Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2023, 17:11

General

  • Target

    3b4906280bfc310ddb3e92c4645bfcef3a8f1f9166be3c7c49d29307546e60db.exe

  • Size

    896KB

  • MD5

    19710650a9827c21bdd1df8fdc48eefa

  • SHA1

    760e8beabbfec6a5d73234bbd5b85f912dd6c867

  • SHA256

    3b4906280bfc310ddb3e92c4645bfcef3a8f1f9166be3c7c49d29307546e60db

  • SHA512

    a9b4a061e7aecfceb4db998029ca93b73039ff62cfa9c331ecc511c2ac8e44b8a79b1d72331d68d60e7eb89aad5a5c2f49607a0eb8f3f4971e891d671edf226e

  • SSDEEP

    12288:Jy90/QgN+Wuasw3HTiwKnKw14gY1ciOgKrzAyTIAOZ0aNz74/eKVqkjjxNCyTs+:JyoQE+Rasw3zihYOz6TFNz745Aod9

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b4906280bfc310ddb3e92c4645bfcef3a8f1f9166be3c7c49d29307546e60db.exe
    "C:\Users\Admin\AppData\Local\Temp\3b4906280bfc310ddb3e92c4645bfcef3a8f1f9166be3c7c49d29307546e60db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za108847.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za108847.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za015882.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za015882.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\49221527.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\49221527.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2040
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 1064
            5⤵
            • Program crash
            PID:684
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w95pP36.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w95pP36.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:8
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 1660
            5⤵
            • Program crash
            PID:1844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xVXtX20.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xVXtX20.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4696
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4900
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1584
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:2324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys246595.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys246595.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 1912
        3⤵
        • Program crash
        PID:4044
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2040 -ip 2040
    1⤵
      PID:3512
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8 -ip 8
      1⤵
        PID:216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1680 -ip 1680
        1⤵
          PID:3124
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:1460

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys246595.exe

          Filesize

          341KB

          MD5

          b82c08d073d7e657f631210769d1927f

          SHA1

          9efce6412029e7e94a055cbc69fa6bae59ee0947

          SHA256

          da1ffa87b16ac76d682c0695655bf37f3dc0e1f26e79eae0ac806555479342dd

          SHA512

          0f2351b4cb1a42850cc0492180509773b4e4e6c534ee8f2502d1f92dac7698c3b1d1efdc606c1cc5d9f5d041cff78be8e632ff90e1eca0d3388c7ccc30c78256

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys246595.exe

          Filesize

          341KB

          MD5

          b82c08d073d7e657f631210769d1927f

          SHA1

          9efce6412029e7e94a055cbc69fa6bae59ee0947

          SHA256

          da1ffa87b16ac76d682c0695655bf37f3dc0e1f26e79eae0ac806555479342dd

          SHA512

          0f2351b4cb1a42850cc0492180509773b4e4e6c534ee8f2502d1f92dac7698c3b1d1efdc606c1cc5d9f5d041cff78be8e632ff90e1eca0d3388c7ccc30c78256

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za108847.exe

          Filesize

          723KB

          MD5

          167d4a4ef051dffbc80580fafc07bda2

          SHA1

          16bf0f2e2bf5b8a8201d271324cb8e02f4c90c6f

          SHA256

          d74d3a9795b9d046fbe0c487becb392079346cde8fe2eb5d8f12e49b13f19f5d

          SHA512

          b0034b6c6d45b93f398872608d87b9b96d0eadefaabfcae31f85800b1a9da10add897704f346bb5929ed4739e83f519fdedf175195adbfb32ae92f7138552dff

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za108847.exe

          Filesize

          723KB

          MD5

          167d4a4ef051dffbc80580fafc07bda2

          SHA1

          16bf0f2e2bf5b8a8201d271324cb8e02f4c90c6f

          SHA256

          d74d3a9795b9d046fbe0c487becb392079346cde8fe2eb5d8f12e49b13f19f5d

          SHA512

          b0034b6c6d45b93f398872608d87b9b96d0eadefaabfcae31f85800b1a9da10add897704f346bb5929ed4739e83f519fdedf175195adbfb32ae92f7138552dff

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xVXtX20.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xVXtX20.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za015882.exe

          Filesize

          540KB

          MD5

          342f5023d0809f083f32e3e33aafbced

          SHA1

          8dadd99ea0b8bc1a72dfdc45cc6063175c091609

          SHA256

          6370259e14b5eae22e17ce1e2c313900f545f71bf2073f97c2d9ff2d08c68155

          SHA512

          8823825d123d5d81c3a937de0dec6506e12cb49c28eb8c8875a56894fae78bcc66a86ad8077ec945253ca73048f6b11e56b2ad14a468217e64a84b1e49bc2927

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za015882.exe

          Filesize

          540KB

          MD5

          342f5023d0809f083f32e3e33aafbced

          SHA1

          8dadd99ea0b8bc1a72dfdc45cc6063175c091609

          SHA256

          6370259e14b5eae22e17ce1e2c313900f545f71bf2073f97c2d9ff2d08c68155

          SHA512

          8823825d123d5d81c3a937de0dec6506e12cb49c28eb8c8875a56894fae78bcc66a86ad8077ec945253ca73048f6b11e56b2ad14a468217e64a84b1e49bc2927

