Analysis

  • max time kernel
    136s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2023 18:31

General

  • Target

    SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe

  • Size

    2.3MB

  • MD5

    3c55617e6b69330386a0350e9f6aa0b4

  • SHA1

    99bff391433cfc610b27f3b2b7ebc3239314f831

  • SHA256

    1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94

  • SHA512

    46eac86da241ab7b98d449e31111c9da154109b493bf62e807cffcdb43767167c994a165d78ec9a4ce24ea4f64ec76edee39daf9408bad3d6e65b64b1b6b1c28

  • SSDEEP

    49152:X4MR20Q9Xz2p2pizrXPHaBXtHqNQ6cBUX0biao10PzFyPawde5Gir:X41MEpyHaZUNFcBUEfoIgPFTir

Malware Config

Extracted

Family

redline

Botnet

120723_rc_11

C2

rcam.tuktuk.ug:11290

Attributes
  • auth_value

    3a7b4b38a7116be1f337083fb37de790

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 21 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe
        "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2876
          • C:\Users\Admin\AppData\Local\Temp\Octium.exe
            "C:\Users\Admin\AppData\Local\Temp\Octium.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of WriteProcessMemory
            PID:2336
            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:1644
          • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe
            "C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Drops file in Drivers directory
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            PID:2164
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:820
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:2580
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:2240
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:1596
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:2632
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:2008
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2644
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2440
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2160
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2616
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1112
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
          3⤵
          • Creates scheduled task(s)
          PID:1696
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:1736
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          PID:2424
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {20453210-F85A-4737-BF17-C545FDD11B25} S-1-5-18:NT AUTHORITY\System:Service:
        1⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Program Files\Google\Chrome\updater.exe
          "C:\Program Files\Google\Chrome\updater.exe"
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:2776

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Google\Chrome\updater.exe

        Filesize

        12.5MB

        MD5

        8dbc96129e97e6f44fe615670544f915

        SHA1

        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

        SHA256

        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

        SHA512

        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

      • C:\Program Files\Google\Chrome\updater.exe

        Filesize

        12.5MB

        MD5

        8dbc96129e97e6f44fe615670544f915

        SHA1

        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

        SHA256

        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

        SHA512

        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

      • C:\Users\Admin\AppData\Local\Temp\Octium.exe

        Filesize

        4.2MB

        MD5

        f206c33258de47d5e05e9f035efc265c

        SHA1

        c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

        SHA256

        298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

        SHA512

        ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

      • C:\Users\Admin\AppData\Local\Temp\Octium.exe

        Filesize

        4.2MB

        MD5

        f206c33258de47d5e05e9f035efc265c

        SHA1

        c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

        SHA256

        298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

        SHA512

        ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

      • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

        Filesize

        12.5MB

        MD5

        8dbc96129e97e6f44fe615670544f915

        SHA1

        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

        SHA256

        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

        SHA512

        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

      • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

        Filesize

        12.5MB

        MD5

        8dbc96129e97e6f44fe615670544f915

        SHA1

        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

        SHA256

        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

        SHA512

        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        9942079d05df5e2a6b7ffdd57b0ebda3

        SHA1

        f038c0613ca7f28ce65a437ab4f861af0cfde14f

        SHA256

        6f7a2c1b9757f97cd5c8a6ab36057371176b4981907ff3b38dcc43d1571310ba

        SHA512

        ce2c7cd410c974d5041013f7dbd7b6f49a3f94efd71a5428f718e1ee17e71abfdba924eeb9b6fa02fcfa089c967ae322f8a4180d6606ea6ea68180b87abd060e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KT6AD57SRVY1B1EFC7QR.temp

        Filesize

        7KB

        MD5

        9942079d05df5e2a6b7ffdd57b0ebda3

        SHA1

        f038c0613ca7f28ce65a437ab4f861af0cfde14f

        SHA256

        6f7a2c1b9757f97cd5c8a6ab36057371176b4981907ff3b38dcc43d1571310ba

        SHA512

        ce2c7cd410c974d5041013f7dbd7b6f49a3f94efd71a5428f718e1ee17e71abfdba924eeb9b6fa02fcfa089c967ae322f8a4180d6606ea6ea68180b87abd060e

      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        301.3MB

        MD5

        7d9643e93e382847679cf4fda0f55cda

        SHA1

        ce19cfcf79419d9883bb5add9dc053d38f1bb9f1

        SHA256

        23aa6833d5ee181069a5aa8172e231556db324dca941adc698c32125d6100b11

        SHA512

        03160e6cc38414619d94cd972539081a4683e6c9808a63ab412a3d602cc89a9cfb3778bc4a8b2507b161b3aa7dc938b8edadf9aefcf65218df619085b26588cc

      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        357.1MB

        MD5

        f5ae2859afd689bab6a7db3cadfdf47b

        SHA1

        156782b7767580cc271290e0d1f88caaed23aa62

        SHA256

        c1b4629d3b47f02506253ec49cbb670149d355082b9d6af61ef8ad43cb0487cd

        SHA512

        182ead7c72f4c37a659e28eb2c0091cd2ae562c8c6e8f784764e94d4d2c80526e84997f83c5653a1b673c832091f27b4e78bb1906060886986e2b4ba0cafb28e

