Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 08:45

General

  • Target

    9e1f6c57d9e907459689e3fb37e95a9180a9501cbb20b5a0367413aa63312a96.exe

  • Size

    1.2MB

  • MD5

    397796118ed82d2af6dd52b7e81632b0

  • SHA1

    ed32c65a74a9d045361600261491c564c2cc81ce

  • SHA256

    9e1f6c57d9e907459689e3fb37e95a9180a9501cbb20b5a0367413aa63312a96

  • SHA512

    bfdf365a4fe3dad4859883b239a331fe7baa86ab0f8851f188a3365e70fa7e1a620b0bc5ba19b2a8ddf6cdb90d40a9ebf1875e20fc4e5faa9aafe8999683c04e

  • SSDEEP

    24576:SyW3EbAxYsVRZcMGO7oqoMfSUFDUFrYkPo0yyGoVZtGO7J7Xxe:5W551MqKaUFNoAVBx

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e1f6c57d9e907459689e3fb37e95a9180a9501cbb20b5a0367413aa63312a96.exe
    "C:\Users\Admin\AppData\Local\Temp\9e1f6c57d9e907459689e3fb37e95a9180a9501cbb20b5a0367413aa63312a96.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za061549.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za061549.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za659083.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za659083.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za894155.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za894155.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9325.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9325.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2092
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2809rq.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2809rq.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2484
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w76HB66.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w76HB66.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xdtuF96.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xdtuF96.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y76sG85.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y76sG85.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3916
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2960
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:2744
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:3680
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:2924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y76sG85.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y76sG85.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za061549.exe

    Filesize

    1.1MB

    MD5

    46024bf5ed397e689d973608d63cc162

    SHA1

    48be3d69cf68cd648630e7fe7ef56ee2aa8b3353

    SHA256

    10c0bd1a90b4e671fd5b8210f6ddae2e20bdc968a903856ed41c7e6c8d24d3eb

    SHA512

    b56fbafd7a8ea9a4bc4937d40c73671a15e467d270f66ca623c4e6a44e272dd7433de0b2093a465cf39aa939891d0464e21fbd0609a3ece569b284973c58ef0a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za061549.exe

    Filesize

    1.1MB

    MD5

    46024bf5ed397e689d973608d63cc162

    SHA1

    48be3d69cf68cd648630e7fe7ef56ee2aa8b3353

    SHA256

    10c0bd1a90b4e671fd5b8210f6ddae2e20bdc968a903856ed41c7e6c8d24d3eb

    SHA512

    b56fbafd7a8ea9a4bc4937d40c73671a15e467d270f66ca623c4e6a44e272dd7433de0b2093a465cf39aa939891d0464e21fbd0609a3ece569b284973c58ef0a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xdtuF96.exe

    Filesize

    485KB

    MD5

    9fa4e0749debbb5820681b53abcb6324

    SHA1

    d5abb7aa0bd9da69359fc038435d2a75706a6bc0

    SHA256

    4d598c0e61c3d920e90618b8c73c346991da2ca7f74d6cef5ff439c724696742

    SHA512

    3ce785151c18fba5822750c66db217a83cc106306c04af4ab7c3839917fe9581628a3141d088c629c2fee0aa0b97a95e108623746dcaeeb29bbc8c0f97bf3b71

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xdtuF96.exe

    Filesize

    485KB

    MD5

    9fa4e0749debbb5820681b53abcb6324

    SHA1

    d5abb7aa0bd9da69359fc038435d2a75706a6bc0

    SHA256

    4d598c0e61c3d920e90618b8c73c346991da2ca7f74d6cef5ff439c724696742

    SHA512

    3ce785151c18fba5822750c66db217a83cc106306c04af4ab7c3839917fe9581628a3141d088c629c2fee0aa0b97a95e108623746dcaeeb29bbc8c0f97bf3b71

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za659083.exe

    Filesize

    805KB

    MD5

    85de83a571a8e6df3d6063cca3e6d8b2

    SHA1

    e7891240e982a46bf470cc6a39fe07d6557d9ab2

    SHA256

    6c7b0c4765682f240f2d03bffa9c84397f723527551d0f7ec82117cc7ebc00bf

    SHA512

    ac4a6ed2a665c0aeb24dcbb2d8f3690cc911acdab358731a20f0b2b7854e1709694e5f9afef68dd9578d4e01a2a25b54bd00463d7da245079a30ef4d026f1c6b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za659083.exe

    Filesize

    805KB

    MD5

    85de83a571a8e6df3d6063cca3e6d8b2

    SHA1

    e7891240e982a46bf470cc6a39fe07d6557d9ab2

    SHA256

    6c7b0c4765682f240f2d03bffa9c84397f723527551d0f7ec82117cc7ebc00bf

    SHA512

    ac4a6ed2a665c0aeb24dcbb2d8f3690cc911acdab358731a20f0b2b7854e1709694e5f9afef68dd9578d4e01a2a25b54bd00463d7da245079a30ef4d026f1c6b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w76HB66.exe

    Filesize

    403KB

    MD5

    d28edccd25191a84f0f6ed044f49a8df

    SHA1

    01d90060392875b459f5008a527958c3892be8cc

    SHA256

    d2015d9c8183ba449cd8de3c93cfbdb25e133602680d33cc6bec3236a41a263a

    SHA512

    647b52af15cac8a83d292b16dcf052c1b24eda6c42841a205c6523fbf7ddbf55123e066293b13c37d18ecff4dee40a68ef595d596074b8eab63a171b956c2301

