Analysis

  • max time kernel
    298s
  • max time network
    274s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2023 02:21

General

  • Target

    Setup+Crack+Keygen.exe

  • Size

    4.8MB

  • MD5

    9b22550dbf9d6c659d818ed5f6597347

  • SHA1

    c8e2c16675a72cc73fb0de1246d0fb5c74b703e8

  • SHA256

    90c0d478be8fcbd302388636ee0095355bf2b42b0505e73b9f66b7431e6f777e

  • SHA512

    fdae73f6601d00d64548eac7740fbaa5e954d78628c89bd7264071c4f206296106ca829733962d795bcdd7fa9f1ecf0a6448096a388f021901e96d6710b18012

  • SSDEEP

    98304:j1bPn9bdcp5b4gMReIneNbp8SEP6vyT4gbTx:BbfW5kgMReInui8Wj5

Malware Config

Extracted

Family

amadey

Version

3.85

C2

45.9.74.166/b7djSDcPcZ/index.php

45.9.74.141/b7djSDcPcZ/index.php

Extracted

Family

systembc

C2

5.42.65.67:4298

localhost.exchange:4298

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • VMProtect packed file 26 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup+Crack+Keygen.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup+Crack+Keygen.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\rpxeeqtckqaqcvirh.exe
        "C:\Users\Admin\AppData\Local\Temp\rpxeeqtckqaqcvirh.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
          "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4760
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:3876
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "Admin:N"&&CACLS "bstyoops.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "Admin:N"&&CACLS "..\c2868ed41c" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3248
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4640
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "bstyoops.exe" /P "Admin:N"
                6⤵
                  PID:4728
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "bstyoops.exe" /P "Admin:R" /E
                  6⤵
                    PID:4512
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2316
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c2868ed41c" /P "Admin:N"
                      6⤵
                        PID:3588
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\c2868ed41c" /P "Admin:R" /E
                        6⤵
                          PID:3600
                      • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe"
                        5⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3756
                      • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe"
                        5⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4264
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll, rundll
                        5⤵
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:4212
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll, rundll
                          6⤵
                          • Blocklisted process makes network request
                          • Loads dropped DLL
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2684
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll, rundll
                        5⤵
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:3936
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll, rundll
                          6⤵
                          • Blocklisted process makes network request
                          • Loads dropped DLL
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4516
              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2628
              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:3620
              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:4844
              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:4780

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                Filesize

                2.7MB

                MD5

                c895da0796fc8d1b87c7212ef1e5b0b7

                SHA1

                fec2e8a4abb488becf72f53076c5f126859ce254

                SHA256

                38cea09d4c4dece3982e20ff62507dc63c20a5f76f9369156ab0faf0a12eb689

                SHA512

                4cf7d2cab0ca79e5aefa8f8c12d76c7e4f2312da157c90a53e2c3c03fe5381db40dc31226b5c9fa3b96d632d1ac4d65891f8a9f4bef5c85084781729ef8dea99

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                Filesize

                2.7MB

                MD5

                c895da0796fc8d1b87c7212ef1e5b0b7

                SHA1

                fec2e8a4abb488becf72f53076c5f126859ce254

                SHA256

                38cea09d4c4dece3982e20ff62507dc63c20a5f76f9369156ab0faf0a12eb689

                SHA512

                4cf7d2cab0ca79e5aefa8f8c12d76c7e4f2312da157c90a53e2c3c03fe5381db40dc31226b5c9fa3b96d632d1ac4d65891f8a9f4bef5c85084781729ef8dea99

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                Filesize

                2.7MB

                MD5

                c895da0796fc8d1b87c7212ef1e5b0b7

                SHA1

                fec2e8a4abb488becf72f53076c5f126859ce254

                SHA256

                38cea09d4c4dece3982e20ff62507dc63c20a5f76f9369156ab0faf0a12eb689

                SHA512

                4cf7d2cab0ca79e5aefa8f8c12d76c7e4f2312da157c90a53e2c3c03fe5381db40dc31226b5c9fa3b96d632d1ac4d65891f8a9f4bef5c85084781729ef8dea99

              • C:\Users\Admin\AppData\Local\Temp\1000057051\BR.exe
                Filesize

                2.7MB

                MD5

                c895da0796fc8d1b87c7212ef1e5b0b7

                SHA1

                fec2e8a4abb488becf72f53076c5f126859ce254

                SHA256

                38cea09d4c4dece3982e20ff62507dc63c20a5f76f9369156ab0faf0a12eb689

                SHA512

                4cf7d2cab0ca79e5aefa8f8c12d76c7e4f2312da157c90a53e2c3c03fe5381db40dc31226b5c9fa3b96d632d1ac4d65891f8a9f4bef5c85084781729ef8dea99

              • C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll
                Filesize

                6.3MB

                MD5

                8cf53c2e44bb0ef6483736ded6e4c93b

                SHA1

                911902a9efba718fb3261d0fd542b30d8b924999

                SHA256

                a2c10b5d95151fefb06479bdf202bbce96a8f0a2db6398b6d4a34d6d2a1784dc

                SHA512

                1fb38d945fa58affca97e715175961a3d4222614ceb7850323f3a86371d1fa5c874978eabee26239e1b1ed30ad0a6126fc2151cf135b046dd62d9b173cceb62d

              • C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll
                Filesize

                6.3MB

                MD5

                8cf53c2e44bb0ef6483736ded6e4c93b

                SHA1

                911902a9efba718fb3261d0fd542b30d8b924999

                SHA256

                a2c10b5d95151fefb06479bdf202bbce96a8f0a2db6398b6d4a34d6d2a1784dc

                SHA512

                1fb38d945fa58affca97e715175961a3d4222614ceb7850323f3a86371d1fa5c874978eabee26239e1b1ed30ad0a6126fc2151cf135b046dd62d9b173cceb62d

              • C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll
                Filesize

                6.3MB

                MD5

                8cf53c2e44bb0ef6483736ded6e4c93b

                SHA1

                911902a9efba718fb3261d0fd542b30d8b924999

                SHA256

                a2c10b5d95151fefb06479bdf202bbce96a8f0a2db6398b6d4a34d6d2a1784dc

                SHA512

                1fb38d945fa58affca97e715175961a3d4222614ceb7850323f3a86371d1fa5c874978eabee26239e1b1ed30ad0a6126fc2151cf135b046dd62d9b173cceb62d

              • C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll
                Filesize

                6.3MB

                MD5

                8cf53c2e44bb0ef6483736ded6e4c93b

                SHA1

                911902a9efba718fb3261d0fd542b30d8b924999

                SHA256

                a2c10b5d95151fefb06479bdf202bbce96a8f0a2db6398b6d4a34d6d2a1784dc

                SHA512

                1fb38d945fa58affca97e715175961a3d4222614ceb7850323f3a86371d1fa5c874978eabee26239e1b1ed30ad0a6126fc2151cf135b046dd62d9b173cceb62d

              • C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll
                Filesize

                6.3MB

                MD5

                8cf53c2e44bb0ef6483736ded6e4c93b

                SHA1

                911902a9efba718fb3261d0fd542b30d8b924999

                SHA256

                a2c10b5d95151fefb06479bdf202bbce96a8f0a2db6398b6d4a34d6d2a1784dc

                SHA512

                1fb38d945fa58affca97e715175961a3d4222614ceb7850323f3a86371d1fa5c874978eabee26239e1b1ed30ad0a6126fc2151cf135b046dd62d9b173cceb62d

              • C:\Users\Admin\AppData\Local\Temp\1000058061\sv64.dll
                Filesize

                6.3MB

                MD5

                8cf53c2e44bb0ef6483736ded6e4c93b

                SHA1

                911902a9efba718fb3261d0fd542b30d8b924999

                SHA256

                a2c10b5d95151fefb06479bdf202bbce96a8f0a2db6398b6d4a34d6d2a1784dc

                SHA512

                1fb38d945fa58affca97e715175961a3d4222614ceb7850323f3a86371d1fa5c874978eabee26239e1b1ed30ad0a6126fc2151cf135b046dd62d9b173cceb62d

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • C:\Users\Admin\AppData\Local\Temp\rpxeeqtckqaqcvirh.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • C:\Users\Admin\AppData\Local\Temp\rpxeeqtckqaqcvirh.exe
                Filesize

                6.5MB

                MD5

                7af7284a37272c65e64b2deb41f6aed9

                SHA1

                c82659430ea52e5c9950811ca5aeea129c1979cc

                SHA256

                0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04

                SHA512

                4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc

              • memory/1256-166-0x0000000000400000-0x0000000000464000-memory.dmp
                Filesize

                400KB

              • memory/1256-171-0x0000000000400000-0x0000000000464000-memory.dmp
                Filesize

                400KB

              • memory/1256-165-0x0000000000400000-0x0000000000464000-memory.dmp
                Filesize

                400KB

              • memory/1256-176-0x0000000000400000-0x0000000000464000-memory.dmp
                Filesize

                400KB

              • memory/1256-167-0x0000000000400000-0x0000000000464000-memory.dmp
                Filesize

                400KB

              • memory/1256-168-0x0000000000400000-0x0000000000464000-memory.dmp
                Filesize

                400KB

              • memory/1712-195-0x00000000002C0000-0x0000000000CC0000-memory.dmp
                Filesize

                10.0MB

              • memory/1712-177-0x0000000001320000-0x0000000001321000-memory.dmp
                Filesize

                4KB

              • memory/1712-179-0x00000000002C0000-0x0000000000CC0000-memory.dmp
                Filesize

                10.0MB

              • memory/1712-178-0x00000000002C0000-0x0000000000CC0000-memory.dmp
                Filesize

                10.0MB

              • memory/2628-302-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/2628-299-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/2628-298-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/2628-297-0x00000000013C0000-0x00000000013C1000-memory.dmp
                Filesize

                4KB

              • memory/2684-274-0x00007FFD86CA0000-0x00007FFD876D9000-memory.dmp
                Filesize

                10.2MB

              • memory/2684-282-0x00007FFD86CA0000-0x00007FFD876D9000-memory.dmp
                Filesize

                10.2MB

              • memory/2684-275-0x00007FFDA5F50000-0x00007FFDA5F52000-memory.dmp
                Filesize

                8KB

              • memory/2684-276-0x00007FFDA5F60000-0x00007FFDA5F62000-memory.dmp
                Filesize

                8KB

              • memory/2684-277-0x00007FFDA5F70000-0x00007FFDA5F72000-memory.dmp
                Filesize

                8KB

              • memory/2684-278-0x00007FFDA52C0000-0x00007FFDA52C2000-memory.dmp
                Filesize

                8KB

              • memory/2684-279-0x00007FFDA52D0000-0x00007FFDA52D2000-memory.dmp
                Filesize

                8KB

              • memory/2684-280-0x00007FFDA3DA0000-0x00007FFDA3DA2000-memory.dmp
                Filesize

                8KB

              • memory/2684-281-0x00007FFDA3DB0000-0x00007FFDA3DB2000-memory.dmp
                Filesize

                8KB

              • memory/2824-155-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-133-0x0000000074930000-0x00000000750E0000-memory.dmp
                Filesize

                7.7MB

              • memory/2824-159-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-161-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-145-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-135-0x0000000004EC0000-0x0000000004F5C000-memory.dmp
                Filesize

                624KB

              • memory/2824-136-0x00000000050D0000-0x00000000050E0000-memory.dmp
                Filesize

                64KB

              • memory/2824-143-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-134-0x0000000000070000-0x000000000054A000-memory.dmp
                Filesize

                4.9MB

              • memory/2824-163-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-137-0x00000000027A0000-0x00000000027A1000-memory.dmp
                Filesize

