Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 15:29

General

  • Target

    d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe

  • Size

    100KB

  • MD5

    0f4189e46b0ee6646684727e90146a40

  • SHA1

    cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

  • SHA256

    d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

  • SHA512

    c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

  • SSDEEP

    768:Cy8/987dmJKW+IMcK8jFlEMDwfPaO3MRlppr78ZhTp6LRsPxYevbYm7Emgv35BMC:c985mcHIqfypX78ZJuuPHbYwEm+5

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 12 IoCs
  • Disables cmd.exe use via registry modification 6 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe
    "C:\Users\Admin\AppData\Local\Temp\d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Modifies registry class
      PID:4628
    • C:\Users\Admin\AppData\Local\smss.exe
      C:\Users\Admin\AppData\Local\smss.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Users\Admin\AppData\Local\winlogon.exe
        C:\Users\Admin\AppData\Local\winlogon.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:4944
      • C:\Windows\SysWOW64\at.exe
        at /delete /y
        3⤵
          PID:4020
        • C:\Windows\SysWOW64\at.exe
          at 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Brengkolang.com"
          3⤵
            PID:2368
          • C:\Users\Admin\AppData\Local\services.exe
            C:\Users\Admin\AppData\Local\services.exe
            3⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • Disables RegEdit via registry modification
            • Disables cmd.exe use via registry modification
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:3240
          • C:\Users\Admin\AppData\Local\lsass.exe
            C:\Users\Admin\AppData\Local\lsass.exe
            3⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • Disables RegEdit via registry modification
            • Disables cmd.exe use via registry modification
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:220
          • C:\Users\Admin\AppData\Local\inetinfo.exe
            C:\Users\Admin\AppData\Local\inetinfo.exe
            3⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • Disables RegEdit via registry modification
            • Disables cmd.exe use via registry modification
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:2836

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\csrss.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\csrss.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\csrss.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\csrss.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\csrss.exe

        Filesize

        63KB

        MD5

        aa1563755e9b07f31553d313ce9689cd

        SHA1

        f4dc29da51d8ebe49e2011fccc7a9601b6b1e6fc

        SHA256

        53c3bf1831ae5eb446d12460e6c3df95bed84e2ba48dabcd7a1191e35d74786e

        SHA512

        8aa040c3e6d027471d298b3cc077b3e346ea724f364016ec55ddc1e4f13f69deba0238c2641b454f1e79a0847ffff8a0850e843fd4b5a34ca068864da9645965

      • C:\Users\Admin\AppData\Local\inetinfo.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\inetinfo.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\inetinfo.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\inetinfo.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\inetinfo.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\inetinfo.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\lsass.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\lsass.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\lsass.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\lsass.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\lsass.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\services.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\services.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\services.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\services.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\smss.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\smss.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\winlogon.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Users\Admin\AppData\Local\winlogon.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Windows\ShellNew\sempalong.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Windows\ShellNew\sempalong.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Windows\ShellNew\sempalong.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Windows\eksplorasi.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Windows\eksplorasi.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Windows\eksplorasi.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Windows\eksplorasi.exe

        Filesize

        100KB

        MD5

        0f4189e46b0ee6646684727e90146a40

        SHA1

        cf2d160b616d5fd3dc794c3e8d930e0d82e414b5

        SHA256

        d20dbce3fa81479b99a80cf9fd7420e4cfbe33b407f067e8c02778920e78d249

        SHA512

        c32d34fda99722cbd320cef807e4167eeec767d38588bf964539576fc8b28f0b3e2841ff7aed70d1398a4a1b3946946cd20a351f03974b0d777a2d04cceb9549

      • C:\Windows\eksplorasi.exe

        Filesize

        64KB

        MD5

        d8fcdc9b326c9ce23a8f11b04fc9558f

        SHA1

        6f88c8c30878ae2eee74fb931a1d4434ca5b59c8

        SHA256

        15a3ba095de5001ae7267705df232b24038150ca16402f6f4dbaebc82db69c1a

        SHA512

        cb3eb9ce23b9193d3a5340f9c84f36bccbb2aa16d464e45eecc3ad5c5e558b687e017c7bc786f30d66deee9cadc0d36e0c15616732ae30cdef2b6c7bdbe592a1

      • memory/220-183-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1080-132-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1080-136-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1080-193-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2080-194-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2080-153-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2836-192-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2836-196-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3240-173-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4944-154-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4944-195-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB