Analysis

  • max time kernel
    39s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-08-2023 00:33

General

  • Target

    9b6b6c5cf8dbafd06176a1f8e5a7cf7fc78a5ffb86df627e6de4eb455506b847.exe

  • Size

    6.5MB

  • MD5

    89e9bc7a5d97370a0f4a35041a54a696

  • SHA1

    c0e8572f48b2e5f83c39374f4175e35a5e7c2029

  • SHA256

    9b6b6c5cf8dbafd06176a1f8e5a7cf7fc78a5ffb86df627e6de4eb455506b847

  • SHA512

    12100def3ac697a0fce815a3be2e41bb62f47f8a60b273c3cf367096c231c86110903322d8f351d8609f7f5f72f5aaf45d6539e09972c54221697820ece570f2

  • SSDEEP

    196608:3PbBDSjGzSuyKff2j6pdVY3d2dZo2tOuAX+W6+B6VJN1lev:3JKGzXuTwdZdLM+JS

Malware Config

Extracted

Family

amadey

Version

3.80

C2

45.15.156.208/jd9dd3Vw/index.php

second.amadgood.com/jd9dd3Vw/index.php

Extracted

Family

laplas

C2

http://206.189.229.43

Attributes
  • api_key

    f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 5 IoCs
  • Themida packer 14 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3304
      • C:\Users\Admin\AppData\Local\Temp\9b6b6c5cf8dbafd06176a1f8e5a7cf7fc78a5ffb86df627e6de4eb455506b847.exe
        "C:\Users\Admin\AppData\Local\Temp\9b6b6c5cf8dbafd06176a1f8e5a7cf7fc78a5ffb86df627e6de4eb455506b847.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3468
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F
            4⤵
            • Creates scheduled task(s)
            PID:1520
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1032
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              5⤵
                PID:3484
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                5⤵
                  PID:3592
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  5⤵
                    PID:2688
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    5⤵
                      PID:2536
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\eb0f58bce7" /P "Admin:N"
                      5⤵
                        PID:2468
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\eb0f58bce7" /P "Admin:R" /E
                        5⤵
                          PID:4452
                      • C:\Users\Admin\AppData\Local\Temp\1000127001\taskmask.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000127001\taskmask.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:4588
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          5⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5068
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 128
                          5⤵
                          • Program crash
                          PID:3604
                      • C:\Users\Admin\AppData\Local\Temp\1000128101\rdpcllp.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000128101\rdpcllp.exe"
                        4⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Executes dropped EXE
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4608
                      • C:\Users\Admin\AppData\Local\Temp\1000129001\taskhostclp.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000129001\taskhostclp.exe"
                        4⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:4676
                        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                          5⤵
                            PID:2380
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3488
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                      2⤵
                        PID:1272
                        • C:\Windows\System32\sc.exe
                          sc stop WaaSMedicSvc
                          3⤵
                          • Launches sc.exe
                          PID:3600
                        • C:\Windows\System32\sc.exe
                          sc stop dosvc
                          3⤵
                          • Launches sc.exe
                          PID:3320
                        • C:\Windows\System32\sc.exe
                          sc stop bits
                          3⤵
                          • Launches sc.exe
                          PID:4944
                        • C:\Windows\System32\sc.exe
                          sc stop wuauserv
                          3⤵
                          • Launches sc.exe
                          PID:4476
                        • C:\Windows\System32\sc.exe
                          sc stop UsoSvc
                          3⤵
                          • Launches sc.exe
                          PID:312
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                        2⤵
                          PID:3124
                        • C:\Windows\System32\cmd.exe
                          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                          2⤵
                            PID:4124
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-ac 0
                              3⤵
                                PID:5064
                              • C:\Windows\System32\powercfg.exe
                                powercfg /x -hibernate-timeout-dc 0
                                3⤵
                                  PID:196
                                • C:\Windows\System32\powercfg.exe
                                  powercfg /x -standby-timeout-dc 0
                                  3⤵
                                    PID:3484
                                  • C:\Windows\System32\powercfg.exe
                                    powercfg /x -standby-timeout-ac 0
                                    3⤵
                                      PID:1200
                                  • C:\Windows\System32\schtasks.exe
                                    C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                    2⤵
                                      PID:2220
                                  • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
                                    C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
                                    1⤵
                                    • Executes dropped EXE
                                    PID:4672

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                    Filesize

                                    3KB

                                    MD5

                                    ad5cd538ca58cb28ede39c108acb5785

                                    SHA1

                                    1ae910026f3dbe90ed025e9e96ead2b5399be877

                                    SHA256

                                    c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                    SHA512

                                    c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    1KB

                                    MD5

                                    4158e99cbe1e3ae856753bdb5aac59aa

                                    SHA1

                                    6475a9e8d6702a78dbbcb0d23d9545bab3d644cc

                                    SHA256

                                    fbaa696f4925f7587e5aec17bf0791a881a2075201c74b173ab4288538225636

                                    SHA512

                                    ecdab10f6b01627ebdbd112c52376ad755e8d50e72bf52a231fc16970a01fa0a3e01b452877f871edeb0d50cd15e5a48a73d9b3ef8c5c98a2d3f6ec9b71dfd59

                                  • C:\Users\Admin\AppData\Local\Temp\1000127001\taskmask.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    f8f7c8c4cc25ba49c5b591aab8bfdc04

                                    SHA1

                                    6ed43db5ba58257c1283abfa8a08290ccf896033

                                    SHA256

                                    67cd8472366ecda8a195fc8a44e4747429f8d2e6d8c16d0c15a0e5a500506feb

                                    SHA512

                                    6e7fbd61fdf4cdcfed8f78a4d2272bb204bbd579cec94c4a45569bef9c5c62be22117545030a91291cae0cee6dea7454ab57fa16907d26d9a39cd7275bdbb9b5

                                  • C:\Users\Admin\AppData\Local\Temp\1000127001\taskmask.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    f8f7c8c4cc25ba49c5b591aab8bfdc04

                                    SHA1

                                    6ed43db5ba58257c1283abfa8a08290ccf896033

                                    SHA256

                                    67cd8472366ecda8a195fc8a44e4747429f8d2e6d8c16d0c15a0e5a500506feb

                                    SHA512

                                    6e7fbd61fdf4cdcfed8f78a4d2272bb204bbd579cec94c4a45569bef9c5c62be22117545030a91291cae0cee6dea7454ab57fa16907d26d9a39cd7275bdbb9b5

                                  • C:\Users\Admin\AppData\Local\Temp\1000127001\taskmask.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    f8f7c8c4cc25ba49c5b591aab8bfdc04

                                    SHA1

                                    6ed43db5ba58257c1283abfa8a08290ccf896033

                                    SHA256

                                    67cd8472366ecda8a195fc8a44e4747429f8d2e6d8c16d0c15a0e5a500506feb

                                    SHA512

                                    6e7fbd61fdf4cdcfed8f78a4d2272bb204bbd579cec94c4a45569bef9c5c62be22117545030a91291cae0cee6dea7454ab57fa16907d26d9a39cd7275bdbb9b5

                                  • C:\Users\Admin\AppData\Local\Temp\1000128101\rdpcllp.exe

                                    Filesize

                                    8.4MB

                                    MD5

                                    768200a76def472e675539094047bed9

                                    SHA1

                                    24bc17689541656a8a12902c7f19bd991193ca50

                                    SHA256

                                    79ff7ea339f95a557cec5e39d944118af6c105c29736e448d5aad60368eae5af

                                    SHA512

                                    143cfc563ebd3f57192adc4484ba0b4b246c4b63d3f10b0e90e83ea841ea83488636233eb58a8217fd1a9dd825075f28e0b1f858bc9e4a5fd5abb6e0712fabbb

                                  • C:\Users\Admin\AppData\Local\Temp\1000128101\rdpcllp.exe

                                    Filesize

                                    8.4MB

                                    MD5

                                    768200a76def472e675539094047bed9

                                    SHA1

                                    24bc17689541656a8a12902c7f19bd991193ca50

                                    SHA256

                                    79ff7ea339f95a557cec5e39d944118af6c105c29736e448d5aad60368eae5af

                                    SHA512

                                    143cfc563ebd3f57192adc4484ba0b4b246c4b63d3f10b0e90e83ea841ea83488636233eb58a8217fd1a9dd825075f28e0b1f858bc9e4a5fd5abb6e0712fabbb

                                  • C:\Users\Admin\AppData\Local\Temp\1000128101\rdpcllp.exe

                                    Filesize

                                    8.4MB

                                    MD5

                                    768200a76def472e675539094047bed9

                                    SHA1

                                    24bc17689541656a8a12902c7f19bd991193ca50

                                    SHA256

                                    79ff7ea339f95a557cec5e39d944118af6c105c29736e448d5aad60368eae5af

                                    SHA512

                                    143cfc563ebd3f57192adc4484ba0b4b246c4b63d3f10b0e90e83ea841ea83488636233eb58a8217fd1a9dd825075f28e0b1f858bc9e4a5fd5abb6e0712fabbb

                                  • C:\Users\Admin\AppData\Local\Temp\1000129001\taskhostclp.exe

                                    Filesize

                                    4.0MB

                                    MD5

                                    3258deefff3ca70f3dfa3e67067ca611

                                    SHA1

                                    a28ec103c22b03f381dd72073cf620b11881b7b7

                                    SHA256

                                    11c3e7a62b3e78c6ec720aea618bf0a3854ad42535f888532c3e206f3724db4c

                                    SHA512

                                    541eec13adbb3afcc6ee0cfea2d1ddd71036a0da9be5fe6919a2becca5dc23089754d2e5bfd15886cd8e3981f982e40d28bb467132cfdf04844d930ca612b3b8

                                  • C:\Users\Admin\AppData\Local\Temp\1000129001\taskhostclp.exe

                                    Filesize

                                    4.0MB

                                    MD5

                                    3258deefff3ca70f3dfa3e67067ca611

                                    SHA1

                                    a28ec103c22b03f381dd72073cf620b11881b7b7

                                    SHA256

                                    11c3e7a62b3e78c6ec720aea618bf0a3854ad42535f888532c3e206f3724db4c

                                    SHA512

                                    541eec13adbb3afcc6ee0cfea2d1ddd71036a0da9be5fe6919a2becca5dc23089754d2e5bfd15886cd8e3981f982e40d28bb467132cfdf04844d930ca612b3b8

                                  • C:\Users\Admin\AppData\Local\Temp\1000129001\taskhostclp.exe

                                    Filesize

                                    4.0MB

                                    MD5

                                    3258deefff3ca70f3dfa3e67067ca611

                                    SHA1

                                    a28ec103c22b03f381dd72073cf620b11881b7b7

                                    SHA256

                                    11c3e7a62b3e78c6ec720aea618bf0a3854ad42535f888532c3e206f3724db4c

                                    SHA512

                                    541eec13adbb3afcc6ee0cfea2d1ddd71036a0da9be5fe6919a2becca5dc23089754d2e5bfd15886cd8e3981f982e40d28bb467132cfdf04844d930ca612b3b8

                                  • C:\Users\Admin\AppData\Local\Temp\229013990333

                                    Filesize

                                    72KB

                                    MD5

                                    8f6198846ac42278f602ea7baf8d11dd

                                    SHA1

                                    3892e8eb59e56579854e8d00f56f3ae27fa8dd57

                                    SHA256

                                    eaef1156b7c456810afedee18ac6b6f86a1962780ac3360e90cba37f0b9ffb81

                                    SHA512

                                    710f42bd5c4154265638515769e533c730f4b8e3d80fb8fb5bbed3f9b03ebebaddac122639ac2f6cd3a22ad1b5532a8b35bdc9229ba4cd294b328b94c2ee46f3

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q05bj41i.cax.ps1

                                    Filesize

                                    1B

                                    MD5

                                    c4ca4238a0b923820dcc509a6f75849b

                                    SHA1

                                    356a192b7913b04c54574d18c28d46e6395428ab

                                    SHA256

                                    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                    SHA512

                                    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                  • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                                    Filesize

                                    6.5MB

                                    MD5

                                    89e9bc7a5d97370a0f4a35041a54a696

                                    SHA1

                                    c0e8572f48b2e5f83c39374f4175e35a5e7c2029

                                    SHA256

                                    9b6b6c5cf8dbafd06176a1f8e5a7cf7fc78a5ffb86df627e6de4eb455506b847

                                    SHA512

                                    12100def3ac697a0fce815a3be2e41bb62f47f8a60b273c3cf367096c231c86110903322d8f351d8609f7f5f72f5aaf45d6539e09972c54221697820ece570f2

                                  • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                                    Filesize

                                    6.5MB

                                    MD5

                                    89e9bc7a5d97370a0f4a35041a54a696

                                    SHA1

                                    c0e8572f48b2e5f83c39374f4175e35a5e7c2029

                                    SHA256

                                    9b6b6c5cf8dbafd06176a1f8e5a7cf7fc78a5ffb86df627e6de4eb455506b847

                                    SHA512

                                    12100def3ac697a0fce815a3be2e41bb62f47f8a60b273c3cf367096c231c86110903322d8f351d8609f7f5f72f5aaf45d6539e09972c54221697820ece570f2

                                  • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                                    Filesize

                                    6.5MB

                                    MD5

                                    89e9bc7a5d97370a0f4a35041a54a696

                                    SHA1

                                    c0e8572f48b2e5f83c39374f4175e35a5e7c2029

                                    SHA256

                                    9b6b6c5cf8dbafd06176a1f8e5a7cf7fc78a5ffb86df627e6de4eb455506b847

                                    SHA512

                                    12100def3ac697a0fce815a3be2e41bb62f47f8a60b273c3cf367096c231c86110903322d8f351d8609f7f5f72f5aaf45d6539e09972c54221697820ece570f2

                                  • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                                    Filesize

                                    6.5MB

                                    MD5

                                    89e9bc7a5d97370a0f4a35041a54a696

                                    SHA1

                                    c0e8572f48b2e5f83c39374f4175e35a5e7c2029

                                    SHA256

                                    9b6b6c5cf8dbafd06176a1f8e5a7cf7fc78a5ffb86df627e6de4eb455506b847

                                    SHA512

                                    12100def3ac697a0fce815a3be2e41bb62f47f8a60b273c3cf367096c231c86110903322d8f351d8609f7f5f72f5aaf45d6539e09972c54221697820ece570f2

                                  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                                    Filesize

                                    530.8MB

                                    MD5

                                    e92b004c544b19c6d116bb6655dfa057

                                    SHA1

                                    8631cabb2d81079acc5a4abd0e521f110deec3ec

                                    SHA256

                                    2a64d0724a695cae093e6aca307019d2a087c395410796a6fcad4060b7f30da4

                                    SHA512

                                    83cecdd0fdaf142947b0e66621e7e8cf61f5584677b42d67f3b01b721fcd81b60eb6c89336ab7aee5033a8e340c0356f377efa72afa12a515c26187a343b4f53

                                  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                                    Filesize

                                    523.4MB

                                    MD5

                                    8a68fad865d671cf6412ae8be84bfd20

                                    SHA1

                                    059c17228d1f9fcca423a3e3c5c864730dd6d8fb

                                    SHA256

                                    06b36112725f02b85daec0e69ec7e6da573098089fc3b557f9eb019c218eadc7

                                    SHA512

                                    f840c0cf8652e1212950f090837e54f8d9ad497dc5ed26d8ff26c80bcb30756dcf6dd84b119241ca4fa5e142a0be3def1713bf4713402df2b074e16fd24c8adf

                                  • memory/2380-577-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-519-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-604-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-675-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-581-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-680-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-730-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-709-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-499-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-507-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-569-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-693-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-552-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-544-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-540-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-536-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-534-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-513-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-527-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-514-0x00007FFFD5970000-0x00007FFFD5B4B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/2380-522-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-517-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/2380-697-0x00007FFFD5970000-0x00007FFFD5B4B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/3124-610-0x00000186F65C0000-0x00000186F65D0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3124-571-0x00007FFFB9DD0000-0x00007FFFBA7BC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/3124-689-0x00007FFFB9DD0000-0x00007FFFBA7BC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/3124-573-0x00000186F65C0000-0x00000186F65D0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3124-572-0x00000186F65C0000-0x00000186F65D0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3468-133-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3468-135-0x0000000000180000-0x0000000000C21000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/3468-163-0x0000000000180000-0x0000000000C21000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/3488-289-0x000002794CC70000-0x000002794CC80000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3488-366-0x000002794CC70000-0x000002794CC80000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3488-550-0x000002794CC70000-0x000002794CC80000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3488-560-0x00007FFFB9DD0000-0x00007FFFBA7BC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/3488-460-0x000002794CC70000-0x000002794CC80000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3488-458-0x000002794CC70000-0x000002794CC80000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3488-429-0x000002794CC70000-0x000002794CC80000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3488-413-0x00007FFFB9DD0000-0x00007FFFBA7BC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/3488-280-0x00007FFFB9DD0000-0x00007FFFBA7BC000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/3488-283-0x000002794CC70000-0x000002794CC80000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3488-320-0x00000279655E0000-0x0000027965656000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/3488-291-0x00000279654B0000-0x00000279654D2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3564-120-0x0000000000790000-0x0000000000791000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3564-121-0x0000000001330000-0x0000000001DD1000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/3564-122-0x0000000001330000-0x0000000001DD1000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/3564-132-0x0000000001330000-0x0000000001DD1000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/4588-181-0x00000000013B0000-0x000000000156F000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/4608-194-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-178-0x00007FFFD5970000-0x00007FFFD5B4B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/4608-191-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-597-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-195-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-217-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-176-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-190-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-177-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-602-0x00007FFFD5970000-0x00007FFFD5B4B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/4608-566-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-188-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4608-245-0x00007FFFD5970000-0x00007FFFD5B4B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/4608-319-0x00007FF6AFF00000-0x00007FF6B0D4A000-memory.dmp

                                    Filesize

                                    14.3MB

                                  • memory/4672-575-0x0000000000180000-0x0000000000C21000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/4672-357-0x0000000001190000-0x0000000001191000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4672-503-0x0000000000180000-0x0000000000C21000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/4672-354-0x0000000000180000-0x0000000000C21000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/4672-356-0x0000000000180000-0x0000000000C21000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/4676-364-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-231-0x00007FFFD5970000-0x00007FFFD5B4B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/4676-222-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-498-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-252-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-255-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-258-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-265-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-287-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-240-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-324-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-247-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-243-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-237-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-505-0x00007FFFD5970000-0x00007FFFD5B4B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/4676-355-0x00007FFFD5970000-0x00007FFFD5B4B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/4676-249-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/4676-234-0x0000000000B50000-0x0000000001493000-memory.dmp

                                    Filesize

                                    9.3MB

                                  • memory/5068-199-0x000000000B490000-0x000000000B4A2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/5068-197-0x000000000B310000-0x000000000B31A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/5068-192-0x000000000B670000-0x000000000BB6E000-memory.dmp

                                    Filesize

                                    5.0MB

                                  • memory/5068-196-0x000000000B200000-0x000000000B210000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5068-193-0x000000000B250000-0x000000000B2E2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/5068-487-0x0000000008D00000-0x0000000008D1E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/5068-226-0x000000000D140000-0x000000000D1B6000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/5068-198-0x000000000C180000-0x000000000C786000-memory.dmp

                                    Filesize

                                    6.0MB

                                  • memory/5068-189-0x0000000072490000-0x0000000072B7E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/5068-179-0x0000000000400000-0x000000000045A000-memory.dmp

                                    Filesize

                                    360KB

                                  • memory/5068-269-0x000000000B200000-0x000000000B210000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5068-200-0x000000000BB70000-0x000000000BC7A000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/5068-262-0x0000000072490000-0x0000000072B7E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/5068-201-0x000000000B500000-0x000000000B53E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/5068-202-0x000000000B560000-0x000000000B5AB000-memory.dmp

                                    Filesize

                                    300KB

                                  • memory/5068-216-0x000000000BD30000-0x000000000BD96000-memory.dmp

                                    Filesize

                                    408KB