Analysis

  • max time kernel
    176s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2023 18:47

General

  • Target

    14a3d843a9f629390d09feb036a7d748aded0ba34fa20051721a08e1f8f7c337.exe

  • Size

    696KB

  • MD5

    495dae43abfef6cba51f8ac26f907373

  • SHA1

    bda242983687626e8e49f56911dd67e41b0cf36b

  • SHA256

    14a3d843a9f629390d09feb036a7d748aded0ba34fa20051721a08e1f8f7c337

  • SHA512

    deaca98faaa0f42fe89a4985f1f8749de9ba036c091d542b28853e73958ba777a1c24ed7a7403c8cae0af1d6cc611a33fa590fd4e4abf22fd255866358ba9fc7

  • SSDEEP

    12288:4MrGy900scy63aHz2MLbMzdaF8e8aub790VwNg6TcpFuWZgU:+yvyrzzLozne8T7mVwNg6QpFJZR

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14a3d843a9f629390d09feb036a7d748aded0ba34fa20051721a08e1f8f7c337.exe
    "C:\Users\Admin\AppData\Local\Temp\14a3d843a9f629390d09feb036a7d748aded0ba34fa20051721a08e1f8f7c337.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7254642.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7254642.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1286255.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1286255.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2671071.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2671071.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1436
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0089368.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0089368.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5093924.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5093924.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2255787.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2255787.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4260
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:4996
  • C:\Windows\system32\WerFaultSecure.exe
    "C:\Windows\system32\WerFaultSecure.exe" -protectedcrash -p 4464 -i 4464 -h 468 -j 472 -s 480 -d 4720
    1⤵
      PID:4704
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:1740
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:4016

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      d1114ba958c8eab83a903b82d57394f4

      SHA1

      fc1d2ecf58bef3975445baf27afa7dcad33831cf

      SHA256

      e07a78e605996cd54212c55f09af8b85fb862293eedb42099e0864cd3833f3fb

      SHA512

      1b792781b9239ca8ff9ca400cc42ea0072f1bbe1a76ec7c017697b4a6db18f662c61e4393baf0937946e4b3ba55eae982f033bc69e02b9c3779e82b4fe03f9d3

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      d1114ba958c8eab83a903b82d57394f4

      SHA1

      fc1d2ecf58bef3975445baf27afa7dcad33831cf

      SHA256

      e07a78e605996cd54212c55f09af8b85fb862293eedb42099e0864cd3833f3fb

      SHA512

      1b792781b9239ca8ff9ca400cc42ea0072f1bbe1a76ec7c017697b4a6db18f662c61e4393baf0937946e4b3ba55eae982f033bc69e02b9c3779e82b4fe03f9d3

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      d1114ba958c8eab83a903b82d57394f4

      SHA1

      fc1d2ecf58bef3975445baf27afa7dcad33831cf

      SHA256

      e07a78e605996cd54212c55f09af8b85fb862293eedb42099e0864cd3833f3fb

      SHA512

      1b792781b9239ca8ff9ca400cc42ea0072f1bbe1a76ec7c017697b4a6db18f662c61e4393baf0937946e4b3ba55eae982f033bc69e02b9c3779e82b4fe03f9d3

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      d1114ba958c8eab83a903b82d57394f4

      SHA1

      fc1d2ecf58bef3975445baf27afa7dcad33831cf

      SHA256

      e07a78e605996cd54212c55f09af8b85fb862293eedb42099e0864cd3833f3fb

      SHA512

      1b792781b9239ca8ff9ca400cc42ea0072f1bbe1a76ec7c017697b4a6db18f662c61e4393baf0937946e4b3ba55eae982f033bc69e02b9c3779e82b4fe03f9d3

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      d1114ba958c8eab83a903b82d57394f4

      SHA1

      fc1d2ecf58bef3975445baf27afa7dcad33831cf

      SHA256

      e07a78e605996cd54212c55f09af8b85fb862293eedb42099e0864cd3833f3fb

      SHA512

      1b792781b9239ca8ff9ca400cc42ea0072f1bbe1a76ec7c017697b4a6db18f662c61e4393baf0937946e4b3ba55eae982f033bc69e02b9c3779e82b4fe03f9d3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2255787.exe

      Filesize

      229KB

      MD5

      d1114ba958c8eab83a903b82d57394f4

      SHA1

      fc1d2ecf58bef3975445baf27afa7dcad33831cf

      SHA256

      e07a78e605996cd54212c55f09af8b85fb862293eedb42099e0864cd3833f3fb

      SHA512

      1b792781b9239ca8ff9ca400cc42ea0072f1bbe1a76ec7c017697b4a6db18f662c61e4393baf0937946e4b3ba55eae982f033bc69e02b9c3779e82b4fe03f9d3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2255787.exe

