Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231130-en
  • resource tags

    arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2023 05:36

General

  • Target

    d20c169833df7d5a176530bf19e65813.exe

  • Size

    6.0MB

  • MD5

    d20c169833df7d5a176530bf19e65813

  • SHA1

    4bb46ef4c7418900e4c4137f4aaded4b3b6f30d2

  • SHA256

    5d3bdd91e0b184716f9c229e5bc3d6e7f0c349e1db0a570fe6032b7bd651059a

  • SHA512

    c17f96d92fd8e8f892324c7f61c23b118fdc7fb032999e13b2c80c75859232b4754ecbae07d200a4fff326f5ee104420b89f39f74571dee6d3bf03dd19eba3f2

  • SSDEEP

    98304:g15EKFX859DrkzOMQhlCkGYbEAFkyXuzD5+u0c8jLgRGEveTjoM9hY/C:i2Z9vk0hAKbEAFpXQ9d0PjMnveTjoGhz

Malware Config

Extracted

Family

amadey

C2

http://185.172.128.5

Attributes
  • strings_key

    11bb398ff31ee80d2c37571aecd1d36d

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Extracted

Family

amadey

Version

4.13

C2

http://185.172.128.5

Attributes
  • install_dir

    4fdb51ccdc

  • install_file

    Utsysc.exe

  • strings_key

    11bb398ff31ee80d2c37571aecd1d36d

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 23 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d20c169833df7d5a176530bf19e65813.exe
    "C:\Users\Admin\AppData\Local\Temp\d20c169833df7d5a176530bf19e65813.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
      "C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1300
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1592
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:1144
  • C:\Windows\system32\netsh.exe
    netsh wlan show profiles
    1⤵
      PID:2380
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {ABB2A3E0-7DE9-4247-81E2-9B0DEFCFE929} S-1-5-21-2185821622-4133679102-1697169727-1000:QHCIVBOB\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2036
      • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\185821622413

      Filesize

      1KB

      MD5

      cc56b4618c66a47525ae8dea58691c41

      SHA1

      52a5109572e33536c2503e1d4f623ffdf1d646c0

      SHA256

      27fa9e4c52abc7b9de14bffa1ac15bba5cd578cf91a0c5939fdedb88b5e68740

      SHA512

      5abe38bb9c5d0da9800c91f7ac5e51d5d0e6e5f68416046f8ca3fb7efdcda53e4603259a7250a9628af47a5dade8627a2f3ac5150bc4c548bf9824f1a5cd951a

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      108KB

      MD5

      f0d46327bd2d38ae7dadb938e2fb6af4

      SHA1

      57f0a6065d73f0272cc2f958382e4e34beea0a88

      SHA256

      fa5c79b2ade7af9ab9581fc6512bbb709d423c507cd12da34da505c25c55ca89

      SHA512

      e4b01f0a231df2aa7fb64d65b074f648164831ce8185f2ae0f7027ea925982a10f101aa048a6de2e998a590a7e543972e29f519ab839a72c3b6bc632edffc505

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      1KB

      MD5

      9b584e0807d2d1ffc735c62ce44f54ab

      SHA1

      8a6d3ad5cd5447b83418cffc2762a552183aa919

      SHA256

      aff501d76cd355ed3264b1432e2e114a530bdae2b106c8e03561cc603dd69bb8

      SHA512

      babc5cbc96006e4b9422e9a0774f03d0fea82f52c828f0b3d4403a4431f815aed7d698686879bc9e517ed6bfb065ef894e7aa5f41d5edde3dac22abb294d0730

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      156KB

      MD5

      9ef1f19f6f2584e2a2158ca0c025a2b8

      SHA1

      c9533b96c3d787d79a83a48550d2b8049dbe85b2

      SHA256

      359516202e96030945fd3a11ddf965e92f56d4e311ec64b07b2d3809008a365f

      SHA512

      4055a8356854716ad4395568d2821cd9ecbfc70118162824fd41cf3539e26f5cdfd9c42efcd1f12dd3d5f02229299ef94bb068c91e42132f48e369f35b27a1e6

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      338KB

      MD5

      1b323cc5d3baa899a8bbbcd0e474cd74

      SHA1

      20e40e20bcf60489821410610881a419e494005b

      SHA256

      989c578a90ee14cbdac002c22a6f0e0086a69e7f29397385a0083e40bc316e1e

      SHA512

      75927cf0cd4e608087a938ff6ceee08e2d8ee992965382eecb5dddded8a603ae882b5bc3a7d3daefe2a80c75e7505ec51fbfb9e5930bdde9e32b0b43ad312c9c

