Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2023 08:02

General

  • Target

    65c3f5b8b95e801fe1c98058d48435629207adfa3fcec656364398c7501adc12.exe

  • Size

    299KB

  • MD5

    8d4a5356bee36cef76a8405df8a122f1

  • SHA1

    f8f02f087c428b8875ad52cb95541396bafe036a

  • SHA256

    65c3f5b8b95e801fe1c98058d48435629207adfa3fcec656364398c7501adc12

  • SHA512

    f521962c0c8a9f492a771afc7b8f487abb328c9c4edbebcb32dda27a88c9865f12d973072aa7f1a20cb3b667ab8ed4edd1514ae58cca10a50d6ca66b83b72bc1

  • SSDEEP

    3072:JFV81fCVSezIAani6/RIBDD1chXbKt2aZnW8PwfNA5cRkMCPNsMPd+mS9J/5tl+F:CC4nF/RkVchXbKt2rN1tuNsMls3lYw

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://potunulit.org/

http://hutnilior.net/

http://bulimu55t.net/

http://soryytlic4.net/

http://novanosa5org.org/

http://nuljjjnuli.org/

http://tolilolihul.net/

http://somatoka51hub.net/

http://hujukui3.net/

http://bukubuka1.net/

http://golilopaster.org/

http://newzelannd66.org/

http://otriluyttn.org/

http://toobussy.com/tmp/

http://wuc11.com/tmp/

http://ladogatur.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

amadey

Version

3.67

C2

45.9.74.80/0bjdn2Z/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65c3f5b8b95e801fe1c98058d48435629207adfa3fcec656364398c7501adc12.exe
    "C:\Users\Admin\AppData\Local\Temp\65c3f5b8b95e801fe1c98058d48435629207adfa3fcec656364398c7501adc12.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3216
  • C:\Users\Admin\AppData\Local\Temp\6590.exe
    C:\Users\Admin\AppData\Local\Temp\6590.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Users\Admin\AppData\Local\Temp\6590.exe
      "C:\Users\Admin\AppData\Local\Temp\6590.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:960
  • C:\Users\Admin\AppData\Local\Temp\6C76.exe
    C:\Users\Admin\AppData\Local\Temp\6C76.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:4488
  • C:\Users\Admin\AppData\Local\Temp\D3AD.exe
    C:\Users\Admin\AppData\Local\Temp\D3AD.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 1884
      2⤵
      • Program crash
      PID:4916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1080 -ip 1080
    1⤵
      PID:2596
    • C:\Users\Admin\AppData\Local\Temp\1DA8.exe
      C:\Users\Admin\AppData\Local\Temp\1DA8.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
        "C:\Users\Admin\AppData\Local\Temp\aafg31.exe"
        2⤵
        • Executes dropped EXE
        PID:4264
      • C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe
        "C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3744
        • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
          "C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4980
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F
            4⤵
            • Creates scheduled task(s)
            PID:2528
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "Admin:N"&&CACLS "..\6d73a97b0c" /P "Admin:R" /E&&Exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3360
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              5⤵
                PID:1320
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "mnolyk.exe" /P "Admin:N"
                5⤵
                  PID:3180
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "mnolyk.exe" /P "Admin:R" /E
                  5⤵
                    PID:448
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    5⤵
                      PID:2816
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\6d73a97b0c" /P "Admin:N"
                      5⤵
                        PID:1940
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\6d73a97b0c" /P "Admin:R" /E
                        5⤵
                          PID:2968
                  • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                    "C:\Users\Admin\AppData\Local\Temp\XandETC.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:4320
                • C:\Users\Admin\AppData\Local\Temp\2605.exe
                  C:\Users\Admin\AppData\Local\Temp\2605.exe
                  1⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:4520
                • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                  C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                  1⤵
                  • Executes dropped EXE
                  PID:4860

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Scheduled Task

                1
                T1053

                Persistence

                Scheduled Task

                1
                T1053

                Privilege Escalation

                Scheduled Task

                1
                T1053

                Credential Access

                Credentials in Files

                3
                T1081

                Discovery

                Query Registry

                4
                T1012

                System Information Discovery

                3
                T1082

                Peripheral Device Discovery

                1
                T1120

                Collection

                Data from Local System

                3
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\013461898371
                  Filesize

                  81KB

                  MD5

                  f78f91ef3a2c62dd89f642e6d1e92981

                  SHA1

                  178b2524ed633836106083910d4b1160f7c77223

                  SHA256

                  7537ba308833dd61d4cce2220d6c9952660737d002d1d987b469591629a561c9

                  SHA512

                  ea12f9c0d75fcea8d090329ce69b3d74b90d309bedd3f8bc0ae8bb2b56e467e238ea25c3643e611af9604fd2167b2dd4bee386b7eb6e05b1bb97c79d480d7215

                • C:\Users\Admin\AppData\Local\Temp\1DA8.exe
                  Filesize

                  4.9MB

                  MD5

                  014b9db957bdbafe8a48ec5cd4004f0e

                  SHA1

                  44ba905cfb83b80bda92553e378eb4600acbea91

                  SHA256

                  92f4134cc013553a811aa371570d7e2e66a2537b4eac3dbdeaf0cb5f02e6ec56

                  SHA512

                  775e1aa3905a1d01f2ca410b4e942ac8794bef3275057821736ebea755d5315318d7e1fadaca80a1c11f7dc1d527a586748f7ba5cd7201748e431848f079aae8

                • C:\Users\Admin\AppData\Local\Temp\1DA8.exe
                  Filesize

                  4.9MB

                  MD5

                  014b9db957bdbafe8a48ec5cd4004f0e

                  SHA1

                  44ba905cfb83b80bda92553e378eb4600acbea91

                  SHA256

                  92f4134cc013553a811aa371570d7e2e66a2537b4eac3dbdeaf0cb5f02e6ec56

                  SHA512

                  775e1aa3905a1d01f2ca410b4e942ac8794bef3275057821736ebea755d5315318d7e1fadaca80a1c11f7dc1d527a586748f7ba5cd7201748e431848f079aae8

                • C:\Users\Admin\AppData\Local\Temp\2605.exe
                  Filesize

                  290KB

                  MD5

                  ae0b7753413c67749fde12971cbe649e

                  SHA1

                  09f29f38a5912d4f56cb35064480a23f5758b433

                  SHA256

                  2989e183bed3ab8ad94de85150da36301f8c50b7defbf47bb7afd721315d5c89

                  SHA512

                  db64fabf8132e41da1533244f3f0e472f2008e68beabc425246428411f6f41629238a04bcb3b56e3d66e5d6950859d44a31ecc06e432d3dcd9385627802eaadd

                • C:\Users\Admin\AppData\Local\Temp\2605.exe
                  Filesize

                  290KB

                  MD5

                  ae0b7753413c67749fde12971cbe649e

                  SHA1

                  09f29f38a5912d4f56cb35064480a23f5758b433

                  SHA256

                  2989e183bed3ab8ad94de85150da36301f8c50b7defbf47bb7afd721315d5c89

                  SHA512

                  db64fabf8132e41da1533244f3f0e472f2008e68beabc425246428411f6f41629238a04bcb3b56e3d66e5d6950859d44a31ecc06e432d3dcd9385627802eaadd

                • C:\Users\Admin\AppData\Local\Temp\6590.exe
                  Filesize

                  883KB

                  MD5

                  266594f5122fa30f09a6096b3953c41b

                  SHA1

                  1f2257b151a0c4c38ecca73adb1ddc94766f26db

                  SHA256

                  c2ad3ab13580cacf8481ee851fcacb94e5d812205cb2004a85353f8a5d1497b1

                  SHA512

                  95423260badad46b3091d04207fdb447de6955be2c35773f0b874e9136a37403681c2fecb6e70d09e5d788ce2c89cc07c5d3151340bceaf847175d59ef68f571

                • C:\Users\Admin\AppData\Local\Temp\6590.exe
                  Filesize

                  883KB

                  MD5

                  266594f5122fa30f09a6096b3953c41b

                  SHA1

                  1f2257b151a0c4c38ecca73adb1ddc94766f26db

                  SHA256

                  c2ad3ab13580cacf8481ee851fcacb94e5d812205cb2004a85353f8a5d1497b1

                  SHA512

                  95423260badad46b3091d04207fdb447de6955be2c35773f0b874e9136a37403681c2fecb6e70d09e5d788ce2c89cc07c5d3151340bceaf847175d59ef68f571

                • C:\Users\Admin\AppData\Local\Temp\6590.exe
                  Filesize

                  883KB

                  MD5

                  266594f5122fa30f09a6096b3953c41b

                  SHA1

                  1f2257b151a0c4c38ecca73adb1ddc94766f26db

                  SHA256

                  c2ad3ab13580cacf8481ee851fcacb94e5d812205cb2004a85353f8a5d1497b1

                  SHA512

                  95423260badad46b3091d04207fdb447de6955be2c35773f0b874e9136a37403681c2fecb6e70d09e5d788ce2c89cc07c5d3151340bceaf847175d59ef68f571

                • C:\Users\Admin\AppData\Local\Temp\6C76.exe
                  Filesize

                  290KB

                  MD5

                  ae0b7753413c67749fde12971cbe649e

                  SHA1

                  09f29f38a5912d4f56cb35064480a23f5758b433

                  SHA256

                  2989e183bed3ab8ad94de85150da36301f8c50b7defbf47bb7afd721315d5c89

                  SHA512

                  db64fabf8132e41da1533244f3f0e472f2008e68beabc425246428411f6f41629238a04bcb3b56e3d66e5d6950859d44a31ecc06e432d3dcd9385627802eaadd

                • C:\Users\Admin\AppData\Local\Temp\6C76.exe
                  Filesize

                  290KB

                  MD5

                  ae0b7753413c67749fde12971cbe649e

                  SHA1

                  09f29f38a5912d4f56cb35064480a23f5758b433

                  SHA256

                  2989e183bed3ab8ad94de85150da36301f8c50b7defbf47bb7afd721315d5c89

                  SHA512

                  db64fabf8132e41da1533244f3f0e472f2008e68beabc425246428411f6f41629238a04bcb3b56e3d66e5d6950859d44a31ecc06e432d3dcd9385627802eaadd

                • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                  Filesize

                  249KB

                  MD5

                  08240e71429b32855b418a4acf0e38ec

                  SHA1

                  b180ace2ea6815775d29785c985b576dc21b76b5

                  SHA256

                  a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                  SHA512

                  69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                  Filesize

                  249KB

                  MD5

                  08240e71429b32855b418a4acf0e38ec

                  SHA1

                  b180ace2ea6815775d29785c985b576dc21b76b5

                  SHA256

                  a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                  SHA512

                  69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                  Filesize

                  249KB

                  MD5

                  08240e71429b32855b418a4acf0e38ec

                  SHA1

                  b180ace2ea6815775d29785c985b576dc21b76b5

                  SHA256

                  a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                  SHA512

                  69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                • C:\Users\Admin\AppData\Local\Temp\D3AD.exe
                  Filesize

                  378KB

                  MD5

                  881431fc5733a31b353776c361f93b23

                  SHA1

                  9a3b543c901d341d6a067bdaf5f171b877954f53

                  SHA256

                  4a2125d21c65ee7657ccf38e064b38e3ae69c8251b5b0fc7a9fb754dbb22953a

                  SHA512

                  9b2b9354565578d79f3be8c16ed024d50f1e54fcb51e1bbac8b9acf4db31b4fac4556f9556f964fe763ec6a7df0d4d43f9ea4834c48165eb8324f0a9e11f5610

                • C:\Users\Admin\AppData\Local\Temp\D3AD.exe
                  Filesize

                  378KB

                  MD5

                  881431fc5733a31b353776c361f93b23

                  SHA1

                  9a3b543c901d341d6a067bdaf5f171b877954f53

                  SHA256

                  4a2125d21c65ee7657ccf38e064b38e3ae69c8251b5b0fc7a9fb754dbb22953a

                  SHA512

                  9b2b9354565578d79f3be8c16ed024d50f1e54fcb51e1bbac8b9acf4db31b4fac4556f9556f964fe763ec6a7df0d4d43f9ea4834c48165eb8324f0a9e11f5610

                • C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe
                  Filesize

                  249KB

                  MD5

                  08240e71429b32855b418a4acf0e38ec

                  SHA1

                  b180ace2ea6815775d29785c985b576dc21b76b5

                  SHA256

                  a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                  SHA512

                  69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                • C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe
                  Filesize

                  249KB

                  MD5

                  08240e71429b32855b418a4acf0e38ec

                  SHA1

                  b180ace2ea6815775d29785c985b576dc21b76b5

                  SHA256

                  a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                  SHA512

                  69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                • C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe
                  Filesize

                  249KB

                  MD5

                  08240e71429b32855b418a4acf0e38ec

                  SHA1

                  b180ace2ea6815775d29785c985b576dc21b76b5

                  SHA256

                  a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                  SHA512

                  69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                  Filesize

                  3.7MB

                  MD5

                  3006b49f3a30a80bb85074c279acc7df

                  SHA1

                  728a7a867d13ad0034c29283939d94f0df6c19df

                  SHA256

                  f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                  SHA512

                  e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                  Filesize

                  3.7MB

                  MD5

                  3006b49f3a30a80bb85074c279acc7df

                  SHA1

                  728a7a867d13ad0034c29283939d94f0df6c19df

                  SHA256

                  f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                  SHA512

                  e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
                  Filesize

                  949KB

                  MD5

                  35eb44f660dba74a18da3b07a5639d59

                  SHA1

                  1bc2c80bd7d579c09749cf1e94fcfc886d69f29a

                  SHA256

                  3c3c81a5e9751c12fd812d7b0279dfe71699a2718e33bce26d941d4d1bd2bb93

                  SHA512

                  22ddc5052483b429f29719b814e4de2662884bb9bb0e6fd7e3bacd73e3f87cc70d4fdc50213faffc0125bf5b2db0367081fe35ce71070ff5a2550d6d7194757e

                • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
                  Filesize

                  949KB

                  MD5

                  35eb44f660dba74a18da3b07a5639d59

                  SHA1

                  1bc2c80bd7d579c09749cf1e94fcfc886d69f29a

                  SHA256

                  3c3c81a5e9751c12fd812d7b0279dfe71699a2718e33bce26d941d4d1bd2bb93

                  SHA512

                  22ddc5052483b429f29719b814e4de2662884bb9bb0e6fd7e3bacd73e3f87cc70d4fdc50213faffc0125bf5b2db0367081fe35ce71070ff5a2550d6d7194757e

                • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
                  Filesize

                  949KB

                  MD5

                  35eb44f660dba74a18da3b07a5639d59

                  SHA1

                  1bc2c80bd7d579c09749cf1e94fcfc886d69f29a

                  SHA256

                  3c3c81a5e9751c12fd812d7b0279dfe71699a2718e33bce26d941d4d1bd2bb93

                  SHA512

                  22ddc5052483b429f29719b814e4de2662884bb9bb0e6fd7e3bacd73e3f87cc70d4fdc50213faffc0125bf5b2db0367081fe35ce71070ff5a2550d6d7194757e

                • C:\Users\Admin\AppData\Roaming\riugttu
                  Filesize

                  290KB

                  MD5

                  ae0b7753413c67749fde12971cbe649e

                  SHA1

                  09f29f38a5912d4f56cb35064480a23f5758b433

                  SHA256

                  2989e183bed3ab8ad94de85150da36301f8c50b7defbf47bb7afd721315d5c89

                  SHA512

                  db64fabf8132e41da1533244f3f0e472f2008e68beabc425246428411f6f41629238a04bcb3b56e3d66e5d6950859d44a31ecc06e432d3dcd9385627802eaadd

                • memory/960-159-0x0000000000400000-0x000000000046F000-memory.dmp
                  Filesize

                  444KB

                • memory/960-165-0x0000000000400000-0x000000000046F000-memory.dmp
                  Filesize

                  444KB

                • memory/960-162-0x0000000000400000-0x000000000046F000-memory.dmp
                  Filesize

                  444KB

                • memory/960-164-0x0000000000400000-0x000000000046F000-memory.dmp
                  Filesize

