Analysis

  • max time kernel
    143s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2023, 12:04

General

  • Target

    18e60045ed98eefc494f9c77e777f1d5596bd1a6229ab53380aa52631d06b79b.exe

  • Size

    599KB

  • MD5

    517961288036e2c0ee6259142a1c225b

  • SHA1

    88bf154fc3219de6e05a2ef1a3590f9663a8bbd7

  • SHA256

    18e60045ed98eefc494f9c77e777f1d5596bd1a6229ab53380aa52631d06b79b

  • SHA512

    717dd41e74be0fd1d476d974e4e1095a6a650dfc5af4b1a716c2f166ebb27a9e8914e55d9a6d4bd620e8e1539e280c5e31139a7e2a270eb2b41aeac32b80ed4e

  • SSDEEP

    12288:UMriy90YzwRPSVtWpbgoeT0oMwiLg68SO43t/6I+JRpYjTTC:ey90RPSVtWFGoNLg/gkIepOTTC

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18e60045ed98eefc494f9c77e777f1d5596bd1a6229ab53380aa52631d06b79b.exe
    "C:\Users\Admin\AppData\Local\Temp\18e60045ed98eefc494f9c77e777f1d5596bd1a6229ab53380aa52631d06b79b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0422778.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0422778.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0140574.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0140574.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9030918.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9030918.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1066204.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1066204.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4908
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1066204.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1066204.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3208
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:2224
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3388
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4844
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  7⤵
                    PID:4968
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:R" /E
                    7⤵
                      PID:3800
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:N"
                      7⤵
                        PID:4420
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:4848
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\c3912af058" /P "Admin:R" /E
                          7⤵
                            PID:3228
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:3888
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:5012
                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4020
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:696
                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1340

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1066204.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1066204.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1066204.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0422778.exe

                Filesize

                307KB

                MD5

                cd8df8d49a9f1970d95852cf106f6ca6

                SHA1

                efc595038c27ef2d4d4f22708852e92caa200457

                SHA256

                3db83d8511116ad23d192bf8dffaccff690e9f9c2b41ca2ee49a382d34cac04e

                SHA512

                17f852b00569ab52d7caefc9966bf850167e348b18e08bff2ae0f324b42ce8a2b1f4287f2a6abadec19c8bee99f924430698dcb22ec62c295af663ead598f2ed

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0422778.exe

                Filesize

                307KB

                MD5

                cd8df8d49a9f1970d95852cf106f6ca6

                SHA1

                efc595038c27ef2d4d4f22708852e92caa200457

                SHA256

                3db83d8511116ad23d192bf8dffaccff690e9f9c2b41ca2ee49a382d34cac04e

                SHA512

                17f852b00569ab52d7caefc9966bf850167e348b18e08bff2ae0f324b42ce8a2b1f4287f2a6abadec19c8bee99f924430698dcb22ec62c295af663ead598f2ed

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0140574.exe

                Filesize

                136KB

                MD5

                6b47cd6c3612dccf1bba377e68af685d

                SHA1

                0a63bf714c55dc467a9676f50a477f3b8bf0ee2f

                SHA256

                d1e7fc8783dd45ab7a9cec0c913848a5f4fb1a89699c04366e84d734ba3e1d1e

                SHA512

                63368764ad154bd7b301990635277d0bd009660cad499de5cc9bf5182d823a8837d8eea71fe1757dea4fa859da992757fe452e5c2e825f0222fbabe0b88827da

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0140574.exe

                Filesize

                136KB

                MD5

                6b47cd6c3612dccf1bba377e68af685d

                SHA1

                0a63bf714c55dc467a9676f50a477f3b8bf0ee2f

                SHA256

                d1e7fc8783dd45ab7a9cec0c913848a5f4fb1a89699c04366e84d734ba3e1d1e

                SHA512

                63368764ad154bd7b301990635277d0bd009660cad499de5cc9bf5182d823a8837d8eea71fe1757dea4fa859da992757fe452e5c2e825f0222fbabe0b88827da

