Analysis

  • max time kernel
    142s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2023, 11:54

General

  • Target

    840d80b47aa300ee71d8e8ca6ccf7935bc6cec6aaa5b180c22c537246786beae.exe

  • Size

    709KB

  • MD5

    eace89394adb903880ff6a63938a88b8

  • SHA1

    566d9b5590c2659761c0ded16a455349e7c3ad89

  • SHA256

    840d80b47aa300ee71d8e8ca6ccf7935bc6cec6aaa5b180c22c537246786beae

  • SHA512

    9cdf2821275a88df8d845e3af90d5be8c4ec48e552502c3c65988fd49c44d396df50356afa66a455e211d143d383cba0a42dbc9dd8f91a80ebe145407c6ca899

  • SSDEEP

    12288:4Mrdy90qLhIBE2wBEuEDZB+vN4032u4KCdh/76Svm1hJoKt9bXdbL:1yHh2wgv+15Cr6SO1hiqbZL

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\840d80b47aa300ee71d8e8ca6ccf7935bc6cec6aaa5b180c22c537246786beae.exe
    "C:\Users\Admin\AppData\Local\Temp\840d80b47aa300ee71d8e8ca6ccf7935bc6cec6aaa5b180c22c537246786beae.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6860817.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6860817.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3248293.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3248293.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7996096.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7996096.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7136891.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7136891.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:64
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7136891.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7136891.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:392
        • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3520
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1356
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4352
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4384
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4104
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  7⤵
                    PID:4416
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:R" /E
                    7⤵
                      PID:4664
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4688
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\c3912af058" /P "Admin:N"
                        7⤵
                          PID:4736
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\c3912af058" /P "Admin:R" /E
                          7⤵
                            PID:4996
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:5020
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4892
                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  PID:3180
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:520
                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                  2⤵
                  • Executes dropped EXE
                  PID:600

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7136891.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7136891.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7136891.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6860817.exe

                      Filesize

                      417KB

                      MD5

                      60afeaf4a4b73ff89439b5a155da62f4

                      SHA1

                      4143fa8bb174a26aa46086d7cdf861527bc96e15

                      SHA256

                      7bd006317398cf2ec7544a8195486b583a7204d580bab33cebfe330d13925b51

                      SHA512

                      32b093e2508da3cc1f3e4a54bd5cff238ef986fef03f1d9b94f1a3c1f8f9cdceb1ed64fb72d07d9a85d0aabf35935ebe5446926eb64425558c7ee0eb2ac98b9b

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6860817.exe

                      Filesize

                      417KB

                      MD5

                      60afeaf4a4b73ff89439b5a155da62f4

                      SHA1

                      4143fa8bb174a26aa46086d7cdf861527bc96e15

                      SHA256

                      7bd006317398cf2ec7544a8195486b583a7204d580bab33cebfe330d13925b51

                      SHA512

                      32b093e2508da3cc1f3e4a54bd5cff238ef986fef03f1d9b94f1a3c1f8f9cdceb1ed64fb72d07d9a85d0aabf35935ebe5446926eb64425558c7ee0eb2ac98b9b

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3248293.exe

                      Filesize

                      136KB

                      MD5

                      75c6126ac668b10f5048302a1869d095

                      SHA1

                      f1aba6bc709aba7cc9123c66093ca906a8e4d4ca

                      SHA256

                      5165155455130b87de3d33e16752c53b090d72c6a84e233154ed00af238583ae

                      SHA512

                      7ef154406135807ed670aa9a93c2842064c4ecff00cc934380463f701a674638c25b5848af91ce1ffc5998d6d2d2d1d5d75f8e639c4d74813f86095b89153a52

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3248293.exe

                      Filesize

                      136KB

                      MD5

                      75c6126ac668b10f5048302a1869d095

                      SHA1

                      f1aba6bc709aba7cc9123c66093ca906a8e4d4ca

                      SHA256

                      5165155455130b87de3d33e16752c53b090d72c6a84e233154ed00af238583ae

                      SHA512

                      7ef154406135807ed670aa9a93c2842064c4ecff00cc934380463f701a674638c25b5848af91ce1ffc5998d6d2d2d1d5d75f8e639c4d74813f86095b89153a52

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7996096.exe

                      Filesize

                      361KB

                      MD5

                      54c1ebfed7b6c78a0b30f6dd7f2aeffd

                      SHA1

                      25b60e90ba364828300dd48006f736ed0955806d

                      SHA256

                      9936f9e3ec51c766ad389f6fd5c99b42ca29ae840df9125dd3c27659bdb7fffb

                      SHA512

                      e137385bb6c0f2f9e8b29dbff9eb617ef298cfe75461e6ee8e6fcdbd61b9d9b1424dcd8f7b260c4d2670dbe95e746aba97c5d0ee97d570ef2c584192add7c9bb

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7996096.exe

                      Filesize

                      361KB

                      MD5

                      54c1ebfed7b6c78a0b30f6dd7f2aeffd

                      SHA1

                      25b60e90ba364828300dd48006f736ed0955806d

                      SHA256

                      9936f9e3ec51c766ad389f6fd5c99b42ca29ae840df9125dd3c27659bdb7fffb

                      SHA512

                      e137385bb6c0f2f9e8b29dbff9eb617ef298cfe75461e6ee8e6fcdbd61b9d9b1424dcd8f7b260c4d2670dbe95e746aba97c5d0ee97d570ef2c584192add7c9bb

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      340KB

                      MD5

                      4a36ea2d5640ce838461ae1d4890f558

                      SHA1

                      c106774307d837c1aaceaa73d1fce19699593caf

                      SHA256

                      169fbde06e6bb81f7edcd4848f5f874ecc03defa25efe45ab9a214d203c7eb6f

                      SHA512

                      ee461f364c72d7388273428ab7b79eab62c3771ee99b799b7f5a1a03f15a709e26c7bc5fb39b2ad4d79cab9a6b96e6c102ea5b6b6614615f30fc52d9059f8954

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • memory/64-196-0x00000000007C0000-0x00000000007F5000-memory.dmp

                      Filesize

                      212KB

                    • memory/392-194-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/392-197-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/392-198-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/392-204-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/392-207-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/600-261-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/600-262-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/600-263-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/1356-214-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/1356-213-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/1356-216-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/1356-217-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/1356-249-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/3180-227-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/3180-228-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/3180-229-0x0000000000400000-0x0000000000438000-memory.dmp

                      Filesize

                      224KB

                    • memory/4700-157-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-165-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-181-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-183-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-184-0x0000000000400000-0x00000000006F4000-memory.dmp

                      Filesize

                      3.0MB

                    • memory/4700-186-0x0000000004E40000-0x0000000004E50000-memory.dmp

                      Filesize

                      64KB

                    • memory/4700-185-0x0000000004E40000-0x0000000004E50000-memory.dmp

                      Filesize

                      64KB

                    • memory/4700-187-0x0000000004E40000-0x0000000004E50000-memory.dmp

                      Filesize

                      64KB

                    • memory/4700-189-0x0000000000400000-0x00000000006F4000-memory.dmp

                      Filesize

                      3.0MB

                    • memory/4700-150-0x00000000022C0000-0x00000000022DA000-memory.dmp

                      Filesize

                      104KB

                    • memory/4700-151-0x00000000001D0000-0x00000000001FD000-memory.dmp

                      Filesize

                      180KB

                    • memory/4700-177-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-152-0x00000000027D0000-0x00000000027E8000-memory.dmp

                      Filesize

                      96KB

                    • memory/4700-175-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-173-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-171-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-153-0x0000000004E40000-0x0000000004E50000-memory.dmp

                      Filesize

                      64KB

                    • memory/4700-169-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-154-0x0000000004E40000-0x0000000004E50000-memory.dmp

                      Filesize

                      64KB

                    • memory/4700-167-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-155-0x0000000004E40000-0x0000000004E50000-memory.dmp

                      Filesize

                      64KB

                    • memory/4700-179-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-163-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-161-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-159-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4700-156-0x00000000027D0000-0x00000000027E2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4848-135-0x0000000007D50000-0x0000000007D9B000-memory.dmp

                      Filesize

                      300KB

                    • memory/4848-143-0x0000000009E20000-0x000000000A34C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4848-131-0x0000000008240000-0x0000000008846000-memory.dmp

                      Filesize

                      6.0MB

                    • memory/4848-132-0x0000000007CB0000-0x0000000007CC2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4848-133-0x0000000007DE0000-0x0000000007EEA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4848-134-0x0000000007D10000-0x0000000007D4E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4848-130-0x0000000000FD0000-0x0000000000FF8000-memory.dmp

                      Filesize

                      160KB

                    • memory/4848-137-0x00000000080B0000-0x0000000008116000-memory.dmp

                      Filesize

                      408KB

                    • memory/4848-138-0x0000000009050000-0x000000000954E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/4848-144-0x00000000052E0000-0x0000000005330000-memory.dmp

                      Filesize

                      320KB

                    • memory/4848-136-0x00000000080A0000-0x00000000080B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4848-142-0x0000000009720000-0x00000000098E2000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4848-141-0x0000000008C10000-0x0000000008C2E000-memory.dmp

                      Filesize

                      120KB

                    • memory/4848-140-0x0000000008E50000-0x0000000008EC6000-memory.dmp

                      Filesize

                      472KB

                    • memory/4848-139-0x0000000008C30000-0x0000000008CC2000-memory.dmp

                      Filesize

                      584KB