Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2023, 14:45

General

  • Target

    935ca3634c2bc8c44cc1b9f229d98082d1509ee3d37e886224f9d9da88276873.exe

  • Size

    1.2MB

  • MD5

    0ade2d67593e94d747bfe7afa3db40b9

  • SHA1

    5b7915808b46e7fe01fa419f89b8df017356e619

  • SHA256

    935ca3634c2bc8c44cc1b9f229d98082d1509ee3d37e886224f9d9da88276873

  • SHA512

    42f521f79a1c4d4aa94c2d2dabcc531622ff9ca8ffc1cc89d4a3f867547fac4f057480c3c8d23c90da07dd479094942f495adf8174cb3c08625ccd98a302b61e

  • SSDEEP

    24576:HymA7PDDu3TA9F/wVE8NvPqKh1Swfq1qZfcEROq6TZ9rkXDj1k:SfXujALmViKjSpqZtR8uX3

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\935ca3634c2bc8c44cc1b9f229d98082d1509ee3d37e886224f9d9da88276873.exe
    "C:\Users\Admin\AppData\Local\Temp\935ca3634c2bc8c44cc1b9f229d98082d1509ee3d37e886224f9d9da88276873.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za116907.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za116907.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za077351.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za077351.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za792377.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za792377.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4324
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6401.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6401.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2856
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4086um.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4086um.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4576
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 1708
              6⤵
              • Program crash
              PID:4200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w86Io84.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w86Io84.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1852
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 1100
            5⤵
            • Program crash
            PID:2728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xIGaM60.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xIGaM60.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3796
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 1628
          4⤵
          • Program crash
          PID:4380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95hP99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95hP99.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3252
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:2096
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4576 -ip 4576
    1⤵
      PID:3280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1852 -ip 1852
      1⤵
        PID:3988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3796 -ip 3796
        1⤵
          PID:2672
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          1⤵
          • Executes dropped EXE
          PID:2616
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe start wuauserv
          1⤵
          • Launches sc.exe
          PID:1320

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95hP99.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y95hP99.exe

          Filesize

          229KB

          MD5

          3308051ded87b1863a8d92925202c4b3

          SHA1

          7834ddc23e7976b07118fb580ae38234466dbdfb

          SHA256

          13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

          SHA512

          f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za116907.exe

          Filesize

          1.1MB

          MD5

          0792ec3f05c8ee99cbae4f2497577ca2

          SHA1

          ca97c927c5be2aefa79d9c6c2c6b121539659ec3

          SHA256

          290a8b9dff1732b1eec746f76dd01e0590eaa3e7d27b2082f0d94c7a161446d3

          SHA512

          66ef025628e6d4179c48e7fff4d169c875e7e588ac22a3eec29c01d85fc1a04942f7f7bb5ed0aec8de33cdf6f731707d625fffaf02a0d8bcfe1c7189155a9afa

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za116907.exe

          Filesize

          1.1MB

          MD5

          0792ec3f05c8ee99cbae4f2497577ca2

          SHA1

          ca97c927c5be2aefa79d9c6c2c6b121539659ec3

          SHA256

          290a8b9dff1732b1eec746f76dd01e0590eaa3e7d27b2082f0d94c7a161446d3

          SHA512

          66ef025628e6d4179c48e7fff4d169c875e7e588ac22a3eec29c01d85fc1a04942f7f7bb5ed0aec8de33cdf6f731707d625fffaf02a0d8bcfe1c7189155a9afa

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xIGaM60.exe

          Filesize

          486KB

          MD5

          a19e206c27142e68f004b5fe7d69ebef

          SHA1

          65872135349dea5b0e37c63258c6180ca4c84ba9

          SHA256

          561576c8d429db428750c28abba77a35b7e9bacbff6fcca9772eefe550fc9eea

          SHA512

          3f413df30e6c36214a09a769bb6d7f7d0ba83c2eca7cd617bd6a6c244382c056f72155e5c0a7c4c854de0ef914b5b60bdfe640dd7ac63e73bf81ae13f7fb8b14

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xIGaM60.exe

          Filesize

          486KB

          MD5

          a19e206c27142e68f004b5fe7d69ebef

          SHA1

          65872135349dea5b0e37c63258c6180ca4c84ba9

          SHA256

          561576c8d429db428750c28abba77a35b7e9bacbff6fcca9772eefe550fc9eea

          SHA512

          3f413df30e6c36214a09a769bb6d7f7d0ba83c2eca7cd617bd6a6c244382c056f72155e5c0a7c4c854de0ef914b5b60bdfe640dd7ac63e73bf81ae13f7fb8b14

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za077351.exe

          Filesize

          806KB

          MD5

          05a80ab55ba52a2db481cf8f1725d98f

          SHA1

          eedb7d5773110483800aea40194526e2fa967150

          SHA256

          386d53a29040b6162ce79583d7402e2caf03bcc0eae1fe438da16195df7726c1

          SHA512

          d2bff8628896c2e3d8d1ab2ef25672e75aee164f721c9927eaa594748d895fdfc1ce78bfee535a42256a05af0b1a6f49175742129074d7262da2deb982b26427

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za077351.exe

          Filesize

          806KB

          MD5

          05a80ab55ba52a2db481cf8f1725d98f

          SHA1

          eedb7d5773110483800aea40194526e2fa967150

          SHA256

          386d53a29040b6162ce79583d7402e2caf03bcc0eae1fe438da16195df7726c1

          SHA512

          d2bff8628896c2e3d8d1ab2ef25672e75aee164f721c9927eaa594748d895fdfc1ce78bfee535a42256a05af0b1a6f49175742129074d7262da2deb982b26427

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w86Io84.exe

          Filesize

          403KB

          MD5

          d6d8b02702e11b422e322d216d84c11e

          SHA1

          4ee3b1a754acc34ec126905af8c9eac00c89b082

          SHA256

          70ed151de498ea6bc34b663568e1a6762e4f4c60a475565aa2b3ffb9e0e49ff5

          SHA512

          a138e7e6b0982674a963e3f9a46c064d2210f09774bba4bfd62770ec740930be41a262ac85fe9642344fb9973eff6001770fb5d25905e863fe4d3b8611f981ed

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w86Io84.exe

          Filesize

          403KB

          MD5

          d6d8b02702e11b422e322d216d84c11e

          SHA1

          4ee3b1a754acc34ec126905af8c9eac00c89b082

          SHA256

          70ed151de498ea6bc34b663568e1a6762e4f4c60a475565aa2b3ffb9e0e49ff5

          SHA512

          a138e7e6b0982674a963e3f9a46c064d2210f09774bba4bfd62770ec740930be41a262ac85fe9642344fb9973eff6001770fb5d25905e863fe4d3b8611f981ed

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za792377.exe

          Filesize

          469KB

          MD5

          c6092137d21f82b7617f8594de9bbec8

          SHA1

          49f56b791cddb858a7a34c249fc34f64883759b0

          SHA256

          b434472ab0f308839f712a13cf407a7b59fb4e918cd3562739d138d13ee9d1d0

          SHA512

          5a2fd8847a7960a27071b8535972a6104fdf14d88658239de9582a59f1f26a4efe3ca35018a692f7596390f19e7274e482a7586d3a940b7b6ba81b0068b1df6e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za792377.exe

          Filesize

          469KB

          MD5

          c6092137d21f82b7617f8594de9bbec8

          SHA1

          49f56b791cddb858a7a34c249fc34f64883759b0

          SHA256

          b434472ab0f308839f712a13cf407a7b59fb4e918cd3562739d138d13ee9d1d0

          SHA512

          5a2fd8847a7960a27071b8535972a6104fdf14d88658239de9582a59f1f26a4efe3ca35018a692f7596390f19e7274e482a7586d3a940b7b6ba81b0068b1df6e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6401.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6401.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4086um.exe

          Filesize

          486KB

          MD5

          dcdf71cc16aae896c81d2f9b9774e2b4

          SHA1

          3d9bdaeb31a046d06aa7cdc435e50e3b53541d5e

          SHA256

          a16950afc47960f984f03fb61818d448862489b545441aafe7d105d61bee0d26

          SHA512

          501bc2161e3be944c2a5fd98664ecc5810b7932f8c92cc65f6a36a3e309cd453397482c3f9015c08b73d6ec8f79ac2402e70a3c44dbc7179ce3a930542a0f0e3

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4086um.exe

          Filesize

          486KB

          MD5

          dcdf71cc16aae896c81d2f9b9774e2b4

          SHA1

          3d9bdaeb31a046d06aa7cdc435e50e3b53541d5e

          SHA256

          a16950afc47960f984f03fb61818d448862489b545441aafe7d105d61bee0d26

          SHA512

          501bc2161e3be944c2a5fd98664ecc5810b7932f8c92cc65f6a36a3e309cd453397482c3f9015c08b73d6ec8f79ac2402e70a3c44dbc7179ce3a930542a0f0e3

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

          Filesize

          89KB

          MD5

          73df88d68a4f5e066784d462788cf695

          SHA1

          e4bfed336848d0b622fa464d40cf4bd9222aab3f

          SHA256

          f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

          SHA512

          64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

          Filesize

          162B

          MD5

          1b7c22a214949975556626d7217e9a39

          SHA1

          d01c97e2944166ed23e47e4a62ff471ab8fa031f

          SHA256

          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

          SHA512

          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

        • memory/1852-989-0x0000000000890000-0x00000000008BD000-memory.dmp

          Filesize

          180KB

        • memory/1852-991-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1852-1020-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1852-990-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1852-1023-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1852-1022-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/2856-164-0x00000000002E0000-0x00000000002EA000-memory.dmp

          Filesize

          40KB

        • memory/3796-1030-0x0000000004F90000-0x0000000004FA0000-memory.dmp

          Filesize

          64KB

        • memory/3796-1032-0x0000000004F90000-0x0000000004FA0000-memory.dmp

          Filesize

          64KB

        • memory/3796-1035-0x0000000004F90000-0x0000000004FA0000-memory.dmp

          Filesize

          64KB

        • memory/3796-1825-0x0000000004F90000-0x0000000004FA0000-memory.dmp

          Filesize

          64KB

        • memory/4576-186-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-982-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/4576-216-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-218-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-220-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-222-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-224-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-226-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-228-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-230-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-232-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-234-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-236-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-238-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-967-0x00000000078B0000-0x0000000007EC8000-memory.dmp

          Filesize

          6.1MB

        • memory/4576-968-0x0000000007F70000-0x0000000007F82000-memory.dmp

          Filesize

          72KB

        • memory/4576-969-0x0000000007F90000-0x000000000809A000-memory.dmp

          Filesize

          1.0MB

        • memory/4576-970-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/4576-971-0x00000000080B0000-0x00000000080EC000-memory.dmp

          Filesize

          240KB

        • memory/4576-972-0x00000000083B0000-0x0000000008416000-memory.dmp

          Filesize

          408KB

        • memory/4576-973-0x0000000008A80000-0x0000000008B12000-memory.dmp

          Filesize

          584KB

        • memory/4576-974-0x0000000008C30000-0x0000000008C80000-memory.dmp

          Filesize

          320KB

        • memory/4576-975-0x0000000008C90000-0x0000000008D06000-memory.dmp

          Filesize

          472KB

        • memory/4576-976-0x0000000008D70000-0x0000000008F32000-memory.dmp

          Filesize

          1.8MB

        • memory/4576-977-0x0000000008F50000-0x000000000947C000-memory.dmp

          Filesize

          5.2MB

        • memory/4576-978-0x0000000009780000-0x000000000979E000-memory.dmp

          Filesize

          120KB

        • memory/4576-981-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/4576-214-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-983-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/4576-212-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-210-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-208-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-206-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-204-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-202-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-200-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-198-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-196-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-194-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-192-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-190-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-188-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-184-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-182-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-180-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-176-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-178-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-175-0x0000000004DD0000-0x0000000004E05000-memory.dmp

          Filesize

          212KB

        • memory/4576-174-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/4576-173-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/4576-172-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/4576-171-0x00000000024C0000-0x0000000002506000-memory.dmp

          Filesize

          280KB

        • memory/4576-170-0x0000000004F80000-0x0000000005524000-memory.dmp

          Filesize

          5.6MB