                4KB

              • memory/2824-157-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-164-0x0000000004E60000-0x0000000004E61000-memory.dmp
                Filesize

                4KB

              • memory/2824-147-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-149-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-151-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-153-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-141-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-140-0x0000000004E40000-0x0000000004E55000-memory.dmp
                Filesize

                84KB

              • memory/2824-139-0x00000000050D0000-0x00000000050E0000-memory.dmp
                Filesize

                64KB

              • memory/2824-170-0x0000000074930000-0x00000000750E0000-memory.dmp
                Filesize

                7.7MB

              • memory/2824-138-0x0000000074930000-0x00000000750E0000-memory.dmp
                Filesize

                7.7MB

              • memory/3620-318-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/3620-316-0x0000000000340000-0x0000000000341000-memory.dmp
                Filesize

                4KB

              • memory/3620-321-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/3620-317-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/3756-245-0x00000000066D0000-0x0000000006BFC000-memory.dmp
                Filesize

                5.2MB

              • memory/3756-237-0x00000000051D0000-0x0000000005774000-memory.dmp
                Filesize

                5.6MB

              • memory/3756-254-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/3756-246-0x0000000006D00000-0x0000000006D1E000-memory.dmp
                Filesize

                120KB

              • memory/3756-244-0x0000000006240000-0x0000000006278000-memory.dmp
                Filesize

                224KB

              • memory/3756-243-0x0000000006210000-0x000000000623E000-memory.dmp
                Filesize

                184KB

              • memory/3756-242-0x00000000059C0000-0x0000000005A26000-memory.dmp
                Filesize

                408KB

              • memory/3756-241-0x0000000005950000-0x00000000059A0000-memory.dmp
                Filesize

                320KB

              • memory/3756-240-0x0000000005120000-0x0000000005196000-memory.dmp
                Filesize

                472KB

              • memory/3756-239-0x0000000005780000-0x0000000005942000-memory.dmp
                Filesize

                1.8MB

              • memory/3756-238-0x0000000005050000-0x00000000050E2000-memory.dmp
                Filesize

                584KB

              • memory/3756-253-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/3756-234-0x0000000000400000-0x0000000000B26000-memory.dmp
                Filesize

                7.1MB

              • memory/3756-233-0x0000000077444000-0x0000000077446000-memory.dmp
                Filesize

                8KB

              • memory/3756-251-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/3756-250-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/3756-225-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/3756-224-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/3756-223-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/3756-222-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/3756-220-0x0000000000400000-0x0000000000B26000-memory.dmp
                Filesize

                7.1MB

              • memory/3756-249-0x0000000000400000-0x0000000000B26000-memory.dmp
                Filesize

                7.1MB

              • memory/4264-257-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/4264-261-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/4264-259-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/4264-258-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/4264-256-0x0000000000400000-0x0000000000B26000-memory.dmp
                Filesize

                7.1MB

              • memory/4264-247-0x0000000000400000-0x0000000000B26000-memory.dmp
                Filesize

                7.1MB

              • memory/4264-232-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/4264-230-0x0000000076130000-0x0000000076220000-memory.dmp
                Filesize

                960KB

              • memory/4264-228-0x0000000000400000-0x0000000000B26000-memory.dmp
                Filesize

                7.1MB

              • memory/4516-285-0x00007FFD86CA0000-0x00007FFD876D9000-memory.dmp
                Filesize

                10.2MB

              • memory/4516-293-0x00007FFD86CA0000-0x00007FFD876D9000-memory.dmp
                Filesize

                10.2MB

              • memory/4760-227-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/4760-197-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/4760-198-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/4760-196-0x00000000012B0000-0x00000000012B1000-memory.dmp
                Filesize

                4KB

              • memory/4780-354-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/4780-355-0x00000000011F0000-0x00000000011F1000-memory.dmp
                Filesize

                4KB

              • memory/4780-359-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/4844-337-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/4844-336-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB

              • memory/4844-340-0x0000000000360000-0x0000000000D60000-memory.dmp
                Filesize

                10.0MB