Analysis

  • max time kernel
    122s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2023 08:50

General

  • Target

    5afe5c03c2fa50e0083bfe5244957690c0fa4bfffe17d44f35f1cfb44bef1723.exe

  • Size

    944KB

  • MD5

    c1643ce032f107dbbab83142f56a79b1

  • SHA1

    3408097011da9f28fa898a33e6e2f233e6c830f8

  • SHA256

    5afe5c03c2fa50e0083bfe5244957690c0fa4bfffe17d44f35f1cfb44bef1723

  • SHA512

    4e3653a12af66f4e35ca5dbef5e55aba38a502305ff2a251f8de8a89c182587ca3a2bb1ccd07f33fdaff9aa34d4150437eb5924c53c26c88539d74cdc594e349

  • SSDEEP

    24576:tyhJfVXbA3f0UU4RTbjfDwjcb5RgCDLcCioGQ0TH2hLm8zLQ:IXRk3f0UlRfY65hLcro1UWU8zL

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5afe5c03c2fa50e0083bfe5244957690c0fa4bfffe17d44f35f1cfb44bef1723.exe
    "C:\Users\Admin\AppData\Local\Temp\5afe5c03c2fa50e0083bfe5244957690c0fa4bfffe17d44f35f1cfb44bef1723.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za624706.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za624706.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za329829.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za329829.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\60836771.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\60836771.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4056
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 1028
            5⤵
            • Program crash
            PID:968
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w85db18.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w85db18.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2176
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 1320
            5⤵
            • Program crash
            PID:2228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMLNR89.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMLNR89.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5044
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3360
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2040
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:4164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys767612.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys767612.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1672
        3⤵
        • Program crash
        PID:3828
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4056 -ip 4056
    1⤵
      PID:2536
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2176 -ip 2176
      1⤵
        PID:2660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1648 -ip 1648
        1⤵
          PID:4460
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:5008
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:5104

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys767612.exe

          Filesize

          353KB

          MD5

          32a961726c7b421fa856808535ab681c

          SHA1

          44cd5caab08b49f23b5ad10c186c66e5def100a6

          SHA256

          5a23fc3581af9089b1ad4ae0916f0938b0f5bcf842f28548f5b8ab21d402efed

          SHA512

          89c62550e7bd4b32d206f5ba1738cd495549f5f032e33022a50d5bfd9f0661013af65364093d398035a4bc69b7e58aadef31e513ed0b839c9f0ba247749cac65

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys767612.exe

          Filesize

          353KB

          MD5

          32a961726c7b421fa856808535ab681c

          SHA1

          44cd5caab08b49f23b5ad10c186c66e5def100a6

          SHA256

          5a23fc3581af9089b1ad4ae0916f0938b0f5bcf842f28548f5b8ab21d402efed

          SHA512

          89c62550e7bd4b32d206f5ba1738cd495549f5f032e33022a50d5bfd9f0661013af65364093d398035a4bc69b7e58aadef31e513ed0b839c9f0ba247749cac65

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za624706.exe

          Filesize

          730KB

          MD5

          d0c96d5165e5ec8e3f43a761d886adcf

          SHA1

          d13f36f7d28302e948c28d31dae2d2dace7e0915

          SHA256

          b408f6dea43852cbf2192d8b46220b6c477d6c0e188a78497657d009aaf5023c

          SHA512

          6080ffe68cbb9f6daa0210b141fba13a9a046da1d86f2e0b8d3206118cdc47011a7c2a230bc5c3ab62582279bf8cd8422fbd3a68db694f472de2665a10bad343

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za624706.exe

          Filesize

          730KB

          MD5

          d0c96d5165e5ec8e3f43a761d886adcf

          SHA1

          d13f36f7d28302e948c28d31dae2d2dace7e0915

          SHA256

          b408f6dea43852cbf2192d8b46220b6c477d6c0e188a78497657d009aaf5023c

          SHA512

          6080ffe68cbb9f6daa0210b141fba13a9a046da1d86f2e0b8d3206118cdc47011a7c2a230bc5c3ab62582279bf8cd8422fbd3a68db694f472de2665a10bad343

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMLNR89.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMLNR89.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za329829.exe

          Filesize

          547KB

          MD5

          04379058d520cccd327e667a3cfc4c3d

          SHA1

          d51d6facba35793e3892c86c2f54853fa4e3156e

          SHA256

          113c2eae6982491fa5f8fc6a587f6a418cff0a76eacd146f393e16b761ead7ec

          SHA512

          e99086d52fe6a29b863de5f488d60e0fda5473ad7c6004b5dd0d136afed8c121559ec7911045a84501631b88dd42f0a8545f52f75b85a9df1877df2cab17ae9f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za329829.exe

          Filesize

          547KB

          MD5

          04379058d520cccd327e667a3cfc4c3d

          SHA1

          d51d6facba35793e3892c86c2f54853fa4e3156e

          SHA256

          113c2eae6982491fa5f8fc6a587f6a418cff0a76eacd146f393e16b761ead7ec

          SHA512

          e99086d52fe6a29b863de5f488d60e0fda5473ad7c6004b5dd0d136afed8c121559ec7911045a84501631b88dd42f0a8545f52f75b85a9df1877df2cab17ae9f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\60836771.exe

          Filesize

          269KB

          MD5

          a1fea68dbc96f2b7f7c04ca91a52b16d

          SHA1

          627509e45e35f701f8a4c8df042582f0e5c77e05

          SHA256

          81ecf5e15749ffbee0cf9f4e668f3aedbc4c8a8355aaf93bd9c74849722db1a4

          SHA512

          bf85c2f732357fe48946ae02647cade731cb50287e1ee07aa09005392d8781fe67dc0b76d3d7890a36b1b652c6ea9b0ba1c08b76ccb092483da2f937575bdc42

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\60836771.exe

          Filesize

          269KB

          MD5

          a1fea68dbc96f2b7f7c04ca91a52b16d

          SHA1

          627509e45e35f701f8a4c8df042582f0e5c77e05

          SHA256

          81ecf5e15749ffbee0cf9f4e668f3aedbc4c8a8355aaf93bd9c74849722db1a4

          SHA512

          bf85c2f732357fe48946ae02647cade731cb50287e1ee07aa09005392d8781fe67dc0b76d3d7890a36b1b652c6ea9b0ba1c08b76ccb092483da2f937575bdc42

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w85db18.exe

          Filesize

          353KB

          MD5

          00dc3a03253bb10b381590fea4ba0db0

          SHA1

          b6d754f41ae53d3fa25263c4807a14e8a7865098

          SHA256

          d04faf75108344cf0000324511557bc5a48dc01ac04dec37411d2a2d50320e70

          SHA512

          f60bb46c975ae6f9d445b7e3c49656dae97e045b764de1c7b1e987fed530ac573dd929298407bd66314e289cf437d74fdded562a5ab4d0cb3365f43b96bfb0d3

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w85db18.exe

          Filesize

          353KB

          MD5

          00dc3a03253bb10b381590fea4ba0db0

          SHA1

          b6d754f41ae53d3fa25263c4807a14e8a7865098

          SHA256

          d04faf75108344cf0000324511557bc5a48dc01ac04dec37411d2a2d50320e70

          SHA512

          f60bb46c975ae6f9d445b7e3c49656dae97e045b764de1c7b1e987fed530ac573dd929298407bd66314e289cf437d74fdded562a5ab4d0cb3365f43b96bfb0d3

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/1648-1260-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/1648-1261-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/1648-1821-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/2176-1002-0x000000000AED0000-0x000000000AF20000-memory.dmp

          Filesize

          320KB

        • memory/2176-232-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-1006-0x000000000B5D0000-0x000000000BAFC000-memory.dmp

          Filesize

          5.2MB

        • memory/2176-1005-0x000000000B200000-0x000000000B3C2000-memory.dmp

          Filesize

          1.8MB

        • memory/2176-1004-0x000000000B0E0000-0x000000000B0FE000-memory.dmp

          Filesize

          120KB

        • memory/2176-1003-0x000000000AF30000-0x000000000AFA6000-memory.dmp

          Filesize

          472KB

        • memory/2176-1001-0x000000000AE10000-0x000000000AEA2000-memory.dmp

          Filesize

          584KB

        • memory/2176-1000-0x000000000A750000-0x000000000A7B6000-memory.dmp

          Filesize

          408KB

        • memory/2176-999-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/2176-998-0x000000000A470000-0x000000000A4AC000-memory.dmp

          Filesize

          240KB

        • memory/2176-199-0x0000000002BC0000-0x0000000002C06000-memory.dmp

          Filesize

          280KB

        • memory/2176-201-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/2176-200-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/2176-202-0x0000000007300000-0x0000000007310000-memory.dmp

          Filesize

          64KB

        • memory/2176-203-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-204-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-206-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-208-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-210-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-212-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-214-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-216-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-218-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-220-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-222-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-224-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-226-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-228-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-230-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-997-0x000000000A360000-0x000000000A46A000-memory.dmp

          Filesize

          1.0MB

        • memory/2176-234-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-236-0x0000000007180000-0x00000000071B5000-memory.dmp

          Filesize

          212KB

        • memory/2176-995-0x0000000009D40000-0x000000000A358000-memory.dmp

          Filesize

          6.1MB

        • memory/2176-996-0x00000000072B0000-0x00000000072C2000-memory.dmp

          Filesize

          72KB

        • memory/4056-175-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-185-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-173-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-171-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-190-0x00000000072E0000-0x00000000072F0000-memory.dmp

          Filesize

          64KB

        • memory/4056-181-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-192-0x00000000072E0000-0x00000000072F0000-memory.dmp

          Filesize

          64KB

        • memory/4056-191-0x00000000072E0000-0x00000000072F0000-memory.dmp

          Filesize

          64KB

        • memory/4056-189-0x0000000002C90000-0x0000000002CBD000-memory.dmp

          Filesize

          180KB

        • memory/4056-188-0x0000000000400000-0x0000000002B9E000-memory.dmp

          Filesize

          39.6MB

        • memory/4056-179-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-177-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-155-0x0000000002C90000-0x0000000002CBD000-memory.dmp

          Filesize

          180KB

        • memory/4056-183-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-194-0x0000000000400000-0x0000000002B9E000-memory.dmp

          Filesize

          39.6MB

        • memory/4056-169-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-167-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-165-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-163-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-161-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-160-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/4056-159-0x00000000072E0000-0x00000000072F0000-memory.dmp

          Filesize

          64KB

        • memory/4056-158-0x00000000072E0000-0x00000000072F0000-memory.dmp

          Filesize

          64KB

        • memory/4056-157-0x00000000072E0000-0x00000000072F0000-memory.dmp

          Filesize

          64KB

        • memory/4056-156-0x00000000072F0000-0x0000000007894000-memory.dmp

          Filesize

          5.6MB

        • memory/4056-187-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB