d0c2d9a9e704b6f6416f0f5c64ad92d62145b7f9

                SHA512

                51f94be401c7eb7fce2e8f4f6def8412b27d1dedcee8bb41ef089c314e813381f817cad8ee7ec516efaea89c25e41e27650bd1b795e5e3eaab506204db08a082

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05Hy18.exe

                Filesize

                278KB

                MD5

                f0cb0469a71ea33836a86a55ef392f91

                SHA1

                cbccb15673b9c9df81f3924a7f2d8825eb7e8fbb

                SHA256

                1fe2e43dc4bc6b88d4d09664d0c2d9a9e704b6f6416f0f5c64ad92d62145b7f9

                SHA512

                51f94be401c7eb7fce2e8f4f6def8412b27d1dedcee8bb41ef089c314e813381f817cad8ee7ec516efaea89c25e41e27650bd1b795e5e3eaab506204db08a082

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za293566.exe

                Filesize

                414KB

                MD5

                2c08dab57e1f24a4d34ee4b162f0f646

                SHA1

                26cb569614958b2c7e8cd2a0f32dd210d1e70081

                SHA256

                fcd4e4eb081ffe03f83f9f45635b3a0009b6fe6f7bd4d1ff43a5829401e61d13

                SHA512

                1665f95d903fe90234ff3d986e0c5e093659e5d645097fa50aaf997952a06fed133bfc457bf0163bfe5eb7bd934ae0902c58e59211a79fdf13e55bbd6cbd2163

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za293566.exe

                Filesize

                414KB

                MD5

                2c08dab57e1f24a4d34ee4b162f0f646

                SHA1

                26cb569614958b2c7e8cd2a0f32dd210d1e70081

                SHA256

                fcd4e4eb081ffe03f83f9f45635b3a0009b6fe6f7bd4d1ff43a5829401e61d13

                SHA512

                1665f95d903fe90234ff3d986e0c5e093659e5d645097fa50aaf997952a06fed133bfc457bf0163bfe5eb7bd934ae0902c58e59211a79fdf13e55bbd6cbd2163

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6168.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6168.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7584gr.exe

                Filesize

                360KB

                MD5

                217acb9aee4cc90082fe17e87d746994

                SHA1

                f8711eb01acdcd85bac3fec023345b0233551ba7

                SHA256

                eacf88c136abfd643011a2915af00d33773ae27d34f6a89a7868d60c5d5790ae

                SHA512

                c0d50dcfbb09e2b7ec099ccf439ad2789e9c0a6e1bb36f5a8f55ca06da44fa77639507ec54b7f0d31531b36318f54694e3dbf1b887d0cc10fe58983217cfc223

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7584gr.exe

                Filesize

                360KB

                MD5

                217acb9aee4cc90082fe17e87d746994

                SHA1

                f8711eb01acdcd85bac3fec023345b0233551ba7

                SHA256

                eacf88c136abfd643011a2915af00d33773ae27d34f6a89a7868d60c5d5790ae

                SHA512

                c0d50dcfbb09e2b7ec099ccf439ad2789e9c0a6e1bb36f5a8f55ca06da44fa77639507ec54b7f0d31531b36318f54694e3dbf1b887d0cc10fe58983217cfc223

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                73df88d68a4f5e066784d462788cf695

                SHA1

                e4bfed336848d0b622fa464d40cf4bd9222aab3f

                SHA256

                f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

                SHA512

                64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                73df88d68a4f5e066784d462788cf695

                SHA1

                e4bfed336848d0b622fa464d40cf4bd9222aab3f

                SHA256

                f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

                SHA512

                64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                Filesize

                89KB

                MD5

                73df88d68a4f5e066784d462788cf695

                SHA1

                e4bfed336848d0b622fa464d40cf4bd9222aab3f

                SHA256

                f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

                SHA512

                64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1624-1014-0x0000000002C20000-0x0000000002C4D000-memory.dmp

                Filesize

                180KB

              • memory/1624-1015-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/1624-1016-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/1624-1017-0x0000000007200000-0x0000000007210000-memory.dmp

                Filesize

                64KB

              • memory/2712-161-0x0000000000BD0000-0x0000000000BDA000-memory.dmp

                Filesize

                40KB

              • memory/4036-1447-0x0000000004C30000-0x0000000004C40000-memory.dmp

                Filesize

                64KB

              • memory/4036-1446-0x0000000004C30000-0x0000000004C40000-memory.dmp

                Filesize

                64KB

              • memory/4036-1450-0x0000000004C30000-0x0000000004C40000-memory.dmp

                Filesize

                64KB

              • memory/4036-1820-0x0000000004C30000-0x0000000004C40000-memory.dmp

                Filesize

                64KB

              • memory/4624-223-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-977-0x00000000071A0000-0x00000000071B0000-memory.dmp

                Filesize

                64KB

              • memory/4624-211-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-213-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-215-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-217-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-219-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-221-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-207-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-225-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-227-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-229-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-231-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-233-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-235-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-964-0x0000000009C60000-0x000000000A278000-memory.dmp

                Filesize

                6.1MB

              • memory/4624-965-0x000000000A310000-0x000000000A322000-memory.dmp

                Filesize

                72KB

              • memory/4624-966-0x000000000A330000-0x000000000A43A000-memory.dmp

                Filesize

                1.0MB

              • memory/4624-967-0x000000000A450000-0x000000000A48C000-memory.dmp

                Filesize

                240KB

              • memory/4624-968-0x00000000071A0000-0x00000000071B0000-memory.dmp

                Filesize

                64KB

              • memory/4624-969-0x000000000A750000-0x000000000A7B6000-memory.dmp

                Filesize

                408KB

              • memory/4624-970-0x000000000AE20000-0x000000000AEB2000-memory.dmp

                Filesize

                584KB

              • memory/4624-972-0x000000000AFD0000-0x000000000B020000-memory.dmp

                Filesize

                320KB

              • memory/4624-973-0x000000000B030000-0x000000000B0A6000-memory.dmp

                Filesize

                472KB

              • memory/4624-974-0x000000000B0E0000-0x000000000B0FE000-memory.dmp

                Filesize

                120KB

              • memory/4624-975-0x000000000B200000-0x000000000B3C2000-memory.dmp

                Filesize

                1.8MB

              • memory/4624-976-0x000000000B3D0000-0x000000000B8FC000-memory.dmp

                Filesize

                5.2MB

              • memory/4624-209-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-978-0x00000000071A0000-0x00000000071B0000-memory.dmp

                Filesize

                64KB

              • memory/4624-979-0x00000000071A0000-0x00000000071B0000-memory.dmp

                Filesize

                64KB

              • memory/4624-205-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-203-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-201-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-199-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-197-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-195-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-193-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-191-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-189-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-187-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-185-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-183-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-181-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-179-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-177-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-175-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-173-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-172-0x0000000007760000-0x0000000007795000-memory.dmp

                Filesize

                212KB

              • memory/4624-171-0x00000000071A0000-0x00000000071B0000-memory.dmp

                Filesize

                64KB

              • memory/4624-170-0x00000000071A0000-0x00000000071B0000-memory.dmp

                Filesize

                64KB

              • memory/4624-169-0x00000000071A0000-0x00000000071B0000-memory.dmp

                Filesize

                64KB

              • memory/4624-168-0x00000000071B0000-0x0000000007754000-memory.dmp

                Filesize

                5.6MB

              • memory/4624-167-0x0000000004850000-0x0000000004896000-memory.dmp

                Filesize

                280KB