Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2023 23:33

General

  • Target

    16d26ebd1c09e284d2a6abe4472e160922ca7d9976d6cfb3371a2fa613f4cb15.exe

  • Size

    951KB

  • MD5

    4d5d273d5d3a780478a9ed890004c657

  • SHA1

    f820706999d1f76d9333358c5d332c9dfe9aa921

  • SHA256

    16d26ebd1c09e284d2a6abe4472e160922ca7d9976d6cfb3371a2fa613f4cb15

  • SHA512

    6f6551016ff85740bd5886b1c01f2b63f6df79620bf32a49cbed4e515700693b6c4bf858dce60efd69182bdc872eb9e7fa045d9e068e79e620c7ad4b93041b37

  • SSDEEP

    24576:iyjEOH1vlgIzHuoKsn/EfR79L7wI5xEqrz31+sWHz8y:JlVt1KornsrwI5Cqrz

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16d26ebd1c09e284d2a6abe4472e160922ca7d9976d6cfb3371a2fa613f4cb15.exe
    "C:\Users\Admin\AppData\Local\Temp\16d26ebd1c09e284d2a6abe4472e160922ca7d9976d6cfb3371a2fa613f4cb15.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za172346.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za172346.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za414747.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za414747.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0229rV.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0229rV.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3320
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 1080
            5⤵
            • Program crash
            PID:2760
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w73LM14.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w73LM14.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4576
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 1176
            5⤵
            • Program crash
            PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xccTz68.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xccTz68.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4408
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1208
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:3416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys193361.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys193361.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 1296
        3⤵
        • Program crash
        PID:5016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3320 -ip 3320
    1⤵
      PID:3764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4576 -ip 4576
      1⤵
        PID:5104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2056 -ip 2056
        1⤵
          PID:5004
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:3664
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:4160

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys193361.exe

          Filesize

          361KB

          MD5

          5f48f21bdabcd71cf0b9cfe10a95015d

          SHA1

          41e737e31fff1ec2725f2ab8d5068c409210387a

          SHA256

          84e4a85e6aacb4acc9882e6a622c3a8cf7a31729bc13cbeff77340cd53744385

          SHA512

          f6e6460e8170b930f1bf725b068130edefb321981d6dc87291982b7bbfe84cde717d76af0df72d69bca664fd05cd85826f2989f83ff2cfa0eb0c51c953f80621

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys193361.exe

          Filesize

          361KB

          MD5

          5f48f21bdabcd71cf0b9cfe10a95015d

          SHA1

          41e737e31fff1ec2725f2ab8d5068c409210387a

          SHA256

          84e4a85e6aacb4acc9882e6a622c3a8cf7a31729bc13cbeff77340cd53744385

          SHA512

          f6e6460e8170b930f1bf725b068130edefb321981d6dc87291982b7bbfe84cde717d76af0df72d69bca664fd05cd85826f2989f83ff2cfa0eb0c51c953f80621

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za172346.exe

          Filesize

          733KB

          MD5

          d9fa535ca3fefdd11f2c452f48de5cc6

          SHA1

          785e08106baf8917c45aa02db8fa03d328cdf202

          SHA256

          b40a56696c4c7d9cf367c17f8cb4587284c8f0b174d3db11f442961698966582

          SHA512

          1ebe8dc9213cc9ae36ba07645b5008cb23b76288800b0af090ddfc33d798fcb204b0ea9f37ba671b1f08fd62c540e886712e964d5ad130228ef9eda3184ea3cc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za172346.exe

          Filesize

          733KB

          MD5

          d9fa535ca3fefdd11f2c452f48de5cc6

          SHA1

          785e08106baf8917c45aa02db8fa03d328cdf202

          SHA256

          b40a56696c4c7d9cf367c17f8cb4587284c8f0b174d3db11f442961698966582

          SHA512

          1ebe8dc9213cc9ae36ba07645b5008cb23b76288800b0af090ddfc33d798fcb204b0ea9f37ba671b1f08fd62c540e886712e964d5ad130228ef9eda3184ea3cc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xccTz68.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xccTz68.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za414747.exe

          Filesize

          550KB

          MD5

          4bc4807cc6ab193fc15d743614eb7857

          SHA1

          e5897278f1c502a4833be1a0fc8f6ede3112c8fd

          SHA256

          971458298009fda976b03bb33ad82ae3cf7db98ce585b2c9f29a1119f45b23de

          SHA512

          c510239b87375ae284e43a4b928d72c242f590576784bb7f5cbd1e10c57b24f9946d7aade8ca782c0da3f5d7a3aee7cb55c0dc9d5af51139b9e1e9741d990069

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za414747.exe

          Filesize

          550KB

          MD5

          4bc4807cc6ab193fc15d743614eb7857

          SHA1

          e5897278f1c502a4833be1a0fc8f6ede3112c8fd

          SHA256

          971458298009fda976b03bb33ad82ae3cf7db98ce585b2c9f29a1119f45b23de

          SHA512

          c510239b87375ae284e43a4b928d72c242f590576784bb7f5cbd1e10c57b24f9946d7aade8ca782c0da3f5d7a3aee7cb55c0dc9d5af51139b9e1e9741d990069

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0229rV.exe

          Filesize

          278KB

          MD5

          6c2fcd1f322a9f6250f5a7ba0b3b6298

          SHA1

          19740b6dcc399edce3bfb21ef33e617ee131566f

          SHA256

          57e28fe5ca0f59de36c68ee8745971bde826c33c6f855191133d094a770c030d

          SHA512

          fccd70329a5799e15a0a39e5fea5e759afc6e62cd91e448b31b4deef996e462ecc9a72f9797ec44facaa8ebcd0ce23e476d71ef302c981c63a6890d8be60cde2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0229rV.exe

          Filesize

          278KB

          MD5

          6c2fcd1f322a9f6250f5a7ba0b3b6298

          SHA1

          19740b6dcc399edce3bfb21ef33e617ee131566f

          SHA256

          57e28fe5ca0f59de36c68ee8745971bde826c33c6f855191133d094a770c030d

          SHA512

          fccd70329a5799e15a0a39e5fea5e759afc6e62cd91e448b31b4deef996e462ecc9a72f9797ec44facaa8ebcd0ce23e476d71ef302c981c63a6890d8be60cde2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w73LM14.exe

          Filesize

          361KB

          MD5

          6da415b38f4207b2e15a52459a8bf697

          SHA1

          cfa31cc0df8a5bd03a6488bbbc2b242ea380ae33

          SHA256

          eae39218d29320c489678243babdf88dee2faa05b62377a381c76f4f29f6146d

          SHA512

          4efdac4373adcec4d95075a191901a841d3d544b89c730480dfae3a89011e2414feb7d501a1d6166bfe24a42508298f9d797dc573ac1917f6509ced6b6d8e1e5

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w73LM14.exe

          Filesize

          361KB

          MD5

          6da415b38f4207b2e15a52459a8bf697

          SHA1

          cfa31cc0df8a5bd03a6488bbbc2b242ea380ae33

          SHA256

          eae39218d29320c489678243babdf88dee2faa05b62377a381c76f4f29f6146d

          SHA512

          4efdac4373adcec4d95075a191901a841d3d544b89c730480dfae3a89011e2414feb7d501a1d6166bfe24a42508298f9d797dc573ac1917f6509ced6b6d8e1e5

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/2056-1819-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/2056-1188-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/2056-1187-0x0000000007290000-0x00000000072A0000-memory.dmp

          Filesize

          64KB

        • memory/3320-156-0x00000000030B0000-0x00000000030C0000-memory.dmp

          Filesize

          64KB

        • memory/3320-173-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-171-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-183-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-185-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-186-0x00000000030B0000-0x00000000030C0000-memory.dmp

          Filesize

          64KB

        • memory/3320-187-0x0000000000400000-0x0000000002BAF000-memory.dmp

          Filesize

          39.7MB

        • memory/3320-188-0x00000000030B0000-0x00000000030C0000-memory.dmp

          Filesize

          64KB

        • memory/3320-189-0x00000000030B0000-0x00000000030C0000-memory.dmp

          Filesize

          64KB

        • memory/3320-190-0x00000000030B0000-0x00000000030C0000-memory.dmp

          Filesize

          64KB

        • memory/3320-192-0x0000000000400000-0x0000000002BAF000-memory.dmp

          Filesize

          39.7MB

        • memory/3320-179-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-181-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-177-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-175-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-169-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-167-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-165-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-163-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-161-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-159-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-158-0x0000000004B80000-0x0000000004B92000-memory.dmp

          Filesize

          72KB

        • memory/3320-157-0x0000000007110000-0x00000000076B4000-memory.dmp

          Filesize

          5.6MB

        • memory/3320-155-0x0000000002CB0000-0x0000000002CDD000-memory.dmp

          Filesize

          180KB

        • memory/4576-206-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-224-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-226-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-228-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-230-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-277-0x0000000002CC0000-0x0000000002D06000-memory.dmp

          Filesize

          280KB

        • memory/4576-279-0x00000000073D0000-0x00000000073E0000-memory.dmp

          Filesize

          64KB

        • memory/4576-280-0x00000000073D0000-0x00000000073E0000-memory.dmp

          Filesize

          64KB

        • memory/4576-282-0x00000000073D0000-0x00000000073E0000-memory.dmp

          Filesize

          64KB

        • memory/4576-993-0x0000000009E10000-0x000000000A428000-memory.dmp

          Filesize

          6.1MB

        • memory/4576-994-0x0000000004E70000-0x0000000004E82000-memory.dmp

          Filesize

          72KB

        • memory/4576-995-0x000000000A430000-0x000000000A53A000-memory.dmp

          Filesize

          1.0MB

        • memory/4576-996-0x00000000073D0000-0x00000000073E0000-memory.dmp

          Filesize

          64KB

        • memory/4576-997-0x00000000072F0000-0x000000000732C000-memory.dmp

          Filesize

          240KB

        • memory/4576-998-0x000000000A760000-0x000000000A7C6000-memory.dmp

          Filesize

          408KB

        • memory/4576-999-0x000000000AE30000-0x000000000AEC2000-memory.dmp

          Filesize

          584KB

        • memory/4576-1000-0x000000000AEF0000-0x000000000AF66000-memory.dmp

          Filesize

          472KB

        • memory/4576-1001-0x000000000AFD0000-0x000000000B192000-memory.dmp

          Filesize

          1.8MB

        • memory/4576-222-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-220-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-218-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-216-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-214-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-212-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-210-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-208-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-204-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-202-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-200-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-197-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-198-0x0000000004C50000-0x0000000004C85000-memory.dmp

          Filesize

          212KB

        • memory/4576-1002-0x000000000B1A0000-0x000000000B6CC000-memory.dmp

          Filesize

          5.2MB

        • memory/4576-1003-0x000000000B750000-0x000000000B76E000-memory.dmp

          Filesize

          120KB

        • memory/4576-1005-0x0000000004830000-0x0000000004880000-memory.dmp

          Filesize

          320KB