Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-06-2024 03:53

General

  • Target

    6a1bfd58efe68f261124127bd748e9ee7c2632b5ad0f8f76b07dbe3bd7c110e3.exe

  • Size

    1.8MB

  • MD5

    a7c185ca699ec75755a98c1b7d3ffb80

  • SHA1

    d16cfd460243ae6ff7c292cb4697ce84ccb88136

  • SHA256

    6a1bfd58efe68f261124127bd748e9ee7c2632b5ad0f8f76b07dbe3bd7c110e3

  • SHA512

    551285647d82643a50ed4c50852b0e3288a4bdc1a81a8f6edfb9c15144de35ac962ade47f0057f09525eb25ef71d02bb26f22c4b09359cb53f76fb229d320ad4

  • SSDEEP

    24576:04Ii/8C4s0sk04I6G4+57ZvNdoDQG5LtibEWnmF3HXFjs/iT7qxf4TXShxqE4Zaf:7IiisY+5hgf4bnmFVe8+d7hxp42j

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

risepro

C2

77.91.77.66:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a1bfd58efe68f261124127bd748e9ee7c2632b5ad0f8f76b07dbe3bd7c110e3.exe
    "C:\Users\Admin\AppData\Local\Temp\6a1bfd58efe68f261124127bd748e9ee7c2632b5ad0f8f76b07dbe3bd7c110e3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2596
      • C:\Users\Admin\AppData\Local\Temp\1000016001\65c2fba09a.exe
        "C:\Users\Admin\AppData\Local\Temp\1000016001\65c2fba09a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4656
      • C:\Users\Admin\AppData\Local\Temp\1000017001\bb0c79deca.exe
        "C:\Users\Admin\AppData\Local\Temp\1000017001\bb0c79deca.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4900
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
          4⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffd4f6ab58,0x7fffd4f6ab68,0x7fffd4f6ab78
            5⤵
              PID:2688
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:2
              5⤵
                PID:3188
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:8
                5⤵
                  PID:3556
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2288 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:8
                  5⤵
                    PID:3660
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:1
                    5⤵
                      PID:3068
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:1
                      5⤵
                        PID:2180
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3920 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:1
                        5⤵
                          PID:5032
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:8
                          5⤵
                            PID:4552
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:8
                            5⤵
                              PID:3508
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:8
                              5⤵
                                PID:3004
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1768,i,7004796724789893596,6603655843935560354,131072 /prefetch:2
                                5⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2004
                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                        1⤵
                          PID:4552
                        • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                          C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5104
                        • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                          C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4440

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          216B

                          MD5

                          e5913418c20cb3eb3a613df9536900c2

                          SHA1

                          0091c0ed0ce6957e7883b85d44d1ed3c96559f9b

                          SHA256

                          660cc6a6a7dbe789ed803508777f5c49a359494cd58baf0ff809ac3d835fca91

                          SHA512

                          affad13f0507cf67880912a703058e433b1ef8e504ab165b2fe73323d1dbc0eb75ef90f8828f643ddc0462ae61bdfd727d3503b5843715542b56357ba3128599

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          2KB

                          MD5

                          346adf75904447b0c28778c8aa9edcfe

                          SHA1

                          e01789ebd8b7d15e57df87f8fb538b835020bf07

                          SHA256

                          c6c6205e39ba9e419e703332ae9d5fb6761357f152aa849e6e6bef8d21017326

                          SHA512

                          4b03802d73fce577f81b80a10f4735c53e5862836408ddc01409a469901aa42cfeeab0fc500fea1712a9e46f905b73718e73d6ea4be882ff2c235e69ef21fa39

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          692B

                          MD5

                          970d77eeb3a56afc65ac8820c8bb7bdb

                          SHA1

                          eb8db733a7e5aa9a886892bc76f47e7b625036ea

                          SHA256

                          2c552b6825bc2dbed17c07f5dc6cb874a295aa6793f3f4dd3eb41e905869e767

                          SHA512

                          c5a2f0648458b0fd53c868d15663cb0e329465d4fb53b3dc5b4eb1897e4be094b05c2b979767ae1a8f486346d157549dddd6569b47d53c7b4236280892d2a4b3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          effa4686e42f340089d33bedbcd78a2d

                          SHA1

                          746576d2659f073f275d6b63ba4f9ae097a9e25e

                          SHA256

                          d46545868ee2949f6cfb7bdda30e582735cbfd5dcccd5e7c91d79db050aee86f

                          SHA512

                          a92201e8d4b8ea431bd2bdce9b9e87599633f4fd437abad89c33a8106d4cfc6c4528b7351be3fea7ffe2abd5889e12454f9bde985a9352f025e852dbbe94bc3b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          16KB

                          MD5

                          434dd20837008c0a714016f315c07354

                          SHA1

                          3641507659be108a49c50dc0db95622709b5cef4

                          SHA256

                          52da8c82fe1973fc9e2e8a5360d0b4d372087a5dee0a7385936cc417c04fe40d

                          SHA512

                          56f42f36c8d4a63c8c8e605dd8c5ef021066989f6cf1793b3c166f40105c15e8c6b66b3cac1f9bb555ef7f9711e0ad37f1052aacd0f3fcfeccd23352fbdbc341

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          279KB

                          MD5

                          908b75fbad1a50b083f86baf3d154ff9

                          SHA1

                          d3dfe9a153c105608b2e83c714aaab14d85383f1

                          SHA256

                          7782bef5730e21baf98f53105d7083468eb1e22ecd4ba4b1c6641564c948a7dc

                          SHA512

                          26c4ba89e01f25d1d88b19283916ff3a7a0c04d299a4a3b07569de8680e8da940260af1766a14fe8f3a27616687f9178946ab5d62d3ac25ad909d4a01328a013

                        • C:\Users\Admin\AppData\Local\Temp\1000016001\65c2fba09a.exe

                          Filesize

                          2.4MB

                          MD5

                          1d0710fba5166efb658d3d3907176d8b

                          SHA1

                          ab4a279bdbd13e7ca844463b360cc5ca37ebb522

                          SHA256

                          1c00b1b0437e537733dcc3c048a59ba3a373f4ab30a97fab21e20501fd081d15

                          SHA512

                          6ceadca1f68b3ee4871e920a9389a43ec133935337e87a60f57a0726fcccf6ce33a31554714fa93f86005042f2b22a493bcd54646eb5923bd8b4034649ff05ae

                        • C:\Users\Admin\AppData\Local\Temp\1000017001\bb0c79deca.exe

                          Filesize

                          2.3MB

                          MD5

                          420efba99739c37bf0c373551aab5901

                          SHA1

                          d0499777d01e5e98b33a55bfac573086946a1481

                          SHA256

                          adf5b15e64d9139858f67da93364b444ef4cf0a603aae1b1616b925d04045dd8

                          SHA512

                          cee99d8c9c51e09b4164dd6e1adf1cee2a41cca79cf7f06ec135d68d1ec316bb8e284e0b707092216c6be980e5b5f3868415f94ad6b5a05ec9cdb8577d4e26e5

                        • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

                          Filesize

                          1.8MB

                          MD5

                          a7c185ca699ec75755a98c1b7d3ffb80

                          SHA1

                          d16cfd460243ae6ff7c292cb4697ce84ccb88136

                          SHA256

                          6a1bfd58efe68f261124127bd748e9ee7c2632b5ad0f8f76b07dbe3bd7c110e3

                          SHA512

                          551285647d82643a50ed4c50852b0e3288a4bdc1a81a8f6edfb9c15144de35ac962ade47f0057f09525eb25ef71d02bb26f22c4b09359cb53f76fb229d320ad4

                        • memory/1624-17-0x0000000000320000-0x00000000007DC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1624-5-0x0000000000320000-0x00000000007DC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1624-3-0x0000000000320000-0x00000000007DC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1624-2-0x0000000000321000-0x000000000034F000-memory.dmp

                          Filesize

                          184KB

                        • memory/1624-1-0x0000000077964000-0x0000000077966000-memory.dmp

                          Filesize

                          8KB

                        • memory/1624-0-0x0000000000320000-0x00000000007DC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2596-61-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-48-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-47-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-46-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-44-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-43-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-41-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-42-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-40-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-39-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-38-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-36-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-35-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-32-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-31-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-30-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-33-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-27-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-62-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-24-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-66-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-65-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-64-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-60-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-28-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2596-67-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-59-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-57-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-37-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-58-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-34-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-45-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/2596-29-0x0000000000400000-0x00000000009F9000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4440-230-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4440-231-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4656-196-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-191-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-239-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-237-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-235-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-233-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-78-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-228-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-212-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-209-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-179-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-207-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-150-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-194-0x00000000002A0000-0x00000000008AC000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4900-96-0x0000000000680000-0x0000000000BFD000-memory.dmp

                          Filesize

                          5.5MB

                        • memory/4900-153-0x0000000000680000-0x0000000000BFD000-memory.dmp

                          Filesize

                          5.5MB

                        • memory/4900-185-0x0000000000680000-0x0000000000BFD000-memory.dmp

                          Filesize

                          5.5MB

                        • memory/4900-192-0x0000000000680000-0x0000000000BFD000-memory.dmp

                          Filesize

                          5.5MB

                        • memory/4900-193-0x0000000000680000-0x0000000000BFD000-memory.dmp

                          Filesize

                          5.5MB

                        • memory/5048-232-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-144-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-151-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-206-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-238-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-208-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-20-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-210-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-21-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-18-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-227-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-195-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-142-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-63-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-19-0x0000000000AF1000-0x0000000000B1F000-memory.dmp

                          Filesize

                          184KB

                        • memory/5048-152-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-234-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-154-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-236-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5048-184-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5104-181-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5104-183-0x0000000000AF0000-0x0000000000FAC000-memory.dmp

                          Filesize

                          4.7MB