Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20231023-en
  • resource tags

    arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-11-2023 16:12

General

  • Target

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3.exe

  • Size

    1.5MB

  • MD5

    32fd90862f9a7732ec49aad05ba343fe

  • SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

  • SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

  • SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • SSDEEP

    24576:ZQIsq2Q2GOAO4fCCy7gtlkJSfU2qZhGjZRDsKjuRui26a24UzhlMxO+znN:ZQIsq2Q2GOAO4fCZ7YlI2UioKCoi9zhM

Malware Config

Extracted

Family

amadey

Version

4.12

C2

http://brodoyouevenlift.co.za

Attributes
  • install_dir

    ce3eb8f6b2

  • install_file

    Utsysc.exe

  • strings_key

    c5b804d7b4c8a99f5afb89e5203cf3ba

  • url_paths

    /g9sdjScV2/index.php

    /vdhe8ejs3/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3.exe
    "C:\Users\Admin\AppData\Local\Temp\d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Users\Admin\AppData\Local\Temp\d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3.exe
      C:\Users\Admin\AppData\Local\Temp\d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3.exe
      2⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
        "C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
          C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4012
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:5080
          • C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe
            "C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4996
            • C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe
              C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe
              6⤵
              • Executes dropped EXE
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4408
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe" & del "C:\ProgramData\*.dll"" & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1124
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 5
                  8⤵
                  • Delays execution with timeout.exe
                  PID:4340
          • C:\Users\Admin\AppData\Local\Temp\1000009001\Wlssejinnvz.exe
            "C:\Users\Admin\AppData\Local\Temp\1000009001\Wlssejinnvz.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:168
            • C:\Users\Admin\AppData\Local\Temp\1000009001\Wlssejinnvz.exe
              C:\Users\Admin\AppData\Local\Temp\1000009001\Wlssejinnvz.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:588
  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
    C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:4896
  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
    C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:1136
    • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe
      2⤵
      • Executes dropped EXE
      PID:4468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Wlssejinnvz.exe.log

    Filesize

    1KB

    MD5

    34cb83de9d8d99a31fa837dc05aedb05

    SHA1

    b1757ff9c600b575543993ea8409ad95d65fcc27

    SHA256

    4283e061bb4933a9ed3c13d8e18d36e30ebdf3a5347824fe42a4ffff1820d6c3

    SHA512

    187c575732e994d8335946de491360d9de7486b72209fea33884f05f0f191d4398ca31bb05bd7a57ae6bba4b07ebe3ac00875cf37a17c6c7b863dcf7c445e554

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Utsysc.exe.log

    Filesize

    1KB

    MD5

    10814e9374c4674fa92e55118c282ea7

    SHA1

    6967ab9bce1bd24f7c8d3a6877a3d2650ce481e0

    SHA256

    fbf67d3906865b5a897d028f490c0cc55370ff9ac40fcc41ae70f36221a80462

    SHA512

    9b143a57d9e1c724686ee934476cfb66dea64c2e30f213503398f26fe53096ee397e70c53d960400d6e4c11733c79360cee8a286fcae2ca389c70bb83dce8e1d

  • C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe

    Filesize

    385KB

    MD5

    51367ff68633e00c8a084cb52534182f

    SHA1

    52a06ba919a3ff357e456022493f66289acee4b3

    SHA256

    3c16def99c05de25b1b8dfb73757f3356bad519c9c39292752aa07fab0653936

    SHA512

    c3262d84da25a1b93575b81dae14f3478a6a2c09dfd399c17b4acb23825f898cdb0e2c4676b35d0279106bf54c35580c7cde608e311bc61bc5071bbc0e0eb92f

  • C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe

    Filesize

    385KB

    MD5

    51367ff68633e00c8a084cb52534182f

    SHA1

    52a06ba919a3ff357e456022493f66289acee4b3

    SHA256

    3c16def99c05de25b1b8dfb73757f3356bad519c9c39292752aa07fab0653936

    SHA512

    c3262d84da25a1b93575b81dae14f3478a6a2c09dfd399c17b4acb23825f898cdb0e2c4676b35d0279106bf54c35580c7cde608e311bc61bc5071bbc0e0eb92f

  • C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe

    Filesize

    385KB

    MD5

    51367ff68633e00c8a084cb52534182f

    SHA1

    52a06ba919a3ff357e456022493f66289acee4b3

    SHA256

    3c16def99c05de25b1b8dfb73757f3356bad519c9c39292752aa07fab0653936

    SHA512

    c3262d84da25a1b93575b81dae14f3478a6a2c09dfd399c17b4acb23825f898cdb0e2c4676b35d0279106bf54c35580c7cde608e311bc61bc5071bbc0e0eb92f

