Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2023, 20:53

General

  • Target

    5af50bc88db0acd6518c4c07df2e66972ed091b413c87ad32b19c2cde24426cf.exe

  • Size

    1.1MB

  • MD5

    79da5f809a554c555e9692b7fb420932

  • SHA1

    d46ffbf60e8f09da407ca40c0d0da92bc5f764a1

  • SHA256

    5af50bc88db0acd6518c4c07df2e66972ed091b413c87ad32b19c2cde24426cf

  • SHA512

    f401c280a98887589af1cf678c90d46d917c4917d23aebf82f828ef5708ea28ed1ac8e8c73803adb9fcd5f30a4a148b642ecdf9631ce81fd4e9d59195fc96ee9

  • SSDEEP

    24576:hyCoQ7GwtkrpJ8Xh0zASB9cP6tI2ivwdvszT5uD34R9:UXQ7GwtkrUXCzAwc++y0zdu7

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5af50bc88db0acd6518c4c07df2e66972ed091b413c87ad32b19c2cde24426cf.exe
    "C:\Users\Admin\AppData\Local\Temp\5af50bc88db0acd6518c4c07df2e66972ed091b413c87ad32b19c2cde24426cf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za135316.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za135316.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za052790.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za052790.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za252046.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za252046.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1100
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz1046.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz1046.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2276
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4557gP.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4557gP.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4560
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 1092
              6⤵
              • Program crash
              PID:4120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w06th02.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w06th02.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2416
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 1320
            5⤵
            • Program crash
            PID:2720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xvMZH89.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xvMZH89.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y72vB76.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y72vB76.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3824
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2140
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:4224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4560 -ip 4560
    1⤵
      PID:2044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2416 -ip 2416
      1⤵
        PID:2848
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:1700
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        1⤵
        • Executes dropped EXE
        PID:2608

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

        Filesize

        229KB

        MD5

        9688472bbf135dc83035fcc921821ef0

        SHA1

        fc4a83c94b3290b4fa9cee4c5e6f6b9a96fbe13c

        SHA256

        8c8647e332a32ad6ef2b9937a9a95b3b345344666bf4a8d8826fdf697dc430da

        SHA512

        106f19d314b2e0d96635298f4fb2dcd619f187b6dca230453e5feeb3a56bd5f02c039120fa50d362d39ba63283701ffdb5f425ffd7664ab00a4c34097d506cef

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

        Filesize

        229KB

        MD5

        9688472bbf135dc83035fcc921821ef0

        SHA1

        fc4a83c94b3290b4fa9cee4c5e6f6b9a96fbe13c

        SHA256

        8c8647e332a32ad6ef2b9937a9a95b3b345344666bf4a8d8826fdf697dc430da

        SHA512

        106f19d314b2e0d96635298f4fb2dcd619f187b6dca230453e5feeb3a56bd5f02c039120fa50d362d39ba63283701ffdb5f425ffd7664ab00a4c34097d506cef

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

        Filesize

        229KB

        MD5

        9688472bbf135dc83035fcc921821ef0

        SHA1

        fc4a83c94b3290b4fa9cee4c5e6f6b9a96fbe13c

        SHA256

        8c8647e332a32ad6ef2b9937a9a95b3b345344666bf4a8d8826fdf697dc430da

        SHA512

        106f19d314b2e0d96635298f4fb2dcd619f187b6dca230453e5feeb3a56bd5f02c039120fa50d362d39ba63283701ffdb5f425ffd7664ab00a4c34097d506cef

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

        Filesize

        229KB

        MD5

        9688472bbf135dc83035fcc921821ef0

        SHA1

        fc4a83c94b3290b4fa9cee4c5e6f6b9a96fbe13c

        SHA256

        8c8647e332a32ad6ef2b9937a9a95b3b345344666bf4a8d8826fdf697dc430da

        SHA512

        106f19d314b2e0d96635298f4fb2dcd619f187b6dca230453e5feeb3a56bd5f02c039120fa50d362d39ba63283701ffdb5f425ffd7664ab00a4c34097d506cef

      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

        Filesize

        229KB

        MD5

        9688472bbf135dc83035fcc921821ef0

        SHA1

        fc4a83c94b3290b4fa9cee4c5e6f6b9a96fbe13c

        SHA256

        8c8647e332a32ad6ef2b9937a9a95b3b345344666bf4a8d8826fdf697dc430da

        SHA512

        106f19d314b2e0d96635298f4fb2dcd619f187b6dca230453e5feeb3a56bd5f02c039120fa50d362d39ba63283701ffdb5f425ffd7664ab00a4c34097d506cef

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y72vB76.exe

        Filesize

        229KB

        MD5

        9688472bbf135dc83035fcc921821ef0

        SHA1

        fc4a83c94b3290b4fa9cee4c5e6f6b9a96fbe13c

        SHA256

        8c8647e332a32ad6ef2b9937a9a95b3b345344666bf4a8d8826fdf697dc430da

        SHA512

        106f19d314b2e0d96635298f4fb2dcd619f187b6dca230453e5feeb3a56bd5f02c039120fa50d362d39ba63283701ffdb5f425ffd7664ab00a4c34097d506cef

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y72vB76.exe

        Filesize

        229KB

        MD5

        9688472bbf135dc83035fcc921821ef0

        SHA1

        fc4a83c94b3290b4fa9cee4c5e6f6b9a96fbe13c

        SHA256

        8c8647e332a32ad6ef2b9937a9a95b3b345344666bf4a8d8826fdf697dc430da

        SHA512

        106f19d314b2e0d96635298f4fb2dcd619f187b6dca230453e5feeb3a56bd5f02c039120fa50d362d39ba63283701ffdb5f425ffd7664ab00a4c34097d506cef

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za135316.exe

        Filesize

        951KB

        MD5

        0969e0d520e54044174a55ff4b49da1e

        SHA1

        c6387cfaae6ac35c2a7470e1fc0448fef2488eb5

        SHA256

        a123e2a904bb1093654f1078c083627afdaf42abedbc46fb29341809d82305fa

        SHA512

        165d28413810c04744b277c97e7ac00e61cccdeff440328f205a4c5ab28a5b8bb2867f14b7ab3ec424cddcfe2bf835ea5b3bbadda666f27525d3356f5fa58726

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za135316.exe

        Filesize

        951KB

        MD5

        0969e0d520e54044174a55ff4b49da1e

        SHA1

        c6387cfaae6ac35c2a7470e1fc0448fef2488eb5

        SHA256

        a123e2a904bb1093654f1078c083627afdaf42abedbc46fb29341809d82305fa

        SHA512

        165d28413810c04744b277c97e7ac00e61cccdeff440328f205a4c5ab28a5b8bb2867f14b7ab3ec424cddcfe2bf835ea5b3bbadda666f27525d3356f5fa58726

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xvMZH89.exe

        Filesize

        136KB

        MD5

        fdd786c5ea58ff2525a33c6b1fb8b9fe

        SHA1

        d64e725aced40881bca838b376911307c1d64f61

        SHA256

        05afcb144d59f4e34c1fc728ebcb7ff18e7c095ba2b7bd123926ab4e00a0336d

        SHA512

        dce9efcb5a74087dd87b052c279f8554291b98627eca03aa42198cafbb0d6c31ce16bf14d9a5771643188568287b0f7845cb829c235f5d4352dfc868868e4af7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xvMZH89.exe

        Filesize

        136KB

        MD5

        fdd786c5ea58ff2525a33c6b1fb8b9fe

        SHA1

        d64e725aced40881bca838b376911307c1d64f61

        SHA256

        05afcb144d59f4e34c1fc728ebcb7ff18e7c095ba2b7bd123926ab4e00a0336d

        SHA512

        dce9efcb5a74087dd87b052c279f8554291b98627eca03aa42198cafbb0d6c31ce16bf14d9a5771643188568287b0f7845cb829c235f5d4352dfc868868e4af7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za052790.exe

        Filesize

        797KB

        MD5

        f756075c17a3978354ee548cc8f390db

        SHA1

        7927db619d68da0f394b3194bd5e3cd6a674baea

        SHA256

        3a02471a8ff34892adfe3f6e008c00c2f21da56ea68e370a1e663d66625bfbae

        SHA512

        5519f60ee413a3c789ddb53388660db9e0a1713bcc20dc497557fe2da7d4253f4e114a987929927229758e972e47f90fe1c5920aade4302d166b8aa0f5053f73

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za052790.exe

        Filesize

        797KB

        MD5

        f756075c17a3978354ee548cc8f390db

        SHA1

        7927db619d68da0f394b3194bd5e3cd6a674baea

        SHA256

        3a02471a8ff34892adfe3f6e008c00c2f21da56ea68e370a1e663d66625bfbae

        SHA512

        5519f60ee413a3c789ddb53388660db9e0a1713bcc20dc497557fe2da7d4253f4e114a987929927229758e972e47f90fe1c5920aade4302d166b8aa0f5053f73

