Analysis

  • max time kernel
    293s
  • max time network
    280s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-12-2022 03:43

General

  • Target

    80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89.exe

  • Size

    410KB

  • MD5

    33bc7cf2d107b85e41d0f2694d1cc1fc

  • SHA1

    705f7a9b207d3a4c531149fae9f44783d4e7d487

  • SHA256

    80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89

  • SHA512

    68567f90881b32c21cffb0a66221b4fe605de083e0c0324f1c79782e6b93dbfd422b4099eb291099c0de917fbd2615a7d4e2547b448cee7a777688b17f931d02

  • SSDEEP

    12288:sohy43jx7ve5qCid/GOnJQJN4I8KQPkRqej9eWGtbUJXJU5MCrjuuhDzvFceyxO2:sKyKjBeIdGOnJQJN4I8KQPkRqej9eWGs

Malware Config

Extracted

Family

amadey

Version

3.60

C2

85.209.135.11/gjend7w/index.php

Extracted

Family

systembc

C2

89.22.236.225:4193

176.124.205.5:4193

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89.exe
    "C:\Users\Admin\AppData\Local\Temp\80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
      "C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:3760
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\acc0b83959" /P "Admin:N"&&CACLS "..\acc0b83959" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:4208
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "gntuud.exe" /P "Admin:N"
            4⤵
              PID:4248
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "gntuud.exe" /P "Admin:R" /E
              4⤵
                PID:4668
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:3688
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\acc0b83959" /P "Admin:N"
                  4⤵
                    PID:4636
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\acc0b83959" /P "Admin:R" /E
                    4⤵
                      PID:4948
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:4724
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll
                      4⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1232
                  • C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                    "C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:3780
                    • C:\Windows\SysWOW64\schtasks.exe
                      "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\nen pobem\Kamoh.exe"
                      4⤵
                      • Creates scheduled task(s)
                      PID:4644
                    • C:\Users\Admin\nen pobem\Kamoh.exe
                      "C:\Users\Admin\nen pobem\Kamoh.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:620
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe"
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1796
                      • C:\Windows\SysWOW64\chcp.com
                        chcp 65001
                        5⤵
                          PID:200
                        • C:\Windows\SysWOW64\PING.EXE
                          ping 127.0.0.1
                          5⤵
                          • Runs ping.exe
                          PID:2248
                    • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:2192
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                        4⤵
                        • Creates scheduled task(s)
                        PID:1816
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main
                      3⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      • outlook_win_path
                      PID:2768
                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  1⤵
                  • Executes dropped EXE
                  PID:216
                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4228
                • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                  C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4612
                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4816
                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  1⤵
                  • Executes dropped EXE
                  PID:5104

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Registry Run Keys / Startup Folder

                1
                T1060

                Scheduled Task

                1
                T1053

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Defense Evasion

                Modify Registry

                1
                T1112

                Credential Access

                Credentials in Files

                1
                T1081

                Discovery

                System Information Discovery

                1
                T1082

                Remote System Discovery

                1
                T1018

                Collection

                Data from Local System

                1
                T1005

                Email Collection

                1
                T1114

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\1000003062\syncfiles.dll
                  Filesize

                  6.4MB

                  MD5

                  2f781ea76036a17bbd0c0f63be7cff12

                  SHA1

                  b9b4c756949a038e87f4efd3569ba12c41a8e810

                  SHA256

                  3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                  SHA512

                  c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

                • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                  Filesize

                  178KB

                  MD5

                  9fe8dc76653623bf584213ec85a54512

                  SHA1

                  d2e790d0aa9d3827a7993812c3dfc3e46b3a18f2

                  SHA256

                  149c81f430967e7d07a18e7dbf5773c057610d62616c70a40ef89c76097c28ec

                  SHA512

                  3b4a54c6c4d489a4325a60fde69623dd1cf85b8b6949190fcb06f84e764d49c7348880b188925ac42baadb1e966a665926917bba54703b32c9a3bbff89a8eb91

                • C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe
                  Filesize

                  178KB

                  MD5

                  9fe8dc76653623bf584213ec85a54512

                  SHA1

                  d2e790d0aa9d3827a7993812c3dfc3e46b3a18f2

                  SHA256

                  149c81f430967e7d07a18e7dbf5773c057610d62616c70a40ef89c76097c28ec

                  SHA512

                  3b4a54c6c4d489a4325a60fde69623dd1cf85b8b6949190fcb06f84e764d49c7348880b188925ac42baadb1e966a665926917bba54703b32c9a3bbff89a8eb91

                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  Filesize

                  410KB

                  MD5

                  33bc7cf2d107b85e41d0f2694d1cc1fc

                  SHA1

                  705f7a9b207d3a4c531149fae9f44783d4e7d487

                  SHA256

                  80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89

                  SHA512

                  68567f90881b32c21cffb0a66221b4fe605de083e0c0324f1c79782e6b93dbfd422b4099eb291099c0de917fbd2615a7d4e2547b448cee7a777688b17f931d02

                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  Filesize

                  410KB

                  MD5

                  33bc7cf2d107b85e41d0f2694d1cc1fc

                  SHA1

                  705f7a9b207d3a4c531149fae9f44783d4e7d487

                  SHA256

                  80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89

                  SHA512

                  68567f90881b32c21cffb0a66221b4fe605de083e0c0324f1c79782e6b93dbfd422b4099eb291099c0de917fbd2615a7d4e2547b448cee7a777688b17f931d02

                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  Filesize

                  410KB

                  MD5

                  33bc7cf2d107b85e41d0f2694d1cc1fc

                  SHA1

                  705f7a9b207d3a4c531149fae9f44783d4e7d487

                  SHA256

                  80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89

                  SHA512

                  68567f90881b32c21cffb0a66221b4fe605de083e0c0324f1c79782e6b93dbfd422b4099eb291099c0de917fbd2615a7d4e2547b448cee7a777688b17f931d02

                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  Filesize

                  410KB

                  MD5

                  33bc7cf2d107b85e41d0f2694d1cc1fc

                  SHA1

                  705f7a9b207d3a4c531149fae9f44783d4e7d487

                  SHA256

                  80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89

                  SHA512

                  68567f90881b32c21cffb0a66221b4fe605de083e0c0324f1c79782e6b93dbfd422b4099eb291099c0de917fbd2615a7d4e2547b448cee7a777688b17f931d02

                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  Filesize

                  410KB

                  MD5

                  33bc7cf2d107b85e41d0f2694d1cc1fc

                  SHA1

                  705f7a9b207d3a4c531149fae9f44783d4e7d487

                  SHA256

                  80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89

                  SHA512

                  68567f90881b32c21cffb0a66221b4fe605de083e0c0324f1c79782e6b93dbfd422b4099eb291099c0de917fbd2615a7d4e2547b448cee7a777688b17f931d02

                • C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe
                  Filesize

                  410KB

                  MD5

                  33bc7cf2d107b85e41d0f2694d1cc1fc

                  SHA1

                  705f7a9b207d3a4c531149fae9f44783d4e7d487

                  SHA256

                  80463ba4b64344c53e914a4df794bcb8da82ff50067baa5d2c98d38a765b1d89

                  SHA512

                  68567f90881b32c21cffb0a66221b4fe605de083e0c0324f1c79782e6b93dbfd422b4099eb291099c0de917fbd2615a7d4e2547b448cee7a777688b17f931d02

                • C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                  Filesize

                  1.9MB

                  MD5

                  e29a05a012ac4fa163930875ce238521

                  SHA1

                  56dc0e7682ededee574353e5c01ac9093e12fd06

                  SHA256

                  7ec02825e3520847033a838b5328c8654d32b656ac0aa194c80fc1b39b102f33

                  SHA512

                  af28c031067d14108c4ee421477b7eba18b094551f08d24f5259f48613d97218fadbecf22c12609e81b35105ba9cb4e2e3aadba438b1c25b4f5b5cd459688370

                • C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe
                  Filesize

                  1.9MB

                  MD5

                  e29a05a012ac4fa163930875ce238521

                  SHA1

                  56dc0e7682ededee574353e5c01ac9093e12fd06

                  SHA256

                  7ec02825e3520847033a838b5328c8654d32b656ac0aa194c80fc1b39b102f33

                  SHA512

                  af28c031067d14108c4ee421477b7eba18b094551f08d24f5259f48613d97218fadbecf22c12609e81b35105ba9cb4e2e3aadba438b1c25b4f5b5cd459688370

                • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                  Filesize

                  659.0MB

                  MD5

                  306db8e70073b44253650f872a9f4658

                  SHA1

                  7df61b6d0c5c0c013047e412d3f157e206965760

                  SHA256

                  f4a65e3095d7de2884e760ba2d0ec13f91d4b2a18632c6e12cfe51c4cd67d7cc

                  SHA512

                  f569d382d708c43bb924a7b682dce9401c5fdfd439d0d619bd1e722207b07393531de9098d88c1e3532c7b368414e514ce1a0652a224da1cfdaee11cd6f1a3ad

                • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                  Filesize

                  670.4MB

                  MD5

                  45c758ddf7faf8ce0f384ca71e0214d9

                  SHA1

                  e7c12c1355c66eede7544daaa4ec7915b95ec842

                  SHA256

                  8f4ffad46f132414844be767cd75d4ed9432442fa39f5410923c10f550534fb7

                  SHA512

                  742bbf5926ed22093dcfffb8ece514000c82ebdae65437482e61c6b71e101a25ca114e00d1d7de3166a28d4c7376ecf1a577b4fdcab2469573716d52bc01ab34

                • C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll
                  Filesize

                  7.3MB

                  MD5

                  e3024c1667894acf4391a3ec838777d2

                  SHA1

                  d0cb9012aa2a6029f1b558fed17a12553919f4b1

                  SHA256

                  0be3489d010af16e7447e2dcca3ce3fd6165c70a86bf4327201c60d7749d6cbf

                  SHA512

                  15e6c0a429adf5ac1afe44ef9450461e5a4b56168166655acfdc29184c7f31b1ec14866c4808940ecc80ddf5704d3dfd8e9161511ac99be3f08f6e9c81bd7af7

                • C:\Users\Admin\nen pobem\Kamoh.exe
                  Filesize

                  63.1MB

                  MD5

                  e7ea0558a36ccf75ba9284b4b5e50af1

                  SHA1

                  ae2822f4d11a0b208bc03638e503ada1c4734718

                  SHA256

                  e84ae29845c309d5f0964ca40f8b52d334190e758903adeae0805fbd5d7626c1

                  SHA512

                  0bdd5b6db9835037985c94bb283c7c90a88f967b7a745350e7a464c6277bd7b5f35c22dbcbcdd7e1cd1654c1252a4e5b68266bc48912584ea24221b5b2351041

                • C:\Users\Admin\nen pobem\Kamoh.exe
                  Filesize

                  57.2MB

                  MD5

                  c2d06f362491438322e80494cb2d3e04

                  SHA1

                  a49ba41e9019db2cb9cbd47718d2ee1fc8e875d3

                  SHA256

                  19aa4366f89d4a8e79df4b5227240890fa8d35fab62dd6fc8e856bf10b3a697e

                  SHA512

                  a6a0b9895ec30bcf0c10049a1434de098906d60219e9988890a16e2bd188097745b98a4fd94ed103f5ced1a7ad7752bbf48e9940741be3d301acdea2db21c491

                • \Users\Admin\1000003062\syncfiles.dll
                  Filesize

                  6.4MB

                  MD5

                  2f781ea76036a17bbd0c0f63be7cff12

                  SHA1

                  b9b4c756949a038e87f4efd3569ba12c41a8e810

                  SHA256

                  3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                  SHA512

                  c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

                • \Users\Admin\1000003062\syncfiles.dll
                  Filesize

                  6.4MB

                  MD5

                  2f781ea76036a17bbd0c0f63be7cff12

                  SHA1

                  b9b4c756949a038e87f4efd3569ba12c41a8e810

                  SHA256

                  3acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372

                  SHA512

                  c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208

                • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll
                  Filesize

                  7.3MB

                  MD5

                  e3024c1667894acf4391a3ec838777d2

                  SHA1

                  d0cb9012aa2a6029f1b558fed17a12553919f4b1

                  SHA256

                  0be3489d010af16e7447e2dcca3ce3fd6165c70a86bf4327201c60d7749d6cbf

                  SHA512

                  15e6c0a429adf5ac1afe44ef9450461e5a4b56168166655acfdc29184c7f31b1ec14866c4808940ecc80ddf5704d3dfd8e9161511ac99be3f08f6e9c81bd7af7

                • \Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll
                  Filesize

                  7.3MB

                  MD5

                  e3024c1667894acf4391a3ec838777d2

                  SHA1

                  d0cb9012aa2a6029f1b558fed17a12553919f4b1

                  SHA256

                  0be3489d010af16e7447e2dcca3ce3fd6165c70a86bf4327201c60d7749d6cbf

                  SHA512

                  15e6c0a429adf5ac1afe44ef9450461e5a4b56168166655acfdc29184c7f31b1ec14866c4808940ecc80ddf5704d3dfd8e9161511ac99be3f08f6e9c81bd7af7

