Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-05-2023 03:00

General

  • Target

    f51e74a4f10226607e001f2a2618be9e236f62bd34a8ac9a7889116e477ae23c.exe

  • Size

    924KB

  • MD5

    bcd921bbf4ea4a50404f698ce57a2046

  • SHA1

    5957cce20e34d46435058ae296844339857d9f4a

  • SHA256

    f51e74a4f10226607e001f2a2618be9e236f62bd34a8ac9a7889116e477ae23c

  • SHA512

    ed3b872586626a7545ea47c5b797efd1608f6ba34601fcb6532522de0fd001d847a0ce4568b4344763e6151f2c9edd8450ce396f182cf564d8244d30626073cb

  • SSDEEP

    24576:YybZZY5j6y1JXR/oS7fcR/W85x68Mt1qmlFm/Ug+C1k3yr:fVK6wXRh7UR/W85RMtYJW

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f51e74a4f10226607e001f2a2618be9e236f62bd34a8ac9a7889116e477ae23c.exe
    "C:\Users\Admin\AppData\Local\Temp\f51e74a4f10226607e001f2a2618be9e236f62bd34a8ac9a7889116e477ae23c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4936155.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4936155.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2564933.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2564933.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1354351.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1354351.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1328
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5449999.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5449999.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2404
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 1080
              6⤵
              • Program crash
              PID:544
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7693045.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7693045.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8626269.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8626269.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9328727.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9328727.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1060
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
            5⤵
            • Loads dropped DLL
            PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4076118.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4076118.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2404 -ip 2404
    1⤵
      PID:3636
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:1404
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:3644

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      a0030771030c5a53795cc3e6425f5bbf

      SHA1

      d9e43b92d65093efaf44d94e52ff3748d369edd8

      SHA256

      0de6e720005075e120fd459d98e24f9999350398bea72a585bf7646c46dfcd57

      SHA512

      bcdcbb1ee0e82512b79e3ee7f7101503e613c18aed5b93d26df42ffe7564e0b8773bfa5c2f69e7ed059f766743920d264ace518ab33414ed01a590decac1c978

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      a0030771030c5a53795cc3e6425f5bbf

      SHA1

      d9e43b92d65093efaf44d94e52ff3748d369edd8

      SHA256

      0de6e720005075e120fd459d98e24f9999350398bea72a585bf7646c46dfcd57

      SHA512

      bcdcbb1ee0e82512b79e3ee7f7101503e613c18aed5b93d26df42ffe7564e0b8773bfa5c2f69e7ed059f766743920d264ace518ab33414ed01a590decac1c978

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      a0030771030c5a53795cc3e6425f5bbf

      SHA1

      d9e43b92d65093efaf44d94e52ff3748d369edd8

      SHA256

      0de6e720005075e120fd459d98e24f9999350398bea72a585bf7646c46dfcd57

      SHA512

      bcdcbb1ee0e82512b79e3ee7f7101503e613c18aed5b93d26df42ffe7564e0b8773bfa5c2f69e7ed059f766743920d264ace518ab33414ed01a590decac1c978

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      a0030771030c5a53795cc3e6425f5bbf

      SHA1

      d9e43b92d65093efaf44d94e52ff3748d369edd8

      SHA256

      0de6e720005075e120fd459d98e24f9999350398bea72a585bf7646c46dfcd57

      SHA512

      bcdcbb1ee0e82512b79e3ee7f7101503e613c18aed5b93d26df42ffe7564e0b8773bfa5c2f69e7ed059f766743920d264ace518ab33414ed01a590decac1c978

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      a0030771030c5a53795cc3e6425f5bbf

      SHA1

      d9e43b92d65093efaf44d94e52ff3748d369edd8

      SHA256

      0de6e720005075e120fd459d98e24f9999350398bea72a585bf7646c46dfcd57

      SHA512

      bcdcbb1ee0e82512b79e3ee7f7101503e613c18aed5b93d26df42ffe7564e0b8773bfa5c2f69e7ed059f766743920d264ace518ab33414ed01a590decac1c978

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4076118.exe

      Filesize

      168KB

      MD5

      7f4e7333739a37b80e2453d3607ed50a

      SHA1

      4c5e5508dd76fcc8910217a1e6eec0eeb4fb4a7c

      SHA256

      e419778fea02c51a7073f86e19f8af699e96d7f45cb97c6c04e6d681907ce7a5

      SHA512

      86beb5073b9033f5fc55c6f56bdaad2d628c6ee75028e1830d08d522dcffe3e70f554dff462a7f41fa32aca0ccbeff62ce524d2e97f1508cfdc68956751cd745

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4076118.exe

      Filesize

      168KB

      MD5

      7f4e7333739a37b80e2453d3607ed50a

      SHA1

      4c5e5508dd76fcc8910217a1e6eec0eeb4fb4a7c

      SHA256

      e419778fea02c51a7073f86e19f8af699e96d7f45cb97c6c04e6d681907ce7a5

      SHA512

      86beb5073b9033f5fc55c6f56bdaad2d628c6ee75028e1830d08d522dcffe3e70f554dff462a7f41fa32aca0ccbeff62ce524d2e97f1508cfdc68956751cd745

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4936155.exe

      Filesize

      770KB

      MD5

      a585a649639914289ed07487ea20c20c

      SHA1

      8a066d924e0d1594196a8d3af7428e3d51c3a0a1

      SHA256

      e922452d2ac1903019b3512af1bdc9b781d75595ea7ff2e88a62b9cd40a16f64

      SHA512

      81e7e7f98a30de90b2a571e73629b78a0929f5040c769addc9494838f26543b785c8fcdc6cd39616c4119e094f505d394f63bdcc9c93d78dfcfa7eab5ad03886

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4936155.exe

      Filesize

      770KB

      MD5

      a585a649639914289ed07487ea20c20c

      SHA1

      8a066d924e0d1594196a8d3af7428e3d51c3a0a1

      SHA256

      e922452d2ac1903019b3512af1bdc9b781d75595ea7ff2e88a62b9cd40a16f64

      SHA512

      81e7e7f98a30de90b2a571e73629b78a0929f5040c769addc9494838f26543b785c8fcdc6cd39616c4119e094f505d394f63bdcc9c93d78dfcfa7eab5ad03886

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9328727.exe

      Filesize

      229KB

      MD5

      a0030771030c5a53795cc3e6425f5bbf

      SHA1

      d9e43b92d65093efaf44d94e52ff3748d369edd8

      SHA256

      0de6e720005075e120fd459d98e24f9999350398bea72a585bf7646c46dfcd57

      SHA512

      bcdcbb1ee0e82512b79e3ee7f7101503e613c18aed5b93d26df42ffe7564e0b8773bfa5c2f69e7ed059f766743920d264ace518ab33414ed01a590decac1c978

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9328727.exe

      Filesize

      229KB

      MD5

      a0030771030c5a53795cc3e6425f5bbf

      SHA1

      d9e43b92d65093efaf44d94e52ff3748d369edd8

      SHA256

      0de6e720005075e120fd459d98e24f9999350398bea72a585bf7646c46dfcd57

      SHA512

      bcdcbb1ee0e82512b79e3ee7f7101503e613c18aed5b93d26df42ffe7564e0b8773bfa5c2f69e7ed059f766743920d264ace518ab33414ed01a590decac1c978

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2564933.exe

      Filesize

      587KB

      MD5

      3dcca3318745cd5ea2d824f31a0f7e25

      SHA1

      ee72fc508289efb7f571d9dca5a505694bdf31c6

      SHA256

      91d4e2537ee998c9c92dfa19cd3aea09c9afd16f489e935c4cec52bb497b0cb8

      SHA512

      1c8a72632384f73e497b3a729e69575e43d830820832136b7c5d7ffc10b9ec765de5d6d09c5f90fb8bca59d347f85d998a776c68caf553b7f23fbee20c60189d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2564933.exe

      Filesize

      587KB

      MD5

      3dcca3318745cd5ea2d824f31a0f7e25

      SHA1

      ee72fc508289efb7f571d9dca5a505694bdf31c6

      SHA256

      91d4e2537ee998c9c92dfa19cd3aea09c9afd16f489e935c4cec52bb497b0cb8

      SHA512

      1c8a72632384f73e497b3a729e69575e43d830820832136b7c5d7ffc10b9ec765de5d6d09c5f90fb8bca59d347f85d998a776c68caf553b7f23fbee20c60189d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8626269.exe

      Filesize

      176KB

      MD5

      849c97a59757e9ea2f6f84f4606fb429

      SHA1

      d22f437816f7825436397c016cf657de95e462b9

      SHA256

      7a076d3b852f29366500ffc5d5fcca010e3112387d24be091c74010765120313

      SHA512

      9ff276b00978b76505ca1420ecbfb6dd0cfdc6e67c9dde6a8e10c685b12c66096dc02f0e835fb894426698161c91befb4882c43646d5fb1f5fd8509bdb3d5895

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8626269.exe

      Filesize

      176KB

      MD5

      849c97a59757e9ea2f6f84f4606fb429

      SHA1

      d22f437816f7825436397c016cf657de95e462b9

      SHA256

      7a076d3b852f29366500ffc5d5fcca010e3112387d24be091c74010765120313

      SHA512

      9ff276b00978b76505ca1420ecbfb6dd0cfdc6e67c9dde6a8e10c685b12c66096dc02f0e835fb894426698161c91befb4882c43646d5fb1f5fd8509bdb3d5895

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1354351.exe

      Filesize

      383KB

      MD5

      dd80f76b4f67db2a7722c3ae5a9165d5

      SHA1

      06cf416ca05b0448931e95720e14ccdea37379ce

      SHA256

      d32f96becb5a17852dd89f809035e43afc297546d078a33806c621564202f33b

      SHA512

      fd2e690052bc240b1e0af535f0c5010593ab710125941ca79ced98ac9c29fa26ef11466c054b6c8ec2916c37a56260a78d8396ff160c25f5885917149b673cf8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1354351.exe

      Filesize

      383KB

      MD5

      dd80f76b4f67db2a7722c3ae5a9165d5

      SHA1

      06cf416ca05b0448931e95720e14ccdea37379ce

      SHA256

      d32f96becb5a17852dd89f809035e43afc297546d078a33806c621564202f33b

      SHA512

      fd2e690052bc240b1e0af535f0c5010593ab710125941ca79ced98ac9c29fa26ef11466c054b6c8ec2916c37a56260a78d8396ff160c25f5885917149b673cf8

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5449999.exe

      Filesize

      283KB

      MD5

      4324c4c4d4aa069d152635fe9d8a80fb

      SHA1

      7d5bde17d53024ef956bdfcda20e356ce10b5e8f

      SHA256

      d30abafe69e589d9e0212ca49018aee8ce7f044d37947a59cb298a306a49d9fb

      SHA512

      505f9508f586d39c5e14861002e1f843b83469f907d3a23d9ce7756f20d3d7f99a78c97489c2b5fda7e73557ce18c5acc1d51c2ff5de02124d046e42077ac3c2

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5449999.exe

      Filesize

      283KB

      MD5

      4324c4c4d4aa069d152635fe9d8a80fb

      SHA1

      7d5bde17d53024ef956bdfcda20e356ce10b5e8f

      SHA256

      d30abafe69e589d9e0212ca49018aee8ce7f044d37947a59cb298a306a49d9fb

      SHA512

      505f9508f586d39c5e14861002e1f843b83469f907d3a23d9ce7756f20d3d7f99a78c97489c2b5fda7e73557ce18c5acc1d51c2ff5de02124d046e42077ac3c2

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7693045.exe

      Filesize

      168KB

      MD5

      ff74f2af5d3dcb6e1d66db7123b8f05f

      SHA1

      96e2386d9180f617965dd8302e74c7c64097fa41

      SHA256

      a764c1d15e29d30bbff4166b0b4e582305e70d08a5f383d14bfb56998ee6e5f7

      SHA512

      ac6088fe7626844a4d646c2b95f2eb5c60bd1e6e9e8296d8224596260953079e2c4703ad12d8197b583f6a6ae83e864e0df47294aef10090dad2dc7d5fbdf8ba

