Analysis

  • max time kernel
    127s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2023 10:29

General

  • Target

    90a0ef24ed60106aef3434f289229249e0103a7b1f19ea5408702d34e899ab0b.exe

  • Size

    1.0MB

  • MD5

    0d03cb07bd8d298f6f247fbb5219909d

  • SHA1

    c51658957f633a1ac0315c35b8368657a3f6df6c

  • SHA256

    90a0ef24ed60106aef3434f289229249e0103a7b1f19ea5408702d34e899ab0b

  • SHA512

    4a996b0a6fdcc4cfe7aa7c9bb03b01c6eeaed39b604aa5f56c797ff8c2d35bb5dc0be6acf0b2480242a3a7fd85b119f63fa246ed5448c31dadd3086882091910

  • SSDEEP

    24576:5yEtqSKxzFG4UEPDzOx2KiEmEvu4X4h3Wu21:seqSKmTEbzZyvu4s3WP

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90a0ef24ed60106aef3434f289229249e0103a7b1f19ea5408702d34e899ab0b.exe
    "C:\Users\Admin\AppData\Local\Temp\90a0ef24ed60106aef3434f289229249e0103a7b1f19ea5408702d34e899ab0b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za531279.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za531279.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za661193.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za661193.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za769564.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za769564.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2252
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0012.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0012.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1352
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9383GL.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9383GL.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1888
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 1692
              6⤵
              • Program crash
              PID:4732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w58zX00.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w58zX00.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3368
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 1080
            5⤵
            • Program crash
            PID:4460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPQwd29.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPQwd29.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 1320
          4⤵
          • Program crash
          PID:4160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95yl66.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95yl66.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4816
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:632
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1888 -ip 1888
    1⤵
      PID:1112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3368 -ip 3368
      1⤵
        PID:5108
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4220 -ip 4220
        1⤵
          PID:2748
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:2708
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:4496

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95yl66.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95yl66.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za531279.exe

          Filesize

          864KB

          MD5

          ec12a2ca882de4065647dd2b01191620

          SHA1

          eb700dd9bd201a595701ee025a6f87bd2d6d366f

          SHA256

          ad09af5f22f3f634a78029a860c348307526b5d45e6b68144d2baa651ba43c88

          SHA512

          f15994717c1a5beacce0454e7e00caa99810da14432e07340d9391b14e9e23667621fef9a5579e069524606253745da54ec4f20b51c9aba885bb004c6756e069

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za531279.exe

          Filesize

          864KB

          MD5

          ec12a2ca882de4065647dd2b01191620

          SHA1

          eb700dd9bd201a595701ee025a6f87bd2d6d366f

          SHA256

          ad09af5f22f3f634a78029a860c348307526b5d45e6b68144d2baa651ba43c88

          SHA512

          f15994717c1a5beacce0454e7e00caa99810da14432e07340d9391b14e9e23667621fef9a5579e069524606253745da54ec4f20b51c9aba885bb004c6756e069

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPQwd29.exe

          Filesize

          362KB

          MD5

          e37bb8a1f6c4d95ad4e51424b53c1236

          SHA1

          9e40d4a71f084eac9d46405c238afe044ddc7e7f

          SHA256

          d07222c92aef81679b78054bf1fc6845517e20061f11738644ce17fbaca5ccbe

          SHA512

          576a8844329fcf82b6d4c8454c29ccc03dd2ebe4db9d3c0e30bfecfc0b6f2c7d264924ae7f68816ff6e78c6874c1db0828776b45f1eac50c8073801e58048b5e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPQwd29.exe

          Filesize

          362KB

          MD5

          e37bb8a1f6c4d95ad4e51424b53c1236

          SHA1

          9e40d4a71f084eac9d46405c238afe044ddc7e7f

          SHA256

          d07222c92aef81679b78054bf1fc6845517e20061f11738644ce17fbaca5ccbe

          SHA512

          576a8844329fcf82b6d4c8454c29ccc03dd2ebe4db9d3c0e30bfecfc0b6f2c7d264924ae7f68816ff6e78c6874c1db0828776b45f1eac50c8073801e58048b5e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za661193.exe

          Filesize

          694KB

          MD5

          f3c93023a869028df786d3a1bbda09c1

          SHA1

          e2dfba94b25b72f78be61e72dfe1da0c4b1bf730

          SHA256

          186c3cbdf392770d701988b31ebb0603138fb5cdffb204df3f23a4facb41f708

          SHA512

          1494e9d4417de5a960546dd676f07cbad34da703805aad8b9dee602c329f66fa8729d46c7f1d20a34e9ab1bbefc28bc4827a7595fc6bf593bd8b52bd2e4afe54

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za661193.exe

          Filesize

          694KB

          MD5

          f3c93023a869028df786d3a1bbda09c1

          SHA1

          e2dfba94b25b72f78be61e72dfe1da0c4b1bf730

          SHA256

          186c3cbdf392770d701988b31ebb0603138fb5cdffb204df3f23a4facb41f708

          SHA512

          1494e9d4417de5a960546dd676f07cbad34da703805aad8b9dee602c329f66fa8729d46c7f1d20a34e9ab1bbefc28bc4827a7595fc6bf593bd8b52bd2e4afe54

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w58zX00.exe

          Filesize

          279KB

          MD5

          1c81ba95ebb8842d23ce1a47e54c5cb2

          SHA1

          0101c5608e9a1a140cfca56403f6778bd1c28665

          SHA256

          b5eb88d8bac62444958afc30c16d619cebb21332206d0cefc2185c27e716c78f

          SHA512

          91bcfaae61ddb9adfeb636b3ab659288a67fdb9bfaf0e158c984631c946b5cb58ac3b8d8b02dcad07bdf25b99e122d23b162e16490b65842a1a7345027cb0221