    • C:\Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      280KB

      MD5

      0fe66a99322a389e8133df67e41ec5d8

      SHA1

      5c00abe27eb20123a9543e15c5aeb5e5f6014ec2

      SHA256

      a1bdee2545b73840e8fe7e661b7002a407434f43ab7f0fdd6d6ca1735168820b

      SHA512

      73e25e721f8aeac3d063a995a7b0299cfe4e5a5197be2b9c703325427c411a058c037f289073ab9dd6ef707c9bfb222e9d66ee46b107e2d8016e462125da4510

    • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

      Filesize

      95KB

      MD5

      84bdb166053be79e45ae0ea46c73a622

      SHA1

      9c0d28812cb13f21c8f2f590451584849fc8e8b8

      SHA256

      fcf9fdebacfe5a2dd1b4561bb61304300e3b53bcb1c295f1597edd679019afff

      SHA512

      db95b93c7d7905b2b7899880c738f56eb54fb102e0ff6f457cf5f2f7d59c1a73a95ff42c467a99327dc9f40038945d9fe9bd87a808b1e7274007c24efa4ceb4d

    • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

      Filesize

      47KB

      MD5

      d6265ce22cc1f5536b1a93940d2c11e4

      SHA1

      8b4b37033d3c2d457eca5d2ef46cf89a4ae70a84

      SHA256

      58ba0694e8c7366828f72ef0760daf4cb6655226c5b9883c0893e1b0c0924713

      SHA512

      36c575e5f8e9fd3ce4faeb9922d83443feb25a6ca2f20761ad55e9f0f49ee38091e54d005ee005d6d42d7b15bc4c1df00a2c8b8802a8a9374fed933126deeac2

    • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      196KB

      MD5

      3f8eedcab442e1668966f13f1bf2a855

      SHA1

      639f66b0518023459506c69e0476281abd779b21

      SHA256

      042e5cdda36d94b4a859371427e1a881c6cbd8abbb569e0792259421c1e6bf0b

      SHA512

      fc6ebe242b8f6f13fde1150ad116d1559d9dd76c07d402e1a212d5a202ded392eb87be6186afc63df6baaa2a7f3f9191856df06b42d6d21cabdec74d5d835cb6

    • C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      26KB

      MD5

      9fb84879e539d83e8fa3073c5891ada1

      SHA1

      437140dbc69acfdb0d201053ce91211efdb38621

      SHA256

      834ae3da29440531611a12b964d5d0308ddf42b7476d23c3e01ababbb4fde31d

      SHA512

      a4e5b605fc47b085256894770c2563a6962c8db38c72d51df88cd163c6d9ac7f75798db1411df577270b013f22440ee025d74f3767bf0943c6851bd47e08088c

    • \Users\Admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe

      Filesize

      265KB

      MD5

      39533b2871d35267591b62748e183936

      SHA1

      cb722727411d2c9165cb7961e9de5ba898d82173

      SHA256

      f56ba1e8b553fe835eb76c2235b5cfe6f17001d0254e1b1fd5d59e50272fd16e

      SHA512

      c8778baabf4def5c56197d3f3622f7d19c9b0872442d7b439e800a3ca8f73f66dc74f166be4e53c376fd1dcc98132f74f0ea4cf51aa59ed053e8004043480ace

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

      Filesize

      102KB

      MD5

      c06513af505f65393b4ebcd2a11a2ee4

      SHA1

      6e9e8a6b93fc9afbcc781790881d821b0bfb0821

      SHA256

      f5d35a2366cf13312a30c9384f1ac30d9dc9ced46fa6b1b9c2d0621493cc2495

      SHA512

      b90b8dc0571b2dde83c5ceaa4f12f203973bc2049663c0a840fa20a900bc7018f1f392f10273a607e816ccaf8a2b4f70bbc30b354437a2c9aecf5626b7c0a5ce

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

      Filesize

      61KB

      MD5

      86992bf4ac67115493cce6f5319e9979

      SHA1

      0029e5a0b18bcbdad99917a069a48303b49ca9e9

      SHA256

      b03e282a053dc0b3d49bd1da03125755edfbac97a7821b9237f5b535fb0f1501

      SHA512

      db3f0e25e68c19280fd3a7a5b9f3108bd710ea296a0a5e168abea5dd514d4f19a0b23fbc27a64f5d08ce2c45cc441b4141066247fcc2afa20846b363db534345

