Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2023 00:10

General

  • Target

    setup.exe

  • Size

    1.1MB

  • MD5

    cd822e8b3839c8bedbf550c22d0e9c4d

  • SHA1

    c4f22239513641903ad427c6fab6d4128cbf262d

  • SHA256

    3c443d8d2bc6f9495bdbc759832a79edcc7485af42537b27f60891955a99f73c

  • SHA512

    fc26b7479a06f8177d74a9fc39f65bfacd2c4be038f80bbd9736d394d77d968f0af1c172001c15b6c8306a30686735ebbaba67f0b86938d3f2d217beeb986f7e

  • SSDEEP

    24576:3ypIRkq4fFfCynUpmPcREfHOo7UG7w+e8VMEE:CpltfDnUAkWfuo7gsVh

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za135129.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za135129.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za808690.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za808690.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za317926.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za317926.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2240
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2672.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2672.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1356
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0969Uu.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0969Uu.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2316
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 1328
              6⤵
              • Program crash
              PID:3464
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w71ZX42.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w71ZX42.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3748
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 1084
            5⤵
            • Program crash
            PID:1256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xTnud91.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xTnud91.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3796
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 1844
          4⤵
          • Program crash
          PID:1400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y14Ve40.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y14Ve40.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4420
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:876
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:3680
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2316 -ip 2316
    1⤵
      PID:4552
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3748 -ip 3748
      1⤵
        PID:1820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3796 -ip 3796
        1⤵
          PID:4388
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:4192
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:4680
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe start wuauserv
          1⤵
          • Launches sc.exe
          PID:4220

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y14Ve40.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y14Ve40.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za135129.exe

          Filesize

          900KB

          MD5

          b7ff7d997fd24a54a4d7ec0b1ecc06b4

          SHA1

          07a1528d8dc012176c4013375cbacd0bd5f7729d

          SHA256

          45aee8bea1d982cb545464980e5b7fd989a95130a1d5f97d8b362339e62d35d4

          SHA512

          bd9163eafab7d711b6ba6c330acdc5bc7a2c381c23d1e773f7997c7a2cf7952229520dc496b7304596a6f388c32d83027c7d630a2c3c18090a28e7ec054e7310

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za135129.exe

          Filesize

          900KB

          MD5

          b7ff7d997fd24a54a4d7ec0b1ecc06b4

          SHA1

          07a1528d8dc012176c4013375cbacd0bd5f7729d

          SHA256

          45aee8bea1d982cb545464980e5b7fd989a95130a1d5f97d8b362339e62d35d4

          SHA512

          bd9163eafab7d711b6ba6c330acdc5bc7a2c381c23d1e773f7997c7a2cf7952229520dc496b7304596a6f388c32d83027c7d630a2c3c18090a28e7ec054e7310

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xTnud91.exe

          Filesize

          360KB

          MD5

          c6d62e7725cbf0d75513c4bcac1b219e

          SHA1

          ba3bb6b5ed56e489df549d950787d85646046f95

          SHA256

          d6251c040c0b16123c8c6516a490c80fbada6e88e46bc4856d6c3b3ef64d2192

          SHA512

          db05d3828f5a67a0fef20136445835255b265b78b6d43fbb975aff5ccdaf5f9d9a059f611421ecfd1e06dbf6521dcedc269efadb290d46d221d8ba6cd645f8da

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xTnud91.exe

          Filesize

          360KB

          MD5

          c6d62e7725cbf0d75513c4bcac1b219e

          SHA1

          ba3bb6b5ed56e489df549d950787d85646046f95

          SHA256

          d6251c040c0b16123c8c6516a490c80fbada6e88e46bc4856d6c3b3ef64d2192

          SHA512

          db05d3828f5a67a0fef20136445835255b265b78b6d43fbb975aff5ccdaf5f9d9a059f611421ecfd1e06dbf6521dcedc269efadb290d46d221d8ba6cd645f8da

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za808690.exe

          Filesize

          684KB

          MD5

          8db5b61594b6df60deb72f26183bff6f

          SHA1

          f8ae22f90082c09d74b027cb0d0cb0752f004295

          SHA256

          52932d943cb48e33b2b31109e3c225cf325f7337c2b824d78e3221c1b6b4928d

          SHA512

          51f14f2cd5e943d00bbb351bb9ad4e354476364d1915da02968f5f3463f4d083b9736d21ded0c34be4bd672f54aee01111a686d0fae17f588eaaab1a5e27426f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za808690.exe

          Filesize

          684KB

          MD5

          8db5b61594b6df60deb72f26183bff6f

          SHA1

          f8ae22f90082c09d74b027cb0d0cb0752f004295

          SHA256

          52932d943cb48e33b2b31109e3c225cf325f7337c2b824d78e3221c1b6b4928d

          SHA512

          51f14f2cd5e943d00bbb351bb9ad4e354476364d1915da02968f5f3463f4d083b9736d21ded0c34be4bd672f54aee01111a686d0fae17f588eaaab1a5e27426f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w71ZX42.exe

          Filesize

          278KB

          MD5

          51d67cbd9ec5504ba844232b21215b2b

          SHA1

          5df381b04af7a8257a4f33c8d8bef82c287b3eff

          SHA256

          695d356c7fac75f021ab55657b70a48b70159340b14df6ab5cae227b6afbb2fa

          SHA512

          66a276b118644e1c6c6033ccdbc6a446321e1165555ea99498db23f2a99a84738d65580673774256c3cccd91a3ed4fc4cea98775362f644a0ff84fcb08bd9866

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w71ZX42.exe

          Filesize

          278KB

          MD5

          51d67cbd9ec5504ba844232b21215b2b

          SHA1

          5df381b04af7a8257a4f33c8d8bef82c287b3eff

          SHA256

          695d356c7fac75f021ab55657b70a48b70159340b14df6ab5cae227b6afbb2fa

          SHA512

          66a276b118644e1c6c6033ccdbc6a446321e1165555ea99498db23f2a99a84738d65580673774256c3cccd91a3ed4fc4cea98775362f644a0ff84fcb08bd9866

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za317926.exe

          Filesize

          409KB

          MD5

          8142cb79181f8588c0179eb74a688d66

          SHA1

          629b209d86d7f2d0da3770160dba008c9229ad0b

          SHA256

          d6494f91d36146024c36b269a55c0139f5cf47e9618d18798f43a55c6c6a276a

          SHA512

          4076840003b9c5f9c4cd07638fc4144b05c4a419cba61cc9c6da0365e181901e39947737d35f5a33e2fd892b87e6abc832e6bd2385f2bc33bdd475e56a2f71cf

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za317926.exe

          Filesize

          409KB

          MD5

          8142cb79181f8588c0179eb74a688d66

          SHA1

          629b209d86d7f2d0da3770160dba008c9229ad0b

          SHA256

          d6494f91d36146024c36b269a55c0139f5cf47e9618d18798f43a55c6c6a276a

          SHA512

          4076840003b9c5f9c4cd07638fc4144b05c4a419cba61cc9c6da0365e181901e39947737d35f5a33e2fd892b87e6abc832e6bd2385f2bc33bdd475e56a2f71cf

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2672.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2672.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0969Uu.exe

          Filesize

          360KB

          MD5

          037a4ea0e9a894f8cb0a0bb1091fa24a

          SHA1

          56cf7086ed5521122d1672af2e3c2a35ab4a95f8

          SHA256

          d75ce17989aa37bade35f314887a1d34f1fe434f3481f4c0a3b4fe8f06849dde

          SHA512

          b3a2aabc75fc58af2e261385af350f2a0d0e6620184571e0f494aaee4e2a6c03106f7d6a8b69edd46776d5eee274f00a335a7feaa066cc28d9d99902dc608ebb

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0969Uu.exe

          Filesize

          360KB

          MD5

          037a4ea0e9a894f8cb0a0bb1091fa24a

          SHA1

          56cf7086ed5521122d1672af2e3c2a35ab4a95f8

          SHA256

          d75ce17989aa37bade35f314887a1d34f1fe434f3481f4c0a3b4fe8f06849dde

          SHA512

          b3a2aabc75fc58af2e261385af350f2a0d0e6620184571e0f494aaee4e2a6c03106f7d6a8b69edd46776d5eee274f00a335a7feaa066cc28d9d99902dc608ebb

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/1356-161-0x0000000000EA0000-0x0000000000EAA000-memory.dmp

          Filesize

          40KB

        • memory/2316-215-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-966-0x000000000A480000-0x000000000A58A000-memory.dmp

          Filesize

          1.0MB

        • memory/2316-187-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-189-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-191-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-193-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-195-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-197-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-199-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-201-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-203-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-205-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-207-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-209-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-211-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-213-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-183-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-217-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-219-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-221-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-223-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-225-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-227-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-229-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-231-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-233-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-235-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-964-0x0000000009DA0000-0x000000000A3B8000-memory.dmp

          Filesize

          6.1MB

        • memory/2316-965-0x000000000A460000-0x000000000A472000-memory.dmp

          Filesize

          72KB

        • memory/2316-185-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-967-0x000000000A5A0000-0x000000000A5DC000-memory.dmp

          Filesize

          240KB

        • memory/2316-968-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/2316-969-0x000000000A8A0000-0x000000000A906000-memory.dmp

          Filesize

          408KB

        • memory/2316-970-0x000000000B0B0000-0x000000000B142000-memory.dmp

          Filesize

          584KB

        • memory/2316-971-0x000000000B150000-0x000000000B1A0000-memory.dmp

          Filesize

          320KB

        • memory/2316-972-0x000000000B1C0000-0x000000000B236000-memory.dmp

          Filesize

          472KB

        • memory/2316-973-0x000000000B290000-0x000000000B452000-memory.dmp

          Filesize

          1.8MB

        • memory/2316-974-0x000000000B470000-0x000000000B99C000-memory.dmp

          Filesize

          5.2MB

        • memory/2316-975-0x000000000BAB0000-0x000000000BACE000-memory.dmp

          Filesize

          120KB

        • memory/2316-167-0x00000000072B0000-0x0000000007854000-memory.dmp

          Filesize

          5.6MB

        • memory/2316-168-0x0000000002CE0000-0x0000000002D26000-memory.dmp

          Filesize

          280KB

        • memory/2316-170-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/2316-169-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/2316-171-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/2316-172-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-173-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-175-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-177-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-179-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/2316-181-0x00000000078A0000-0x00000000078D5000-memory.dmp

          Filesize

          212KB

        • memory/3748-1018-0x00000000075B0000-0x00000000075C0000-memory.dmp

          Filesize

          64KB

        • memory/3748-1017-0x00000000075B0000-0x00000000075C0000-memory.dmp

          Filesize

          64KB

        • memory/3748-1013-0x00000000075B0000-0x00000000075C0000-memory.dmp

          Filesize

          64KB

        • memory/3748-1012-0x00000000075B0000-0x00000000075C0000-memory.dmp

          Filesize

          64KB

        • memory/3748-1011-0x00000000075B0000-0x00000000075C0000-memory.dmp

          Filesize

          64KB

        • memory/3748-1010-0x0000000002C80000-0x0000000002CAD000-memory.dmp

          Filesize

          180KB

        • memory/3796-1818-0x0000000007330000-0x0000000007340000-memory.dmp

          Filesize

          64KB

        • memory/3796-1282-0x0000000007330000-0x0000000007340000-memory.dmp

          Filesize

          64KB

        • memory/3796-1280-0x0000000007330000-0x0000000007340000-memory.dmp

          Filesize

          64KB

        • memory/3796-1278-0x0000000007330000-0x0000000007340000-memory.dmp

          Filesize

          64KB