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w76HB66.exe

    Filesize

    403KB

    MD5

    d28edccd25191a84f0f6ed044f49a8df

    SHA1

    01d90060392875b459f5008a527958c3892be8cc

    SHA256

    d2015d9c8183ba449cd8de3c93cfbdb25e133602680d33cc6bec3236a41a263a

    SHA512

    647b52af15cac8a83d292b16dcf052c1b24eda6c42841a205c6523fbf7ddbf55123e066293b13c37d18ecff4dee40a68ef595d596074b8eab63a171b956c2301

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za894155.exe

    Filesize

    468KB

    MD5

    44b19bcd19255f6f6ad76a96bec26e2d

    SHA1

    ade20a1da4bd5c978aa1cbc6dc67607ed441e6b2

    SHA256

    3228ecd2bdd29e6ea9114fc22a31bd89956001bda11e05bcbf4f0968186f2dce

    SHA512

    4b541c61d08b32a1eed2318a4f46c115c89da98521d1122d62e25ac25989a35c7f1ee750ab10e0eca3280d5715eee2e215c0335adeb000f6f360205885dc6b77

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za894155.exe

    Filesize

    468KB

    MD5

    44b19bcd19255f6f6ad76a96bec26e2d

    SHA1

    ade20a1da4bd5c978aa1cbc6dc67607ed441e6b2

    SHA256

    3228ecd2bdd29e6ea9114fc22a31bd89956001bda11e05bcbf4f0968186f2dce

    SHA512

    4b541c61d08b32a1eed2318a4f46c115c89da98521d1122d62e25ac25989a35c7f1ee750ab10e0eca3280d5715eee2e215c0335adeb000f6f360205885dc6b77

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9325.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9325.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2809rq.exe

    Filesize

    485KB

    MD5

    e684792e980111724b75cf88c03310a6

    SHA1

    ad1974f90a0b42c2276f2d0905270c4a300b6c05

    SHA256

    c104f7e9d06b96b3323ced84b10ae43906d5cc622653dea3e4c441f28ee038e4

    SHA512

    d17c267fa9d3c7a02370af860fe0a9dffd468c3d091ae97b4aa960d396361fe9264ae5e43a0b209807ae91a2c7163fe02737725a11e046d501c387cd9985164b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2809rq.exe

    Filesize

    485KB

    MD5

    e684792e980111724b75cf88c03310a6

    SHA1

    ad1974f90a0b42c2276f2d0905270c4a300b6c05

    SHA256

    c104f7e9d06b96b3323ced84b10ae43906d5cc622653dea3e4c441f28ee038e4

    SHA512

    d17c267fa9d3c7a02370af860fe0a9dffd468c3d091ae97b4aa960d396361fe9264ae5e43a0b209807ae91a2c7163fe02737725a11e046d501c387cd9985164b

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/2092-149-0x0000000000450000-0x000000000045A000-memory.dmp

    Filesize

    40KB

  • memory/2484-205-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-956-0x00000000078A0000-0x00000000079AA000-memory.dmp

    Filesize

    1.0MB

  • memory/2484-173-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-175-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-177-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-179-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-181-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-183-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-185-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-187-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-191-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-189-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-193-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-195-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-197-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-199-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-201-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-203-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-169-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-207-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-209-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-211-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-213-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-215-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-217-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-219-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-221-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-223-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-225-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-954-0x0000000007EB0000-0x00000000084B6000-memory.dmp

    Filesize

    6.0MB

  • memory/2484-955-0x0000000004FD0000-0x0000000004FE2000-memory.dmp

    Filesize

    72KB

  • memory/2484-171-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-957-0x00000000079B0000-0x00000000079EE000-memory.dmp

    Filesize

    248KB

  • memory/2484-958-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/2484-959-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/2484-960-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/2484-961-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/2484-962-0x0000000008A20000-0x0000000008A70000-memory.dmp

    Filesize

    320KB

  • memory/2484-963-0x0000000008A90000-0x0000000008B06000-memory.dmp

    Filesize

    472KB

  • memory/2484-964-0x0000000008B30000-0x0000000008B4E000-memory.dmp

    Filesize

    120KB

  • memory/2484-966-0x0000000008D30000-0x0000000008EF2000-memory.dmp

    Filesize

    1.8MB

  • memory/2484-967-0x0000000008F10000-0x000000000943C000-memory.dmp

    Filesize

    5.2MB

  • memory/2484-155-0x00000000025F0000-0x000000000262C000-memory.dmp

    Filesize

    240KB

  • memory/2484-156-0x0000000005020000-0x000000000551E000-memory.dmp

    Filesize

    5.0MB

  • memory/2484-157-0x0000000002830000-0x000000000286A000-memory.dmp

    Filesize

    232KB

  • memory/2484-159-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/2484-160-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/2484-158-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/2484-161-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/2484-162-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-163-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-165-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/2484-167-0x0000000002830000-0x0000000002865000-memory.dmp

    Filesize

    212KB

  • memory/3532-1007-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/3532-1006-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/3532-1005-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/3532-1004-0x00000000008E0000-0x000000000090D000-memory.dmp

    Filesize

    180KB

  • memory/3532-975-0x00000000029F0000-0x0000000002A08000-memory.dmp

    Filesize

    96KB

  • memory/3532-974-0x0000000002840000-0x000000000285A000-memory.dmp

    Filesize

    104KB

  • memory/4780-1810-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/4780-1409-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/4780-1407-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/4780-1406-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB