Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2025, 12:36

General

  • Target

    54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe

  • Size

    2.0MB

  • MD5

    354e5ac5449695bd3e8520e47ba4815e

  • SHA1

    a023339baaea904f78d73c5b440ffa764aa9b6a2

  • SHA256

    54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a

  • SHA512

    ab31ab9d52efb5955003f62ec7d87dd706daf322d154a03bbe3533c385f9802777b1e939b9cfdbe9acd4431e7855907ae0d3c88a89ced8b20fb30a008550d42e

  • SSDEEP

    49152:PyurhZIw1XiVWyvHdT8rXVZJDBw+fsPtoajy/v/FGiLi/0/dN:n0swdTiXBBRsPCRpLiE

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

185.163.204.65:7000

Mutex

SWaSxcOz2FkLWFU7

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Poverty Stealer Payload 1 IoCs
  • Detect Xworm Payload 2 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Povertystealer family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Downloads MZ/PE file 10 IoCs
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe
    "C:\Users\Admin\AppData\Local\Temp\54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4224
      • C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe
        "C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3324
      • C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe
        "C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 856
          4⤵
          • Program crash
          PID:3380
      • C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe
        "C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1968
      • C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe
        "C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1264
      • C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe
        "C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4352
          • C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe
            "C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3124
      • C:\Users\Admin\AppData\Local\Temp\1090673001\83823fe455.exe
        "C:\Users\Admin\AppData\Local\Temp\1090673001\83823fe455.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            5⤵
              PID:4652
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              5⤵
                PID:3976
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              4⤵
                PID:1644
            • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe
              "C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3484
              • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe
                "C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"
                4⤵
                  PID:4168
              • C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe
                "C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1048
              • C:\Users\Admin\AppData\Local\Temp\1091498001\amnew.exe
                "C:\Users\Admin\AppData\Local\Temp\1091498001\amnew.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1052
                • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                  "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                  4⤵
                  • Downloads MZ/PE file
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2732
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:2864
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1208 -ip 1208
            1⤵
              PID:1836
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:1260
            • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
              C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:3344
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:872
            • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
              C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:3036
            • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
              C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
              1⤵
              • Executes dropped EXE
              PID:4416

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe

              Filesize

              5.1MB

              MD5

              515748a93ce7beb3f4416ec66ba8488e

              SHA1

              3ba2f1a56dcc91967361622c56b1ba545cda4325

              SHA256

              a09d49280077ed84d72c5b39977a67155f7bf1bc12615fecb6ec81a0aa2f92a6

              SHA512

              3ce752a103a11b4ef84e6531f4feebcd70f5dfde979e3952709a686fb03e67741d894037406fc23fc5ea3b506d650653a01f3ef48fd7b5a44f79e45c8eb96ffb

            • C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe

              Filesize

              136KB

              MD5

              76a1de8dc8bff924e884ade0a7ac4967

              SHA1

              f9b2ac72407ffdbc2699f3a3292f22a391d5254f

              SHA256

              8c3af9b8fdd734699dd7bd451f0efd5e10da99aadd37ef20b9d98a79ad53c552

              SHA512

              461b29e801ed1980ad8cb07dcf96a652351317592281907d0b773b3bf378df28d1ea3de7bdfc459662c176369b48abcdbac0ef481c389525b00aa91de0f258d8

            • C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe

              Filesize

              1.7MB

              MD5

              356ccfc1d038c4bf5aa960b6d18bc9c5

              SHA1

              3507e3c30b44a318d15b30650744faa1c6c1169b

              SHA256

              bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f

              SHA512

              dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd

            • C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe

              Filesize

              2.8MB

              MD5

              0658a83d9b5dbbc9dd5bf50c1efbbf1a

              SHA1

              6ef596985aa7da0170706e9a0a71a9189534f66c

              SHA256

              567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00

              SHA512

              2751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c

            • C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe

              Filesize

              2.1MB

              MD5

              ebc28b4636ffb2ccd31c069fe4e3153e

              SHA1

              1123d1a5af8b311e66164a4eb9a4a5abf671f47a

              SHA256

              4fca516e363db4103349dbc6807f522060c0d3d9adf1eb9e4459c783b81059d1

              SHA512

              f3d714acb0462b6bc3736fb5349bfab0b76fec39da7934cc79ac8decc8a7fb464afb9e1ac915f96595537ef5e3c803b4a0a31d6a904d0b7233ff160226960e0f

            • C:\Users\Admin\AppData\Local\Temp\1090673001\83823fe455.exe

              Filesize

              6.6MB

              MD5

              6ea2a7f9508369885220226be0fd705d

              SHA1

              030757e8417498cf85867fe46f59ca6b6cf1498f

              SHA256

              6f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478

              SHA512

              7d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e

            • C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe

              Filesize

              2.1MB

              MD5

              d59903af15c5257c5e274b297bec5e6d

              SHA1

              1d84da470c7821a2dbcc9a788e720a4bce32c8c4

              SHA256

              879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d

              SHA512

              2ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c

            • C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe

              Filesize

              173KB

              MD5

              a43d79a6456eefe4bc9fee38bfe7b8f7

              SHA1

              8f8d0183e4ed13ed8ba02e647705b0782ca65061

              SHA256

              94c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047

              SHA512

              7cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093

            • C:\Users\Admin\AppData\Local\Temp\1091498001\amnew.exe

              Filesize

              429KB

              MD5

              22892b8303fa56f4b584a04c09d508d8

              SHA1

              e1d65daaf338663006014f7d86eea5aebf142134

              SHA256

              87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

              SHA512

              852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

              Filesize

              2.0MB

              MD5

              354e5ac5449695bd3e8520e47ba4815e

              SHA1

              a023339baaea904f78d73c5b440ffa764aa9b6a2

              SHA256

              54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a

              SHA512

              ab31ab9d52efb5955003f62ec7d87dd706daf322d154a03bbe3533c385f9802777b1e939b9cfdbe9acd4431e7855907ae0d3c88a89ced8b20fb30a008550d42e

            • C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe

              Filesize

              4.1MB

              MD5

              f1abe4f549ebdf621c51ee73a35d548a

              SHA1

              2e98814bf5f0b37380a210278b12b24bb262433f

              SHA256

              2d10c308f8eb83b56d8491f593dcf492e6a57ddfc66ee285212cfa70482563bd

              SHA512

              da6460bbad6e52f1b81f344397a964512a576d08d7623c1476ec3b7e749a4446117f86c7918bcf45ae42107717aac6a697cb0709da8bee53a7b35abb7d26411b

            • C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe

              Filesize

              2.1MB

              MD5

              817caec31605801a67c847f63ce7bb20

              SHA1

              f023444245b780be58b0c6672a56a7deb8597424

              SHA256

              162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6

              SHA512

              ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936

            • memory/872-340-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/872-338-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/1048-245-0x00000000004B0000-0x00000000004E0000-memory.dmp

              Filesize

              192KB

            • memory/1208-66-0x0000000005090000-0x0000000005634000-memory.dmp

              Filesize

              5.6MB

            • memory/1208-65-0x00000000001E0000-0x0000000000208000-memory.dmp

              Filesize

              160KB

            • memory/1260-159-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/1260-170-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/1264-112-0x0000000000D60000-0x0000000001062000-memory.dmp