  • C:\Users\Admin\AppData\Local\Temp\1000008001\Opesi.exe

    Filesize

    385KB

    MD5

    51367ff68633e00c8a084cb52534182f

    SHA1

    52a06ba919a3ff357e456022493f66289acee4b3

    SHA256

    3c16def99c05de25b1b8dfb73757f3356bad519c9c39292752aa07fab0653936

    SHA512

    c3262d84da25a1b93575b81dae14f3478a6a2c09dfd399c17b4acb23825f898cdb0e2c4676b35d0279106bf54c35580c7cde608e311bc61bc5071bbc0e0eb92f

  • C:\Users\Admin\AppData\Local\Temp\1000009001\Wlssejinnvz.exe

    Filesize

    977KB

    MD5

    b4ce50927cd3a7ab60d2d6522070cd69

    SHA1

    e18b3c9b952a6096a34aae2afba7e0a136ef40de

    SHA256

    78622732081a2280320cbd61ae9c1cf51061ad534b537cf6010144e41e29bb67

    SHA512

    d71932a1550af611ded83eb7abe0e2c7502bc8e0d3c709e04f2dec1005392f2fd891094fc9be7c90c3bd3fe3a83bf96fb7fa2eb0cb560631332460b176b3c223

  • C:\Users\Admin\AppData\Local\Temp\1000009001\Wlssejinnvz.exe

    Filesize

    977KB

    MD5

    b4ce50927cd3a7ab60d2d6522070cd69

    SHA1

    e18b3c9b952a6096a34aae2afba7e0a136ef40de

    SHA256

    78622732081a2280320cbd61ae9c1cf51061ad534b537cf6010144e41e29bb67

    SHA512

    d71932a1550af611ded83eb7abe0e2c7502bc8e0d3c709e04f2dec1005392f2fd891094fc9be7c90c3bd3fe3a83bf96fb7fa2eb0cb560631332460b176b3c223

  • C:\Users\Admin\AppData\Local\Temp\1000009001\Wlssejinnvz.exe

    Filesize

    977KB

    MD5

    b4ce50927cd3a7ab60d2d6522070cd69

    SHA1

    e18b3c9b952a6096a34aae2afba7e0a136ef40de

    SHA256

    78622732081a2280320cbd61ae9c1cf51061ad534b537cf6010144e41e29bb67

    SHA512

    d71932a1550af611ded83eb7abe0e2c7502bc8e0d3c709e04f2dec1005392f2fd891094fc9be7c90c3bd3fe3a83bf96fb7fa2eb0cb560631332460b176b3c223

  • C:\Users\Admin\AppData\Local\Temp\1000009001\Wlssejinnvz.exe

    Filesize

    977KB

    MD5

    b4ce50927cd3a7ab60d2d6522070cd69

    SHA1

    e18b3c9b952a6096a34aae2afba7e0a136ef40de

    SHA256

    78622732081a2280320cbd61ae9c1cf51061ad534b537cf6010144e41e29bb67

    SHA512

    d71932a1550af611ded83eb7abe0e2c7502bc8e0d3c709e04f2dec1005392f2fd891094fc9be7c90c3bd3fe3a83bf96fb7fa2eb0cb560631332460b176b3c223

  • C:\Users\Admin\AppData\Local\Temp\184424523918

    Filesize

    71KB

    MD5

    b4e8646ce818c3a0e3f5d9e30b4ea60f

    SHA1

    b717a8f03d093da4f937e1f8e8eb3457582d1497

    SHA256

    9a28fcd04fa890f1a1ee8d09e5cb223bff5e506ded43cf8f34ab27c509647483

    SHA512

    d6c2545b412533890f8a6ba520d313ea9d1d90f3e8a8ad565e0ce76d6ad1d46dd474f95f547a4f3cfcf37d9fab396e1364a2391ec9702f6e61d9de7ade6813b5

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • C:\Users\Admin\AppData\Local\Temp\ce3eb8f6b2\Utsysc.exe

    Filesize

    1.5MB

    MD5

    32fd90862f9a7732ec49aad05ba343fe

    SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

    SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • memory/168-146-0x000002D9D63B0000-0x000002D9D6498000-memory.dmp

    Filesize

    928KB

  • memory/168-141-0x000002D9BBC40000-0x000002D9BBD38000-memory.dmp

    Filesize

    992KB

  • memory/168-148-0x000002D9D6670000-0x000002D9D6740000-memory.dmp

    Filesize

    832KB

  • memory/168-145-0x000002D9D62C0000-0x000002D9D63A8000-memory.dmp

    Filesize

    928KB

  • memory/168-144-0x000002D9D61D0000-0x000002D9D62B8000-memory.dmp

    Filesize

    928KB

  • memory/168-155-0x00007FF9E37B0000-0x00007FF9E419C000-memory.dmp

    Filesize

    9.9MB

  • memory/168-143-0x000002D9BC210000-0x000002D9BC220000-memory.dmp

    Filesize

    64KB

  • memory/168-147-0x000002D9D64A0000-0x000002D9D6570000-memory.dmp

    Filesize

    832KB

  • memory/168-142-0x00007FF9E37B0000-0x00007FF9E419C000-memory.dmp

    Filesize

    9.9MB

  • memory/588-149-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/588-162-0x00007FF9E37B0000-0x00007FF9E419C000-memory.dmp