                • memory/200-757-0x0000000000000000-mapping.dmp
                • memory/216-607-0x00000000029A0000-0x00000000029E4000-memory.dmp
                  Filesize

                  272KB

                • memory/620-733-0x0000000000000000-mapping.dmp
                • memory/620-813-0x0000000003430000-0x00000000035D9000-memory.dmp
                  Filesize

                  1.7MB

                • memory/620-838-0x0000000003430000-0x00000000035D9000-memory.dmp
                  Filesize

                  1.7MB

                • memory/780-220-0x0000000000000000-mapping.dmp
                • memory/1232-383-0x00007FF9E4400000-0x00007FF9E4DFD000-memory.dmp
                  Filesize

                  10.0MB

                • memory/1232-379-0x0000000000000000-mapping.dmp
                • memory/1232-447-0x00007FF9E4400000-0x00007FF9E4DFD000-memory.dmp
                  Filesize

                  10.0MB

                • memory/1796-738-0x0000000000000000-mapping.dmp
                • memory/1816-481-0x0000000000000000-mapping.dmp
                • memory/2108-151-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-127-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-153-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-154-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-155-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-156-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-157-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-159-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-158-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-160-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-161-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-162-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-163-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-165-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-164-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-166-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-170-0x0000000002F00000-0x0000000002F44000-memory.dmp
                  Filesize

                  272KB

                • memory/2108-121-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-122-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-123-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-143-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-152-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-150-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-124-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-120-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-125-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-126-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-142-0x0000000002F00000-0x0000000002F44000-memory.dmp
                  Filesize

                  272KB

                • memory/2108-128-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-129-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-130-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-131-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-132-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-133-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-144-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-134-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-135-0x0000000002F00000-0x0000000002F44000-memory.dmp
                  Filesize

                  272KB

                • memory/2108-136-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-146-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-149-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-145-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-137-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-147-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-138-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-139-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-140-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-148-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2108-141-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2192-428-0x0000000000000000-mapping.dmp
                • memory/2192-468-0x0000000000120000-0x0000000000139000-memory.dmp
                  Filesize

                  100KB

                • memory/2192-483-0x0000000000120000-0x0000000000139000-memory.dmp
                  Filesize

                  100KB

                • memory/2248-765-0x0000000000000000-mapping.dmp
                • memory/2768-501-0x0000000000000000-mapping.dmp
                • memory/2768-549-0x00000000045C0000-0x0000000005155000-memory.dmp
                  Filesize

                  11.6MB

                • memory/2992-167-0x0000000000000000-mapping.dmp
                • memory/2992-183-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-172-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-173-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-171-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-169-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-446-0x0000000000F60000-0x0000000000FA4000-memory.dmp
                  Filesize

                  272KB

                • memory/2992-175-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-178-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-180-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-182-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-181-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-179-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-217-0x0000000000F60000-0x0000000000FA4000-memory.dmp
                  Filesize

                  272KB

                • memory/2992-188-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-187-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-174-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-184-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-185-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/2992-177-0x00000000779E0000-0x0000000077B6E000-memory.dmp
                  Filesize

                  1.6MB

                • memory/3688-277-0x0000000000000000-mapping.dmp
                • memory/3760-218-0x0000000000000000-mapping.dmp
                • memory/3780-413-0x0000000002D70000-0x0000000002F1B000-memory.dmp
                  Filesize

                  1.7MB

                • memory/3780-344-0x0000000000000000-mapping.dmp
                • memory/3780-448-0x0000000002D70000-0x0000000002F1B000-memory.dmp
                  Filesize

                  1.7MB

                • memory/4208-239-0x0000000000000000-mapping.dmp
                • memory/4228-677-0x00000000011E0000-0x000000000132A000-memory.dmp
                  Filesize

                  1.3MB

                • memory/4248-242-0x0000000000000000-mapping.dmp
                • memory/4612-670-0x0000000000D30000-0x0000000000D49000-memory.dmp
                  Filesize

                  100KB

                • memory/4636-278-0x0000000000000000-mapping.dmp
                • memory/4644-714-0x0000000000000000-mapping.dmp
                • memory/4668-263-0x0000000000000000-mapping.dmp
                • memory/4724-320-0x0000000000000000-mapping.dmp
                • memory/4816-837-0x0000000000800000-0x0000000000844000-memory.dmp
                  Filesize

                  272KB

                • memory/4948-306-0x0000000000000000-mapping.dmp