Analysis

  • max time kernel
    95s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-04-2023 13:14

General

  • Target

    0e012083922685e2186744fd1f93c1112a288d68f4741eda0ee55c6988ae46b1.exe

  • Size

    883KB

  • MD5

    aac0a60ab492069317bfab3efed14dc0

  • SHA1

    3524c7d76e51cea30f9bea9e02237f4e0bbaf451

  • SHA256

    0e012083922685e2186744fd1f93c1112a288d68f4741eda0ee55c6988ae46b1

  • SHA512

    083e4e4973b51b2db9a0500638b2a31f53a2ac1f648c13afe87de94a8712121567062739af43c36bb2ed1cb34a2cf82c81843272b8e11782b1f6fcf6bb3f85a4

  • SSDEEP

    24576:PyaaBlHqtzghQEHKGw1XIX0j1aU1WKJOeBk9h:a9qIKGw7j1aUhJOmm

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e012083922685e2186744fd1f93c1112a288d68f4741eda0ee55c6988ae46b1.exe
    "C:\Users\Admin\AppData\Local\Temp\0e012083922685e2186744fd1f93c1112a288d68f4741eda0ee55c6988ae46b1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za108714.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za108714.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za387993.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za387993.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3820
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\69750310.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\69750310.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4436
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02bv83.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02bv83.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xGgmF65.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xGgmF65.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4240
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:352
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys267828.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys267828.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4248
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:2068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys267828.exe

    Filesize

    340KB

    MD5

    82f1f8ab8f4190c79a0fba9cfaa3c35c

    SHA1

    f42aa7c0aa5eb2e9e2c45f3a81bd9678bb1ab807

    SHA256

    ffb7d003c92fc7a8b06fd87aab39582aaf5f5b64ce1cfccfb4e2d683a35567a3

    SHA512

    fe377f271a3b2bf9f0e18c52ca13085460f5d3ac7b4c007c13b1275ff8bb63294ba705555714c9ca595902518a9c7b1a5aea2d19368ab2d14aedd66ede3c6415

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys267828.exe

    Filesize

    340KB

    MD5

    82f1f8ab8f4190c79a0fba9cfaa3c35c

    SHA1

    f42aa7c0aa5eb2e9e2c45f3a81bd9678bb1ab807

    SHA256

    ffb7d003c92fc7a8b06fd87aab39582aaf5f5b64ce1cfccfb4e2d683a35567a3

    SHA512

    fe377f271a3b2bf9f0e18c52ca13085460f5d3ac7b4c007c13b1275ff8bb63294ba705555714c9ca595902518a9c7b1a5aea2d19368ab2d14aedd66ede3c6415

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za108714.exe

    Filesize

    722KB

    MD5

    0adaedc687f7c9d838ef775d8532ed06

    SHA1

    dd057277c8edfb6fdefca1f52affbd37a0cea0c5

    SHA256

    1a9cc1eda16029840c079de505eca4beef4eb814bd6a8b3aa1539776b69d9a3b

    SHA512

    5e41ba4b38fbf1f492ba4ffe207c44327dfcc1a56f5c974b549a577977234f745d7b69de397069e1c48372201ca8ffd33b418e2edd0018821e1a5021d294544d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za108714.exe

    Filesize

    722KB

    MD5

    0adaedc687f7c9d838ef775d8532ed06

    SHA1

    dd057277c8edfb6fdefca1f52affbd37a0cea0c5

    SHA256

    1a9cc1eda16029840c079de505eca4beef4eb814bd6a8b3aa1539776b69d9a3b

    SHA512

    5e41ba4b38fbf1f492ba4ffe207c44327dfcc1a56f5c974b549a577977234f745d7b69de397069e1c48372201ca8ffd33b418e2edd0018821e1a5021d294544d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xGgmF65.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xGgmF65.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za387993.exe

    Filesize

    540KB

    MD5

    d4470369c0eb32db936881dc505e2070

    SHA1

    466b72d4020ad34ab7460f026bfa2e1a84b41fd9

    SHA256

    db935d56eeeda423d5fed8bc2f3fcfb839381aa755c2ead49ecdec52c159ac9e

    SHA512

    468554af6c5bc9b933218dea318c2e6f315fc41215566ef1e468506c9c5f85ef4f3048133255058b1ef639ed986ae18a4e8d7e7750ed2c2e40f5753a537a9e7f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za387993.exe

    Filesize

    540KB

    MD5

    d4470369c0eb32db936881dc505e2070

    SHA1

    466b72d4020ad34ab7460f026bfa2e1a84b41fd9

    SHA256

    db935d56eeeda423d5fed8bc2f3fcfb839381aa755c2ead49ecdec52c159ac9e

    SHA512

    468554af6c5bc9b933218dea318c2e6f315fc41215566ef1e468506c9c5f85ef4f3048133255058b1ef639ed986ae18a4e8d7e7750ed2c2e40f5753a537a9e7f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\69750310.exe

    Filesize

    257KB

    MD5

    aa9083fd4e7e69977aaddb4a5f88bc46

    SHA1

    2827d3f58dde62ef6e1a52784215961d68c9e98a

    SHA256

    accd4c096fb5f2a453752c6bc29e5f882464f19b4585198943e2c3f2b645f557

    SHA512

    5bb3d3522aa8805f584b99975848296897729bd76338dbe1b6b3eae7575b7948bb993e94f5d03e45b5c043afdce8a399d3438aa0e53695844b0297008ee106d8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\69750310.exe

    Filesize

    257KB

    MD5

    aa9083fd4e7e69977aaddb4a5f88bc46

    SHA1

    2827d3f58dde62ef6e1a52784215961d68c9e98a

    SHA256

    accd4c096fb5f2a453752c6bc29e5f882464f19b4585198943e2c3f2b645f557

    SHA512

    5bb3d3522aa8805f584b99975848296897729bd76338dbe1b6b3eae7575b7948bb993e94f5d03e45b5c043afdce8a399d3438aa0e53695844b0297008ee106d8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02bv83.exe

    Filesize

    340KB

    MD5

    c0bf983db4cffb8fc1a80a6c306dca0e

    SHA1

    41d56a89d3deb68c8bee16bc120ab38bf8606a8c

    SHA256

    3448c0afe0e24e5d4de2071518355466a6ef7ca9f92781dffdaddadeef2eb8bb

    SHA512

    d1f2b6ff407d6f34417a38a4e62c68eb922cb3917208a1db19ac2a4caa9da7b5fc8532b63941d685c29fc5bb5e39c7d198ad7894dfe29d070ba050c0b68bf85c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w02bv83.exe

    Filesize

    340KB

    MD5

    c0bf983db4cffb8fc1a80a6c306dca0e

    SHA1

    41d56a89d3deb68c8bee16bc120ab38bf8606a8c

    SHA256

    3448c0afe0e24e5d4de2071518355466a6ef7ca9f92781dffdaddadeef2eb8bb

    SHA512

    d1f2b6ff407d6f34417a38a4e62c68eb922cb3917208a1db19ac2a4caa9da7b5fc8532b63941d685c29fc5bb5e39c7d198ad7894dfe29d070ba050c0b68bf85c

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/3984-994-0x000000000B020000-0x000000000B070000-memory.dmp

    Filesize

    320KB

  • memory/3984-436-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/3984-1000-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/3984-1001-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/3984-999-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/3984-996-0x000000000B260000-0x000000000B78C000-memory.dmp

    Filesize

    5.2MB

  • memory/3984-995-0x000000000B090000-0x000000000B252000-memory.dmp

    Filesize

    1.8MB

  • memory/3984-992-0x000000000AF80000-0x000000000AF9E000-memory.dmp

    Filesize

    120KB

  • memory/3984-991-0x000000000AED0000-0x000000000AF46000-memory.dmp

    Filesize

    472KB

  • memory/3984-990-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/3984-989-0x000000000A650000-0x000000000A6B6000-memory.dmp

    Filesize

    408KB

  • memory/3984-988-0x000000000A4C0000-0x000000000A50B000-memory.dmp

    Filesize

    300KB

  • memory/3984-185-0x0000000004A50000-0x0000000004A8C000-memory.dmp

    Filesize

    240KB

  • memory/3984-186-0x0000000007040000-0x000000000707A000-memory.dmp

    Filesize

    232KB

  • memory/3984-187-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-188-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-190-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-192-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-194-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-196-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-198-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-200-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-202-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-204-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-206-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-208-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-210-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-212-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-214-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-216-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-218-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-220-0x0000000007040000-0x0000000007075000-memory.dmp

    Filesize

    212KB

  • memory/3984-429-0x00000000045C0000-0x0000000004606000-memory.dmp

    Filesize

    280KB

  • memory/3984-431-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/3984-433-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/3984-987-0x0000000007080000-0x0000000007090000-memory.dmp

    Filesize

    64KB

  • memory/3984-983-0x0000000009B50000-0x000000000A156000-memory.dmp

    Filesize

    6.0MB

  • memory/3984-984-0x000000000A1F0000-0x000000000A202000-memory.dmp

    Filesize

    72KB

  • memory/3984-985-0x000000000A220000-0x000000000A32A000-memory.dmp

    Filesize

    1.0MB

  • memory/3984-986-0x000000000A340000-0x000000000A37E000-memory.dmp

    Filesize

    248KB

  • memory/4248-1084-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4248-1812-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4248-1811-0x000000000A3C0000-0x000000000A40B000-memory.dmp

    Filesize

    300KB

  • memory/4248-1088-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4248-1086-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4436-176-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-150-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-166-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-174-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-172-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-170-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-168-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-158-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-156-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-154-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-152-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-160-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-149-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-146-0x00000000049C0000-0x00000000049D0000-memory.dmp

    Filesize

    64KB

  • memory/4436-177-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/4436-178-0x00000000049C0000-0x00000000049D0000-memory.dmp

    Filesize

    64KB

  • memory/4436-180-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/4436-164-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-162-0x0000000004950000-0x0000000004963000-memory.dmp

    Filesize

    76KB

  • memory/4436-148-0x00000000049C0000-0x00000000049D0000-memory.dmp

    Filesize

    64KB

  • memory/4436-147-0x0000000004950000-0x0000000004968000-memory.dmp

    Filesize

    96KB

  • memory/4436-145-0x0000000007170000-0x000000000766E000-memory.dmp

    Filesize

    5.0MB

  • memory/4436-144-0x00000000048B0000-0x00000000048CA000-memory.dmp

    Filesize

    104KB

  • memory/4436-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB