Analysis

  • max time kernel
    54s
  • max time network
    65s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-03-2023 04:03

General

  • Target

    9e83c3a822bc5253e9b5047fd2ee19abce885852db7afcb70d9b76fc470f69bc.exe

  • Size

    9.6MB

  • MD5

    e38edcf41b7b13dc8837e030774cf083

  • SHA1

    1ed5f18fbc105fd177129f594d63e3297654acff

  • SHA256

    9e83c3a822bc5253e9b5047fd2ee19abce885852db7afcb70d9b76fc470f69bc

  • SHA512

    17021db0c40c5068c1df61e3682cd967fec74a76e661d5967b3950d2a0f2a3a64ea15abcfd21b89223fb541d3561172a0dbdcc2a63694996518e0fde8ced1080

  • SSDEEP

    196608:JGujuxvOMsHXVCFzaixl/CcHsjGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG:JXdP3VC9CcMjGGGGGGGGGGGGGGGGGGGi

Score
10/10

Malware Config

Extracted

Family

aurora

C2

94.142.138.215:8081

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e83c3a822bc5253e9b5047fd2ee19abce885852db7afcb70d9b76fc470f69bc.exe
    "C:\Users\Admin\AppData\Local\Temp\9e83c3a822bc5253e9b5047fd2ee19abce885852db7afcb70d9b76fc470f69bc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c "wmic csproduct get uuid"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3940
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2524
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C "wmic path win32_VideoController get name"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          4⤵
            PID:4748
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "wmic cpu get name"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4744
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic cpu get name
            4⤵
              PID:1196
          • C:\Windows\SysWOW64\cmd.exe
            cmd "/c " systeminfo
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3224
            • C:\Windows\SysWOW64\systeminfo.exe
              systeminfo
              4⤵
              • Gathers system information
              PID:3816
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3112
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4380
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4172
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4164
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:216
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:832
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2420
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1144
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3220
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4648
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2160

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
        Filesize

        2KB

        MD5

        6bf0e5945fb9da68e1b03bdaed5f6f8d

        SHA1

        eed3802c8e4abe3b327c100c99c53d3bbcf8a33d

        SHA256

        dda58fd16fee83a65c05936b1a070187f2c360024650ecaf857c5e060a6a55f1

        SHA512

        977a393fdad2b162aa42194ddad6ec8bcab24f81980ff01b1c22c4d59ac268bb5ce947105c968de1a8a66b35023280a1e7709dfea5053385f87141389ebecb25

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        4b49899d9393df62254f50a0e2e4eaa9

        SHA1

        26e4e848dc6d2c04917b9dc9753d4bbef89b82bc

        SHA256

        ef4c373c5963846210b64abdea84468d058c11b271acf7fcf385033d649fe003

        SHA512

        975cce7dbb8ff4dc76b5249b50ce75e5ab63c85661d400d15aabf18e376cefafd3e938c2aee9dc724f3b80936fd57cb52e17821711b710b319dc5d2a4569c448

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        2f0d3004cbfaa0e4d85aafc0562b0b8a

        SHA1

        a3d766f988c3b8e02422876736d51838a21cd998

        SHA256

        c81f3652453f8bd7ff9d6b9310b34d85a7a48347130ae86daee4b3ce02f237b3

        SHA512

        7353fb3692a4c8305f2da05ad3b3b6a4074c68d970d207f7b1a1b390ecf1305a39ac10870a6e8e3ace7234e77ce897699857a25705d7cb0720f9d17f894b3ae9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        7d01080c8bea97184cc5275ace07d376

        SHA1

        74405c2f52ad464b13224be7fbb5ca11fc51b473

        SHA256

        d59519f985f357282f14fcd8404deb56aae7b9ff085e0e4184947f7bb6b65982

        SHA512

        7ea93f90d2d22daf4d8fca30b8382a8652a1e0616770e4759e36e9e3f33ca32ef369ece609672dd6ed70d73e7e9e52a60f3c3a83f545dc72f6ba7b3cde866e1c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        7a6694966c5dbb4b224af6c7af61971f

        SHA1

        f69654af1184f48e2b3a57de59dedfe794924582

        SHA256

        4508a5aeaa7f9fdea7ab5945d2eae3c8c8e25652d662f47c76f540aa457cdf02

        SHA512

        31b0ac0d38313a11cc8186e9fd244c6c7a4e82a1eb6838c287b86e0854daa4aa36003f29a7d39cea8e59f2fa8579a78cb12e5316967615f385f2c53d361a5bde

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        22adb2f26b643fa8a52b40bc1f32241b

        SHA1

        2ff0474d594a3629ce41ec62bed58c1a78a125c0

        SHA256

        af06fc12d2db4630eeb2a3b366a4010b5dca7497825849b9ffedcdc950ef10a9

        SHA512

        eea55d5be7178bcd4f84c6977e3ff56ea18bc63ba53df9dd055cd848661c47acef81c27bb2570cc73c192e30f8a9c28a98f71155ba0638fe09b0bcef874ec270

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        b7df867868fb0ee82b9894ab668abd18

        SHA1

        a707441962db627485a0b9aeda54a6450d20e404

        SHA256

        56275e6f9a529e83898347b0f022e205e0bcce94042ba4223ba71e4983917a59

        SHA512

        9344488010de3be5545c7d1ed4744ebe60fe72bb1583ab2b08c093856a00c41649d1ff5213150f3660109a41ab64871a77bc030ca6e8cea559d928daf84e56e1

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        9caff3b906733e699a96bc296702f465

        SHA1

        17979309ce0d1ba5dc19c914f338429e3b67ed8f

        SHA256

        bd6c237a5158791ca89f3e8bf52b7813accbd9c175eeae697154e0dcb24537a6

        SHA512

        d184d7a0f2618e1ec5ae3d82d1f4d395fdf0b002dcf4e26f585fb1a39e8c3bf858b7ea426c5e603773609c526822f6bdcfec99d33636981fae25cb3529dab9f0

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        b37a9802f5ec7362db40475a31d78899

        SHA1

        0108a98e057cea681169c896a5363b2f15248ab0

        SHA256

        7d930d32c6bf1bb210d47afd49e8f567f416fff42b6e3c6753f505e86a3cdfa8

        SHA512

        73869372722f02533cca07cb8c846d2e2a938eb2f7da8d85f62e86247d9bafadba50aa71b6fd69d70ad0d164dffc96679fe44abae8eedc3f6698f23080581f2a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        8371f331eaf3f0002aef23eab3ed5d0a

        SHA1

        5514f79e636c7f4a820f866afdcdd903032f25d4

        SHA256

        61efc993c0fbdef874af223838329a1826bde9acc3a9c1fd88ffd83152495308

        SHA512

        b1a7be0b6ed20f07b4a898153017b2098509eacc1464c22a643f14b9481174853cdfc02371488c5d7b9ed41b658d9255acf3a15f0e153cd7902dfb77f5259a5e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        16KB

        MD5

        89baa0b571efbef28ebdd218eefbb697

        SHA1

        53bb2366a72e8066ed5a573bde8b21937415465e

        SHA256

        9296d8a25509f4f32b75ffce9d062e0982d36376016f29c50434220dcf7d5a45

        SHA512

        d38819bb48dcebaf56a00a9791f1b06db20bb9c813230426b78a520bee856862393a3c47d0ba86d30da289ca0dc98b041b226e74e116289c998ce744f8487406

      • C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV
        Filesize

        20KB

        MD5

        c9ff7748d8fcef4cf84a5501e996a641

        SHA1

        02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

        SHA256

        4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

        SHA512

        d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

      • C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx
        Filesize

        71KB

        MD5

        95a12fa5756d0040e1c1284371ea17e4

        SHA1

        a9c9c457a87ecca994364b6b0a8bbe815c64197d

        SHA256

        805458918a058fbae738b7e4fc57e4d3b8317adf26d11b9b9e53e22bc946b562

        SHA512

        1d71748f56e83e3d8e68bcec6a17ace238d904e767a10ef20c86be8c785ab3c3fea60c832e3b68e0277467ac1b053849d1f3d52bd872b2b9aa7206616ced56c5

      • C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP
        Filesize

        71KB

        MD5

        95a12fa5756d0040e1c1284371ea17e4

        SHA1

        a9c9c457a87ecca994364b6b0a8bbe815c64197d

        SHA256

        805458918a058fbae738b7e4fc57e4d3b8317adf26d11b9b9e53e22bc946b562

        SHA512

        1d71748f56e83e3d8e68bcec6a17ace238d904e767a10ef20c86be8c785ab3c3fea60c832e3b68e0277467ac1b053849d1f3d52bd872b2b9aa7206616ced56c5