    Filesize

    9.9MB

  • memory/588-159-0x0000026375EE0000-0x0000026375F34000-memory.dmp

    Filesize

    336KB

  • memory/588-158-0x0000026375E30000-0x0000026375E86000-memory.dmp

    Filesize

    344KB

  • memory/588-157-0x00000263752F0000-0x00000263752F8000-memory.dmp

    Filesize

    32KB

  • memory/588-153-0x0000026375B80000-0x0000026375C80000-memory.dmp

    Filesize

    1024KB

  • memory/588-154-0x00007FF9E37B0000-0x00007FF9E419C000-memory.dmp

    Filesize

    9.9MB

  • memory/588-156-0x0000026375320000-0x0000026375330000-memory.dmp

    Filesize

    64KB

  • memory/1388-121-0x0000000071DE0000-0x00000000724CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1388-114-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/1388-113-0x0000000071DE0000-0x00000000724CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1568-23-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/1568-13-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/1568-12-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/1568-15-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/1568-10-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4012-32-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4012-135-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4012-30-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4012-29-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4012-33-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4012-50-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4012-53-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4012-139-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4352-14-0x0000000073380000-0x0000000073A6E000-memory.dmp

    Filesize

    6.9MB

  • memory/4352-6-0x0000000005040000-0x000000000508C000-memory.dmp

    Filesize

    304KB

  • memory/4352-1-0x0000000073380000-0x0000000073A6E000-memory.dmp

    Filesize

    6.9MB

  • memory/4352-2-0x0000000004F00000-0x0000000004F7A000-memory.dmp

    Filesize

    488KB

  • memory/4352-9-0x0000000005760000-0x0000000005C5E000-memory.dmp

    Filesize

    5.0MB

  • memory/4352-3-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/4352-8-0x00000000051F0000-0x0000000005256000-memory.dmp

    Filesize

    408KB

  • memory/4352-4-0x0000000004F80000-0x0000000004FE0000-memory.dmp

    Filesize

    384KB

  • memory/4352-5-0x0000000004FE0000-0x0000000005040000-memory.dmp

    Filesize

    384KB

  • memory/4352-0-0x0000000000550000-0x00000000006CA000-memory.dmp

    Filesize

    1.5MB

  • memory/4352-7-0x0000000005150000-0x00000000051E2000-memory.dmp

    Filesize

    584KB

  • memory/4408-79-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB

  • memory/4408-97-0x0000000000400000-0x000000000063A000-memory.dmp

    Filesize

    2.2MB

  • memory/4408-70-0x0000000000400000-0x000000000063A000-memory.dmp

    Filesize

    2.2MB

  • memory/4408-64-0x0000000000400000-0x000000000063A000-memory.dmp

    Filesize

    2.2MB

  • memory/4408-77-0x0000000000400000-0x000000000063A000-memory.dmp

    Filesize

    2.2MB

  • memory/4408-68-0x0000000000400000-0x000000000063A000-memory.dmp

    Filesize

    2.2MB

  • memory/4408-76-0x0000000000400000-0x000000000063A000-memory.dmp

    Filesize

    2.2MB

  • memory/4432-101-0x0000000000D30000-0x0000000000D40000-memory.dmp

    Filesize

    64KB

  • memory/4432-104-0x0000000071DE0000-0x00000000724CE000-memory.dmp

    Filesize

    6.9MB

  • memory/4432-100-0x0000000071DE0000-0x00000000724CE000-memory.dmp

    Filesize

    6.9MB

  • memory/4468-120-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4468-119-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4468-118-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4576-24-0x0000000071850000-0x0000000071F3E000-memory.dmp

    Filesize

    6.9MB

  • memory/4576-25-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/4576-31-0x0000000071850000-0x0000000071F3E000-memory.dmp

    Filesize

    6.9MB

  • memory/4896-107-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4896-106-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4896-105-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4996-56-0x0000000000260000-0x00000000002C6000-memory.dmp

    Filesize

    408KB

  • memory/4996-57-0x0000000004A90000-0x0000000004AE4000-memory.dmp

    Filesize

    336KB

  • memory/4996-59-0x0000000004B00000-0x0000000004B54000-memory.dmp

    Filesize

    336KB

  • memory/4996-61-0x0000000004B50000-0x0000000004BA4000-memory.dmp

    Filesize

    336KB

  • memory/4996-60-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/4996-58-0x0000000071DE0000-0x00000000724CE000-memory.dmp

    Filesize

    6.9MB

  • memory/4996-62-0x0000000004BA0000-0x0000000004BDC000-memory.dmp

    Filesize

    240KB

  • memory/4996-63-0x0000000004D10000-0x0000000004D4C000-memory.dmp

    Filesize

    240KB

  • memory/4996-69-0x0000000071DE0000-0x00000000724CE000-memory.dmp

    Filesize

    6.9MB