Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 01:00

General

  • Target

    e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe

  • Size

    1.8MB

  • MD5

    a2d097eb8d28f2d5c1b1cdbec83220f4

  • SHA1

    3bb1449483a2c97ff759d51059be98c71d1bb6b5

  • SHA256

    e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770

  • SHA512

    55faec6aec40afa092cd904ae0ddd361d023a7232b37e4e0d7e5f4ffecebbb166e0d3127add2885cb1650de45d8ac2923e8521361fe7ec9c22434e3ed6f8a0d9

  • SSDEEP

    49152:PLos/o9N1nYGWxojwYiJ+vdUz643UU7DhVxxRBmQN:Toh1nCozvdUzD3ddVPRBmQ

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

risepro

C2

77.91.77.66:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe
    "C:\Users\Admin\AppData\Local\Temp\e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3612
      • C:\Users\Admin\AppData\Local\Temp\1000016001\9b87256fdb.exe
        "C:\Users\Admin\AppData\Local\Temp\1000016001\9b87256fdb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3816
      • C:\Users\Admin\AppData\Local\Temp\1000017001\0d12de27bd.exe
        "C:\Users\Admin\AppData\Local\Temp\1000017001\0d12de27bd.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
          4⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:5060
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffe405ab58,0x7fffe405ab68,0x7fffe405ab78
            5⤵
              PID:2476
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:2
              5⤵
                PID:4388
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:8
                5⤵
                  PID:992
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:8
                  5⤵
                    PID:5124
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3136 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:1
                    5⤵
                      PID:5224
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:1
                      5⤵
                        PID:5252
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4408 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:1
                        5⤵
                          PID:5648
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:8
                          5⤵
                            PID:5880
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3524 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:8
                            5⤵
                              PID:5956
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4752 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:8
                              5⤵
                                PID:5972
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2416 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:2
                                5⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4816
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4084,i,10925946972013221578,8820669985803190952,262144 --variations-seed-version --mojo-platform-channel-handle=3928 /prefetch:8
                        1⤵
                          PID:4700
                        • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                          C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4568
                        • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                          1⤵
                            PID:5312
                          • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                            C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5496
                          • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                            C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4332

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            216B

                            MD5

                            5f02d5c993fce135fed791a777420fd4

                            SHA1

                            44c629ed4d9da6668661f10ccf1fd01f3bc22cba

                            SHA256

                            922add3137191d9b2a720ad5b82a93bbec5b358df4c0f994044f5d398a93344d

                            SHA512

                            ad431ce0e16755b635ea3a8d3d8ec31459a377cf0996b5db8c6d19b79b9a00199108902516f6c0382e0a59946c1765c1735608e73782ed9416db1eef8c419d4f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            f01dc9dffa442b0e3cce8e43e80f75dc

                            SHA1

                            a56507d3a8e88d5d51c546f58cd926bf56f311a3

                            SHA256

                            03327b020aeffb7950687e75c51eda7811386dd50f7563690ad628027702cffd

                            SHA512

                            6f1de544c7eea9e8fe6c106c9025d2c5ff556918c9451e87315a1247aeae7cb8a1648bc07f47fb506e0b54f1ab424b261d60a1ae857a9807c1d19e15d0749343

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            692B

                            MD5

                            dc66b3002a3036b80e444f34865eacab

                            SHA1

                            94bbbc10d25bd953dce388042fbbda0688700817

                            SHA256

                            6913b40ac82951826424320dfc2c0543374a28d95acca0dc1103ea8fc1db3b56

                            SHA512

                            de39146d9cec7d32c773c0201c89f93211043c66cd7eb1de5813f65929de3f3f57d454ddb0443443bfb6ba6b5e44a11af6a8ad0b3dc3044d5db610573a4f58df

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            7KB

                            MD5

                            ba30a27d545573b32bd0ec3a36c3093f

                            SHA1

                            5ff79d21e01f285cdb376ef253f63b1734ca285d

                            SHA256

                            3993e8a478ad86128a93abc398e025c355f59e033678852eb2f9e8c367da92a5

                            SHA512

                            47d4c5b3e716fcd01c0e5808d70a2bae3d7ac8c070447a9a12cd8fbc15655a222f6309894360fb3dbafe9a91c7394d2deed36a8df0cc90d3585f2c6a8de2c3cb

