Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2023, 17:58

General

  • Target

    4e2372f78b6f8078102eef370c0ea6c8106ec57939e84c422f2f06461efa1b93.exe

  • Size

    1.1MB

  • MD5

    aaa56b626ee20a06dc9739f217d58a8c

  • SHA1

    3b7e3f2b8cd3c0a891e5ee9244d5a63b3e914cf9

  • SHA256

    4e2372f78b6f8078102eef370c0ea6c8106ec57939e84c422f2f06461efa1b93

  • SHA512

    5712669ae491f470584e4c8a9210f87bc2e1fc5453913212c0246d6f23d9d728311ccd520e9fcc11af24c0f98b253e01223306373ebb025cf118f0d2881dd938

  • SSDEEP

    24576:+yK3rW34AOTA5KFAXMrmYaqS8ovaSsF6S2xjPlc2xcyANy+njjC:NKbWo37F2MrmYaqS8oSSssrb2yG

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e2372f78b6f8078102eef370c0ea6c8106ec57939e84c422f2f06461efa1b93.exe
    "C:\Users\Admin\AppData\Local\Temp\4e2372f78b6f8078102eef370c0ea6c8106ec57939e84c422f2f06461efa1b93.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za129321.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za129321.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za407734.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za407734.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za356367.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za356367.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1252
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\81576441.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\81576441.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4100
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u08820323.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u08820323.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1432
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 1084
              6⤵
              • Program crash
              PID:1048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w28hv10.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w28hv10.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4592
          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4032
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4120
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
              6⤵
              • Loads dropped DLL
              PID:3848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xWqGw88.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xWqGw88.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xWqGw88.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xWqGw88.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys308801.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys308801.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1432 -ip 1432
    1⤵
      PID:2776
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:2060
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:2184
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:4116

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

            Filesize

            229KB

            MD5

            3308051ded87b1863a8d92925202c4b3

            SHA1

            7834ddc23e7976b07118fb580ae38234466dbdfb

            SHA256

            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

            SHA512

            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

            Filesize

            229KB

            MD5

            3308051ded87b1863a8d92925202c4b3

            SHA1

            7834ddc23e7976b07118fb580ae38234466dbdfb

            SHA256

            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

            SHA512

            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

            Filesize

            229KB

            MD5

            3308051ded87b1863a8d92925202c4b3

            SHA1

            7834ddc23e7976b07118fb580ae38234466dbdfb

            SHA256

            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

            SHA512

            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

            Filesize

            229KB

            MD5

            3308051ded87b1863a8d92925202c4b3

            SHA1

            7834ddc23e7976b07118fb580ae38234466dbdfb

            SHA256

            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

            SHA512

            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

            Filesize

            229KB

            MD5

            3308051ded87b1863a8d92925202c4b3

            SHA1

            7834ddc23e7976b07118fb580ae38234466dbdfb

            SHA256

            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

            SHA512

            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys308801.exe

            Filesize

            136KB

            MD5

            08157c7e00df201ac51957f5e7075866

            SHA1

            38e09bdf6b08e732faa00be25756c75b09ce064f

            SHA256

            e5415aef51cd6f0eaa4970b591480496bde5867b94cb4c20a4d529915022baff

            SHA512

            f1fd63cc53aeeb354530e2672f746f6c60f6f4d6df4fc9bcd0f4cbdb459d8a8f41a80f112390a304247be96676564793fcb4c8109c49e145b7afb5bc65d8b4df

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys308801.exe

            Filesize

            136KB

            MD5

            08157c7e00df201ac51957f5e7075866

            SHA1

            38e09bdf6b08e732faa00be25756c75b09ce064f

            SHA256

            e5415aef51cd6f0eaa4970b591480496bde5867b94cb4c20a4d529915022baff

            SHA512

            f1fd63cc53aeeb354530e2672f746f6c60f6f4d6df4fc9bcd0f4cbdb459d8a8f41a80f112390a304247be96676564793fcb4c8109c49e145b7afb5bc65d8b4df

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za129321.exe

            Filesize

            951KB

            MD5

            f1aac5a788bb093c4269ed2792c2ebc2

            SHA1

            acbe0586b88f297fb5d4e06c254615b8acd4c1ba

            SHA256

            51ecf918b488198ef63ae50514fb81810b1515e1a38ba73ed8abeffffe9a0939

            SHA512

            21d1f8bdc1c3d23b0d870a9fb98be2c968571f64e1ebf24bbe2d94cf68bd6009c433928b1ca8806bf6a71cd7bf84774329f9c05ff9aae2230319297d4d1b1727

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za129321.exe

            Filesize

            951KB

            MD5

            f1aac5a788bb093c4269ed2792c2ebc2

            SHA1

            acbe0586b88f297fb5d4e06c254615b8acd4c1ba

            SHA256

            51ecf918b488198ef63ae50514fb81810b1515e1a38ba73ed8abeffffe9a0939

            SHA512

            21d1f8bdc1c3d23b0d870a9fb98be2c968571f64e1ebf24bbe2d94cf68bd6009c433928b1ca8806bf6a71cd7bf84774329f9c05ff9aae2230319297d4d1b1727

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xWqGw88.exe

            Filesize

            342KB

            MD5

            1a080a55b822b063ecd5b3a8a627933b

            SHA1

            14993310af3b2f68f6e790f0cdca22a9797d6369

            SHA256

            9220c68616f155d03192ffc5a7a43679e330ee50bb94d5bcf31d1f4dc376ff62

            SHA512

            3096dc305158b8e7cf08a366187c3113d8465fbdd0dc26df35ce32527bd5a2313e4cac8d5d8bad4699d686170b98d9ba4ee9643cdb90fe60a1e4a55514661379

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xWqGw88.exe

            Filesize

            342KB

            MD5

            1a080a55b822b063ecd5b3a8a627933b

            SHA1

            14993310af3b2f68f6e790f0cdca22a9797d6369

            SHA256

            9220c68616f155d03192ffc5a7a43679e330ee50bb94d5bcf31d1f4dc376ff62

            SHA512

            3096dc305158b8e7cf08a366187c3113d8465fbdd0dc26df35ce32527bd5a2313e4cac8d5d8bad4699d686170b98d9ba4ee9643cdb90fe60a1e4a55514661379

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xWqGw88.exe

            Filesize

            342KB

            MD5

            1a080a55b822b063ecd5b3a8a627933b

            SHA1

            14993310af3b2f68f6e790f0cdca22a9797d6369

            SHA256

            9220c68616f155d03192ffc5a7a43679e330ee50bb94d5bcf31d1f4dc376ff62

            SHA512

            3096dc305158b8e7cf08a366187c3113d8465fbdd0dc26df35ce32527bd5a2313e4cac8d5d8bad4699d686170b98d9ba4ee9643cdb90fe60a1e4a55514661379

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za407734.exe

            Filesize

            596KB

            MD5

            dcf862f43c6b73d77a71458057440769

            SHA1

            37548c4b78b2d9461f45cb4969a31019d6feaf60

            SHA256

            2b862154a101afbc410778070e5bb103cc81969133402167cb1dd7918c610536

            SHA512

            9440a2dabd45fbeb61a8b1acd98c6345af758c9a15264be27c6e7f3d370407c8f839129badb25bf12f731998ce5225bddaa838599199a8cbc02a8a4890abe57f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za407734.exe

            Filesize

            596KB

            MD5

            dcf862f43c6b73d77a71458057440769

            SHA1

            37548c4b78b2d9461f45cb4969a31019d6feaf60

            SHA256

            2b862154a101afbc410778070e5bb103cc81969133402167cb1dd7918c610536

            SHA512

            9440a2dabd45fbeb61a8b1acd98c6345af758c9a15264be27c6e7f3d370407c8f839129badb25bf12f731998ce5225bddaa838599199a8cbc02a8a4890abe57f

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w28hv10.exe

            Filesize

            229KB

            MD5

            3308051ded87b1863a8d92925202c4b3

            SHA1

            7834ddc23e7976b07118fb580ae38234466dbdfb

            SHA256

            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

            SHA512

            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w28hv10.exe

            Filesize

            229KB

            MD5

            3308051ded87b1863a8d92925202c4b3

            SHA1

            7834ddc23e7976b07118fb580ae38234466dbdfb

            SHA256

            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

            SHA512

            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za356367.exe

            Filesize

            414KB

            MD5

            d73e603a2d1ad921df40d2040faea9fd

            SHA1

            4219d2f468df93a0d9853609426cabf51ffafdb5

            SHA256

            198628b10cf33085cd66f7f2025449c3bac4f3256128a2283dddd4f9a59ac47d

            SHA512

            6e59e4fb7d06240331482bfcefe83be8a3d7ecaace15f8515795b08ce90fb6cf0614ca08dd9a52ade07e26acd328a6351c804416c80373375fb18c20e1a319a4

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za356367.exe

            Filesize

            414KB

            MD5

            d73e603a2d1ad921df40d2040faea9fd

            SHA1

            4219d2f468df93a0d9853609426cabf51ffafdb5

            SHA256

            198628b10cf33085cd66f7f2025449c3bac4f3256128a2283dddd4f9a59ac47d

            SHA512

            6e59e4fb7d06240331482bfcefe83be8a3d7ecaace15f8515795b08ce90fb6cf0614ca08dd9a52ade07e26acd328a6351c804416c80373375fb18c20e1a319a4

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\81576441.exe

            Filesize

            175KB

            MD5

            3d10b67208452d7a91d7bd7066067676

            SHA1

            e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

            SHA256

            5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

            SHA512

            b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\81576441.exe

            Filesize

            175KB

            MD5

            3d10b67208452d7a91d7bd7066067676

            SHA1

            e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

            SHA256

            5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

            SHA512

            b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u08820323.exe

            Filesize

            259KB

            MD5

            eb1442e61e76c96cb9a5a823f078c08c

            SHA1

            11173445b5600946934c8e5dc4946b3016816e20

            SHA256

            79378236f97767ad3df2f8c26e17a67446431a7e0e21eec73648ab516ad51b38

            SHA512

            cb11f206f86266ef24fbe9348f3ece0a840760d0325e4c95c3f15b4ab5c6a1a25e4137beaa39d96980c8e1452ce8d70906cef30e560dbdaf6870bf5fd9ca85ed

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u08820323.exe

            Filesize

            259KB

            MD5

            eb1442e61e76c96cb9a5a823f078c08c

            SHA1

            11173445b5600946934c8e5dc4946b3016816e20

            SHA256

            79378236f97767ad3df2f8c26e17a67446431a7e0e21eec73648ab516ad51b38

            SHA512

            cb11f206f86266ef24fbe9348f3ece0a840760d0325e4c95c3f15b4ab5c6a1a25e4137beaa39d96980c8e1452ce8d70906cef30e560dbdaf6870bf5fd9ca85ed

          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

            Filesize

            89KB

            MD5

            73df88d68a4f5e066784d462788cf695

            SHA1

            e4bfed336848d0b622fa464d40cf4bd9222aab3f

            SHA256

            f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

            SHA512

            64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

            Filesize

            89KB

            MD5

            73df88d68a4f5e066784d462788cf695

            SHA1

            e4bfed336848d0b622fa464d40cf4bd9222aab3f

            SHA256

            f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

            SHA512

            64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

            Filesize

            89KB

            MD5

            73df88d68a4f5e066784d462788cf695

            SHA1

            e4bfed336848d0b622fa464d40cf4bd9222aab3f

            SHA256

            f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

            SHA512

            64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

            Filesize

            162B

            MD5

            1b7c22a214949975556626d7217e9a39

            SHA1

            d01c97e2944166ed23e47e4a62ff471ab8fa031f

            SHA256

            340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

            SHA512

            ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

          • memory/1284-259-0x00000000020D0000-0x0000000002117000-memory.dmp

            Filesize

            284KB

          • memory/1432-238-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/1432-237-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

            Filesize

            64KB

          • memory/1432-236-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

            Filesize

            64KB

          • memory/1432-235-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

            Filesize

            64KB

          • memory/1432-233-0x0000000000400000-0x0000000000455000-memory.dmp

            Filesize

            340KB

          • memory/1432-229-0x0000000002090000-0x00000000020BD000-memory.dmp

            Filesize

            180KB

          • memory/1432-230-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

            Filesize

            64KB

          • memory/1432-231-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

            Filesize

            64KB

          • memory/1432-232-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

            Filesize

            64KB

          • memory/3208-273-0x00000000080B0000-0x00000000086C8000-memory.dmp

            Filesize

            6.1MB

          • memory/3208-265-0x0000000000E20000-0x0000000000E48000-memory.dmp

            Filesize

            160KB

          • memory/3208-643-0x0000000008EA0000-0x0000000008EF0000-memory.dmp

            Filesize

            320KB

          • memory/3208-583-0x0000000008E30000-0x0000000008E4E000-memory.dmp

            Filesize

            120KB

          • memory/3208-577-0x0000000009C70000-0x000000000A19C000-memory.dmp

            Filesize

            5.2MB

          • memory/3208-570-0x0000000009570000-0x0000000009732000-memory.dmp

            Filesize

            1.8MB

          • memory/3208-549-0x0000000008D10000-0x0000000008D86000-memory.dmp

            Filesize

            472KB

          • memory/3208-448-0x0000000008AF0000-0x0000000008B82000-memory.dmp

            Filesize

            584KB

          • memory/3208-385-0x0000000007F10000-0x0000000007F76000-memory.dmp

            Filesize

            408KB

          • memory/3208-310-0x0000000007E90000-0x0000000007EA0000-memory.dmp

            Filesize

            64KB

          • memory/3208-299-0x0000000007B90000-0x0000000007BCC000-memory.dmp

            Filesize

            240KB

          • memory/3208-282-0x0000000007C60000-0x0000000007D6A000-memory.dmp

            Filesize

            1.0MB

          • memory/3208-275-0x0000000007B30000-0x0000000007B42000-memory.dmp

            Filesize

            72KB

          • memory/4100-176-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-166-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-174-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-161-0x0000000004D00000-0x00000000052A4000-memory.dmp

            Filesize

            5.6MB

          • memory/4100-172-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-168-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-195-0x0000000004CF0000-0x0000000004D00000-memory.dmp

            Filesize

            64KB

          • memory/4100-164-0x0000000004CF0000-0x0000000004D00000-memory.dmp

            Filesize

            64KB

          • memory/4100-163-0x0000000004CF0000-0x0000000004D00000-memory.dmp

            Filesize

            64KB

          • memory/4100-162-0x0000000004CF0000-0x0000000004D00000-memory.dmp

            Filesize

            64KB

          • memory/4100-165-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-192-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-194-0x0000000004CF0000-0x0000000004D00000-memory.dmp

            Filesize

            64KB

          • memory/4100-193-0x0000000004CF0000-0x0000000004D00000-memory.dmp

            Filesize

            64KB

          • memory/4100-170-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-180-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-178-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-182-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-184-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-186-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-188-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4100-190-0x0000000002420000-0x0000000002433000-memory.dmp

            Filesize

            76KB

          • memory/4652-268-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

            Filesize

            64KB

          • memory/4652-256-0x0000000000400000-0x0000000000449000-memory.dmp

            Filesize

            292KB

          • memory/4652-269-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

            Filesize

            64KB

          • memory/4652-1075-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

            Filesize

            64KB

          • memory/4652-1078-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

            Filesize

            64KB

          • memory/4652-1077-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

            Filesize

            64KB

          • memory/4652-1079-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

            Filesize

            64KB

          • memory/4652-1083-0x0000000000400000-0x0000000000449000-memory.dmp

            Filesize

            292KB

          • memory/4652-271-0x00000000049B0000-0x00000000049E5000-memory.dmp

            Filesize

            212KB

          • memory/4652-270-0x00000000049B0000-0x00000000049E5000-memory.dmp

            Filesize

            212KB

          • memory/4652-258-0x0000000000400000-0x0000000000449000-memory.dmp

            Filesize

            292KB

          • memory/4652-267-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

            Filesize

            64KB

          • memory/4652-266-0x0000000000400000-0x0000000000449000-memory.dmp

            Filesize

            292KB

          • memory/4652-260-0x0000000000400000-0x0000000000449000-memory.dmp

            Filesize

            292KB