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7693045.exe

      Filesize

      168KB

      MD5

      ff74f2af5d3dcb6e1d66db7123b8f05f

      SHA1

      96e2386d9180f617965dd8302e74c7c64097fa41

      SHA256

      a764c1d15e29d30bbff4166b0b4e582305e70d08a5f383d14bfb56998ee6e5f7

      SHA512

      ac6088fe7626844a4d646c2b95f2eb5c60bd1e6e9e8296d8224596260953079e2c4703ad12d8197b583f6a6ae83e864e0df47294aef10090dad2dc7d5fbdf8ba

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o7693045.exe

      Filesize

      168KB

      MD5

      ff74f2af5d3dcb6e1d66db7123b8f05f

      SHA1

      96e2386d9180f617965dd8302e74c7c64097fa41

      SHA256

      a764c1d15e29d30bbff4166b0b4e582305e70d08a5f383d14bfb56998ee6e5f7

      SHA512

      ac6088fe7626844a4d646c2b95f2eb5c60bd1e6e9e8296d8224596260953079e2c4703ad12d8197b583f6a6ae83e864e0df47294aef10090dad2dc7d5fbdf8ba

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

      Filesize

      162B

      MD5

      1b7c22a214949975556626d7217e9a39

      SHA1

      d01c97e2944166ed23e47e4a62ff471ab8fa031f

      SHA256

      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

      SHA512

      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

    • memory/1456-266-0x0000000005470000-0x0000000005480000-memory.dmp

      Filesize

      64KB

    • memory/2404-174-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-178-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-196-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/2404-198-0x0000000000400000-0x00000000006C7000-memory.dmp

      Filesize

      2.8MB

    • memory/2404-194-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/2404-193-0x0000000000400000-0x00000000006C7000-memory.dmp

      Filesize

      2.8MB

    • memory/2404-192-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-162-0x0000000004DC0000-0x0000000005364000-memory.dmp

      Filesize

      5.6MB

    • memory/2404-163-0x0000000002080000-0x00000000020AD000-memory.dmp

      Filesize

      180KB

    • memory/2404-164-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/2404-165-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-166-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-170-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-168-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-172-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-176-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-195-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/2404-180-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-182-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-190-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-188-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-184-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/2404-186-0x00000000026A0000-0x00000000026B2000-memory.dmp

      Filesize

      72KB

    • memory/3956-210-0x000000000A880000-0x000000000A8E6000-memory.dmp

      Filesize

      408KB

    • memory/3956-208-0x000000000A6C0000-0x000000000A736000-memory.dmp

      Filesize

      472KB

    • memory/3956-202-0x00000000004A0000-0x00000000004CE000-memory.dmp

      Filesize

      184KB

    • memory/3956-213-0x000000000C450000-0x000000000C97C000-memory.dmp

      Filesize

      5.2MB

    • memory/3956-212-0x000000000BD50000-0x000000000BF12000-memory.dmp

      Filesize

      1.8MB

    • memory/3956-211-0x000000000B410000-0x000000000B460000-memory.dmp

      Filesize

      320KB

    • memory/3956-203-0x000000000A900000-0x000000000AF18000-memory.dmp

      Filesize

      6.1MB

    • memory/3956-209-0x000000000A7E0000-0x000000000A872000-memory.dmp

      Filesize

      584KB

    • memory/3956-204-0x000000000A430000-0x000000000A53A000-memory.dmp

      Filesize

      1.0MB

    • memory/3956-207-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

      Filesize

      64KB

    • memory/3956-206-0x000000000A3B0000-0x000000000A3EC000-memory.dmp

      Filesize

      240KB

    • memory/3956-205-0x000000000A350000-0x000000000A362000-memory.dmp

      Filesize

      72KB

    • memory/4840-248-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4840-247-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB

    • memory/4840-246-0x0000000004B30000-0x0000000004B40000-memory.dmp

      Filesize

      64KB