Analysis

  • max time kernel
    111s
  • max time network
    262s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 22:24

General

  • Target

    1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe

  • Size

    2.8MB

  • MD5

    d2bf840dc942875d4c7b0514e276b3a8

  • SHA1

    6f24363af15cf0c681ae0d0798537abde40eaf5a

  • SHA256

    1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a

  • SHA512

    e6632291603f16f44a6f9bc4b380c9c6a042db37c5671b292b12f44bf482a5261fa8cd32d40275086ad463f6981caf5dbc27b894b715cda61e7650a3ad661138

  • SSDEEP

    49152:bEfP5+ZCHEINQvII48Cbi++G+scRJSR3EJ3M6pBVP3+:G5gCkIQvII48C2D3sKJ0EJjpB9O

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.93:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 19 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe
    "C:\Users\Admin\AppData\Local\Temp\1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe
        "C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2844
      • C:\Users\Admin\AppData\Local\Temp\1000055001\06ea315373.exe
        "C:\Users\Admin\AppData\Local\Temp\1000055001\06ea315373.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:596
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7049758,0x7fef7049768,0x7fef7049778
            5⤵
              PID:784
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:2
              5⤵
                PID:1708
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:8
                5⤵
                  PID:2164
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:8
                  5⤵
                    PID:788
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:1
                    5⤵
                      PID:2940
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2244 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:1
                      5⤵
                        PID:2936
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3240 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:1
                        5⤵
                          PID:2368
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1376 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:2
                          5⤵
                            PID:1056
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3404 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:8
                            5⤵
                              PID:1732
                        • C:\Users\Admin\AppData\Local\Temp\1000056001\aa41c87a8f.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000056001\aa41c87a8f.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1044
                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                          "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                          3⤵
                            PID:2064
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                            3⤵
                            • Loads dropped DLL
                            PID:2712
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                              4⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2348
                              • C:\Windows\system32\netsh.exe
                                netsh wlan show profiles
                                5⤵
                                  PID:2584
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\248906074286_Desktop.zip' -CompressionLevel Optimal
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1516
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                              3⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              PID:2416
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:2536

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  aefd77f47fb84fae5ea194496b44c67a

                                  SHA1

                                  dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                  SHA256

                                  4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                  SHA512

                                  b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  ab25583d08d74b9d41cfa6bb104943dc

                                  SHA1

                                  22b62d0d3994d9af9ece034363e280a72687920e

                                  SHA256

                                  3421635479c3e21caf324ac90f743a2aaf6b73b5cc7470cc06972e1b09a6839b

                                  SHA512

                                  67c9f82a5dc8355564ad73156b1646edb8cdee5cf9d652886f6a1890c3eb5be693afc3887879be5debc5753f345329e8c2559a9258e60b182ed83b299aa66f37

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  604d1f2115c48ba3af58aaeadaccd56c

                                  SHA1

                                  e7792c4cab6b98c505cb435cb37485984ce992c0

                                  SHA256

                                  853928701a4b5daecb158f4d74b9033c888f4a526bbf77226123ae463eaaf4cf

                                  SHA512

                                  8730b49e57de8d8e040586a5c58802ef9e4473fc9e131b56ace26f608ef524e92c65186a9d85ba618e7e3c98a61b0d6ecebd0489695a393b7d7fc857a09b0ad9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  a9bb4f40af4f30c6775ee00bfe772e48

                                  SHA1

                                  eebaf19f415b8040463d098ba99bc124b2287b7b

                                  SHA256

                                  a0b38397870732e0ef260b841b584c98b51b2ae655933b3e495f5a21c012b017

                                  SHA512

                                  7eced0205ccf66dcfbc3bb6c4ee45dfa87ca383440b5c5e2d68b55d98b507016873020bad52865299742d1d4b7a4c09520979d4f58a11918183a657efe35474f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  9b540f0bd7823c5ea90be0e07852af67

                                  SHA1

                                  9e677806e4c0cd7bfe77a4f9f1ebea4ec66d1cf9

                                  SHA256

                                  f876b6023024f7e68c5c6c2568b026f7acb2824ae5eb1a49f4449ee42c90bf29

                                  SHA512

                                  627cf7dadb2887e3288672e525eefdc2f96d02c1c9f99530bd2f7c6e8ff68d4099871b92b8d6de491604cb12cc387050356e1de8b67ed1337014a4a6808b8629

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  1ed78f44a2cad6e08da27edbc701b4bc

                                  SHA1

                                  e7a8bc103762db81429b13497c065ac16cac4b85

                                  SHA256

                                  20bd5a075cfee256a6cc19803fb9964834590840ada1212f7eca0a9d990e8359

                                  SHA512

                                  3882675eadbc45a7b534c0efc671551926bbc333275e03e8a4b23fdfc958af231094b65855fceccf6ec7c63ead1ad1a21bf3853e95eb05adca093a7820c22244

                                • C:\Users\Admin\AppData\Local\Temp\1000055001\06ea315373.exe

                                  Filesize

                                  1.1MB

                                  MD5

                                  76c779d2a6e42c6dbcff43e67bb38ca3

                                  SHA1

                                  558f8e6b714efaeaba794e7d2b7821936a4da077

                                  SHA256

                                  e820be731929c621a94de7bd83e0da4796c103632961bda20ffbd568279e6f43

                                  SHA512

                                  516d91d0e635f3468d135bf51f507fe3d81c1fb72c8baccc08a0e7c05c6dcaefd2816ca937cb2f8ca0ab8f4c8e78a2917b22dc10c289221e8450cfba34bebf3e

