Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2023, 22:35

General

  • Target

    4a2ae2f2c7fd45239033139b7066b5a990120aaecc81a08d30a6c26d65735da8.exe

  • Size

    921KB

  • MD5

    be4cb39a45cb40c6179f84afd031ac16

  • SHA1

    e9f17ca15b1027c3c0e9b7bcefe9491db6e71bd3

  • SHA256

    4a2ae2f2c7fd45239033139b7066b5a990120aaecc81a08d30a6c26d65735da8

  • SHA512

    3bee5c586f4331e0b406496d9e498d605a8b71c61ca61ffe03c82054332ca09a06137d8485e574e3bfc3339df1e9c0fce56b78e6ba7ea25274926f3b016eed38

  • SSDEEP

    12288:Cy90yIvO6OjFOE6TUkLYMKzextgyukB6NNN3FMz59KKGDiVjw/Eqxi:CyN6OJUUs8WqLm59KKGm8/1c

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a2ae2f2c7fd45239033139b7066b5a990120aaecc81a08d30a6c26d65735da8.exe
    "C:\Users\Admin\AppData\Local\Temp\4a2ae2f2c7fd45239033139b7066b5a990120aaecc81a08d30a6c26d65735da8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un044621.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un044621.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un130870.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un130870.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr930339.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr930339.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1548
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 1012
            5⤵
            • Program crash
            PID:1684
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu818724.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu818724.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4848
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 1324
            5⤵
            • Program crash
            PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk358036.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk358036.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si269275.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si269275.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4872
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4736
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1088
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:1984
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:1252
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2244
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\cb7ae701b3" /P "Admin:N"
                    5⤵
                      PID:1712
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\cb7ae701b3" /P "Admin:R" /E
                      5⤵
                        PID:1524
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:2000
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1548 -ip 1548
                1⤵
                  PID:3008
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4848 -ip 4848
                  1⤵
                    PID:380
                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3968
                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1116
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe start wuauserv
                    1⤵
                    • Launches sc.exe
                    PID:912

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si269275.exe

                    Filesize

                    204KB

                    MD5

                    d2622752e39ebe03e48351887e7ba2c7

                    SHA1

                    8377db1a7994b5101d4285126cbb2e8e7e4e82e3

                    SHA256

                    c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0

                    SHA512

                    f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si269275.exe

                    Filesize

                    204KB

                    MD5

                    d2622752e39ebe03e48351887e7ba2c7

                    SHA1

                    8377db1a7994b5101d4285126cbb2e8e7e4e82e3

                    SHA256

                    c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0

                    SHA512

                    f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un044621.exe

                    Filesize

                    749KB

                    MD5

                    5aa75d7c303eb0ebfe2da61e0da75112

                    SHA1

                    f4184029799fd5c1c4bfbe01cc1a43ee0f632ec9

                    SHA256

                    38096431efa57e83c659ac2257bd7fc4731b0ddc48aa4798246470e76c305a41

                    SHA512

                    e281556601126c313c886cd00b7a81362eeedac5f246b43f87ba3a3fef267a020f7ca0dd2b2a0d3c4d4f4a1e61c9b57e41722e1a24d141475769f8e12b80d4db

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un044621.exe

                    Filesize

                    749KB

                    MD5

                    5aa75d7c303eb0ebfe2da61e0da75112

                    SHA1

                    f4184029799fd5c1c4bfbe01cc1a43ee0f632ec9

                    SHA256

                    38096431efa57e83c659ac2257bd7fc4731b0ddc48aa4798246470e76c305a41

                    SHA512

                    e281556601126c313c886cd00b7a81362eeedac5f246b43f87ba3a3fef267a020f7ca0dd2b2a0d3c4d4f4a1e61c9b57e41722e1a24d141475769f8e12b80d4db

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk358036.exe

                    Filesize

                    136KB

                    MD5

                    ac0ffc4fceebe7be421ae8fc8517d1bf

                    SHA1

                    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

                    SHA256

                    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

                    SHA512

                    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk358036.exe

                    Filesize

                    136KB

                    MD5

                    ac0ffc4fceebe7be421ae8fc8517d1bf

                    SHA1

                    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

                    SHA256

                    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

                    SHA512

                    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un130870.exe

                    Filesize

                    595KB

                    MD5

                    7881bf7499528478588a03d4224c4930

                    SHA1

                    957599ebc372ae38c000a61edb81b95145fadb1a

                    SHA256

                    22df2175beeb12c7fd9b1d523ba9cac768402fcebfc83af08d98034d498b6391

                    SHA512

                    3937f277a539d26106b96255872523627686be228ca96a2d33867649727da59a1925f1fa79d7d12cb01048a89704342f5c3c6cfba155c58467af5ff3732dc22f

