Analysis

  • max time kernel
    110s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 15:08

General

  • Target

    ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe

  • Size

    1.0MB

  • MD5

    facd0b118db0fef2a438a9f9b79673bd

  • SHA1

    ccac7ff0ab6cabc97f35280598574cb96ddf9dab

  • SHA256

    ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e

  • SHA512

    fcc671a126ee27c2441d92a671390fce78ec07d584c2e61671a9133e0a08f99cd82cb1b8cc26b1266dbe8ba0fc49ca0a1a128def6f9672f63fc9eb96d5a8ae0c

  • SSDEEP

    24576:gyr16aBeE9AtjsxLW8RYFgIResm8ZOq7jVPWHJJEBP:nrxBe6KWW8RYFg4eP8ZOq7hQJEB

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe
    "C:\Users\Admin\AppData\Local\Temp\ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za430431.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za430431.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za056249.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za056249.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\07509847.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\07509847.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5100
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 1080
            5⤵
            • Program crash
            PID:4540
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w46EH90.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w46EH90.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4648
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 1584
            5⤵
            • Program crash
            PID:1140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgAZq27.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgAZq27.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3108
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4568
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:3168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys403739.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys403739.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 1312
        3⤵
        • Program crash
        PID:520
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 5100 -ip 5100
    1⤵
      PID:408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4648 -ip 4648
      1⤵
        PID:3840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3156 -ip 3156
        1⤵
          PID:5048
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:3680
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:2908

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys403739.exe

          Filesize

          460KB

          MD5

          17a464832774bbb54607bcf2e7cc7278

          SHA1

          d398c93e4c01e9f8503556f403a3811c775acd92

          SHA256

          27c340044d552004d3b7b5addb1ee01820e66fd21911f1cf7dd394fc08272cc8

          SHA512

          87575dbd3e6cf3fcdb5d3d46a44cc01b554ac6b996027cacad6946484a731431bee2f3cea6dbe3f98b027e87d1556b7c0a16ae8fc54adcc538dff88f61cf4fc5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys403739.exe

          Filesize

          460KB

          MD5

          17a464832774bbb54607bcf2e7cc7278

          SHA1

          d398c93e4c01e9f8503556f403a3811c775acd92

          SHA256

          27c340044d552004d3b7b5addb1ee01820e66fd21911f1cf7dd394fc08272cc8

          SHA512

          87575dbd3e6cf3fcdb5d3d46a44cc01b554ac6b996027cacad6946484a731431bee2f3cea6dbe3f98b027e87d1556b7c0a16ae8fc54adcc538dff88f61cf4fc5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za430431.exe

          Filesize

          776KB

          MD5

          500d884e1c53b87768ef31cd7245b693

          SHA1

          22f45d44017d55c25ca88243bf816db8d4714a5c

          SHA256

          a6bb95446b0708f559a3f85124b6298464187f8e3fc37c65ca5ed5975195d8ba

          SHA512

          b4313788a1f0282d584ef26ce38db79d9ae4b502a874acd823899b0899b9b5ae00d3ad02996e91f137c4cc44f0182029f97b596344fc2083f4e298265f71d5ba

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za430431.exe

          Filesize

          776KB

          MD5

          500d884e1c53b87768ef31cd7245b693

          SHA1

          22f45d44017d55c25ca88243bf816db8d4714a5c

          SHA256

          a6bb95446b0708f559a3f85124b6298464187f8e3fc37c65ca5ed5975195d8ba

          SHA512

          b4313788a1f0282d584ef26ce38db79d9ae4b502a874acd823899b0899b9b5ae00d3ad02996e91f137c4cc44f0182029f97b596344fc2083f4e298265f71d5ba

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgAZq27.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgAZq27.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za056249.exe

          Filesize

          593KB

          MD5

          6d2b3556890ffc406e695eeb845dfc38

          SHA1

          0788f45296e7f8c23f8e181d499c5e71c596daf5

          SHA256

          0bf88630bcfd42339663d5ccd10dd65963a4820805629d6b4b0dbe70e4589f16

          SHA512

          f3a82528fde2303facf69b057a72974e1135309e4f38e97230d87b74ae095ed0c839c94478acc371eaa6ca03d6f2ab279549072b1305064cbe1466527c7ee278

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za056249.exe

          Filesize

          593KB

          MD5

          6d2b3556890ffc406e695eeb845dfc38

          SHA1

          0788f45296e7f8c23f8e181d499c5e71c596daf5

          SHA256

          0bf88630bcfd42339663d5ccd10dd65963a4820805629d6b4b0dbe70e4589f16

          SHA512

          f3a82528fde2303facf69b057a72974e1135309e4f38e97230d87b74ae095ed0c839c94478acc371eaa6ca03d6f2ab279549072b1305064cbe1466527c7ee278

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\07509847.exe

          Filesize

          378KB

          MD5

          deb2aa47b5fb835ad82b6e01a5cce1f6

          SHA1

          471a3412b32a4e364a9250916e43b1066a99caae

          SHA256

          217052ef8973dedf1c45290bd03dfafede9e9a721db972d4234663c05d54fe98

          SHA512

          6ba35df1a668af1574166d71bc9509fd82aa8e2661cabaa794dc99301c151169333a99d95434849fbb26ca52ac0c7d524d2e59a4f2ce91db6903584883fd5b20

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\07509847.exe

          Filesize

          378KB

          MD5

          deb2aa47b5fb835ad82b6e01a5cce1f6

          SHA1

          471a3412b32a4e364a9250916e43b1066a99caae

          SHA256

          217052ef8973dedf1c45290bd03dfafede9e9a721db972d4234663c05d54fe98

          SHA512

          6ba35df1a668af1574166d71bc9509fd82aa8e2661cabaa794dc99301c151169333a99d95434849fbb26ca52ac0c7d524d2e59a4f2ce91db6903584883fd5b20

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w46EH90.exe

          Filesize

          460KB

          MD5

          1b75e9be4f1b7110749b3791b135eaee

          SHA1

          1bcd5d4f97b95e870e0a0185b6d4f50a000e4425

          SHA256

          235036bfe9d127a288a930c4c3275a2f3cc392b5d605a0c886e59132f0c2d7e2

          SHA512

          ad83a95b520277494a65e8e273a0a6e1becd1d023b31765328fe56f77ad96a35dd564c115ca057bc7e0421c7cabc0dcbadc9215a9fd58107e051a1cf99c5cc3f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w46EH90.exe

          Filesize

          460KB

          MD5

          1b75e9be4f1b7110749b3791b135eaee

          SHA1

          1bcd5d4f97b95e870e0a0185b6d4f50a000e4425

          SHA256

          235036bfe9d127a288a930c4c3275a2f3cc392b5d605a0c886e59132f0c2d7e2

          SHA512

          ad83a95b520277494a65e8e273a0a6e1becd1d023b31765328fe56f77ad96a35dd564c115ca057bc7e0421c7cabc0dcbadc9215a9fd58107e051a1cf99c5cc3f

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/3156-1598-0x0000000005050000-0x0000000005060000-memory.dmp

          Filesize

          64KB

        • memory/3156-1599-0x0000000005050000-0x0000000005060000-memory.dmp

          Filesize

          64KB

        • memory/3156-1818-0x0000000005050000-0x0000000005060000-memory.dmp

          Filesize

          64KB

        • memory/4648-999-0x0000000008A70000-0x0000000008B02000-memory.dmp

          Filesize

          584KB

        • memory/4648-466-0x00000000026D0000-0x00000000026E0000-memory.dmp

          Filesize

          64KB

        • memory/4648-1004-0x0000000009230000-0x000000000975C000-memory.dmp

          Filesize

          5.2MB

        • memory/4648-1003-0x0000000008E60000-0x0000000009022000-memory.dmp

          Filesize

          1.8MB

        • memory/4648-1002-0x0000000008C40000-0x0000000008C5E000-memory.dmp

          Filesize

          120KB

        • memory/4648-1001-0x0000000008B90000-0x0000000008C06000-memory.dmp

          Filesize

          472KB

        • memory/4648-1000-0x0000000008B30000-0x0000000008B80000-memory.dmp

          Filesize

          320KB

        • memory/4648-998-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/4648-997-0x00000000026D0000-0x00000000026E0000-memory.dmp

          Filesize

          64KB

        • memory/4648-199-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-198-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-201-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-203-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-205-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-207-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-209-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-211-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-213-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-215-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-217-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-219-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-223-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-221-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-225-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-227-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-229-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-231-0x00000000053C0000-0x00000000053F5000-memory.dmp

          Filesize

          212KB

        • memory/4648-462-0x0000000000A40000-0x0000000000A86000-memory.dmp

          Filesize

          280KB

        • memory/4648-464-0x00000000026D0000-0x00000000026E0000-memory.dmp

          Filesize

          64KB

        • memory/4648-996-0x00000000080B0000-0x00000000080EC000-memory.dmp

          Filesize

          240KB

        • memory/4648-993-0x00000000078C0000-0x0000000007ED8000-memory.dmp

          Filesize

          6.1MB

        • memory/4648-994-0x0000000007F70000-0x0000000007F82000-memory.dmp

          Filesize

          72KB

        • memory/4648-995-0x0000000007F90000-0x000000000809A000-memory.dmp

          Filesize

          1.0MB

        • memory/5100-176-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-157-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-186-0x0000000002A60000-0x0000000002A70000-memory.dmp

          Filesize

          64KB

        • memory/5100-184-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-193-0x0000000000400000-0x0000000000804000-memory.dmp

          Filesize

          4.0MB

        • memory/5100-192-0x0000000002A60000-0x0000000002A70000-memory.dmp

          Filesize

          64KB

        • memory/5100-191-0x0000000002A60000-0x0000000002A70000-memory.dmp

          Filesize

          64KB

        • memory/5100-190-0x0000000002A60000-0x0000000002A70000-memory.dmp

          Filesize

          64KB

        • memory/5100-188-0x0000000000400000-0x0000000000804000-memory.dmp

          Filesize

          4.0MB

        • memory/5100-182-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-180-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-178-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-185-0x0000000002A60000-0x0000000002A70000-memory.dmp

          Filesize

          64KB

        • memory/5100-172-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-187-0x0000000002A60000-0x0000000002A70000-memory.dmp

          Filesize

          64KB

        • memory/5100-170-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-168-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-166-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-164-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-162-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-160-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-174-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-158-0x0000000002A20000-0x0000000002A32000-memory.dmp

          Filesize

          72KB

        • memory/5100-156-0x0000000004DD0000-0x0000000005374000-memory.dmp

          Filesize

          5.6MB

        • memory/5100-155-0x00000000008E0000-0x000000000090D000-memory.dmp

          Filesize

          180KB