Analysis

  • max time kernel
    117s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2023 18:31

General

  • Target

    SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe

  • Size

    2.3MB

  • MD5

    3c55617e6b69330386a0350e9f6aa0b4

  • SHA1

    99bff391433cfc610b27f3b2b7ebc3239314f831

  • SHA256

    1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94

  • SHA512

    46eac86da241ab7b98d449e31111c9da154109b493bf62e807cffcdb43767167c994a165d78ec9a4ce24ea4f64ec76edee39daf9408bad3d6e65b64b1b6b1c28

  • SSDEEP

    49152:X4MR20Q9Xz2p2pizrXPHaBXtHqNQ6cBUX0biao10PzFyPawde5Gir:X41MEpyHaZUNFcBUEfoIgPFTir

Malware Config

Extracted

Family

redline

Botnet

120723_rc_11

C2

rcam.tuktuk.ug:11290

Attributes
  • auth_value

    3a7b4b38a7116be1f337083fb37de790

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Themida packer 21 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3156
      • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe
        "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:3940
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:4004
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Users\Admin\AppData\Local\Temp\Octium.exe
                "C:\Users\Admin\AppData\Local\Temp\Octium.exe"
                4⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Adds Run key to start application
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of WriteProcessMemory
                PID:536
                • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                  C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                  5⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:2012
              • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe
                "C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"
                4⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Drops file in Drivers directory
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:3784
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3364
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1036
            • C:\Windows\System32\sc.exe
              sc stop UsoSvc
              3⤵
              • Launches sc.exe
              PID:2296
            • C:\Windows\System32\sc.exe
              sc stop WaaSMedicSvc
              3⤵
              • Launches sc.exe
              PID:5020
            • C:\Windows\System32\sc.exe
              sc stop wuauserv
              3⤵
              • Launches sc.exe
              PID:4756
            • C:\Windows\System32\sc.exe
              sc stop bits
              3⤵
              • Launches sc.exe
              PID:2980
            • C:\Windows\System32\sc.exe
              sc stop dosvc
              3⤵
              • Launches sc.exe
              PID:4696
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4072
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1936
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
                PID:2328
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-dc 0
                3⤵
                  PID:2376
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4808
              • C:\Windows\System32\schtasks.exe
                C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                2⤵
                  PID:2608
              • C:\Program Files\Google\Chrome\updater.exe
                "C:\Program Files\Google\Chrome\updater.exe"
                1⤵
                  PID:3448

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Google\Chrome\updater.exe

                  Filesize

                  12.5MB

                  MD5

                  8dbc96129e97e6f44fe615670544f915

                  SHA1

                  8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                  SHA256

                  0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                  SHA512

                  63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                • C:\Program Files\Google\Chrome\updater.exe

                  Filesize

                  12.5MB

                  MD5

                  8dbc96129e97e6f44fe615670544f915

                  SHA1

                  8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                  SHA256

                  0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                  SHA512

                  63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  d85ba6ff808d9e5444a4b369f5bc2730

                  SHA1

                  31aa9d96590fff6981b315e0b391b575e4c0804a

                  SHA256

                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                  SHA512

                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  944B

                  MD5

                  77d622bb1a5b250869a3238b9bc1402b

                  SHA1

                  d47f4003c2554b9dfc4c16f22460b331886b191b

                  SHA256

                  f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                  SHA512

                  d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                • C:\Users\Admin\AppData\Local\Temp\Octium.exe

                  Filesize

                  4.2MB

                  MD5

                  f206c33258de47d5e05e9f035efc265c

                  SHA1

                  c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

                  SHA256

                  298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

                  SHA512

                  ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

                • C:\Users\Admin\AppData\Local\Temp\Octium.exe

                  Filesize

                  4.2MB

                  MD5

                  f206c33258de47d5e05e9f035efc265c

                  SHA1

                  c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

                  SHA256

                  298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

                  SHA512

                  ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

                • C:\Users\Admin\AppData\Local\Temp\Octium.exe

                  Filesize

                  4.2MB

                  MD5

                  f206c33258de47d5e05e9f035efc265c

                  SHA1

                  c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

                  SHA256

                  298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

                  SHA512

                  ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

                • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

                  Filesize

                  12.5MB

                  MD5

                  8dbc96129e97e6f44fe615670544f915

                  SHA1

                  8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                  SHA256

                  0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                  SHA512

                  63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

                  Filesize

                  12.5MB

                  MD5

                  8dbc96129e97e6f44fe615670544f915

                  SHA1

                  8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                  SHA256

                  0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                  SHA512

                  63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

                  Filesize

                  12.5MB

                  MD5

                  8dbc96129e97e6f44fe615670544f915

                  SHA1

                  8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

                  SHA256

                  0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

                  SHA512

                  63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eeiywckk.0vq.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                  Filesize