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un130870.exe

                    Filesize

                    595KB

                    MD5

                    7881bf7499528478588a03d4224c4930

                    SHA1

                    957599ebc372ae38c000a61edb81b95145fadb1a

                    SHA256

                    22df2175beeb12c7fd9b1d523ba9cac768402fcebfc83af08d98034d498b6391

                    SHA512

                    3937f277a539d26106b96255872523627686be228ca96a2d33867649727da59a1925f1fa79d7d12cb01048a89704342f5c3c6cfba155c58467af5ff3732dc22f

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr930339.exe

                    Filesize

                    389KB

                    MD5

                    1878d9da67b996298cc920ac50938840

                    SHA1

                    c71bd04454f2b03da827d0ebf24c0e89ca1a8188

                    SHA256

                    85e35fba8e3f6c310a4f8ea5fe8ea68511c75fdbe8ee6dfb3cf759a16ee1c7fc

                    SHA512

                    3fc2af08e88fc7a2dd99be49e8894e328bd5ee711723f77ae50102098a195d0352d56296be88f82d241426bece137bc942e8e0fb64add1842f496a5d53a3167b

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr930339.exe

                    Filesize

                    389KB

                    MD5

                    1878d9da67b996298cc920ac50938840

                    SHA1

                    c71bd04454f2b03da827d0ebf24c0e89ca1a8188

                    SHA256

                    85e35fba8e3f6c310a4f8ea5fe8ea68511c75fdbe8ee6dfb3cf759a16ee1c7fc

                    SHA512

                    3fc2af08e88fc7a2dd99be49e8894e328bd5ee711723f77ae50102098a195d0352d56296be88f82d241426bece137bc942e8e0fb64add1842f496a5d53a3167b

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu818724.exe

                    Filesize

                    472KB

                    MD5

                    a11d57cfc57f6a6a5817ddbee51ff42f

                    SHA1

                    77c986d29e8d434a818dd82d49ff398466f2e643

                    SHA256

                    9113c7a7946a05781463d4101889606ca2736d474cad4959a004a995827f4db1

                    SHA512

                    3030f6a28e20430ac1b89cb44dcf67be924bbcbe8549dc4f84f1184a9681228aec36906006a8639804daf95e22d79d14fb64ee62f0af31880bf32bc1e348dcbe

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu818724.exe

                    Filesize

                    472KB

                    MD5

                    a11d57cfc57f6a6a5817ddbee51ff42f

                    SHA1

                    77c986d29e8d434a818dd82d49ff398466f2e643

                    SHA256

                    9113c7a7946a05781463d4101889606ca2736d474cad4959a004a995827f4db1

                    SHA512

                    3030f6a28e20430ac1b89cb44dcf67be924bbcbe8549dc4f84f1184a9681228aec36906006a8639804daf95e22d79d14fb64ee62f0af31880bf32bc1e348dcbe

                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                    Filesize

                    204KB

                    MD5

                    d2622752e39ebe03e48351887e7ba2c7

                    SHA1

                    8377db1a7994b5101d4285126cbb2e8e7e4e82e3

                    SHA256

                    c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0

                    SHA512

                    f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c

                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                    Filesize

                    204KB

                    MD5

                    d2622752e39ebe03e48351887e7ba2c7

                    SHA1

                    8377db1a7994b5101d4285126cbb2e8e7e4e82e3

                    SHA256

                    c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0

                    SHA512

                    f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c

                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                    Filesize

                    204KB

                    MD5

                    d2622752e39ebe03e48351887e7ba2c7

                    SHA1

                    8377db1a7994b5101d4285126cbb2e8e7e4e82e3

                    SHA256

                    c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0

                    SHA512

                    f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c

                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                    Filesize

                    204KB

                    MD5

                    d2622752e39ebe03e48351887e7ba2c7

                    SHA1

                    8377db1a7994b5101d4285126cbb2e8e7e4e82e3

                    SHA256

                    c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0

                    SHA512

                    f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c

                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                    Filesize

