Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    749s
  • max time network
    779s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    19/03/2023, 14:15

General

  • Target

    add_attack.zip

  • Size

    20.4MB

  • MD5

    580e4b67d15856343fdf60ad011da65c

  • SHA1

    c40ffb955bee114d87bfc7306a0271e31c9e7347

  • SHA256

    1055458a8ee3ee7724fd82ca27387523cb1d0d1733ac8cceaf99fab47e35d105

  • SHA512

    2d5adc8d3146a6de809c79c9de59db4cf12209cda1bdc059339d330a47da4e0347fc0205df4c81456909e34464959c6a2c4362b8bfdcaa8b9288e5505d156ef6

  • SSDEEP

    393216:e+j0yu69ioV7WtMGJFVJzYooRWgaMoU/Y/X1X+CQ821nFEpqpSQVL:LoErGJhUPWeoX1g821F3N

Malware Config

Extracted

Family

laplas

C2

http://185.106.92.104

Attributes
  • api_key

    bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\add_attack.zip
    1⤵
      PID:5024
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3748
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\add_attack\" -spe -an -ai#7zMap8062:78:7zEvent2096
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3428
      • C:\Users\Admin\Desktop\add_attack\goland.exe
        "C:\Users\Admin\Desktop\add_attack\goland.exe"
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:3872
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:4584
      • C:\Users\Admin\Desktop\add_attack\neee.exe
        "C:\Users\Admin\Desktop\add_attack\neee.exe"
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
          "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:3864
      • C:\Users\Admin\Desktop\add_attack\Slava.exe
        "C:\Users\Admin\Desktop\add_attack\Slava.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4612
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\Desktop\add_attack\Slava.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2136
          • C:\Windows\system32\choice.exe
            choice /C Y /N /D Y /T 0
            3⤵
              PID:2852
        • C:\Users\Admin\Desktop\add_attack\cockkieeAC.exe
          "C:\Users\Admin\Desktop\add_attack\cockkieeAC.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4032
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\Desktop\add_attack\cockkieeAC.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2680
            • C:\Windows\system32\choice.exe
              choice /C Y /N /D Y /T 0
              3⤵
                PID:2560
          • C:\Users\Admin\Desktop\add_attack\goland.exe
            "C:\Users\Admin\Desktop\add_attack\goland.exe"
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:1484
          • C:\Users\Admin\Desktop\add_attack\neee.exe
            "C:\Users\Admin\Desktop\add_attack\neee.exe"
            1⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1900
            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
              "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:4460

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1IYUAPIF\online[1].txt

            Filesize

            2B

            MD5

            444bcb3a3fcf8389296c49467f27e1d6

            SHA1

            7a85f4764bbd6daf1c3545efbbf0f279a6dc0beb

            SHA256

            2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df

            SHA512

            9fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YYL8D8JJ\regex[1].txt

            Filesize

            633B

            MD5

            c5298d2c78be8fdfc264eb6fe3e275f8

            SHA1

            f09de5f443da081efaff0155f422ca0375edd164

            SHA256

            de32b3c0549fde0dc5ac435a89f16a87832a0632b6602e75f552d07074081577

            SHA512

            5aeb5013b00e13cd8a172639bc7c675bd06cc0473ae9844c9c324e5c322987ddeff986bd4a8e620ce0ca9d1098a3ee8bbb4802789d1e89b0ec0cecf2f55a4853

          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

            Filesize

            781.6MB

            MD5

            9f11482b0f8072a87f4d9edd3ba8fcc2

            SHA1

            6c377d6a96980ad2bf3e21667c282be7adb5ebef

            SHA256

            58d15bd143d431fdfb3e805398c700e81a3f5d48ce100f07041fea1af12b97b3

            SHA512

            a4e5ced1cf488485bc462764b250b2d0420f1016ec25eec75f64f96d9f55d3c4aa9fc1ba4db6925319043e17ad939b82b2f52e3a6494f969574ef2b1a4a16015

          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

            Filesize

            781.6MB

            MD5

            9f11482b0f8072a87f4d9edd3ba8fcc2

            SHA1

            6c377d6a96980ad2bf3e21667c282be7adb5ebef

            SHA256

            58d15bd143d431fdfb3e805398c700e81a3f5d48ce100f07041fea1af12b97b3

            SHA512

            a4e5ced1cf488485bc462764b250b2d0420f1016ec25eec75f64f96d9f55d3c4aa9fc1ba4db6925319043e17ad939b82b2f52e3a6494f969574ef2b1a4a16015

          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

            Filesize

            787.3MB

            MD5

            a4009d992b3a99c9a8f35cad179c98ed

            SHA1

            41895ecc227dc6ed0340c3c84216c09ce9a8961e

            SHA256

            a131120dbb6c9bee78167ab64ad7fb79b37436d84a40808edc21895464bbf5a5

            SHA512

            18e654bb2e9cc1707200f8ed533a72827d9a4e093bb710f89ce337fe532fc94b78cfdd149025726e0a9179955756a52a270ace48692ab13e4b68434654933e31

          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

            Filesize

            787.3MB

            MD5

            a4009d992b3a99c9a8f35cad179c98ed

            SHA1

            41895ecc227dc6ed0340c3c84216c09ce9a8961e

            SHA256

            a131120dbb6c9bee78167ab64ad7fb79b37436d84a40808edc21895464bbf5a5

            SHA512

            18e654bb2e9cc1707200f8ed533a72827d9a4e093bb710f89ce337fe532fc94b78cfdd149025726e0a9179955756a52a270ace48692ab13e4b68434654933e31

          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

            Filesize

            787.3MB

            MD5

            a4009d992b3a99c9a8f35cad179c98ed

            SHA1

            41895ecc227dc6ed0340c3c84216c09ce9a8961e

            SHA256

            a131120dbb6c9bee78167ab64ad7fb79b37436d84a40808edc21895464bbf5a5

            SHA512

            18e654bb2e9cc1707200f8ed533a72827d9a4e093bb710f89ce337fe532fc94b78cfdd149025726e0a9179955756a52a270ace48692ab13e4b68434654933e31

          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

            Filesize

            787.3MB

            MD5

            a4009d992b3a99c9a8f35cad179c98ed

            SHA1

            41895ecc227dc6ed0340c3c84216c09ce9a8961e

            SHA256

            a131120dbb6c9bee78167ab64ad7fb79b37436d84a40808edc21895464bbf5a5

            SHA512

            18e654bb2e9cc1707200f8ed533a72827d9a4e093bb710f89ce337fe532fc94b78cfdd149025726e0a9179955756a52a270ace48692ab13e4b68434654933e31

          • C:\Users\Admin\Desktop\add_attack\Slava.exe

            Filesize

            13.9MB

            MD5

            1fa21564b4463aa7a564a20fa00dafba

            SHA1

            44d44ad94ede70ae8bdf75ea18660911f5a22915

            SHA256

            f9c21532868a2cd3cbeaa22f92c237cb73bff27d73fc49716d81c89eedb72be9

            SHA512

            2467c316ca826f757c0eae92a295ac9e3d4cde38936f480fdbaea1fbaa933c298c4d3ac7ca361f20c246c768591f02b8a6c18c4064780803585d1b7cbf914abf

          • C:\Users\Admin\Desktop\add_attack\Slava.exe

            Filesize

            13.9MB

            MD5

            1fa21564b4463aa7a564a20fa00dafba

            SHA1

            44d44ad94ede70ae8bdf75ea18660911f5a22915

            SHA256

            f9c21532868a2cd3cbeaa22f92c237cb73bff27d73fc49716d81c89eedb72be9

            SHA512

            2467c316ca826f757c0eae92a295ac9e3d4cde38936f480fdbaea1fbaa933c298c4d3ac7ca361f20c246c768591f02b8a6c18c4064780803585d1b7cbf914abf