                  572.8MB

                  MD5

                  70ef0514a71ef33df618a0fafb821801

                  SHA1

                  043768212bba9285695215d77be6247f5ef2ef73

                  SHA256

                  447ade9217eb81c561474aac91dccec9bbdf06e73cb2aebc04e0669bc7cc595c

                  SHA512

                  00a22ff90b38922a6f36e42b8bd8a67e108c03b1d9107522901e2f6664abbf7dab5d3881090a1268a90aed29ad97ad004a6d3ac196efbfa0bc6a8a22d676b57b

                • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                  Filesize

                  562.1MB

                  MD5

                  c78dfbeae085b9ed74230389978f43bf

                  SHA1

                  ef10a293bfd19be73b949a8ee409ff551f49f4a2

                  SHA256

                  a2565bf6d75050179e07c97ca031d9976ac6ee87488b256a3eacb0a00864a5af

                  SHA512

                  e26c7b3e22d85548066aff11cebc2ab228c69889b657a9a7371933a83c3d3347f44b511c396b493ea279df88f529c726e58a8cd3012611c6923c76e8e5c7679d

                • memory/536-223-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-216-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-199-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-198-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-197-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-196-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-195-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-194-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-193-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-192-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-218-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/536-220-0x0000000000D50000-0x000000000166D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-234-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-278-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-238-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-237-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-233-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-232-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-230-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-229-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-227-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-226-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-258-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-261-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-250-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2012-276-0x0000000000760000-0x000000000107D000-memory.dmp

                  Filesize

                  9.1MB

                • memory/2672-169-0x000000000AF80000-0x000000000B598000-memory.dmp

                  Filesize

                  6.1MB

                • memory/2672-173-0x0000000005330000-0x0000000005340000-memory.dmp

                  Filesize

                  64KB

                • memory/2672-171-0x000000000AA40000-0x000000000AA52000-memory.dmp

                  Filesize

                  72KB

                • memory/2672-176-0x000000000BBF0000-0x000000000C194000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2672-165-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/2672-172-0x000000000AAA0000-0x000000000AADC000-memory.dmp

                  Filesize

                  240KB

                • memory/2672-177-0x000000000B6B0000-0x000000000B716000-memory.dmp

                  Filesize

                  408KB

                • memory/2672-178-0x0000000005330000-0x0000000005340000-memory.dmp

                  Filesize

                  64KB

                • memory/2672-170-0x000000000AB00000-0x000000000AC0A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/2672-179-0x000000000C550000-0x000000000C712000-memory.dmp

                  Filesize

                  1.8MB

                • memory/2672-180-0x000000000D460000-0x000000000D98C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/2672-175-0x000000000B5A0000-0x000000000B632000-memory.dmp

                  Filesize

                  584KB

                • memory/2672-174-0x000000000ADD0000-0x000000000AE46000-memory.dmp

                  Filesize

                  472KB

                • memory/3364-248-0x000001B47A9D0000-0x000001B47A9F2000-memory.dmp

                  Filesize

                  136KB

                • memory/3364-253-0x000001B478920000-0x000001B478930000-memory.dmp

                  Filesize

                  64KB

                • memory/3364-254-0x000001B478920000-0x000001B478930000-memory.dmp

                  Filesize

                  64KB

                • memory/3364-252-0x000001B478920000-0x000001B478930000-memory.dmp

                  Filesize

                  64KB

                • memory/3364-255-0x000001B478920000-0x000001B478930000-memory.dmp

                  Filesize

                  64KB

                • memory/3448-288-0x00007FF6E1F40000-0x00007FF6E2EE0000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-211-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-259-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-217-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-228-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-215-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-214-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-213-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-212-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-283-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-210-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-208-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-277-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/3784-280-0x00007FF614FF0000-0x00007FF615F90000-memory.dmp

                  Filesize

                  15.6MB

                • memory/4808-160-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-142-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-136-0x0000000000AA0000-0x0000000001008000-memory.dmp

                  Filesize

                  5.4MB

                • memory/4808-144-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-146-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-148-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-150-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-152-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-141-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-140-0x0000000000AA0000-0x0000000001008000-memory.dmp

                  Filesize

                  5.4MB

                • memory/4808-274-0x0000010E95380000-0x0000010E95390000-memory.dmp

                  Filesize

                  64KB

                • memory/4808-275-0x0000010E95380000-0x0000010E95390000-memory.dmp

                  Filesize

                  64KB

                • memory/4808-154-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-156-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-158-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-162-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-164-0x0000000003190000-0x00000000031A5000-memory.dmp

                  Filesize

                  84KB

                • memory/4808-138-0x00000000059C0000-0x0000000005A5C000-memory.dmp

                  Filesize

                  624KB

                • memory/4808-137-0x0000000000AA0000-0x0000000001008000-memory.dmp

                  Filesize

                  5.4MB

                • memory/4808-168-0x0000000000AA0000-0x0000000001008000-memory.dmp

                  Filesize

                  5.4MB