Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    104s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/04/2023, 17:30

General

  • Target

    d82b732098025effc1c93cfc9b7a36819fab47e916b3f24c4354bd6af46de403.exe

  • Size

    1.1MB

  • MD5

    0e30f48845e24a4d83ff7bb21e1f50c2

  • SHA1

    be02de0f5f74bf933415bc58307d3b59526ba348

  • SHA256

    d82b732098025effc1c93cfc9b7a36819fab47e916b3f24c4354bd6af46de403

  • SHA512

    3a7ded6edd4ac95093ee1a83651345edf8ccaa853db101c352e2daf0cf85496e0b28eb961145c56801830acaa4585eec60ddd931a55825b54550337ff2ee2f6a

  • SSDEEP

    24576:sysNxzcBROfDeiOSPnES7ZqRabCbv7ux+fs5/0+lvNz:bOxzUcZlP/Ii0se+VN

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d82b732098025effc1c93cfc9b7a36819fab47e916b3f24c4354bd6af46de403.exe
    "C:\Users\Admin\AppData\Local\Temp\d82b732098025effc1c93cfc9b7a36819fab47e916b3f24c4354bd6af46de403.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za954240.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za954240.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za952310.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za952310.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za196164.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za196164.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8824.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8824.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4956
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4492rv.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4492rv.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w35OI66.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w35OI66.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRqBs32.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRqBs32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y56zE82.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y56zE82.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1648
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:2872
  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
    1⤵
    • Executes dropped EXE
    PID:1304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y56zE82.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y56zE82.exe

    Filesize

    229KB

    MD5

    3308051ded87b1863a8d92925202c4b3

    SHA1

    7834ddc23e7976b07118fb580ae38234466dbdfb

    SHA256

    13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

    SHA512

    f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za954240.exe

    Filesize

    913KB

    MD5

    618b015fb8669cebeea7c07fd9a22f41

    SHA1

    1f70f850f7f0353b65a421de8788e874e87743d4

    SHA256

    62e5a6f16e87d578b00b0c90029f9b83ace1895b85b3ca7e45ff7bf7fcf1d1f2

    SHA512

    620824b56c2aa31bdf90d0f8db2af79b656cd3a6154e5f7813e58c544f20388ab7abd588a99b2729ed597127b5b5fc4e8810d42443a45693fe2ce65cd11fa0f7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za954240.exe

    Filesize

    913KB

    MD5

    618b015fb8669cebeea7c07fd9a22f41

    SHA1

    1f70f850f7f0353b65a421de8788e874e87743d4

    SHA256

    62e5a6f16e87d578b00b0c90029f9b83ace1895b85b3ca7e45ff7bf7fcf1d1f2

    SHA512

    620824b56c2aa31bdf90d0f8db2af79b656cd3a6154e5f7813e58c544f20388ab7abd588a99b2729ed597127b5b5fc4e8810d42443a45693fe2ce65cd11fa0f7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRqBs32.exe

    Filesize

    350KB

    MD5

    61bbe9903824ed6da7b6973ad85643ce

    SHA1

    014d02818efe882098150b3e6769e75b35ed0829

    SHA256

    5b491d2d0a8cc44e5a7091871e61c1cdbbcda80f8b80e4fa410ff9d296963452

    SHA512

    5b410b211f81a7aceb8f21b1d8910b89e3083a13cf2c6f8464adabca48ab41fc9fb35dd23e3c3ca4150d392820b61a66f140af030034feb19cba0e4ddba656a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRqBs32.exe

    Filesize

    350KB

    MD5

    61bbe9903824ed6da7b6973ad85643ce

    SHA1

    014d02818efe882098150b3e6769e75b35ed0829

    SHA256

    5b491d2d0a8cc44e5a7091871e61c1cdbbcda80f8b80e4fa410ff9d296963452

    SHA512

    5b410b211f81a7aceb8f21b1d8910b89e3083a13cf2c6f8464adabca48ab41fc9fb35dd23e3c3ca4150d392820b61a66f140af030034feb19cba0e4ddba656a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za952310.exe

    Filesize

    668KB

    MD5

    e7ecd824829d56baf46c3693f4b78e77

    SHA1

    94180a9d084ee7bb20bb4a653734234257d686d5

    SHA256

    79e912bcb48cbecda92b993880fdaf05b78726d1c9343c6df25436cce8b5069c

    SHA512

    900abfee84c66e991d8a23a34c78ffe10df6a862ade949bc3151580a265fa86a3ac54e597854ae80f74f433e72f7f5ac04fe6260f4cea95fbb72f23a15cedd16

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za952310.exe

    Filesize

    668KB

    MD5

    e7ecd824829d56baf46c3693f4b78e77

    SHA1

    94180a9d084ee7bb20bb4a653734234257d686d5

    SHA256

    79e912bcb48cbecda92b993880fdaf05b78726d1c9343c6df25436cce8b5069c

    SHA512

    900abfee84c66e991d8a23a34c78ffe10df6a862ade949bc3151580a265fa86a3ac54e597854ae80f74f433e72f7f5ac04fe6260f4cea95fbb72f23a15cedd16

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w35OI66.exe

    Filesize

    278KB

    MD5

    59b83a51c6612a84b91e3f0025796750

    SHA1

    664586ca8f423d876053c8a6b708a27e4a9ff536

    SHA256

    358b08d30503e2f2437a96f874c580785824e493ad6629e4cc58ea4e8609c814

    SHA512

    f9909f992e7cead1c312fe8f0dab5f0bc59986c5cb9ad29f194654f404849c928acbc103d34201524acceea425c742a22d7f187880b9894764fec887a848ed10

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w35OI66.exe

    Filesize

    278KB

    MD5

    59b83a51c6612a84b91e3f0025796750

    SHA1

    664586ca8f423d876053c8a6b708a27e4a9ff536

    SHA256

    358b08d30503e2f2437a96f874c580785824e493ad6629e4cc58ea4e8609c814

    SHA512

    f9909f992e7cead1c312fe8f0dab5f0bc59986c5cb9ad29f194654f404849c928acbc103d34201524acceea425c742a22d7f187880b9894764fec887a848ed10

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za196164.exe

    Filesize

    398KB

    MD5

    5d90cfb5b6924f110057323ccb2597f4

    SHA1

    7bbe12c9eb4e3c15d3aceda8e9678aac3787fa3b

    SHA256

    3b06f02564539abd6e855d46aa80cb464a91a74c60d305c13b380e202e361ee6

    SHA512

    1951d853ada62d9013341d47db9482b32ca3e974af8cc4c436792f57b9699ce610726491bf8e6a19ad123314141913d71ce0c50717246239dc13fd4e1fab8315

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za196164.exe

    Filesize

    398KB

    MD5

    5d90cfb5b6924f110057323ccb2597f4

    SHA1

    7bbe12c9eb4e3c15d3aceda8e9678aac3787fa3b

    SHA256

    3b06f02564539abd6e855d46aa80cb464a91a74c60d305c13b380e202e361ee6

    SHA512

    1951d853ada62d9013341d47db9482b32ca3e974af8cc4c436792f57b9699ce610726491bf8e6a19ad123314141913d71ce0c50717246239dc13fd4e1fab8315

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8824.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8824.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4492rv.exe

    Filesize

    350KB

    MD5

    5a43b3c0365e6bbe02711b55d5a24893

    SHA1

    de2e22cfecc1a9b1ca34ded8d69d2d786aa8aea4

    SHA256

    122bf6323bc52db700c951ab9589d579ae58eb26e016a442a2a4b0f1e52ccd96

    SHA512

    51a0c05d7928c0f753ff8b5bb5654e73839876519acf07f1b5d8007824c0eb0b42b7c300c9935f761738d3edcf36f71d54d95cbe901729419489ba7e34fa6932

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4492rv.exe

    Filesize

    350KB

    MD5

    5a43b3c0365e6bbe02711b55d5a24893

    SHA1

    de2e22cfecc1a9b1ca34ded8d69d2d786aa8aea4

    SHA256

    122bf6323bc52db700c951ab9589d579ae58eb26e016a442a2a4b0f1e52ccd96

    SHA512

    51a0c05d7928c0f753ff8b5bb5654e73839876519acf07f1b5d8007824c0eb0b42b7c300c9935f761738d3edcf36f71d54d95cbe901729419489ba7e34fa6932

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

    Filesize

    162B

    MD5

    1b7c22a214949975556626d7217e9a39

    SHA1

    d01c97e2944166ed23e47e4a62ff471ab8fa031f

    SHA256

    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

    SHA512

    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

    Filesize

    89KB

    MD5

    73df88d68a4f5e066784d462788cf695

    SHA1

    e4bfed336848d0b622fa464d40cf4bd9222aab3f

    SHA256

    f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

    SHA512

    64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

  • memory/1636-974-0x0000000004900000-0x000000000491A000-memory.dmp

    Filesize

    104KB

  • memory/1636-975-0x0000000004D70000-0x0000000004D88000-memory.dmp

    Filesize

    96KB

  • memory/1636-1005-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/1636-1004-0x0000000002CB0000-0x0000000002CDD000-memory.dmp

    Filesize

    180KB

  • memory/1636-1007-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/1636-1006-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2992-1016-0x00000000071A0000-0x00000000071B0000-memory.dmp

    Filesize

    64KB

  • memory/2992-1015-0x00000000071A0000-0x00000000071B0000-memory.dmp

    Filesize

    64KB

  • memory/2992-1017-0x00000000071A0000-0x00000000071B0000-memory.dmp

    Filesize

    64KB

  • memory/2992-1810-0x00000000071A0000-0x00000000071B0000-memory.dmp

    Filesize

    64KB

  • memory/4956-149-0x00000000000D0000-0x00000000000DA000-memory.dmp

    Filesize

    40KB

  • memory/5056-169-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-965-0x000000000B0D0000-0x000000000B5FC000-memory.dmp

    Filesize

    5.2MB

  • memory/5056-199-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-201-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-203-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-205-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-207-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-209-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-211-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-213-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-215-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-217-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-219-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-221-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-223-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-225-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-954-0x0000000009B80000-0x000000000A186000-memory.dmp

    Filesize

    6.0MB

  • memory/5056-955-0x000000000A200000-0x000000000A212000-memory.dmp

    Filesize

    72KB

  • memory/5056-956-0x000000000A230000-0x000000000A33A000-memory.dmp

    Filesize

    1.0MB

  • memory/5056-957-0x000000000A350000-0x000000000A38E000-memory.dmp

    Filesize

    248KB

  • memory/5056-958-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/5056-959-0x000000000A4D0000-0x000000000A51B000-memory.dmp

    Filesize

    300KB

  • memory/5056-960-0x000000000A660000-0x000000000A6C6000-memory.dmp

    Filesize

    408KB

  • memory/5056-961-0x000000000AD10000-0x000000000ADA2000-memory.dmp

    Filesize

    584KB

  • memory/5056-962-0x000000000ADC0000-0x000000000AE10000-memory.dmp

    Filesize

    320KB

  • memory/5056-963-0x000000000AE30000-0x000000000AEA6000-memory.dmp

    Filesize

    472KB

  • memory/5056-964-0x000000000AF00000-0x000000000B0C2000-memory.dmp

    Filesize

    1.8MB

  • memory/5056-197-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-966-0x000000000B730000-0x000000000B74E000-memory.dmp

    Filesize

    120KB

  • memory/5056-195-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-193-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-191-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-189-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-187-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-185-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-183-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-181-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-179-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-177-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-175-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-173-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-171-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-167-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-158-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-162-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/5056-165-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-164-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/5056-161-0x00000000049D0000-0x0000000004A05000-memory.dmp

    Filesize

    212KB

  • memory/5056-160-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/5056-159-0x0000000002BC0000-0x0000000002C06000-memory.dmp

    Filesize

    280KB

  • memory/5056-157-0x00000000049D0000-0x0000000004A0A000-memory.dmp

    Filesize

    232KB

  • memory/5056-156-0x0000000007200000-0x00000000076FE000-memory.dmp

    Filesize

    5.0MB

  • memory/5056-155-0x0000000004920000-0x000000000495C000-memory.dmp

    Filesize

    240KB