          • C:\Users\Admin\Desktop\add_attack\cockkieeAC.exe

            Filesize

            13.9MB

            MD5

            50f31873c5df2e169f1ec5ebab8ba2c3

            SHA1

            43dfd3859c1763ced1eee0d0ea934a76aaa0fd4e

            SHA256

            adcf0ee814651b8a561d827d7ecc7a9aee660a950511c1ffae7d16f426f8de14

            SHA512

            f5e408bcab7318edc079d553000f1110c0376ed1a0e11360280c99ec416a588d19ab5a0ed2ae33abc9746f7974d2f6c6c2ed53bca8fc51c890b813b9db9251ca

          • C:\Users\Admin\Desktop\add_attack\cockkieeAC.exe

            Filesize

            13.9MB

            MD5

            50f31873c5df2e169f1ec5ebab8ba2c3

            SHA1

            43dfd3859c1763ced1eee0d0ea934a76aaa0fd4e

            SHA256

            adcf0ee814651b8a561d827d7ecc7a9aee660a950511c1ffae7d16f426f8de14

            SHA512

            f5e408bcab7318edc079d553000f1110c0376ed1a0e11360280c99ec416a588d19ab5a0ed2ae33abc9746f7974d2f6c6c2ed53bca8fc51c890b813b9db9251ca

          • C:\Users\Admin\Desktop\add_attack\goland.exe

            Filesize

            2.6MB

            MD5

            fc6d40512829e36687854cb0118a5a1e

            SHA1

            cf801f9dad93b5ebbcef79b093b034b45aa75a1e

            SHA256

            58c0d2f945207a56f5baefbb320d7ddbd01089205025de05133db173281e65e2

            SHA512

            8545d6e56ab77e28e416b013a2836307616d8c00dc26216c35fba8bc1ec0b8c8503f8d7cb55e8dd1d5aaa08875e9172f7259082a4f6756c4722be9c4e3f96e6f

          • C:\Users\Admin\Desktop\add_attack\goland.exe

            Filesize

            2.6MB

            MD5

            fc6d40512829e36687854cb0118a5a1e

            SHA1

            cf801f9dad93b5ebbcef79b093b034b45aa75a1e

            SHA256

            58c0d2f945207a56f5baefbb320d7ddbd01089205025de05133db173281e65e2

            SHA512

            8545d6e56ab77e28e416b013a2836307616d8c00dc26216c35fba8bc1ec0b8c8503f8d7cb55e8dd1d5aaa08875e9172f7259082a4f6756c4722be9c4e3f96e6f

          • C:\Users\Admin\Desktop\add_attack\goland.exe

            Filesize

            2.6MB

            MD5

            fc6d40512829e36687854cb0118a5a1e

            SHA1

            cf801f9dad93b5ebbcef79b093b034b45aa75a1e

            SHA256

            58c0d2f945207a56f5baefbb320d7ddbd01089205025de05133db173281e65e2

            SHA512

            8545d6e56ab77e28e416b013a2836307616d8c00dc26216c35fba8bc1ec0b8c8503f8d7cb55e8dd1d5aaa08875e9172f7259082a4f6756c4722be9c4e3f96e6f

          • C:\Users\Admin\Desktop\add_attack\neee.exe

            Filesize

            7.3MB

            MD5

            99f16ab6ab670935b5aa5c84b1b5f6bd

            SHA1

            59f375481cdfe246d1ddcaada9941e16dcfda297

            SHA256

            348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057

            SHA512

            845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70

          • C:\Users\Admin\Desktop\add_attack\neee.exe

            Filesize

            7.3MB

            MD5

            99f16ab6ab670935b5aa5c84b1b5f6bd

            SHA1

            59f375481cdfe246d1ddcaada9941e16dcfda297

            SHA256

            348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057

            SHA512

            845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70

          • C:\Users\Admin\Desktop\add_attack\neee.exe

            Filesize

            7.3MB

            MD5

            99f16ab6ab670935b5aa5c84b1b5f6bd

            SHA1

            59f375481cdfe246d1ddcaada9941e16dcfda297

            SHA256

            348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057

            SHA512

            845e76e29adb6b7890a3a5c508e27b9731e9872bc791eeefb146b23e0e737280d19e4df1203b719f8e168a8c8a0d8ae1b4bf670da5d264bde1eece8663624d70

          • memory/1484-228-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1484-222-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1484-223-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1484-218-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1484-224-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1484-225-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1484-226-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1484-227-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1484-229-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/1780-161-0x0000000002D10000-0x0000000002D11000-memory.dmp

            Filesize

            4KB

          • memory/1780-158-0x00000000007B0000-0x00000000007B1000-memory.dmp

            Filesize

            4KB

          • memory/1780-164-0x0000000002D40000-0x0000000002D41000-memory.dmp

            Filesize

            4KB

          • memory/1780-165-0x00000000007D0000-0x000000000134B000-memory.dmp

            Filesize

            11.5MB

          • memory/1780-157-0x00000000006C0000-0x00000000006C1000-memory.dmp

            Filesize

            4KB

          • memory/1780-162-0x0000000002D20000-0x0000000002D21000-memory.dmp

            Filesize

            4KB

          • memory/1780-160-0x0000000002D00000-0x0000000002D01000-memory.dmp

            Filesize

            4KB

          • memory/1780-163-0x0000000002D30000-0x0000000002D31000-memory.dmp

            Filesize

            4KB

          • memory/1780-159-0x00000000007C0000-0x00000000007C1000-memory.dmp

            Filesize

            4KB

          • memory/1900-233-0x0000000001750000-0x0000000001751000-memory.dmp

            Filesize

            4KB

          • memory/1900-236-0x0000000001780000-0x0000000001781000-memory.dmp

            Filesize

            4KB

          • memory/1900-230-0x00000000013F0000-0x00000000013F1000-memory.dmp

            Filesize

            4KB

          • memory/1900-232-0x0000000001720000-0x0000000001721000-memory.dmp

            Filesize

            4KB

          • memory/1900-234-0x0000000001760000-0x0000000001761000-memory.dmp

            Filesize

            4KB

          • memory/1900-235-0x0000000001770000-0x0000000001771000-memory.dmp

            Filesize

            4KB

          • memory/1900-238-0x00000000007D0000-0x000000000134B000-memory.dmp

            Filesize

            11.5MB

          • memory/1900-237-0x0000000001790000-0x0000000001791000-memory.dmp

            Filesize

            4KB

          • memory/1900-231-0x0000000001710000-0x0000000001711000-memory.dmp

            Filesize

            4KB

          • memory/3864-187-0x0000000001150000-0x0000000001151000-memory.dmp

            Filesize

            4KB

          • memory/3864-192-0x0000000000260000-0x0000000000DDB000-memory.dmp

            Filesize

            11.5MB

          • memory/3864-188-0x0000000001160000-0x0000000001161000-memory.dmp

            Filesize

            4KB

          • memory/3864-190-0x0000000001180000-0x0000000001181000-memory.dmp

            Filesize

            4KB

          • memory/3864-191-0x0000000002D10000-0x0000000002D11000-memory.dmp

            Filesize

            4KB

          • memory/3864-189-0x0000000001170000-0x0000000001171000-memory.dmp

            Filesize

            4KB

          • memory/3864-186-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

            Filesize

            4KB

          • memory/3864-184-0x0000000000250000-0x0000000000251000-memory.dmp

            Filesize

            4KB

          • memory/3864-185-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

            Filesize

            4KB

          • memory/3872-154-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-156-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-149-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-150-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-151-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-179-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-200-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-152-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-153-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-171-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/3872-155-0x00000000000C0000-0x00000000008FF000-memory.dmp

            Filesize

            8.2MB

          • memory/4032-168-0x0000000000510000-0x000000000135F000-memory.dmp

            Filesize

            14.3MB

          • memory/4460-254-0x0000000001220000-0x0000000001221000-memory.dmp

            Filesize

            4KB

          • memory/4584-201-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-212-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-209-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-205-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-204-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-203-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-208-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-202-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-210-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-206-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-214-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-211-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-216-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-207-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4584-215-0x0000000000DA0000-0x00000000015DF000-memory.dmp

            Filesize

            8.2MB

          • memory/4612-169-0x0000000000210000-0x000000000105F000-memory.dmp

            Filesize

            14.3MB