      • C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC
        Filesize

        148KB

        MD5

        90a1d4b55edf36fa8b4cc6974ed7d4c4

        SHA1

        aba1b8d0e05421e7df5982899f626211c3c4b5c1

        SHA256

        7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

        SHA512

        ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

      • C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz
        Filesize

        92KB

        MD5

        e93f499f52c3bc7e456a1b5978fc05d5

        SHA1

        7deaa85ec9fb9401f2010bb0a893635d9a7e02bd

        SHA256

        8405cf0dbae6930f4add6b7354f71d815919211f8be724292f26e028253e94d2

        SHA512

        2aa3d1573cc52a1107a9b31fdce074e325130a64e5faa282c7c6b2ca88646013106e39d357710deb90c253e885479ea512d04b2e162a936c58c1e40812af9b31

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5jjru2ro.ghp.ps1
        Filesize

        1B

        MD5

        c4ca4238a0b923820dcc509a6f75849b

        SHA1

        356a192b7913b04c54574d18c28d46e6395428ab

        SHA256

        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

        SHA512

        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

      • C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe
        Filesize

        71KB

        MD5

        95a12fa5756d0040e1c1284371ea17e4

        SHA1

        a9c9c457a87ecca994364b6b0a8bbe815c64197d

        SHA256

        805458918a058fbae738b7e4fc57e4d3b8317adf26d11b9b9e53e22bc946b562

        SHA512

        1d71748f56e83e3d8e68bcec6a17ace238d904e767a10ef20c86be8c785ab3c3fea60c832e3b68e0277467ac1b053849d1f3d52bd872b2b9aa7206616ced56c5

      • C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe
        Filesize

        71KB

        MD5

        95a12fa5756d0040e1c1284371ea17e4

        SHA1

        a9c9c457a87ecca994364b6b0a8bbe815c64197d

        SHA256

        805458918a058fbae738b7e4fc57e4d3b8317adf26d11b9b9e53e22bc946b562

        SHA512

        1d71748f56e83e3d8e68bcec6a17ace238d904e767a10ef20c86be8c785ab3c3fea60c832e3b68e0277467ac1b053849d1f3d52bd872b2b9aa7206616ced56c5

      • C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL
        Filesize

        46KB

        MD5

        02d2c46697e3714e49f46b680b9a6b83

        SHA1

        84f98b56d49f01e9b6b76a4e21accf64fd319140

        SHA256

        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

        SHA512

        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

      • C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA
        Filesize

        71KB

        MD5

        95a12fa5756d0040e1c1284371ea17e4

        SHA1

        a9c9c457a87ecca994364b6b0a8bbe815c64197d

        SHA256

        805458918a058fbae738b7e4fc57e4d3b8317adf26d11b9b9e53e22bc946b562

        SHA512

        1d71748f56e83e3d8e68bcec6a17ace238d904e767a10ef20c86be8c785ab3c3fea60c832e3b68e0277467ac1b053849d1f3d52bd872b2b9aa7206616ced56c5

      • C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh
        Filesize

        71KB

        MD5

        95a12fa5756d0040e1c1284371ea17e4

        SHA1

        a9c9c457a87ecca994364b6b0a8bbe815c64197d

        SHA256

        805458918a058fbae738b7e4fc57e4d3b8317adf26d11b9b9e53e22bc946b562

        SHA512

        1d71748f56e83e3d8e68bcec6a17ace238d904e767a10ef20c86be8c785ab3c3fea60c832e3b68e0277467ac1b053849d1f3d52bd872b2b9aa7206616ced56c5

      • C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs
        Filesize

        71KB

        MD5

        95a12fa5756d0040e1c1284371ea17e4

        SHA1

        a9c9c457a87ecca994364b6b0a8bbe815c64197d

        SHA256

        805458918a058fbae738b7e4fc57e4d3b8317adf26d11b9b9e53e22bc946b562

        SHA512

        1d71748f56e83e3d8e68bcec6a17ace238d904e767a10ef20c86be8c785ab3c3fea60c832e3b68e0277467ac1b053849d1f3d52bd872b2b9aa7206616ced56c5

      • memory/216-247-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
        Filesize

        64KB

      • memory/216-246-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
        Filesize

        64KB

      • memory/832-269-0x0000000004620000-0x0000000004630000-memory.dmp
        Filesize

        64KB

      • memory/832-270-0x0000000004620000-0x0000000004630000-memory.dmp
        Filesize

