Malware Analysis Report

2024-09-11 11:14

Sample ID 240618-rtsdmsxeqc
Target 281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8
SHA256 281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8
Tags
amadey 9a3efc trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8

Threat Level: Known bad

The file 281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8 was found to be: Known bad.

Malicious Activity Summary

amadey 9a3efc trojan

Amadey

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Drops file in Windows directory

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-18 14:29

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 14:29

Reported

2024-06-18 14:32

Platform

win7-20240508-en

Max time kernel

142s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe

"C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe"

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 dnschnj.at udp
US 8.8.8.8:53 techolivls.in udp
US 8.8.8.8:53 check-ftp.ru udp
US 8.8.8.8:53 dnschnj.at udp
US 8.8.8.8:53 check-ftp.ru udp
US 8.8.8.8:53 techolivls.in udp
US 8.8.8.8:53 check-ftp.ru udp
US 8.8.8.8:53 dnschnj.at udp
US 8.8.8.8:53 techolivls.in udp

Files

memory/2032-1-0x0000000002500000-0x0000000002600000-memory.dmp

memory/2032-2-0x0000000000220000-0x000000000028B000-memory.dmp

memory/2032-3-0x0000000000400000-0x0000000000470000-memory.dmp

\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

MD5 64baf97c6f6e5e9f70b62e778e0a9d53
SHA1 3dbb898f67a116490c1f951ddce5f8d0b8c2976a
SHA256 281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8
SHA512 625dc7063556613ed4cedf617eb24196bfad56c150d644d5aa634e7e89d1edf9f5747dd7bb094f5903fd19c6ba12eff99869a07ace75bd208e4f3e1b7d25d583

memory/2032-20-0x0000000000400000-0x0000000000470000-memory.dmp

memory/2032-21-0x0000000000400000-0x0000000002397000-memory.dmp

memory/2032-19-0x0000000000220000-0x000000000028B000-memory.dmp

memory/2032-15-0x0000000000400000-0x0000000002397000-memory.dmp

memory/2032-18-0x0000000002500000-0x0000000002600000-memory.dmp

memory/852-27-0x0000000000400000-0x0000000002397000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\680803933149

MD5 a0feafd2a3795ce4cec4debaa1b63498
SHA1 0b9a7cdf81701fb7de944ea9ea75819d82a97ca8
SHA256 ece3063faac64dd8aa00be9a327bd5c325fdb533ab9d2bdaeda3cbb9386dab78
SHA512 af0d6ff1d0680d5fc57a7c6a6b68c2e6639e282fbc5bf2983fad86e13bc07da1a2f16c472c213d340193170c8aba7bf36034fbeae3636f39d9f729a9ef06251a

memory/852-33-0x0000000000400000-0x0000000002397000-memory.dmp

memory/852-39-0x0000000000400000-0x0000000002397000-memory.dmp

memory/852-43-0x0000000000400000-0x0000000002397000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 14:29

Reported

2024-06-18 14:32

Platform

win10v2004-20240508-en

Max time kernel

146s

Max time network

57s

Command Line

"C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe"

Signatures

Amadey

trojan amadey

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe

"C:\Users\Admin\AppData\Local\Temp\281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 756

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 904

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1136

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1148

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1292

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4000 -ip 4000

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1316

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 556

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 576

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 552

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 656

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 692

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 884

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 892

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 896

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 948

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 968

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1004

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1160

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1168

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1176

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1452

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1444

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1444

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1952 -ip 1952

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 440

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 372 -ip 372

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 444

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 2828 -ip 2828

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 900

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3672 -ip 3672

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 448

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 techolivls.in udp
US 8.8.8.8:53 check-ftp.ru udp
US 8.8.8.8:53 dnschnj.at udp
US 8.8.8.8:53 check-ftp.ru udp
US 8.8.8.8:53 dnschnj.at udp
US 8.8.8.8:53 techolivls.in udp
US 8.8.8.8:53 dnschnj.at udp

Files

memory/4000-1-0x00000000025D0000-0x00000000026D0000-memory.dmp

memory/4000-2-0x0000000002520000-0x000000000258B000-memory.dmp

memory/4000-3-0x0000000000400000-0x0000000000470000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

MD5 64baf97c6f6e5e9f70b62e778e0a9d53
SHA1 3dbb898f67a116490c1f951ddce5f8d0b8c2976a
SHA256 281eef04e95527f22c31e7714afd7e2eee1480414ff1c427025c7a39684973a8
SHA512 625dc7063556613ed4cedf617eb24196bfad56c150d644d5aa634e7e89d1edf9f5747dd7bb094f5903fd19c6ba12eff99869a07ace75bd208e4f3e1b7d25d583

memory/2828-16-0x0000000000400000-0x0000000002397000-memory.dmp

memory/2828-17-0x0000000000400000-0x0000000002397000-memory.dmp

memory/4000-20-0x0000000000400000-0x0000000000470000-memory.dmp

memory/4000-19-0x0000000002520000-0x000000000258B000-memory.dmp

memory/4000-18-0x0000000000400000-0x0000000002397000-memory.dmp

memory/2828-25-0x0000000000400000-0x0000000002397000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\337824034273

MD5 2f7da7659a4502cc95e6bab61ffab4d6
SHA1 bcbbbf9f0aed7ec7cdf5a1bd424a5b6ee9a2bb9a
SHA256 8de3da941cd879ec0444cac8f4823c191cfa16535ef0803bc1d6778f96c41c51
SHA512 c50fbddefda6b7c8ed561be6dfe5ca56141785654af196d9384c1bab08775128577b5446c880e9e0005349c7a193b278858a7e38f476e241f5c8ee3f635157b7

memory/2828-32-0x0000000000400000-0x0000000002397000-memory.dmp

memory/1952-33-0x0000000000400000-0x0000000002397000-memory.dmp

memory/2828-42-0x0000000000400000-0x0000000002397000-memory.dmp

memory/372-49-0x0000000000400000-0x0000000002397000-memory.dmp

memory/3672-58-0x0000000000400000-0x0000000002397000-memory.dmp