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            16KB

                            MD5

                            2ded5194cda7be629f939fa2107280c8

                            SHA1

                            9a961c3efa37aa28f75a918a1a9197517a5f44a7

                            SHA256

                            0dd6a1f92283110dc9ffc7596fd9e2c90fcc73e9ef4bbe9dbe571366857d6e73

                            SHA512

                            ad0c751e289d3bdf2ba550c6366206391a0ddafccdc287ecdd0c8adcafc03f213b5ddcd6dc6b8943127563cdfb4acadaeb4e58a834970ff56fc92dc6357d7db8

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            279KB

                            MD5

                            f0bf81916e3bcad69de03800e8fd2fd0

                            SHA1

                            8623994115e156953dc99afc01be429799fc4cac

                            SHA256

                            bcf9a6c442d0cc019d1c50615b6f4015b1d22bff4947deb4bb03b55f067c4b1f

                            SHA512

                            ca583f31383f7d86a044815eb9d309493956707dd48bb006b32c7533cd24f84a643734d7bb1e296937c1a5a7451dcb32fdeec02c4e95b766465fffe41f411c66

                          • C:\Users\Admin\AppData\Local\Temp\1000016001\9b87256fdb.exe

                            Filesize

                            2.3MB

                            MD5

                            21a7795d5e104aa467feff97c1101232

                            SHA1

                            1e260bed535310421776e546a93b8af866eedbb4

                            SHA256

                            7fc8460e46b1f7c4ae95d5a16a296039ef598abec1765d9e4ee9377af7ab8c65

                            SHA512

                            3976db87fffc2bad13b2f485ddd8970092a03e17d68336451bfee558b3dded2e2db91c5a47916fef9f0aaa3128f1c2801d024bd0928f10c8d4a2bd939855cc31

                          • C:\Users\Admin\AppData\Local\Temp\1000017001\0d12de27bd.exe

                            Filesize

                            2.2MB

                            MD5

                            783d2e1bd21598ace9f11de6a48a87a5

                            SHA1

                            ebc95ad120a60fa2008336f92c9d4176a4129e89

                            SHA256

                            e8e886949270adc21171f3da304ce0fd4374ad184af9f72dc63d1bcced3b0bbe

                            SHA512

                            4fe1e1c40337006349d3c1773c585fe5c7276638f4ee126b1b4f59f79ee9bc0fd3544b7707617d57ed6418a9606bf3e5808c2f8dd20e39bddd1ccf348509a700

                          • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

                            Filesize

                            1.8MB

                            MD5

                            a2d097eb8d28f2d5c1b1cdbec83220f4

                            SHA1

                            3bb1449483a2c97ff759d51059be98c71d1bb6b5

                            SHA256

                            e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770

                            SHA512

                            55faec6aec40afa092cd904ae0ddd361d023a7232b37e4e0d7e5f4ffecebbb166e0d3127add2885cb1650de45d8ac2923e8521361fe7ec9c22434e3ed6f8a0d9

                          • memory/1380-17-0x0000000000690000-0x0000000000B51000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1380-0-0x0000000000690000-0x0000000000B51000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1380-5-0x0000000000690000-0x0000000000B51000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1380-3-0x0000000000690000-0x0000000000B51000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/1380-2-0x0000000000691000-0x00000000006BF000-memory.dmp

                            Filesize

                            184KB

                          • memory/1380-1-0x00000000773F4000-0x00000000773F6000-memory.dmp

                            Filesize

                            8KB

                          • memory/1720-182-0x00000000002F0000-0x0000000000839000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1720-100-0x00000000002F0000-0x0000000000839000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1720-155-0x00000000002F0000-0x0000000000839000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1720-189-0x00000000002F0000-0x0000000000839000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/3612-30-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-31-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-29-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-44-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-47-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-50-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-51-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-49-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-55-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-57-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-52-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-56-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-54-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-53-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-48-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-46-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-45-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-43-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-42-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-41-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-40-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-38-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-34-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-58-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-27-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-24-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-28-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/3612-32-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-33-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-39-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-36-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-37-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3612-35-0x0000000000400000-0x00000000009ED000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-154-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-230-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-203-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-190-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-209-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-80-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-212-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-234-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-232-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-181-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-192-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/3816-228-0x0000000000D20000-0x0000000001307000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/4332-237-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4332-238-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4568-69-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4568-81-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-205-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-20-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-191-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-148-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-147-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-82-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-19-0x0000000000A21000-0x0000000000A4F000-memory.dmp

                            Filesize

                            184KB

                          • memory/4772-211-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-188-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-18-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-227-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-202-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-229-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-21-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-231-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-68-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-233-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-171-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/4772-236-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/5496-208-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB

                          • memory/5496-206-0x0000000000A20000-0x0000000000EE1000-memory.dmp

                            Filesize

                            4.8MB