                                • C:\Users\Admin\AppData\Local\Temp\1000056001\aa41c87a8f.exe

                                  Filesize

                                  2.2MB

                                  MD5

                                  3709ad0a7007bcae942b905a07bd6bba

                                  SHA1

                                  9d25192c841f3b2fb1b9bbb0dfdcec6cdaaca3a7

                                  SHA256

                                  2248caa741ec4d757c597091f2bab56f694181ef5a677bdab47d990e4c7f695a

                                  SHA512

                                  d41cbc49ded02909e0eae68da22988c36993bde9db4025f64d45007d2c47ed07a7cdc1a2b28ae1cb7ecb8d4c5169cb4084650adaddb656caf33b4e0ad85239fc

                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                  Filesize

                                  109KB

                                  MD5

                                  726cd06231883a159ec1ce28dd538699

                                  SHA1

                                  404897e6a133d255ad5a9c26ac6414d7134285a2

                                  SHA256

                                  12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                  SHA512

                                  9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                  Filesize

                                  1.2MB

                                  MD5

                                  15a42d3e4579da615a384c717ab2109b

                                  SHA1

                                  22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                  SHA256

                                  3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                  SHA512

                                  1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                • \Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                  Filesize

                                  2.8MB

                                  MD5

                                  d2bf840dc942875d4c7b0514e276b3a8

                                  SHA1

                                  6f24363af15cf0c681ae0d0798537abde40eaf5a

                                  SHA256

                                  1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a

                                  SHA512

                                  e6632291603f16f44a6f9bc4b380c9c6a042db37c5671b292b12f44bf482a5261fa8cd32d40275086ad463f6981caf5dbc27b894b715cda61e7650a3ad661138

                                • memory/1044-329-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-263-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-375-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-373-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-371-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-369-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-367-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-365-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-363-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-354-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-352-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-350-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-348-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-346-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-344-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-342-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-340-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-338-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-327-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-325-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-323-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-321-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-319-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-306-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-300-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-291-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-288-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-302-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1044-195-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1044-194-0x00000000028A0000-0x00000000028A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1044-191-0x0000000002730000-0x0000000002732000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1044-193-0x0000000002380000-0x0000000002381000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1044-190-0x00000000001D0000-0x0000000000762000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1512-15-0x00000000009B0000-0x00000000009B1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-10-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-16-0x0000000000E30000-0x0000000000E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-18-0x0000000000820000-0x0000000000821000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-19-0x00000000010D0000-0x00000000010D1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-2-0x0000000001250000-0x000000000155D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1512-31-0x00000000067B0000-0x0000000006ABD000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1512-30-0x0000000001250000-0x000000000155D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1512-1-0x00000000779C0000-0x00000000779C2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1512-4-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-7-0x0000000000810000-0x0000000000811000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-0-0x0000000001250000-0x000000000155D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1512-13-0x0000000000940000-0x0000000000941000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-11-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-14-0x00000000009A0000-0x00000000009A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-3-0x0000000000B40000-0x0000000000B41000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-5-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-6-0x0000000000E20000-0x0000000000E21000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-8-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-9-0x0000000000990000-0x0000000000991000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1512-12-0x0000000000D10000-0x0000000000D11000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-45-0x0000000002170000-0x0000000002171000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-40-0x0000000002160000-0x0000000002161000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-376-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-374-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-66-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-211-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-372-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-370-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-368-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-266-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-184-0x0000000006840000-0x0000000006DD2000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1960-64-0x0000000006840000-0x0000000006D0E000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/1960-289-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-366-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-292-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-98-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-50-0x00000000020B0000-0x00000000020B1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-301-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-33-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-303-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-49-0x0000000002780000-0x0000000002781000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-307-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-364-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-48-0x00000000024F0000-0x00000000024F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-320-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-46-0x0000000002180000-0x0000000002181000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-322-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-34-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-324-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-35-0x0000000002300000-0x0000000002301000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-326-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-37-0x00000000021E0000-0x00000000021E1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-328-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-355-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-330-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-36-0x0000000002320000-0x0000000002321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-353-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-339-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-41-0x0000000002190000-0x0000000002191000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-341-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-42-0x00000000021F0000-0x00000000021F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-343-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-43-0x00000000023D0000-0x00000000023D1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-345-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-44-0x0000000002150000-0x0000000002151000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-347-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-39-0x00000000020A0000-0x00000000020A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-349-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/1960-38-0x00000000023E0000-0x00000000023E1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1960-351-0x0000000000800000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  3.1MB

                                • memory/2844-104-0x00000000001A0000-0x000000000066E000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/2844-93-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-75-0x0000000002510000-0x0000000002511000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-69-0x00000000026F0000-0x00000000026F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-67-0x00000000001A0000-0x000000000066E000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/2844-68-0x00000000025D0000-0x00000000025D1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-97-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-103-0x0000000002B20000-0x0000000002B21000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-79-0x0000000000B90000-0x0000000000B91000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-74-0x0000000000B40000-0x0000000000B41000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-95-0x0000000002A40000-0x0000000002A41000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-70-0x0000000002560000-0x0000000002561000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-65-0x00000000001A0000-0x000000000066E000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/2844-71-0x00000000029F0000-0x00000000029F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-76-0x0000000002570000-0x0000000002571000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-72-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-78-0x0000000000B30000-0x0000000000B31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-73-0x00000000025C0000-0x00000000025C1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2844-77-0x00000000028E0000-0x00000000028E1000-memory.dmp

                                  Filesize

                                  4KB