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w58zX00.exe

          Filesize

          279KB

          MD5

          1c81ba95ebb8842d23ce1a47e54c5cb2

          SHA1

          0101c5608e9a1a140cfca56403f6778bd1c28665

          SHA256

          b5eb88d8bac62444958afc30c16d619cebb21332206d0cefc2185c27e716c78f

          SHA512

          91bcfaae61ddb9adfeb636b3ab659288a67fdb9bfaf0e158c984631c946b5cb58ac3b8d8b02dcad07bdf25b99e122d23b162e16490b65842a1a7345027cb0221

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za769564.exe

          Filesize

          414KB

          MD5

          8e3d5a8987b5206721ef88951c0a8076

          SHA1

          3c2aae784dfc9cacfd2e5f00019f42e4862f53a8

          SHA256

          71d7029f277a4d28b5e7b468103303529b3156f6c76ab8cb447a2e41921b469e

          SHA512

          0d2c395a173f27712335c032ac05593e4c8377dc2234eafa8cd2d96dbaaeee04bcd44e472867c112e91ecf9fa4d0f39103ca67189017190106ad7c145e36a501

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za769564.exe

          Filesize

          414KB

          MD5

          8e3d5a8987b5206721ef88951c0a8076

          SHA1

          3c2aae784dfc9cacfd2e5f00019f42e4862f53a8

          SHA256

          71d7029f277a4d28b5e7b468103303529b3156f6c76ab8cb447a2e41921b469e

          SHA512

          0d2c395a173f27712335c032ac05593e4c8377dc2234eafa8cd2d96dbaaeee04bcd44e472867c112e91ecf9fa4d0f39103ca67189017190106ad7c145e36a501

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0012.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0012.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9383GL.exe

          Filesize

          362KB

          MD5

          af0f148fcfa75d31a76db3df3508bd4d

          SHA1

          9b8b7ed045bf2451b4ff2a5a4eb505d956413519

          SHA256

          65675feec282e238caf42af59c02f32c243fc1dee408b8640d6dde0d1a418af4

          SHA512

          a581ff6bf26312d1ba5e39f1972b837626c6fb72a7ba29f4eacb70c59afa2b6f258e4adb9304a5f4c938eaa29c921fa3d7d651feb053173c2d6310d7228f1b53

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9383GL.exe

          Filesize

          362KB

          MD5

          af0f148fcfa75d31a76db3df3508bd4d

          SHA1

          9b8b7ed045bf2451b4ff2a5a4eb505d956413519

          SHA256

          65675feec282e238caf42af59c02f32c243fc1dee408b8640d6dde0d1a418af4

          SHA512

          a581ff6bf26312d1ba5e39f1972b837626c6fb72a7ba29f4eacb70c59afa2b6f258e4adb9304a5f4c938eaa29c921fa3d7d651feb053173c2d6310d7228f1b53

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/1352-161-0x0000000000610000-0x000000000061A000-memory.dmp

          Filesize

          40KB

        • memory/1888-180-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-970-0x000000000AED0000-0x000000000AF20000-memory.dmp

          Filesize

          320KB

        • memory/1888-196-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-198-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-200-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-202-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-204-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-206-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-208-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-210-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-212-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-214-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-216-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-218-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-220-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-222-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-224-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-226-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-228-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-230-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-232-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-234-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-963-0x0000000009C70000-0x000000000A288000-memory.dmp

          Filesize

          6.1MB

        • memory/1888-964-0x000000000A320000-0x000000000A332000-memory.dmp

          Filesize

          72KB

        • memory/1888-965-0x000000000A340000-0x000000000A44A000-memory.dmp

          Filesize

          1.0MB

        • memory/1888-966-0x000000000A470000-0x000000000A4AC000-memory.dmp

          Filesize

          240KB

        • memory/1888-967-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/1888-968-0x000000000A760000-0x000000000A7C6000-memory.dmp

          Filesize

          408KB

        • memory/1888-969-0x000000000AE20000-0x000000000AEB2000-memory.dmp

          Filesize

          584KB

        • memory/1888-194-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-971-0x000000000AF40000-0x000000000AFB6000-memory.dmp

          Filesize

          472KB

        • memory/1888-972-0x000000000B010000-0x000000000B1D2000-memory.dmp

          Filesize

          1.8MB

        • memory/1888-973-0x000000000B230000-0x000000000B75C000-memory.dmp

          Filesize

          5.2MB

        • memory/1888-974-0x000000000B830000-0x000000000B84E000-memory.dmp

          Filesize

          120KB

        • memory/1888-192-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-190-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-167-0x0000000007200000-0x00000000077A4000-memory.dmp

          Filesize

          5.6MB

        • memory/1888-168-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

          Filesize

          280KB

        • memory/1888-169-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/1888-170-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/1888-171-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-188-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-186-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-172-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-174-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-176-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-184-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-182-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/1888-178-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/3368-1017-0x0000000007220000-0x0000000007230000-memory.dmp

          Filesize

          64KB

        • memory/3368-1016-0x0000000007220000-0x0000000007230000-memory.dmp

          Filesize

          64KB

        • memory/3368-1015-0x0000000007220000-0x0000000007230000-memory.dmp

          Filesize

          64KB

        • memory/3368-1011-0x0000000007220000-0x0000000007230000-memory.dmp

          Filesize

          64KB

        • memory/3368-1010-0x0000000002C90000-0x0000000002CBD000-memory.dmp

          Filesize

          180KB

        • memory/4220-1816-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4220-1200-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB

        • memory/4220-1198-0x0000000007140000-0x0000000007150000-memory.dmp

          Filesize

          64KB