Analysis

  • max time kernel
    133s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2022, 10:59

General

  • Target

    50747db71ba614220a8e938f28437cb167a4fdb55bddb59a35d94d10d19ed019.exe

  • Size

    6.0MB

  • MD5

    787d32bec19831ea987a6f00867f253d

  • SHA1

    28e245d9af7a213fdb76ae28a9fbc12a0344c586

  • SHA256

    50747db71ba614220a8e938f28437cb167a4fdb55bddb59a35d94d10d19ed019

  • SHA512

    b1cecf99d39618dfc4e0a8fe7598f475f4768a60b1293137dfb7d9964b549580b81490d3c3616a547c24bac0d75d074c24505cee5a6ef41e20fdf25f1b05ed89

  • SSDEEP

    98304:4o1No6oFFZHXMAow+cvJuhyPfxpgUdVfP+HUQ:4o1No6oF/cTw+cvJuhyXxpgUdJP+7

Malware Config

Extracted

Family

redline

Botnet

sep16as1

C2

185.215.113.122:15386

Attributes
  • auth_value

    01795623e4e3747594c759aa084bc4a0

Extracted

Family

redline

Botnet

Lyla.18.9

C2

185.215.113.216:21921

Attributes
  • auth_value

    d571a99ea018ea37bb80eca1ffdd7368

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Detectes Phoenix Miner Payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50747db71ba614220a8e938f28437cb167a4fdb55bddb59a35d94d10d19ed019.exe
    "C:\Users\Admin\AppData\Local\Temp\50747db71ba614220a8e938f28437cb167a4fdb55bddb59a35d94d10d19ed019.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\50747db71ba614220a8e938f28437cb167a4fdb55bddb59a35d94d10d19ed019.exe
      "C:\Users\Admin\AppData\Local\Temp\50747db71ba614220a8e938f28437cb167a4fdb55bddb59a35d94d10d19ed019.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3948
        • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          C:\Users\Admin\AppData\Roaming\explorer\explorer.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe
            -pool us-etc.2miners.com:1010 -wal 0xB7b2553E9b6DC10186ddD09AB9fbE71C68da0851.ferms -epsw x -mode 1 -log 0 -mport 0 -etha 0 -ftime 55 -retrydelay 1 -coin etc
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:2164
      • C:\Users\Admin\AppData\Local\Temp\6ECH275E1CH7CF2.exe
        "C:\Users\Admin\AppData\Local\Temp\6ECH275E1CH7CF2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Users\Admin\AppData\Local\Temp\6ECH275E1CH7CF2.exe
          "C:\Users\Admin\AppData\Local\Temp\6ECH275E1CH7CF2.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3240
      • C:\Users\Admin\AppData\Local\Temp\GGFBH3I8IF8JDCL.exe
        "C:\Users\Admin\AppData\Local\Temp\GGFBH3I8IF8JDCL.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Users\Admin\AppData\Local\Temp\GGFBH3I8IF8JDCL.exe
          "C:\Users\Admin\AppData\Local\Temp\GGFBH3I8IF8JDCL.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5052
      • C:\Users\Admin\AppData\Local\Temp\7951C5L8B1C96E8.exe
        "C:\Users\Admin\AppData\Local\Temp\7951C5L8B1C96E8.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4196
        • C:\Users\Admin\AppData\Local\Temp\7951C5L8B1C96E8.exe
          "C:\Users\Admin\AppData\Local\Temp\7951C5L8B1C96E8.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:3944
      • C:\Users\Admin\AppData\Local\Temp\42IL8E89KIG0EAH.exe
        "C:\Users\Admin\AppData\Local\Temp\42IL8E89KIG0EAH.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3268
        • C:\Windows\SysWOW64\control.exe
          "C:\Windows\System32\control.exe" .\DRuBd.S2
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\DRuBd.S2
            5⤵
            • Loads dropped DLL
            PID:4328
            • C:\Windows\system32\RunDll32.exe
              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\DRuBd.S2
              6⤵
                PID:1504
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\DRuBd.S2
                  7⤵
                  • Loads dropped DLL
                  PID:2060
        • C:\Users\Admin\AppData\Local\Temp\42IL8E89KIG0EAH.exe
          https://iplogger.org/1x5az7
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:968
          • C:\Windows\SysWOW64\control.exe
            "C:\Windows\System32\control.exe" .\DRuBd.S2
            4⤵
              PID:4184
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\DRuBd.S2
                5⤵
                • Loads dropped DLL
                PID:1808
                • C:\Windows\system32\RunDll32.exe
                  C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\DRuBd.S2
                  6⤵
                    PID:3488
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\DRuBd.S2
                      7⤵
                      • Loads dropped DLL
                      PID:4108

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\6ECH275E1CH7CF2.exe.log

          Filesize

          42B

          MD5

          84cfdb4b995b1dbf543b26b86c863adc

          SHA1

          d2f47764908bf30036cf8248b9ff5541e2711fa2

          SHA256

          d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

          SHA512

          485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GGFBH3I8IF8JDCL.exe.log

          Filesize

          42B

          MD5

          84cfdb4b995b1dbf543b26b86c863adc

          SHA1

          d2f47764908bf30036cf8248b9ff5541e2711fa2

          SHA256

          d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

          SHA512

          485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

        • C:\Users\Admin\AppData\Local\Temp\42IL8E89KIG0EAH.exe

          Filesize

          1.6MB

          MD5

          59255696be41a82388613b0855ca4647

          SHA1

          fad4933a7f76b7514e4264bf95065b3c1ba4dec1

          SHA256

          b8d116a47471896d3ffa69a75e9f15cdb1c1cf7b5b5cf1a827c1498322bb81c3

          SHA512

          507c7a469f340b180976b49bcf4b580cb65b0bb4378c64145a5c8197d77ed749c09954d1a06827830aaf95e3225501ca0a47933e9d53be104ba58d5f72eee4dc

        • C:\Users\Admin\AppData\Local\Temp\42IL8E89KIG0EAH.exe

          Filesize

          1.6MB

          MD5

          59255696be41a82388613b0855ca4647

          SHA1

          fad4933a7f76b7514e4264bf95065b3c1ba4dec1

          SHA256

          b8d116a47471896d3ffa69a75e9f15cdb1c1cf7b5b5cf1a827c1498322bb81c3

          SHA512

          507c7a469f340b180976b49bcf4b580cb65b0bb4378c64145a5c8197d77ed749c09954d1a06827830aaf95e3225501ca0a47933e9d53be104ba58d5f72eee4dc

        • C:\Users\Admin\AppData\Local\Temp\42IL8E89KIG0EAH.exe

          Filesize

          1.6MB

          MD5

          59255696be41a82388613b0855ca4647

          SHA1

          fad4933a7f76b7514e4264bf95065b3c1ba4dec1

          SHA256

          b8d116a47471896d3ffa69a75e9f15cdb1c1cf7b5b5cf1a827c1498322bb81c3

          SHA512

          507c7a469f340b180976b49bcf4b580cb65b0bb4378c64145a5c8197d77ed749c09954d1a06827830aaf95e3225501ca0a47933e9d53be104ba58d5f72eee4dc

        • C:\Users\Admin\AppData\Local\Temp\6ECH275E1CH7CF2.exe

          Filesize

          5.9MB

          MD5

          7def80039011ba48e10a2dbb0234a2fd

          SHA1

          da0c7a37ba51f2dcf40925c16c2114a302d1fcd4

          SHA256

          25930781d193523b9ce112572ee0a5653c6e34b04e5f7d32c40cfc85d61c4756

          SHA512

          2043acbcacc2867b344af848518e378718929de0266fbaf4c70bc139e3b199f9975df21e579b4ac572f13ae5332ef3f82e6ae28c7cee1eb5833461510309c8f1

        • C:\Users\Admin\AppData\Local\Temp\6ECH275E1CH7CF2.exe

          Filesize

          5.9MB

          MD5

          7def80039011ba48e10a2dbb0234a2fd

          SHA1

          da0c7a37ba51f2dcf40925c16c2114a302d1fcd4

          SHA256

          25930781d193523b9ce112572ee0a5653c6e34b04e5f7d32c40cfc85d61c4756

          SHA512

          2043acbcacc2867b344af848518e378718929de0266fbaf4c70bc139e3b199f9975df21e579b4ac572f13ae5332ef3f82e6ae28c7cee1eb5833461510309c8f1

        • C:\Users\Admin\AppData\Local\Temp\6ECH275E1CH7CF2.exe

          Filesize

          5.9MB

          MD5

          7def80039011ba48e10a2dbb0234a2fd

          SHA1

          da0c7a37ba51f2dcf40925c16c2114a302d1fcd4

          SHA256

          25930781d193523b9ce112572ee0a5653c6e34b04e5f7d32c40cfc85d61c4756

          SHA512

          2043acbcacc2867b344af848518e378718929de0266fbaf4c70bc139e3b199f9975df21e579b4ac572f13ae5332ef3f82e6ae28c7cee1eb5833461510309c8f1

        • C:\Users\Admin\AppData\Local\Temp\7951C5L8B1C96E8.exe

          Filesize

          5.8MB

          MD5

          c03af2033755683a3a56e8c00658a965

          SHA1

          6c81f3c7d48a194f2581adc1ad34fdb040a37c8d

          SHA256

          959da2cac96a66b64caf4b75fbec4452324f78c20c688de202b272108d108871

          SHA512

          d0fe2f54cae1b1880591c979925748d91665529bb94f53bd3787842a78c46867fcc321588abc5f8f3faa524b5f119bcdae77e75f46d66d31255ace6c4e29aa75

        • C:\Users\Admin\AppData\Local\Temp\7951C5L8B1C96E8.exe

          Filesize

          5.8MB

          MD5

          c03af2033755683a3a56e8c00658a965

          SHA1

          6c81f3c7d48a194f2581adc1ad34fdb040a37c8d

          SHA256

          959da2cac96a66b64caf4b75fbec4452324f78c20c688de202b272108d108871

          SHA512

          d0fe2f54cae1b1880591c979925748d91665529bb94f53bd3787842a78c46867fcc321588abc5f8f3faa524b5f119bcdae77e75f46d66d31255ace6c4e29aa75

        • C:\Users\Admin\AppData\Local\Temp\7951C5L8B1C96E8.exe

          Filesize

          5.8MB

          MD5

          c03af2033755683a3a56e8c00658a965

          SHA1

          6c81f3c7d48a194f2581adc1ad34fdb040a37c8d

          SHA256

          959da2cac96a66b64caf4b75fbec4452324f78c20c688de202b272108d108871

          SHA512

          d0fe2f54cae1b1880591c979925748d91665529bb94f53bd3787842a78c46867fcc321588abc5f8f3faa524b5f119bcdae77e75f46d66d31255ace6c4e29aa75

        • C:\Users\Admin\AppData\Local\Temp\DRuBd.S2

          Filesize

          1.8MB

          MD5

          63d3eda465f6bf3f3951ee528daf748c

          SHA1

          71db0ba3dacf3692f4f559c97e0df2bc25a87761

          SHA256

          96ba91f7faad1726f611274b487a38f4e6a2da8697ccafc1c4ca07d52cc7295a

          SHA512

          0d393891da12a9e1b53d056afa5d08058ed243699197f322e4466f1b1b143c15a03c5b3a64b6f3a8cb3ee0d6496b38f6edf2c1a689ded57aef2c7514273c4cd1

        • C:\Users\Admin\AppData\Local\Temp\DRubd.s2

          Filesize

          1.8MB

          MD5

          63d3eda465f6bf3f3951ee528daf748c

          SHA1

          71db0ba3dacf3692f4f559c97e0df2bc25a87761

          SHA256

          96ba91f7faad1726f611274b487a38f4e6a2da8697ccafc1c4ca07d52cc7295a

          SHA512

          0d393891da12a9e1b53d056afa5d08058ed243699197f322e4466f1b1b143c15a03c5b3a64b6f3a8cb3ee0d6496b38f6edf2c1a689ded57aef2c7514273c4cd1

        • C:\Users\Admin\AppData\Local\Temp\DRubd.s2

          Filesize

          1.8MB

          MD5

          63d3eda465f6bf3f3951ee528daf748c

          SHA1

          71db0ba3dacf3692f4f559c97e0df2bc25a87761

          SHA256

          96ba91f7faad1726f611274b487a38f4e6a2da8697ccafc1c4ca07d52cc7295a

          SHA512

          0d393891da12a9e1b53d056afa5d08058ed243699197f322e4466f1b1b143c15a03c5b3a64b6f3a8cb3ee0d6496b38f6edf2c1a689ded57aef2c7514273c4cd1

        • C:\Users\Admin\AppData\Local\Temp\DRubd.s2

          Filesize

          1.8MB

          MD5

          63d3eda465f6bf3f3951ee528daf748c

          SHA1

          71db0ba3dacf3692f4f559c97e0df2bc25a87761

          SHA256

          96ba91f7faad1726f611274b487a38f4e6a2da8697ccafc1c4ca07d52cc7295a

          SHA512

          0d393891da12a9e1b53d056afa5d08058ed243699197f322e4466f1b1b143c15a03c5b3a64b6f3a8cb3ee0d6496b38f6edf2c1a689ded57aef2c7514273c4cd1

        • C:\Users\Admin\AppData\Local\Temp\DRubd.s2

          Filesize

          1.8MB

          MD5

          63d3eda465f6bf3f3951ee528daf748c

          SHA1

          71db0ba3dacf3692f4f559c97e0df2bc25a87761

          SHA256

          96ba91f7faad1726f611274b487a38f4e6a2da8697ccafc1c4ca07d52cc7295a

          SHA512

          0d393891da12a9e1b53d056afa5d08058ed243699197f322e4466f1b1b143c15a03c5b3a64b6f3a8cb3ee0d6496b38f6edf2c1a689ded57aef2c7514273c4cd1

        • C:\Users\Admin\AppData\Local\Temp\GGFBH3I8IF8JDCL.exe

          Filesize

          5.8MB

          MD5

          74cab43801ca44b983bbd29de397bf7a

          SHA1

          bd5b7539689a30c548b50b745afacd4f95cbff6f

          SHA256

          4d13aad2cd625b3581591ad9ff18c84394611dfa4a88a9a5c1da9a3b60a4b66e

          SHA512

          0de962f3ed309929c48a78ba8f750cbc32417652fd43f1fc2a0f0b470a9921ce8a1861b9c44322133c8ed681268b433a6cb7d20b849c14de740cda109fdedc0b

        • C:\Users\Admin\AppData\Local\Temp\GGFBH3I8IF8JDCL.exe

          Filesize

          5.8MB

          MD5

          74cab43801ca44b983bbd29de397bf7a

          SHA1

          bd5b7539689a30c548b50b745afacd4f95cbff6f

          SHA256

          4d13aad2cd625b3581591ad9ff18c84394611dfa4a88a9a5c1da9a3b60a4b66e

          SHA512

          0de962f3ed309929c48a78ba8f750cbc32417652fd43f1fc2a0f0b470a9921ce8a1861b9c44322133c8ed681268b433a6cb7d20b849c14de740cda109fdedc0b

        • C:\Users\Admin\AppData\Local\Temp\GGFBH3I8IF8JDCL.exe

          Filesize

          5.8MB

          MD5

          74cab43801ca44b983bbd29de397bf7a

          SHA1

          bd5b7539689a30c548b50b745afacd4f95cbff6f

          SHA256

          4d13aad2cd625b3581591ad9ff18c84394611dfa4a88a9a5c1da9a3b60a4b66e

          SHA512

          0de962f3ed309929c48a78ba8f750cbc32417652fd43f1fc2a0f0b470a9921ce8a1861b9c44322133c8ed681268b433a6cb7d20b849c14de740cda109fdedc0b

        • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe

          Filesize

          17KB

          MD5

          d9e2fc3a247db17e03d220092e4756ff

          SHA1

          c409057b469fcefe230ee170a5b2bc33d3bb28ec

          SHA256

          ee36cfc26f2b4205cf7de07cd257af6d1d992919e58047ec7a4fdd6cf70140dd

          SHA512

          b973884a248e162dd7f83d981d6c7774eb21bce3983012474799b9b96f18846d60a2995cc82d4f7c362d4495626d36f6f39ff76d22c806b755c7cb2c7bfcb4af

        • C:\Users\Admin\AppData\Roaming\explorer\explorer.exe

          Filesize

          17KB

          MD5

          d9e2fc3a247db17e03d220092e4756ff

          SHA1

          c409057b469fcefe230ee170a5b2bc33d3bb28ec

          SHA256

          ee36cfc26f2b4205cf7de07cd257af6d1d992919e58047ec7a4fdd6cf70140dd

          SHA512

          b973884a248e162dd7f83d981d6c7774eb21bce3983012474799b9b96f18846d60a2995cc82d4f7c362d4495626d36f6f39ff76d22c806b755c7cb2c7bfcb4af

        • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe

          Filesize

          9.7MB

          MD5

          afe1d7271ec50bf3332edf6ba5f8ba01

          SHA1

          b07633f2274ffc7d8f02fdca4da94aec88534b0c

          SHA256

          d645e1c6408572a8e4e7e20e099a8301a6b811131a00bc8b28ca97a4ec951222

          SHA512

          9e1248618a54956f0b9d455e33eb63fbeeb5c3b16ee168d5f5c002eac9863568f844ed0b47ec1eb9bb452e6e63e7784eebb76693e90e5789c94f0193a9e0737a

        • C:\Users\Admin\AppData\Roaming\explorer\svchost.exe

          Filesize

          9.7MB

          MD5

          afe1d7271ec50bf3332edf6ba5f8ba01

          SHA1

          b07633f2274ffc7d8f02fdca4da94aec88534b0c

          SHA256

          d645e1c6408572a8e4e7e20e099a8301a6b811131a00bc8b28ca97a4ec951222

          SHA512

          9e1248618a54956f0b9d455e33eb63fbeeb5c3b16ee168d5f5c002eac9863568f844ed0b47ec1eb9bb452e6e63e7784eebb76693e90e5789c94f0193a9e0737a