              Filesize

              3.0MB

            • memory/1264-110-0x0000000000D60000-0x0000000001062000-memory.dmp

              Filesize

              3.0MB

            • memory/1340-18-0x0000000000781000-0x00000000007E9000-memory.dmp

              Filesize

              416KB

            • memory/1340-4-0x0000000000780000-0x0000000000C32000-memory.dmp

              Filesize

              4.7MB

            • memory/1340-1-0x0000000077AA4000-0x0000000077AA6000-memory.dmp

              Filesize

              8KB

            • memory/1340-2-0x0000000000781000-0x00000000007E9000-memory.dmp

              Filesize

              416KB

            • memory/1340-17-0x0000000000780000-0x0000000000C32000-memory.dmp

              Filesize

              4.7MB

            • memory/1340-3-0x0000000000780000-0x0000000000C32000-memory.dmp

              Filesize

              4.7MB

            • memory/1340-0-0x0000000000780000-0x0000000000C32000-memory.dmp

              Filesize

              4.7MB

            • memory/1696-198-0x0000000005CA0000-0x0000000005D32000-memory.dmp

              Filesize

              584KB

            • memory/1696-200-0x0000000005C70000-0x0000000005C7A000-memory.dmp

              Filesize

              40KB

            • memory/1696-197-0x0000000000D40000-0x00000000013DA000-memory.dmp

              Filesize

              6.6MB

            • memory/1696-199-0x0000000005D40000-0x0000000005DDC000-memory.dmp

              Filesize

              624KB

            • memory/1696-202-0x0000000007E40000-0x0000000007E5A000-memory.dmp

              Filesize

              104KB

            • memory/1696-201-0x0000000005FE0000-0x0000000006006000-memory.dmp

              Filesize

              152KB

            • memory/1696-203-0x0000000007E70000-0x0000000007E76000-memory.dmp

              Filesize

              24KB

            • memory/1968-83-0x00000000009C0000-0x0000000000E04000-memory.dmp

              Filesize

              4.3MB

            • memory/1968-88-0x00000000009C0000-0x0000000000E04000-memory.dmp

              Filesize

              4.3MB

            • memory/2492-287-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/2492-289-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/2492-305-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/2492-327-0x0000000007EE0000-0x0000000007EE6000-memory.dmp

              Filesize

              24KB

            • memory/2492-326-0x0000000007F80000-0x0000000007F9A000-memory.dmp

              Filesize

              104KB

            • memory/2492-303-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/2492-281-0x0000000007750000-0x0000000007A12000-memory.dmp

              Filesize

              2.8MB

            • memory/2492-267-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/2492-318-0x0000000004F30000-0x0000000004F36000-memory.dmp

              Filesize

              24KB

            • memory/2492-283-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/2492-285-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/2492-297-0x0000000000400000-0x00000000004A2000-memory.dmp

              Filesize

              648KB

            • memory/2864-29-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/2864-30-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/2864-31-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/2864-32-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/3036-343-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/3124-168-0x00000000006D0000-0x0000000000B84000-memory.dmp

              Filesize

              4.7MB

            • memory/3124-172-0x00000000006D0000-0x0000000000B84000-memory.dmp

              Filesize

              4.7MB

            • memory/3324-90-0x0000027A2C300000-0x0000027A2C350000-memory.dmp

              Filesize

              320KB

            • memory/3324-85-0x0000027A2BF80000-0x0000027A2C060000-memory.dmp

              Filesize

              896KB

            • memory/3324-87-0x00007FF7C2880000-0x00007FF7C2D3B000-memory.dmp

              Filesize

              4.7MB

            • memory/3324-89-0x0000027A2C280000-0x0000027A2C2A2000-memory.dmp

              Filesize

              136KB

            • memory/3324-91-0x0000027A2C3D0000-0x0000027A2C446000-memory.dmp

              Filesize

              472KB

            • memory/3324-92-0x0000027A13690000-0x0000027A136AE000-memory.dmp

              Filesize

              120KB

            • memory/3324-86-0x0000027A2C060000-0x0000027A2C112000-memory.dmp

              Filesize

              712KB

            • memory/3344-176-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/3344-175-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/4168-250-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/4224-150-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-280-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-19-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-206-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-20-0x0000000000841000-0x00000000008A9000-memory.dmp

              Filesize

              416KB

            • memory/4224-21-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-226-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-22-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-147-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-23-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-249-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-24-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-143-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-26-0x0000000000841000-0x00000000008A9000-memory.dmp

              Filesize

              416KB

            • memory/4224-25-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-178-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-27-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-68-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-111-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4224-93-0x0000000000840000-0x0000000000CF2000-memory.dmp

              Filesize

              4.7MB

            • memory/4352-141-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/4352-269-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/4352-146-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/4352-248-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/4352-149-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/4352-216-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/4352-177-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/4352-205-0x0000000000310000-0x00000000007C4000-memory.dmp

              Filesize

              4.7MB

            • memory/5048-129-0x0000000000A40000-0x0000000000EF4000-memory.dmp

              Filesize

              4.7MB

            • memory/5048-140-0x0000000000A40000-0x0000000000EF4000-memory.dmp

              Filesize

              4.7MB