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\49221527.exe

          Filesize

          258KB

          MD5

          64fbc2f686d085b3cdde326dc0c3264f

          SHA1

          5324a5f76437b89d09ade05bc3420e636678d4af

          SHA256

          e59a082270f34aa10b2c5dfecc71ac94016b3738d0bf8ccae0d5052406845a2f

          SHA512

          eaa9e360453a96ad2798ad4f8d7a5713e0b800fe2e6c54cb754e5c8980faf4b1fbf9a1d369eeae20e332fc5e6af38eaf8ea0ef4f7def557db04f7a616f32e14f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\49221527.exe

          Filesize

          258KB

          MD5

          64fbc2f686d085b3cdde326dc0c3264f

          SHA1

          5324a5f76437b89d09ade05bc3420e636678d4af

          SHA256

          e59a082270f34aa10b2c5dfecc71ac94016b3738d0bf8ccae0d5052406845a2f

          SHA512

          eaa9e360453a96ad2798ad4f8d7a5713e0b800fe2e6c54cb754e5c8980faf4b1fbf9a1d369eeae20e332fc5e6af38eaf8ea0ef4f7def557db04f7a616f32e14f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w95pP36.exe

          Filesize

          341KB

          MD5

          e2a909475b0ddb669d6242e208fb4d32

          SHA1

          1d91495a732a1b17a77a8487e845af26ce5a11b0

          SHA256

          5487f606f8cdc9ab87e5037eca5f651419c17cb14d25f93a97ced48d657ad1de

          SHA512

          dab28a4aa29530395ae666fd678defeb8dee6bb8611f3fff30587c77d01da4ab6e28c7fb677ef39ca4396dfe1e38b64320471b247b92a8c7a12ae9d1b1d91d1e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w95pP36.exe

          Filesize

          341KB

          MD5

          e2a909475b0ddb669d6242e208fb4d32

          SHA1

          1d91495a732a1b17a77a8487e845af26ce5a11b0

          SHA256

          5487f606f8cdc9ab87e5037eca5f651419c17cb14d25f93a97ced48d657ad1de

          SHA512

          dab28a4aa29530395ae666fd678defeb8dee6bb8611f3fff30587c77d01da4ab6e28c7fb677ef39ca4396dfe1e38b64320471b247b92a8c7a12ae9d1b1d91d1e

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/8-1007-0x000000000AED0000-0x000000000AF46000-memory.dmp

          Filesize

          472KB

        • memory/8-994-0x0000000009C70000-0x000000000A288000-memory.dmp

          Filesize

          6.1MB

        • memory/8-1011-0x0000000006C50000-0x0000000006CA0000-memory.dmp

          Filesize

          320KB

        • memory/8-1010-0x000000000B910000-0x000000000B92E000-memory.dmp

          Filesize

          120KB

        • memory/8-1009-0x000000000B180000-0x000000000B6AC000-memory.dmp

          Filesize

          5.2MB

        • memory/8-1008-0x000000000AFA0000-0x000000000B162000-memory.dmp

          Filesize

          1.8MB

        • memory/8-1006-0x000000000AE10000-0x000000000AEA2000-memory.dmp

          Filesize

          584KB

        • memory/8-1005-0x0000000007840000-0x00000000078A6000-memory.dmp

          Filesize

          408KB

        • memory/8-1003-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/8-1002-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/8-1001-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/8-1000-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/8-998-0x000000000A440000-0x000000000A47C000-memory.dmp

          Filesize

          240KB

        • memory/8-198-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-199-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-201-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-203-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-205-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-207-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-209-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-211-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-213-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-215-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-221-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/8-219-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/8-223-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/8-222-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-225-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-218-0x0000000002F20000-0x0000000002F66000-memory.dmp

          Filesize

          280KB

        • memory/8-217-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-227-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-229-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-231-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-235-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-233-0x00000000071B0000-0x00000000071E5000-memory.dmp

          Filesize

          212KB

        • memory/8-997-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/8-995-0x000000000A300000-0x000000000A312000-memory.dmp

          Filesize

          72KB

        • memory/8-996-0x000000000A320000-0x000000000A42A000-memory.dmp

          Filesize

          1.0MB

        • memory/1680-1276-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/1680-1832-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/1680-1831-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/1680-1830-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/1680-1829-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/1680-1827-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/1680-1278-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/1680-1274-0x00000000072B0000-0x00000000072C0000-memory.dmp

          Filesize

          64KB

        • memory/2040-173-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-188-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/2040-185-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-183-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-181-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-171-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-169-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-167-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-165-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-163-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-161-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-160-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-179-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-187-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-189-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2040-190-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2040-192-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2040-193-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/2040-177-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-175-0x0000000007110000-0x0000000007123000-memory.dmp

          Filesize

          76KB

        • memory/2040-159-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2040-158-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2040-157-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2040-156-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

          Filesize

          180KB

        • memory/2040-155-0x0000000007200000-0x00000000077A4000-memory.dmp

          Filesize

          5.6MB