      • \Program Files\Google\Chrome\updater.exe

        Filesize

        12.5MB

        MD5

        8dbc96129e97e6f44fe615670544f915

        SHA1

        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

        SHA256

        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

        SHA512

        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

      • \Users\Admin\AppData\Local\Temp\Octium.exe

        Filesize

        4.2MB

        MD5

        f206c33258de47d5e05e9f035efc265c

        SHA1

        c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

        SHA256

        298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

        SHA512

        ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

      • \Users\Admin\AppData\Local\Temp\TaskMnr.exe

        Filesize

        12.5MB

        MD5

        8dbc96129e97e6f44fe615670544f915

        SHA1

        8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

        SHA256

        0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

        SHA512

        63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

      • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

        Filesize

        330.4MB

        MD5

        ddcecd0f4b55ac48a01afa385c79fd2d

        SHA1

        837e8506803936eef303a53f10dae6beb2e172d1

        SHA256

        eb5beb019da4e77407c90d8cb196ea03646f8995d13aeb7ef7bce9e0dec1f010

        SHA512

        08289535019bd765d7a4a1458cffdceb687ec050ce8363dec5c7b42e8bdc99de5ac0325919a2e0294a75155c8eb727ae61b82c2fad2d203a9b45b6414dfee6ce

      • memory/1052-200-0x000000013F080000-0x0000000140020000-memory.dmp

        Filesize

        15.6MB

      • memory/1052-190-0x000000013F080000-0x0000000140020000-memory.dmp

        Filesize

        15.6MB

      • memory/1112-181-0x0000000002220000-0x00000000022A0000-memory.dmp

        Filesize

        512KB

      • memory/1112-172-0x0000000002220000-0x00000000022A0000-memory.dmp

        Filesize

        512KB

      • memory/1112-170-0x00000000022D0000-0x00000000022D8000-memory.dmp

        Filesize

        32KB

      • memory/1112-174-0x0000000002220000-0x00000000022A0000-memory.dmp

        Filesize

        512KB

      • memory/1112-169-0x000000001B050000-0x000000001B332000-memory.dmp

        Filesize

        2.9MB

      • memory/1112-177-0x0000000002220000-0x00000000022A0000-memory.dmp

        Filesize

        512KB

      • memory/1112-173-0x0000000002220000-0x00000000022A0000-memory.dmp

        Filesize

        512KB

      • memory/1112-178-0x0000000002220000-0x00000000022A0000-memory.dmp

        Filesize

        512KB

      • memory/1112-182-0x0000000002220000-0x00000000022A0000-memory.dmp

        Filesize

        512KB

      • memory/1644-161-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-140-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-152-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-138-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-139-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-141-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-142-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-143-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-146-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-162-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-145-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1644-159-0x00000000013C0000-0x0000000001CDD000-memory.dmp

        Filesize

        9.1MB

      • memory/1672-60-0x0000000000390000-0x00000000003AC000-memory.dmp

        Filesize

        112KB

      • memory/1672-62-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-74-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-76-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-70-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-72-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-66-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-55-0x00000000010F0000-0x0000000001658000-memory.dmp

        Filesize

        5.4MB

      • memory/1672-61-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-80-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-78-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-92-0x00000000003B0000-0x00000000003B1000-memory.dmp

        Filesize

        4KB

      • memory/1672-68-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-91-0x0000000004F90000-0x0000000004FD0000-memory.dmp

        Filesize

        256KB

      • memory/1672-57-0x00000000010F0000-0x0000000001658000-memory.dmp

        Filesize

        5.4MB

      • memory/1672-64-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-59-0x00000000010F0000-0x0000000001658000-memory.dmp

        Filesize

        5.4MB

      • memory/1672-82-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/1672-98-0x00000000010F0000-0x0000000001658000-memory.dmp

        Filesize

        5.4MB

      • memory/1672-84-0x0000000000390000-0x00000000003A5000-memory.dmp

        Filesize

        84KB

      • memory/2164-160-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-130-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-125-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-126-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-127-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-119-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-122-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-123-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-124-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-147-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2164-186-0x000000013FC00000-0x0000000140BA0000-memory.dmp

        Filesize

        15.6MB

      • memory/2336-120-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-112-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-132-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-131-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-129-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-121-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-115-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-114-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-113-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-137-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-111-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2336-108-0x0000000000F60000-0x000000000187D000-memory.dmp

        Filesize

        9.1MB

      • memory/2424-208-0x0000000001040000-0x00000000010C0000-memory.dmp

        Filesize

        512KB

      • memory/2424-209-0x0000000001040000-0x00000000010C0000-memory.dmp

        Filesize

        512KB

      • memory/2424-210-0x0000000001040000-0x00000000010C0000-memory.dmp

        Filesize

        512KB

      • memory/2776-191-0x000000013F080000-0x0000000140020000-memory.dmp

        Filesize

        15.6MB

      • memory/2776-201-0x000000013F080000-0x0000000140020000-memory.dmp

        Filesize

        15.6MB

      • memory/2876-94-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2876-89-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2876-85-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2876-86-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2876-87-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2876-88-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2876-90-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2876-107-0x0000000007690000-0x0000000007FAD000-memory.dmp

        Filesize

        9.1MB

      • memory/2876-101-0x0000000000D60000-0x0000000000DA0000-memory.dmp

        Filesize

        256KB

      • memory/2876-100-0x0000000000D60000-0x0000000000DA0000-memory.dmp

        Filesize

        256KB

      • memory/2876-99-0x0000000000320000-0x0000000000326000-memory.dmp

        Filesize

        24KB

      • memory/2876-96-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3036-153-0x0000000002290000-0x0000000002310000-memory.dmp

        Filesize

        512KB

      • memory/3036-158-0x0000000002290000-0x0000000002310000-memory.dmp

        Filesize

        512KB

      • memory/3036-154-0x0000000002290000-0x0000000002310000-memory.dmp

        Filesize

        512KB

      • memory/3036-155-0x000000001B100000-0x000000001B3E2000-memory.dmp

        Filesize

        2.9MB

      • memory/3036-156-0x0000000001E90000-0x0000000001E98000-memory.dmp

        Filesize

        32KB

      • memory/3036-157-0x0000000002290000-0x0000000002310000-memory.dmp

        Filesize

        512KB