Analysis

  • max time kernel
    108s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-04-2023 04:57

General

  • Target

    06c7e1e1e4823c47c058cbd95845e57b5bd7f3340e9d49745eb01827bac5fd1c.exe

  • Size

    1.0MB

  • MD5

    f731306a4c15898ea613d2130d99497d

  • SHA1

    7b5809a009160a2d6178cb741d19931434c00d95

  • SHA256

    06c7e1e1e4823c47c058cbd95845e57b5bd7f3340e9d49745eb01827bac5fd1c

  • SHA512

    422bc2b19591e3f29f44fb52eb8e15c7080b0ae52eac243596be8aed0cac8619e98c7eb734d75274368088b04898f229d4461bbfc3d8d91d4b5e3d4821d5639c

  • SSDEEP

    24576:oyw/ZJ2ZgR1Tbnk3LMz+UbGqw2OYUeFCRI7m9x:vw1RtbnqLuHkYU5I7m

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06c7e1e1e4823c47c058cbd95845e57b5bd7f3340e9d49745eb01827bac5fd1c.exe
    "C:\Users\Admin\AppData\Local\Temp\06c7e1e1e4823c47c058cbd95845e57b5bd7f3340e9d49745eb01827bac5fd1c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za428544.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za428544.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za591063.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za591063.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za125998.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za125998.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3924
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5819.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5819.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2492
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3897oh.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3897oh.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18QI08.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18QI08.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xtJjo91.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xtJjo91.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y65SM08.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y65SM08.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4824
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4500
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4844
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:5020
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:4612
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:3880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y65SM08.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y65SM08.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za428544.exe

    Filesize

    883KB

    MD5

    6253eb6e006fb9530d7ff868359c4b12

    SHA1

    3d6d5d951d142a0aa523bda21dabe10ced308a9c

    SHA256

    c57ab53821f24dccce020836e3ef8393bcf7567dc4eb1d64bf6863b7b0ee0cec

    SHA512

    63e47b6bf0324eb21bdf6f8b83b8a0d15721c37c007a63ed2e7897a451fb9ed7596265fc30504dd1bd94876d310a5d560e094ab0827850e714e1b8578f4487ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za428544.exe

    Filesize

    883KB

    MD5

    6253eb6e006fb9530d7ff868359c4b12

    SHA1

    3d6d5d951d142a0aa523bda21dabe10ced308a9c

    SHA256

    c57ab53821f24dccce020836e3ef8393bcf7567dc4eb1d64bf6863b7b0ee0cec

    SHA512

    63e47b6bf0324eb21bdf6f8b83b8a0d15721c37c007a63ed2e7897a451fb9ed7596265fc30504dd1bd94876d310a5d560e094ab0827850e714e1b8578f4487ba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xtJjo91.exe

    Filesize

    358KB

    MD5

    bc6542f616bad2e8248263947d528ca3

    SHA1

    eb9ae1e24cbd2616567a37e169f71247a077bcd9

    SHA256

    ba8975e70e7f0853dadd8f643dc3976f5e751480251b32e69b20946ffc17337d

    SHA512

    fd61027577ae6c44521d4ad65474b503be476d568f3a79126cd336e73b7ac1c51ef556c227499b84abff05a29d6c41148926e02f9731f9ce84474aabffe624cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xtJjo91.exe

    Filesize

    358KB

    MD5

    bc6542f616bad2e8248263947d528ca3

    SHA1

    eb9ae1e24cbd2616567a37e169f71247a077bcd9

    SHA256

    ba8975e70e7f0853dadd8f643dc3976f5e751480251b32e69b20946ffc17337d

    SHA512

    fd61027577ae6c44521d4ad65474b503be476d568f3a79126cd336e73b7ac1c51ef556c227499b84abff05a29d6c41148926e02f9731f9ce84474aabffe624cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za591063.exe

    Filesize

    672KB

    MD5

    040b054d3b464ce4132e9b1421de6ede

    SHA1

    0213e11073244810b78d5925a7a5416f3407b2b5

    SHA256

    50d090a33d08754087e20738c30d599d5f89282e157649fb0fcf4a910abdedd9

    SHA512

    1da38218a9f46a5a1b03b73986a64ff9d0af041e59b13f276d5692d07116866fd2e6d2a03802d880fccaef9c10af315a4f4ff5c52d7a5e3ab9b197681dd2fef6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za591063.exe

    Filesize

    672KB

    MD5

    040b054d3b464ce4132e9b1421de6ede

    SHA1

    0213e11073244810b78d5925a7a5416f3407b2b5

    SHA256

    50d090a33d08754087e20738c30d599d5f89282e157649fb0fcf4a910abdedd9

    SHA512

    1da38218a9f46a5a1b03b73986a64ff9d0af041e59b13f276d5692d07116866fd2e6d2a03802d880fccaef9c10af315a4f4ff5c52d7a5e3ab9b197681dd2fef6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18QI08.exe

    Filesize

    275KB

    MD5

    1f19b00c769818177eccff5089224429

    SHA1

    b5bf51fedafc550e94bd35c6b0fc4cd278e01d48

    SHA256

    ed74de63246531ac3f8918dc23e050d1172990862438f4cb7ebcc8348e6eaa3f

    SHA512

    9ca02be1dfbb2ff783cee4b7c7aaced4f8aabec5905a3acaaf8d9775b20366df46b5e63bfbf3bca8b53292ce6b2adf55a0894f929015acf9fc6b296965352b13

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18QI08.exe

    Filesize

    275KB

    MD5

    1f19b00c769818177eccff5089224429

    SHA1

    b5bf51fedafc550e94bd35c6b0fc4cd278e01d48

    SHA256

    ed74de63246531ac3f8918dc23e050d1172990862438f4cb7ebcc8348e6eaa3f

    SHA512

    9ca02be1dfbb2ff783cee4b7c7aaced4f8aabec5905a3acaaf8d9775b20366df46b5e63bfbf3bca8b53292ce6b2adf55a0894f929015acf9fc6b296965352b13

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za125998.exe

    Filesize

    403KB

    MD5

    b94116f1d6cf3eb892b206c0e3a9d63a

    SHA1

    6d178ab828f28a3cc315a40f913adce4e1a0be3b

    SHA256

    abfe07fed5d82019d9ab53f27628f8bb3fbacae3e190a2c2275158e55b347e24

    SHA512

    746b3344b12fe0d57071dcdf1667d88171f3e67c2341a2bc56aa045ef676f2c58632a5449c67c7b9092e52426a964926fde05fce8f7196c2f8329d71bb37f658

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za125998.exe

    Filesize

    403KB

    MD5

    b94116f1d6cf3eb892b206c0e3a9d63a

    SHA1

    6d178ab828f28a3cc315a40f913adce4e1a0be3b

    SHA256

    abfe07fed5d82019d9ab53f27628f8bb3fbacae3e190a2c2275158e55b347e24

    SHA512

    746b3344b12fe0d57071dcdf1667d88171f3e67c2341a2bc56aa045ef676f2c58632a5449c67c7b9092e52426a964926fde05fce8f7196c2f8329d71bb37f658

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5819.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5819.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3897oh.exe

    Filesize

    358KB

    MD5

    d9723a3d81e498b03876696e6e8aa8df

    SHA1

    85086b53179a8eabfc4e3d6551efe98f84e80d0d

    SHA256

    a9b406dc8af49e4c5f702787810bc43cc831ab01a17797e8b8aad4d4aa8191e6

    SHA512

    9d1d8eac1c5ad987b963b38804f995e225fab64e561e31c0899f767250fe1862b4f8a73309c084d2adbd17cfe55e4d94db22d78854cd31fe8f3015fb3d93febf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3897oh.exe

    Filesize

    358KB

    MD5

    d9723a3d81e498b03876696e6e8aa8df

    SHA1

    85086b53179a8eabfc4e3d6551efe98f84e80d0d

    SHA256

    a9b406dc8af49e4c5f702787810bc43cc831ab01a17797e8b8aad4d4aa8191e6

    SHA512

    9d1d8eac1c5ad987b963b38804f995e225fab64e561e31c0899f767250fe1862b4f8a73309c084d2adbd17cfe55e4d94db22d78854cd31fe8f3015fb3d93febf

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/2492-148-0x0000000000970000-0x000000000097A000-memory.dmp

    Filesize

    40KB

  • memory/4160-1808-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/4160-1013-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/4160-1014-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/4160-1016-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/4344-1005-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB

  • memory/4344-1004-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB

  • memory/4344-1003-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB

  • memory/4344-1002-0x0000000002C70000-0x0000000002C9D000-memory.dmp

    Filesize

    180KB

  • memory/4344-973-0x0000000004940000-0x0000000004958000-memory.dmp

    Filesize

    96KB

  • memory/4344-972-0x0000000002EF0000-0x0000000002F0A000-memory.dmp

    Filesize

    104KB

  • memory/4824-168-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-965-0x0000000004AF0000-0x0000000004B40000-memory.dmp

    Filesize

    320KB

  • memory/4824-200-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-202-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-204-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-206-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-208-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-210-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-212-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-214-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-218-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-216-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-220-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-222-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-224-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-953-0x000000000A210000-0x000000000A816000-memory.dmp

    Filesize

    6.0MB

  • memory/4824-954-0x0000000009C00000-0x0000000009C12000-memory.dmp

    Filesize

    72KB

  • memory/4824-955-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/4824-956-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/4824-957-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

    Filesize

    300KB

  • memory/4824-958-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/4824-959-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/4824-960-0x000000000AD20000-0x000000000ADB2000-memory.dmp

    Filesize

    584KB

  • memory/4824-961-0x000000000ADE0000-0x000000000AE56000-memory.dmp

    Filesize

    472KB

  • memory/4824-962-0x000000000AEA0000-0x000000000B062000-memory.dmp

    Filesize

    1.8MB

  • memory/4824-963-0x000000000B080000-0x000000000B5AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4824-964-0x000000000B6E0000-0x000000000B6FE000-memory.dmp

    Filesize

    120KB

  • memory/4824-198-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-196-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-194-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-192-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-190-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-188-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-186-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-184-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-182-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-180-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-178-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-176-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-174-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-172-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-170-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-166-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-164-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-162-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-161-0x0000000004E00000-0x0000000004E35000-memory.dmp

    Filesize

    212KB

  • memory/4824-156-0x0000000002BC0000-0x0000000002C06000-memory.dmp

    Filesize

    280KB

  • memory/4824-157-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/4824-160-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/4824-158-0x0000000004E00000-0x0000000004E3A000-memory.dmp

    Filesize

    232KB

  • memory/4824-159-0x0000000007270000-0x0000000007280000-memory.dmp

    Filesize

    64KB

  • memory/4824-155-0x0000000007280000-0x000000000777E000-memory.dmp

    Filesize

    5.0MB

  • memory/4824-154-0x0000000004930000-0x000000000496C000-memory.dmp

    Filesize

    240KB