        • memory/1808-203-0x0000000003400000-0x000000000353D000-memory.dmp

          Filesize

          1.2MB

        • memory/1808-202-0x0000000003120000-0x00000000032BC000-memory.dmp

          Filesize

          1.6MB

        • memory/1808-213-0x0000000003540000-0x00000000035FE000-memory.dmp

          Filesize

          760KB

        • memory/1808-214-0x0000000003600000-0x00000000036A8000-memory.dmp

          Filesize

          672KB

        • memory/1808-235-0x0000000003400000-0x000000000353D000-memory.dmp

          Filesize

          1.2MB

        • memory/1960-134-0x0000000001320000-0x0000000001356000-memory.dmp

          Filesize

          216KB

        • memory/1960-138-0x0000000001320000-0x0000000001356000-memory.dmp

          Filesize

          216KB

        • memory/1960-141-0x0000000001320000-0x0000000001356000-memory.dmp

          Filesize

          216KB

        • memory/2060-229-0x0000000003000000-0x000000000313D000-memory.dmp

          Filesize

          1.2MB

        • memory/2060-225-0x0000000000C70000-0x0000000000D18000-memory.dmp

          Filesize

          672KB

        • memory/2060-220-0x0000000002D20000-0x0000000002EBC000-memory.dmp

          Filesize

          1.6MB

        • memory/2060-221-0x0000000003000000-0x000000000313D000-memory.dmp

          Filesize

          1.2MB

        • memory/2060-224-0x0000000003140000-0x00000000031FE000-memory.dmp

          Filesize

          760KB

        • memory/2164-163-0x00007FF75EBE0000-0x00007FF760137000-memory.dmp

          Filesize

          21.3MB

        • memory/2164-153-0x00007FF75EBE0000-0x00007FF760137000-memory.dmp

          Filesize

          21.3MB

        • memory/2736-132-0x0000000000970000-0x0000000000F68000-memory.dmp

          Filesize

          6.0MB

        • memory/3240-177-0x0000000005DE0000-0x00000000063F8000-memory.dmp

          Filesize

          6.1MB

        • memory/3240-174-0x0000000000F70000-0x0000000000F98000-memory.dmp

          Filesize

          160KB

        • memory/3240-198-0x0000000007130000-0x00000000072F2000-memory.dmp

          Filesize

          1.8MB

        • memory/3240-179-0x00000000030D0000-0x00000000030E2000-memory.dmp

          Filesize

          72KB

        • memory/3240-180-0x0000000003130000-0x000000000316C000-memory.dmp

          Filesize

          240KB

        • memory/3240-178-0x00000000058D0000-0x00000000059DA000-memory.dmp

          Filesize

          1.0MB

        • memory/3240-199-0x0000000007830000-0x0000000007D5C000-memory.dmp

          Filesize

          5.2MB

        • memory/3944-184-0x0000000006570000-0x0000000006B14000-memory.dmp

          Filesize

          5.6MB

        • memory/3944-188-0x00000000060A0000-0x0000000006132000-memory.dmp

          Filesize

          584KB

        • memory/3944-191-0x0000000006340000-0x000000000634A000-memory.dmp

          Filesize

          40KB

        • memory/3944-167-0x0000000001120000-0x000000000112A000-memory.dmp

          Filesize

          40KB

        • memory/4104-160-0x00000000003E0000-0x00000000009BB000-memory.dmp

          Filesize

          5.9MB

        • memory/4108-234-0x0000000003670000-0x00000000037AD000-memory.dmp

          Filesize

          1.2MB

        • memory/4108-222-0x0000000003390000-0x000000000352C000-memory.dmp

          Filesize

          1.6MB

        • memory/4108-223-0x0000000003670000-0x00000000037AD000-memory.dmp

          Filesize

          1.2MB

        • memory/4108-228-0x00000000037B0000-0x000000000386E000-memory.dmp

          Filesize

          760KB

        • memory/4108-231-0x0000000003870000-0x0000000003918000-memory.dmp

          Filesize

          672KB

        • memory/4196-165-0x00000000000D0000-0x0000000000699000-memory.dmp

          Filesize

          5.8MB

        • memory/4328-206-0x00000000035B0000-0x000000000366E000-memory.dmp

          Filesize

          760KB

        • memory/4328-230-0x0000000003470000-0x00000000035AD000-memory.dmp

          Filesize

          1.2MB

        • memory/4328-200-0x0000000003190000-0x000000000332C000-memory.dmp

          Filesize

          1.6MB

        • memory/4328-201-0x0000000003470000-0x00000000035AD000-memory.dmp

          Filesize

          1.2MB

        • memory/4328-207-0x0000000003670000-0x0000000003718000-memory.dmp

          Filesize

          672KB

        • memory/5000-152-0x00000000000B0000-0x0000000000697000-memory.dmp

          Filesize

          5.9MB

        • memory/5052-195-0x0000000005B40000-0x0000000005BA6000-memory.dmp

          Filesize

          408KB

        • memory/5052-185-0x0000000001310000-0x000000000132C000-memory.dmp

          Filesize

          112KB

        • memory/5052-196-0x00000000067D0000-0x0000000006846000-memory.dmp

          Filesize

          472KB

        • memory/5052-197-0x0000000006780000-0x000000000679E000-memory.dmp

          Filesize

          120KB

        • memory/5052-204-0x0000000007420000-0x0000000007470000-memory.dmp

          Filesize

          320KB