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9030918.exe

                Filesize

                175KB

                MD5

                14d6f5a4e4eef1cba7f1df435c10af19

                SHA1

                a0ff7a7f3cebbcd74c4d74ab8f68937d75859937

                SHA256

                f9098e1be658ba2b416fadbcf6be0563c9e9ed11f2582da2ce88e98c7ab5de05

                SHA512

                76f2138975479c9800f87f4ac0a792a7624e137f4d99dd532ec8227e703febf4c5b699e296e4096fb3f145666de8fc9171a0da31a692453bd10faa16d5536310

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9030918.exe

                Filesize

                175KB

                MD5

                14d6f5a4e4eef1cba7f1df435c10af19

                SHA1

                a0ff7a7f3cebbcd74c4d74ab8f68937d75859937

                SHA256

                f9098e1be658ba2b416fadbcf6be0563c9e9ed11f2582da2ce88e98c7ab5de05

                SHA512

                76f2138975479c9800f87f4ac0a792a7624e137f4d99dd532ec8227e703febf4c5b699e296e4096fb3f145666de8fc9171a0da31a692453bd10faa16d5536310

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                340KB

                MD5

                632a903bd26f8456029e97dab502f5d9

                SHA1

                0d2673275fe40b514f0d68f33c2d83694bd56b84

                SHA256

                8cdb939386084bb43235d79ca8a7ce0ee862dc938ca3c2d2af152882b6b806c1

                SHA512

                02b436fb3f0f75c9d0040da2382b39c4b8a6f40fc9e657029e1a96a3e13d4bcf67d8953149876e56f0afc8a8d0998d2dbeb8acee663ffb98e50531ca7a19f729

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1340-274-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/1340-275-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/1340-276-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/1356-168-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-193-0x0000000004C40000-0x0000000004C50000-memory.dmp

                Filesize

                64KB

              • memory/1356-176-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-178-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-180-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-182-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-184-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-186-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-188-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-190-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-192-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-174-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-194-0x0000000004C40000-0x0000000004C50000-memory.dmp

                Filesize

                64KB

              • memory/1356-195-0x0000000004C40000-0x0000000004C50000-memory.dmp

                Filesize

                64KB

              • memory/1356-172-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-170-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-166-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/1356-165-0x00000000023F0000-0x0000000002402000-memory.dmp

                Filesize

                72KB

              • memory/2056-203-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2056-201-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2056-205-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2056-207-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2056-220-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2712-227-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2712-226-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2712-262-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2712-230-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/2712-229-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/4020-241-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/4020-240-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/4020-242-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/4216-154-0x00000000085A0000-0x0000000008632000-memory.dmp

                Filesize

                584KB

              • memory/4216-160-0x0000000008960000-0x000000000897E000-memory.dmp

                Filesize

                120KB

              • memory/4216-157-0x0000000008710000-0x0000000008786000-memory.dmp

                Filesize

                472KB

              • memory/4216-147-0x0000000000910000-0x0000000000938000-memory.dmp

                Filesize

                160KB

              • memory/4216-159-0x00000000098A0000-0x0000000009DCC000-memory.dmp

                Filesize

                5.2MB

              • memory/4216-155-0x0000000008BF0000-0x0000000009194000-memory.dmp

                Filesize

                5.6MB

              • memory/4216-158-0x00000000091A0000-0x0000000009362000-memory.dmp

                Filesize

                1.8MB

              • memory/4216-156-0x0000000008640000-0x0000000008690000-memory.dmp

                Filesize

                320KB

              • memory/4216-153-0x00000000079D0000-0x0000000007A36000-memory.dmp

                Filesize

                408KB

              • memory/4216-152-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/4216-151-0x00000000076A0000-0x00000000076DC000-memory.dmp

                Filesize

                240KB

              • memory/4216-150-0x0000000007770000-0x000000000787A000-memory.dmp

                Filesize

                1.0MB

              • memory/4216-149-0x0000000007640000-0x0000000007652000-memory.dmp

                Filesize

                72KB

              • memory/4216-148-0x0000000007BA0000-0x00000000081B8000-memory.dmp

                Filesize

                6.1MB

              • memory/4908-204-0x0000000000840000-0x0000000000875000-memory.dmp

                Filesize

                212KB