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

      Filesize

      77KB

      MD5

      8247d27cec7e6b460516f6f30ab6cff1

      SHA1

      a0f2e8252c37e9fd10591ba1780dd7dc518fed4a

      SHA256

      833a5277b68f31ee69d7de4e8db6ccfc0af0701742f410b962f4bba74a940fda

      SHA512

      d5ba7c77c3ca0cfbd831dbd2e2dad842bed0a5af6dd1d1a2403d8fb4d7db34544e8839cda048ae77ab4f6c8dc5e12de6cf8ea132ea93339a603072b20cef14f6

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll

      Filesize

      101KB

      MD5

      0e9755db25c7e4d966744033db10f252

      SHA1

      4aa4e902faab9c5cbbce84bf5815bdd2f19d278d

      SHA256

      a22afaa8127fd129ef121f4a673a9887f5d19d364477424ac2fc476774f345ae

      SHA512

      885e1594bfc6d0732d1ea048fb52f2740358e75a8b09d0d78eda7e45a919000f6e61c3c4ee3f6edfe9cccbfeded132f42dd12b48f6fe8565af96c5d1123b7cc2

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      79KB

      MD5

      2dc9bf7477f8566d65714eb60293d230

      SHA1

      0090d76f821f70e1e06bcc0e3538d5ce79795887

      SHA256

      f722c25875ebf2a51cc6e1572a791905f17d171e74530522c85e769067b58e0c

      SHA512

      ed81ce903beeb338af78fdc03d76675ca026a356e0f405035a27f1d390780368f6ae63922432a642ea4a3684fee6383fdc6a22f997e2cb741ed8924a00cf737b

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      113KB

      MD5

      840337ca7fd9724c3c077345abbb193c

      SHA1

      e51a0a5b8f5d5b04a3b84c70e822513d701cafcc

      SHA256

      dc95694d25b6f39df3d977928ea7b6e36f39adb6a76b9023264c8d9030c7bcad

      SHA512

      3c2c60482f5b648b55f9e65f20a5b5dffb245bcf46818a5c511385fcf4958ee167d375b1e6d4ba7d3452a562b2a03c9b2852685ac8472fb07008ac68095ef5c3

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      118KB

      MD5

      a9f64ed5a2724ce25e3f12cdbc8a302a

      SHA1

      f006678c8ccef4bd678018329532caabe959c7a6

      SHA256

      c6a5813c24e8b49392c60e8b5957d324abc69364496ddf212a306e8d6b39d82d

      SHA512

      f738f2427a0a75981cc8a5a3d792d26c34233285bb895b09c132e7d54b1090712694d897ae2e5be48a1bc5a645714833e9390b46236d9007214b31d04ac3aaeb

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      64KB

      MD5

      d5df69385ebb80d50e8a1e93b8f6af63

      SHA1

      4b3e0fa37d8b5d5daae94faddf2aedec223dcecf

      SHA256

      8856aee74d0191ba85b6edba563da10c2847cd6a769528e26a524b11079c7ef0

      SHA512

      4d05bfba9caa11bdd16bc52e21343b1a4824f21223c9e8a351e83473731e10797fc6ec093b1cbf30ff3007745237669e82e8765dc5f732596c7937903d1232bf

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      28KB

      MD5

      9448be632ae881b6a2bec0973d17a09b

      SHA1

      88c504e582e558da9de569e1ac074d580b181e1f

      SHA256

      fc27aec7d72a99af90dc197c0fe4fa7e2520126d806cc4b5488a64fb00650ea3

      SHA512

      41498495a92ad7157df576ab6d22af3fd68128f605e54297dc0ce040e3e130430f86d12febb65922ed6cbcbfdacf466f5f827fc37909fdd354e408ce7ed3580a

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      69KB

      MD5

      fbbeb134cddd7a49644396ec73f0f07b

      SHA1

      6fef9bc045ca6587053998d2e54ecb7167680f90

      SHA256

      f2442b1f852da6ab33d84b975ca39a3e9c24434eeda67b83133e3369a5db89c7

      SHA512

      2802e2f34e19068160a8c9cce6c4c4a2a65e68490c39d4ad51aa0ba556efe9b751bd135f7a64e003538036b80d9a809860461723bf31717b94c31d0ea3190fb8

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      41KB

      MD5

      9f4f0701bd61700e4f489cb5fed128eb

      SHA1

      49ec802547559daeb54a7a650f12b9b01af9ec8f

      SHA256

      702a2bf1a6b15469214a40997aeb977208cd0f5855042009cbc68fa5ed81775c

      SHA512

      d121634ede3136aecc4e1c2412ce181d2ac9e78425e38797b07c66bd5cdb8a594f357c7efb93297f5bd2bd4587e6d4a6aee7e1ad7b5cf5563b8fd1232a5186aa