        64KB

      • memory/1144-316-0x00000000050B0000-0x00000000050C0000-memory.dmp
        Filesize

        64KB

      • memory/1144-315-0x00000000050B0000-0x00000000050C0000-memory.dmp
        Filesize

        64KB

      • memory/2160-385-0x0000000006620000-0x0000000006630000-memory.dmp
        Filesize

        64KB

      • memory/2160-384-0x0000000006620000-0x0000000006630000-memory.dmp
        Filesize

        64KB

      • memory/2320-121-0x00000000008D0000-0x000000000127A000-memory.dmp
        Filesize

        9.7MB

      • memory/2320-124-0x000000001BF00000-0x000000001C180000-memory.dmp
        Filesize

        2.5MB

      • memory/2320-123-0x0000000003280000-0x0000000003281000-memory.dmp
        Filesize

        4KB

      • memory/2320-122-0x000000001BDF0000-0x000000001BE00000-memory.dmp
        Filesize

        64KB

      • memory/2420-292-0x0000000004550000-0x0000000004560000-memory.dmp
        Filesize

        64KB

      • memory/2420-293-0x0000000004550000-0x0000000004560000-memory.dmp
        Filesize

        64KB

      • memory/2556-146-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-135-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-134-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-133-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-132-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-131-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-130-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-129-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-128-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-125-0x0000000000400000-0x0000000000747000-memory.dmp
        Filesize

        3.3MB

      • memory/3112-143-0x00000000075D0000-0x0000000007636000-memory.dmp
        Filesize

        408KB

      • memory/3112-167-0x0000000009C70000-0x000000000A16E000-memory.dmp
        Filesize

        5.0MB

      • memory/3112-138-0x0000000004AC0000-0x0000000004AF6000-memory.dmp
        Filesize

        216KB

      • memory/3112-139-0x0000000007670000-0x0000000007C98000-memory.dmp
        Filesize

        6.2MB

      • memory/3112-140-0x0000000007030000-0x0000000007040000-memory.dmp
        Filesize

        64KB

      • memory/3112-141-0x0000000007030000-0x0000000007040000-memory.dmp
        Filesize

        64KB

      • memory/3112-142-0x0000000007430000-0x0000000007452000-memory.dmp
        Filesize

        136KB

      • memory/3112-147-0x0000000007CF0000-0x0000000007D0C000-memory.dmp
        Filesize

        112KB

      • memory/3112-166-0x0000000009660000-0x0000000009682000-memory.dmp
        Filesize

        136KB

      • memory/3112-165-0x00000000093C0000-0x00000000093DA000-memory.dmp
        Filesize

        104KB

      • memory/3112-164-0x00000000096D0000-0x0000000009764000-memory.dmp
        Filesize

        592KB

      • memory/3112-149-0x00000000085C0000-0x0000000008636000-memory.dmp
        Filesize

        472KB

      • memory/3112-148-0x00000000087F0000-0x000000000883B000-memory.dmp
        Filesize

        300KB

      • memory/3112-144-0x0000000007FD0000-0x0000000008036000-memory.dmp
        Filesize

        408KB

      • memory/3112-145-0x0000000008040000-0x0000000008390000-memory.dmp
        Filesize

        3.3MB

      • memory/3220-337-0x0000000000DC0000-0x0000000000DD0000-memory.dmp
        Filesize

        64KB

      • memory/3220-338-0x0000000000DC0000-0x0000000000DD0000-memory.dmp
        Filesize

        64KB

      • memory/4164-223-0x0000000000D00000-0x0000000000D10000-memory.dmp
        Filesize

        64KB

      • memory/4164-222-0x0000000000D00000-0x0000000000D10000-memory.dmp
        Filesize

        64KB

      • memory/4172-199-0x0000000006B40000-0x0000000006B50000-memory.dmp
        Filesize

        64KB

      • memory/4172-200-0x0000000006B40000-0x0000000006B50000-memory.dmp
        Filesize

        64KB

      • memory/4380-178-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
        Filesize

        64KB

      • memory/4380-177-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
        Filesize

        64KB

      • memory/4648-369-0x0000000004D60000-0x0000000004D70000-memory.dmp
        Filesize

        64KB

      • memory/4648-370-0x0000000004D60000-0x0000000004D70000-memory.dmp
        Filesize

        64KB

      • memory/4648-380-0x0000000004D60000-0x0000000004D70000-memory.dmp
        Filesize

        64KB