                    204KB

                    MD5

                    d2622752e39ebe03e48351887e7ba2c7

                    SHA1

                    8377db1a7994b5101d4285126cbb2e8e7e4e82e3

                    SHA256

                    c74dad9fa19bf79777746674fef33c0ad16d55c0e2ecf1991ceff3d8d7fa27c0

                    SHA512

                    f8b3a3b666e27b5f945b4ad9e44c4eeb3e0a62ba171dcc4729480c85aa6fbcf784f8990dee1fd5020a86a3a802e204e2b1b77a622125bb78c70e551e0df4742c

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    f577e9f9bb3716a1405af573fbf2afb4

                    SHA1

                    7e2a18c86e4912f9218fbe7c8cf64e04afb90f6e

                    SHA256

                    4b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb

                    SHA512

                    fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    f577e9f9bb3716a1405af573fbf2afb4

                    SHA1

                    7e2a18c86e4912f9218fbe7c8cf64e04afb90f6e

                    SHA256

                    4b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb

                    SHA512

                    fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                    Filesize

                    89KB

                    MD5

                    f577e9f9bb3716a1405af573fbf2afb4

                    SHA1

                    7e2a18c86e4912f9218fbe7c8cf64e04afb90f6e

                    SHA256

                    4b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb

                    SHA512

                    fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add

                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • memory/1548-158-0x0000000004E20000-0x0000000004E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/1548-193-0x0000000000400000-0x0000000000806000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1548-177-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-175-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-179-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-181-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-183-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-185-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-187-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-188-0x0000000000400000-0x0000000000806000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1548-189-0x0000000004E20000-0x0000000004E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/1548-190-0x0000000004E20000-0x0000000004E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/1548-191-0x0000000004E20000-0x0000000004E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/1548-173-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-155-0x0000000004E30000-0x00000000053D4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/1548-171-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-169-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-167-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-165-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-163-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-161-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-160-0x0000000004D70000-0x0000000004D82000-memory.dmp

                    Filesize

                    72KB

                  • memory/1548-159-0x0000000004E20000-0x0000000004E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/1548-157-0x0000000004E20000-0x0000000004E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/1548-156-0x0000000000920000-0x000000000094D000-memory.dmp

                    Filesize

                    180KB

                  • memory/4080-1012-0x0000000007550000-0x0000000007560000-memory.dmp

                    Filesize

                    64KB

                  • memory/4080-1011-0x0000000000420000-0x0000000000448000-memory.dmp

                    Filesize

                    160KB

                  • memory/4848-205-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-223-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-225-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-227-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-229-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-231-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-284-0x00000000008F0000-0x0000000000936000-memory.dmp

                    Filesize

                    280KB

                  • memory/4848-285-0x0000000004F20000-0x0000000004F30000-memory.dmp

                    Filesize

                    64KB

                  • memory/4848-288-0x0000000004F20000-0x0000000004F30000-memory.dmp

                    Filesize

                    64KB

                  • memory/4848-289-0x0000000004F20000-0x0000000004F30000-memory.dmp

                    Filesize

                    64KB

                  • memory/4848-995-0x0000000007F80000-0x0000000007F92000-memory.dmp

                    Filesize

                    72KB

                  • memory/4848-994-0x0000000007960000-0x0000000007F78000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/4848-996-0x0000000007FA0000-0x00000000080AA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4848-997-0x00000000080B0000-0x00000000080EC000-memory.dmp

                    Filesize

                    240KB

                  • memory/4848-998-0x0000000004F20000-0x0000000004F30000-memory.dmp

                    Filesize

                    64KB

                  • memory/4848-999-0x00000000083B0000-0x0000000008416000-memory.dmp

                    Filesize

                    408KB

                  • memory/4848-1000-0x0000000008A80000-0x0000000008B12000-memory.dmp

                    Filesize

                    584KB

                  • memory/4848-1001-0x0000000008B40000-0x0000000008BB6000-memory.dmp

                    Filesize

                    472KB

                  • memory/4848-1002-0x0000000008C20000-0x0000000008DE2000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4848-221-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-219-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-217-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-215-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-213-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-211-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-209-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-207-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-203-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-201-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-198-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-199-0x0000000002850000-0x0000000002885000-memory.dmp

                    Filesize

                    212KB

                  • memory/4848-1003-0x0000000008DF0000-0x000000000931C000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4848-1004-0x0000000009430000-0x000000000944E000-memory.dmp

                    Filesize

                    120KB

                  • memory/4848-1005-0x00000000025E0000-0x0000000002630000-memory.dmp

                    Filesize

                    320KB