    • \Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll

      Filesize

      77KB

      MD5

      ca2fce892ba64c0523a57bc2cba4dddb

      SHA1

      31bf2ff3b6d1925422884801c457bfc7fc1cab2a

      SHA256

      a4fe90c077ed90c657a9a6a6a8cef5e360e92413a141a7827c7cf391398e6b79

      SHA512

      1c4d6186748c839b73178a6ad9cc1c0dc576219a9021fe5cadf007d33cf6e52eba66ec064c465f52136162a9d18f222a185da185ff34f302942d309ec5f6b767

    • memory/2036-236-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-242-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-228-0x0000000077140000-0x0000000077187000-memory.dmp

      Filesize

      284KB

    • memory/2036-229-0x0000000077140000-0x0000000077187000-memory.dmp

      Filesize

      284KB

    • memory/2036-230-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-214-0x00000000008B0000-0x000000000186A000-memory.dmp

      Filesize

      15.7MB

    • memory/2036-233-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-189-0x00000000008B0000-0x000000000186A000-memory.dmp

      Filesize

      15.7MB

    • memory/2036-238-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-227-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-244-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-245-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-247-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-249-0x00000000008B0000-0x000000000186A000-memory.dmp

      Filesize

      15.7MB

    • memory/2036-248-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-240-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2036-235-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-39-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-44-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-69-0x00000000055E0000-0x000000000659A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-68-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-72-0x0000000077140000-0x0000000077187000-memory.dmp

      Filesize

      284KB

    • memory/2068-71-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-46-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-51-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-50-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-59-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-58-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-54-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-55-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-57-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-56-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-53-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-52-0x0000000077C40000-0x0000000077C42000-memory.dmp

      Filesize

      8KB

    • memory/2068-47-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-49-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-48-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-45-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-43-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-42-0x0000000077140000-0x0000000077187000-memory.dmp

      Filesize

      284KB

    • memory/2068-41-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-40-0x0000000077140000-0x0000000077187000-memory.dmp

      Filesize

      284KB

    • memory/2068-38-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2068-11-0x0000000000150000-0x0000000000151000-memory.dmp

      Filesize

      4KB

    • memory/2068-14-0x0000000000160000-0x0000000000161000-memory.dmp

      Filesize

      4KB

    • memory/2068-19-0x0000000000170000-0x0000000000171000-memory.dmp

      Filesize

      4KB

    • memory/2068-24-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/2068-26-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/2068-29-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2068-31-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2068-21-0x0000000000170000-0x0000000000171000-memory.dmp

      Filesize

      4KB

    • memory/2068-16-0x0000000000160000-0x0000000000161000-memory.dmp

      Filesize

      4KB

    • memory/2068-7-0x0000000000150000-0x0000000000151000-memory.dmp

      Filesize

      4KB

    • memory/2068-9-0x0000000000150000-0x0000000000151000-memory.dmp

      Filesize

      4KB

    • memory/2068-6-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2068-4-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2068-3-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2068-1-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/2068-0-0x0000000000B80000-0x0000000001B3A000-memory.dmp

      Filesize

      15.7MB

    • memory/2796-113-0x0000000077140000-0x0000000077187000-memory.dmp

      Filesize

      284KB

    • memory/2796-158-0x00000000008B0000-0x000000000186A000-memory.dmp

      Filesize

      15.7MB

    • memory/2796-157-0x00000000008B0000-0x000000000186A000-memory.dmp

      Filesize

      15.7MB

    • memory/2796-167-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-170-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-169-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-168-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-166-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-165-0x0000000077140000-0x0000000077187000-memory.dmp

      Filesize

      284KB

    • memory/2796-171-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-111-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-115-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-120-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-126-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-130-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-129-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-127-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-124-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-123-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-121-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-118-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-117-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-114-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-112-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-110-0x0000000075760000-0x0000000075870000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-77-0x00000000008B0000-0x000000000186A000-memory.dmp

      Filesize

      15.7MB

    • memory/2796-78-0x0000000000090000-0x0000000000091000-memory.dmp

      Filesize

      4KB

    • memory/2796-81-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB

    • memory/2796-83-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB

    • memory/2796-86-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2796-88-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2796-91-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2796-93-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2796-75-0x0000000000090000-0x0000000000091000-memory.dmp

      Filesize

      4KB

    • memory/2796-70-0x00000000008B0000-0x000000000186A000-memory.dmp

      Filesize

      15.7MB