      Filesize

      229KB

      MD5

      d1114ba958c8eab83a903b82d57394f4

      SHA1

      fc1d2ecf58bef3975445baf27afa7dcad33831cf

      SHA256

      e07a78e605996cd54212c55f09af8b85fb862293eedb42099e0864cd3833f3fb

      SHA512

      1b792781b9239ca8ff9ca400cc42ea0072f1bbe1a76ec7c017697b4a6db18f662c61e4393baf0937946e4b3ba55eae982f033bc69e02b9c3779e82b4fe03f9d3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7254642.exe

      Filesize

      512KB

      MD5

      25f25f962f350eb5ce7df040d088a500

      SHA1

      fe492b74b1497390258e166ad10f07b13e243553

      SHA256

      fcdc964858c3991e66d41e56e79f46d8e01b77edfc43880a09556dc287c8e5ad

      SHA512

      1a994f25d1c124eea9a6d35ad3392907c57f8838a20b9f0865e75302c5ffe6444665998b2cc9f0954e41e29ef59c8ff534fe210bc078d63b27ee344450549246

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7254642.exe

      Filesize

      512KB

      MD5

      25f25f962f350eb5ce7df040d088a500

      SHA1

      fe492b74b1497390258e166ad10f07b13e243553

      SHA256

      fcdc964858c3991e66d41e56e79f46d8e01b77edfc43880a09556dc287c8e5ad

      SHA512

      1a994f25d1c124eea9a6d35ad3392907c57f8838a20b9f0865e75302c5ffe6444665998b2cc9f0954e41e29ef59c8ff534fe210bc078d63b27ee344450549246

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5093924.exe

      Filesize

      176KB

      MD5

      87601f310ee4e97b833eb594421b5207

      SHA1

      56743df829ecd646635b816a35293308f24fd81b

      SHA256

      9d191759e58c894f6da1aa223d93c5c784d2c582267ce59e7d4f4fa3b30c5834

      SHA512

      c21fc6e2d7721f9a7debf5c6cef28b2553900bde4ed7a5ae16af0262a344a7df2b78420f4cafcc3e051cd4b17eb50d3fce5605f9eac60a3574ca0bf6474f97d6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5093924.exe

      Filesize

      176KB

      MD5

      87601f310ee4e97b833eb594421b5207

      SHA1

      56743df829ecd646635b816a35293308f24fd81b

      SHA256

      9d191759e58c894f6da1aa223d93c5c784d2c582267ce59e7d4f4fa3b30c5834

      SHA512

      c21fc6e2d7721f9a7debf5c6cef28b2553900bde4ed7a5ae16af0262a344a7df2b78420f4cafcc3e051cd4b17eb50d3fce5605f9eac60a3574ca0bf6474f97d6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1286255.exe

      Filesize

      308KB

      MD5

      467aff5f01ee7dd3fc6bff6c70327d3f

      SHA1

      ea0f15f8c44af43e2fdff9092eab6983f91a10c1

      SHA256

      87120a6e17d90d013404764486d3ae490a7ff1eab4a15bfb11c063f32dbd430a

      SHA512

      18f1ea96bc008e9642f295a2c67f2d8aaaedba8f9a731ce97d3547a7aa00a81bd672dfee3c27539e8614f1fee0358bf5cac3aa4ae0a5dabedcb2b92043b098cc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1286255.exe

      Filesize

      308KB

      MD5

      467aff5f01ee7dd3fc6bff6c70327d3f

      SHA1

      ea0f15f8c44af43e2fdff9092eab6983f91a10c1

      SHA256

      87120a6e17d90d013404764486d3ae490a7ff1eab4a15bfb11c063f32dbd430a

      SHA512

      18f1ea96bc008e9642f295a2c67f2d8aaaedba8f9a731ce97d3547a7aa00a81bd672dfee3c27539e8614f1fee0358bf5cac3aa4ae0a5dabedcb2b92043b098cc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2671071.exe

      Filesize

      176KB

      MD5

      9c4b760d2b9381ab9d872fb0f8ab2839

      SHA1

      683d2f41ca1d362ad06237d77ee055a569e6d45e

      SHA256

      fe7d337ca7db58eb3d37a3f77d8254a95293194308fe7c8c557cfc4d924d6b32

      SHA512

      0903e8f3e9f52ad8bc14ba51c330715f16b8c1c9bc383a8e687aa159b647ad5f1696b6e2f9e2c5fe4c63670564c3993623fba0859d5e04e10ec9b5c1c5eb60fc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2671071.exe

      Filesize

      176KB

      MD5

      9c4b760d2b9381ab9d872fb0f8ab2839

      SHA1

      683d2f41ca1d362ad06237d77ee055a569e6d45e

      SHA256

      fe7d337ca7db58eb3d37a3f77d8254a95293194308fe7c8c557cfc4d924d6b32

      SHA512

      0903e8f3e9f52ad8bc14ba51c330715f16b8c1c9bc383a8e687aa159b647ad5f1696b6e2f9e2c5fe4c63670564c3993623fba0859d5e04e10ec9b5c1c5eb60fc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2671071.exe

      Filesize

      176KB

      MD5

      9c4b760d2b9381ab9d872fb0f8ab2839

      SHA1

      683d2f41ca1d362ad06237d77ee055a569e6d45e

      SHA256

      fe7d337ca7db58eb3d37a3f77d8254a95293194308fe7c8c557cfc4d924d6b32

      SHA512

      0903e8f3e9f52ad8bc14ba51c330715f16b8c1c9bc383a8e687aa159b647ad5f1696b6e2f9e2c5fe4c63670564c3993623fba0859d5e04e10ec9b5c1c5eb60fc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0089368.exe

      Filesize

      136KB

      MD5

      676456b39fae88296522722f762e7c64

      SHA1

      ee8b04e2d046770ef83dec2d98e4c40bfc8d83bf

      SHA256

      b828c1766c3fc398b316e4707d578c1181f19206d947b407a189f71f7eff85c9

      SHA512

      7ca58a2408ece3a512671cd47bc899bff833c947fbd0bf6e978a9e1766921babef697e648de0f7c73d90c2890a81a807a2bf0c20d001a7f945823aadf9456333

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0089368.exe

      Filesize

      136KB

      MD5

      676456b39fae88296522722f762e7c64

      SHA1

      ee8b04e2d046770ef83dec2d98e4c40bfc8d83bf

      SHA256

      b828c1766c3fc398b316e4707d578c1181f19206d947b407a189f71f7eff85c9

      SHA512

      7ca58a2408ece3a512671cd47bc899bff833c947fbd0bf6e978a9e1766921babef697e648de0f7c73d90c2890a81a807a2bf0c20d001a7f945823aadf9456333

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

      Filesize

      162B

      MD5

      1b7c22a214949975556626d7217e9a39

      SHA1

      d01c97e2944166ed23e47e4a62ff471ab8fa031f

      SHA256

      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

      SHA512

      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

    • memory/1436-184-0x00000000023C0000-0x00000000023D0000-memory.dmp

      Filesize

      64KB

    • memory/1436-182-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-168-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-185-0x00000000023C0000-0x00000000023D0000-memory.dmp

      Filesize

      64KB

    • memory/1436-186-0x00000000023C0000-0x00000000023D0000-memory.dmp

      Filesize

      64KB

    • memory/1436-187-0x00000000023C0000-0x00000000023D0000-memory.dmp

      Filesize

      64KB

    • memory/1436-188-0x00000000023C0000-0x00000000023D0000-memory.dmp

      Filesize

      64KB

    • memory/1436-172-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-170-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-154-0x0000000004950000-0x0000000004EF4000-memory.dmp

      Filesize

      5.6MB

    • memory/1436-155-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-183-0x00000000023C0000-0x00000000023D0000-memory.dmp

      Filesize

      64KB

    • memory/1436-180-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-178-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-176-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-156-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-158-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-160-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-162-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-164-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-174-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1436-166-0x00000000023D0000-0x00000000023E2000-memory.dmp

      Filesize

      72KB

    • memory/1708-244-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1708-243-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1708-210-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1708-212-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1708-215-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1708-242-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/3396-202-0x0000000008570000-0x000000000858E000-memory.dmp

      Filesize

      120KB

    • memory/3396-204-0x0000000009550000-0x0000000009A7C000-memory.dmp

      Filesize

      5.2MB

    • memory/3396-203-0x0000000008E50000-0x0000000009012000-memory.dmp

      Filesize

      1.8MB

    • memory/3396-205-0x0000000004A20000-0x0000000004A70000-memory.dmp

      Filesize

      320KB

    • memory/3396-201-0x0000000008640000-0x00000000086B6000-memory.dmp

      Filesize

      472KB

    • memory/3396-200-0x00000000083D0000-0x0000000008462000-memory.dmp

      Filesize

      584KB

    • memory/3396-199-0x00000000077F0000-0x0000000007856000-memory.dmp

      Filesize

      408KB

    • memory/3396-198-0x0000000007460000-0x0000000007470000-memory.dmp

      Filesize

      64KB

    • memory/3396-197-0x00000000074B0000-0x00000000074EC000-memory.dmp

      Filesize

      240KB

    • memory/3396-196-0x0000000007560000-0x000000000766A000-memory.dmp

      Filesize

      1.0MB

    • memory/3396-195-0x0000000007430000-0x0000000007442000-memory.dmp

      Filesize

      72KB

    • memory/3396-194-0x00000000079D0000-0x0000000007FE8000-memory.dmp

      Filesize

      6.1MB

    • memory/3396-193-0x0000000000720000-0x0000000000748000-memory.dmp

      Filesize

      160KB