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w06th02.exe

        Filesize

        486KB

        MD5

        791505db3d57d63730aff5fd9322df53

        SHA1

        e859b447c7134ecc66ccf504f5b839db8550bb86

        SHA256

        b0313d7ceb3490cfbe29d3db3c4643ca18f274767def3c10ed9389e9a668357e

        SHA512

        6d155c14cc2c8933e21151afe3900162a3586f071f6fed1da310d79896ae4517efa79507d2e82b44749e334861fa6e14ca7325034c9f16941e1ea4e21ab72103

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w06th02.exe

        Filesize

        486KB

        MD5

        791505db3d57d63730aff5fd9322df53

        SHA1

        e859b447c7134ecc66ccf504f5b839db8550bb86

        SHA256

        b0313d7ceb3490cfbe29d3db3c4643ca18f274767def3c10ed9389e9a668357e

        SHA512

        6d155c14cc2c8933e21151afe3900162a3586f071f6fed1da310d79896ae4517efa79507d2e82b44749e334861fa6e14ca7325034c9f16941e1ea4e21ab72103

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za252046.exe

        Filesize

        383KB

        MD5

        7add3007c3afb7ef8e03de13781ede22

        SHA1

        e3b5bb5aa50349d5af01d2b17f115a24b102ddc8

        SHA256

        44e4ab54f20d9704aa10d61a674b4d5e2e00937a702bac09f9f3addc520ddbca

        SHA512

        0ed82621e600c088c866b17cb2ecb4dae6018102638e72abbd17bbe47e387fcd293d14b177aa06c13351a31bd8991482f9ca3ca1ba80b33db450fcd7323452fe

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za252046.exe

        Filesize

        383KB

        MD5

        7add3007c3afb7ef8e03de13781ede22

        SHA1

        e3b5bb5aa50349d5af01d2b17f115a24b102ddc8

        SHA256

        44e4ab54f20d9704aa10d61a674b4d5e2e00937a702bac09f9f3addc520ddbca

        SHA512

        0ed82621e600c088c866b17cb2ecb4dae6018102638e72abbd17bbe47e387fcd293d14b177aa06c13351a31bd8991482f9ca3ca1ba80b33db450fcd7323452fe

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz1046.exe

        Filesize

        11KB

        MD5

        78c3c8212cb8c23b1adfa1c970a5ea61

        SHA1

        70cb7000ca8a18ed2da17a59ead6f905fc13eaee

        SHA256

        04cdace3f1f541f266f553f581943d847b765821a933c7695a6830ea3ae37a48

        SHA512

        87474d9f045b6c32e2555c95d45f6c8628ce953fc9fc8c4dfbe538b8b48d12164bc5cea0d8df6eaa32b2e52a356c13f712b7ea7eaeb385a077ea7536f8b58e9a

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz1046.exe

        Filesize

        11KB

        MD5

        78c3c8212cb8c23b1adfa1c970a5ea61

        SHA1

        70cb7000ca8a18ed2da17a59ead6f905fc13eaee

        SHA256

        04cdace3f1f541f266f553f581943d847b765821a933c7695a6830ea3ae37a48

        SHA512

        87474d9f045b6c32e2555c95d45f6c8628ce953fc9fc8c4dfbe538b8b48d12164bc5cea0d8df6eaa32b2e52a356c13f712b7ea7eaeb385a077ea7536f8b58e9a

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4557gP.exe

        Filesize

        404KB

        MD5

        c02253bf79e1faab37020dc89f70cead

        SHA1

        2f6b1e596ffd996feb73a844dc0589e4a296bf2d

        SHA256

        f46408646ffe7f9f7f0f8341ccebe2284c92a68624d284acfaa59e07f71a5fbb

        SHA512

        40536fdf89189e57c13675756d61270a75d10e1a369c1c0672d3486aa35fd40ccfde7940970492ed3795b1ec9fd05abde57306d2c3e23cef6056913e1e58f280

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4557gP.exe

        Filesize

        404KB

        MD5

        c02253bf79e1faab37020dc89f70cead

        SHA1

        2f6b1e596ffd996feb73a844dc0589e4a296bf2d

        SHA256

        f46408646ffe7f9f7f0f8341ccebe2284c92a68624d284acfaa59e07f71a5fbb

        SHA512

        40536fdf89189e57c13675756d61270a75d10e1a369c1c0672d3486aa35fd40ccfde7940970492ed3795b1ec9fd05abde57306d2c3e23cef6056913e1e58f280

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

        Filesize

        89KB

        MD5

        73df88d68a4f5e066784d462788cf695

        SHA1

        e4bfed336848d0b622fa464d40cf4bd9222aab3f

        SHA256

        f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

        SHA512

        64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

        Filesize

        89KB

        MD5

        73df88d68a4f5e066784d462788cf695

        SHA1

        e4bfed336848d0b622fa464d40cf4bd9222aab3f

        SHA256

        f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

        SHA512

        64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

        Filesize

        89KB

        MD5

        73df88d68a4f5e066784d462788cf695

        SHA1

        e4bfed336848d0b622fa464d40cf4bd9222aab3f

        SHA256

        f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

        SHA512

        64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

      • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

        Filesize

        162B

        MD5

        1b7c22a214949975556626d7217e9a39

        SHA1

        d01c97e2944166ed23e47e4a62ff471ab8fa031f

        SHA256

        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

        SHA512

        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

      • memory/2276-161-0x0000000000440000-0x000000000044A000-memory.dmp

        Filesize

        40KB

      • memory/2416-1009-0x00000000083B0000-0x0000000008416000-memory.dmp

        Filesize

        408KB

      • memory/2416-470-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/2416-1019-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/2416-1018-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/2416-1015-0x0000000009010000-0x000000000953C000-memory.dmp

        Filesize

        5.2MB

      • memory/2416-1014-0x0000000008E40000-0x0000000009002000-memory.dmp

        Filesize

        1.8MB

      • memory/2416-1013-0x00000000026A0000-0x00000000026F0000-memory.dmp

        Filesize

        320KB

      • memory/2416-1012-0x0000000008D20000-0x0000000008D3E000-memory.dmp

        Filesize

        120KB

      • memory/2416-1011-0x0000000008C60000-0x0000000008CD6000-memory.dmp

        Filesize

        472KB

      • memory/2416-1010-0x0000000008BB0000-0x0000000008C42000-memory.dmp

        Filesize

        584KB

      • memory/2416-208-0x0000000002440000-0x0000000002486000-memory.dmp

        Filesize

        280KB

      • memory/2416-210-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/2416-209-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/2416-211-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-212-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-214-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-216-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-218-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-220-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-222-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-224-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-226-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-228-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-230-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-232-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-234-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-236-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-238-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-240-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-242-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-244-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

        Filesize

        212KB

      • memory/2416-1007-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/2416-1004-0x00000000078B0000-0x0000000007EC8000-memory.dmp

        Filesize

        6.1MB

      • memory/2416-1005-0x0000000007F70000-0x0000000007F82000-memory.dmp

        Filesize

        72KB

      • memory/2416-1006-0x0000000007F90000-0x000000000809A000-memory.dmp

        Filesize

        1.0MB

      • memory/2416-1008-0x00000000080C0000-0x00000000080FC000-memory.dmp

        Filesize

        240KB

      • memory/4484-1024-0x0000000000FE0000-0x0000000001008000-memory.dmp

        Filesize

        160KB

      • memory/4484-1025-0x0000000007CF0000-0x0000000007D00000-memory.dmp

        Filesize

        64KB

      • memory/4560-200-0x0000000005050000-0x0000000005060000-memory.dmp

        Filesize

        64KB

      • memory/4560-186-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-203-0x0000000000400000-0x000000000080A000-memory.dmp

        Filesize

        4.0MB

      • memory/4560-201-0x0000000005050000-0x0000000005060000-memory.dmp

        Filesize

        64KB

      • memory/4560-194-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-199-0x0000000000400000-0x000000000080A000-memory.dmp

        Filesize

        4.0MB

      • memory/4560-198-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-182-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-188-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-184-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-192-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-190-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-196-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-180-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-178-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-176-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-174-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-171-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-172-0x0000000002A20000-0x0000000002A32000-memory.dmp

        Filesize

        72KB

      • memory/4560-170-0x0000000005060000-0x0000000005604000-memory.dmp

        Filesize

        5.6MB

      • memory/4560-169-0x0000000005050000-0x0000000005060000-memory.dmp

        Filesize

        64KB

      • memory/4560-168-0x0000000005050000-0x0000000005060000-memory.dmp

        Filesize

        64KB

      • memory/4560-167-0x0000000000980000-0x00000000009AD000-memory.dmp

        Filesize

        180KB