                  444KB

                • memory/1080-209-0x0000000006D40000-0x0000000006D50000-memory.dmp
                  Filesize

                  64KB

                • memory/1080-202-0x0000000006D40000-0x0000000006D50000-memory.dmp
                  Filesize

                  64KB

                • memory/1080-205-0x0000000006D40000-0x0000000006D50000-memory.dmp
                  Filesize

                  64KB

                • memory/1080-203-0x0000000006D40000-0x0000000006D50000-memory.dmp
                  Filesize

                  64KB

                • memory/1080-201-0x00000000026D0000-0x000000000270D000-memory.dmp
                  Filesize

                  244KB

                • memory/1080-208-0x0000000007920000-0x000000000795C000-memory.dmp
                  Filesize

                  240KB

                • memory/1080-212-0x0000000008830000-0x0000000008D5C000-memory.dmp
                  Filesize

                  5.2MB

                • memory/1080-210-0x0000000007B00000-0x0000000007B66000-memory.dmp
                  Filesize

                  408KB

                • memory/1080-211-0x0000000008610000-0x00000000087D2000-memory.dmp
                  Filesize

                  1.8MB

                • memory/1080-206-0x0000000006BE0000-0x0000000006BF2000-memory.dmp
                  Filesize

                  72KB

                • memory/1080-214-0x0000000000400000-0x000000000258A000-memory.dmp
                  Filesize

                  33.5MB

                • memory/1080-207-0x0000000006C00000-0x0000000006D0A000-memory.dmp
                  Filesize

                  1.0MB

                • memory/1080-204-0x0000000007300000-0x0000000007918000-memory.dmp
                  Filesize

                  6.1MB

                • memory/1268-219-0x00000000008C0000-0x0000000000DAA000-memory.dmp
                  Filesize

                  4.9MB

                • memory/2828-158-0x0000000005520000-0x000000000553E000-memory.dmp
                  Filesize

                  120KB

                • memory/2828-148-0x0000000005A80000-0x0000000006024000-memory.dmp
                  Filesize

                  5.6MB

                • memory/2828-146-0x00000000008A0000-0x0000000000982000-memory.dmp
                  Filesize

                  904KB

                • memory/2828-147-0x0000000005370000-0x0000000005402000-memory.dmp
                  Filesize

                  584KB

                • memory/2828-149-0x0000000005570000-0x000000000560C000-memory.dmp
                  Filesize

                  624KB

                • memory/2828-157-0x0000000005610000-0x0000000005686000-memory.dmp
                  Filesize

                  472KB

                • memory/2828-156-0x0000000005270000-0x0000000005271000-memory.dmp
                  Filesize

                  4KB

                • memory/2828-155-0x0000000005360000-0x0000000005370000-memory.dmp
                  Filesize

                  64KB

                • memory/3216-134-0x00000000042B0000-0x00000000042B9000-memory.dmp
                  Filesize

                  36KB

                • memory/3216-136-0x0000000000400000-0x0000000002577000-memory.dmp
                  Filesize

                  33.5MB

                • memory/3232-177-0x00000000031C0000-0x00000000031D6000-memory.dmp
                  Filesize

                  88KB

                • memory/3232-276-0x0000000008AC0000-0x0000000008AD6000-memory.dmp
                  Filesize

                  88KB

                • memory/3232-135-0x0000000001110000-0x0000000001126000-memory.dmp
                  Filesize

                  88KB

                • memory/4264-274-0x0000018675C80000-0x0000018675DF1000-memory.dmp
                  Filesize

                  1.4MB

                • memory/4264-275-0x0000018675E00000-0x0000018675F31000-memory.dmp
                  Filesize

                  1.2MB

                • memory/4264-281-0x0000018675E00000-0x0000018675F31000-memory.dmp
                  Filesize

                  1.2MB

                • memory/4320-280-0x00007FF608CA0000-0x00007FF60905D000-memory.dmp
                  Filesize

                  3.7MB

                • memory/4488-180-0x0000000000400000-0x0000000002574000-memory.dmp
                  Filesize

                  33.5MB

                • memory/4488-163-0x00000000026C0000-0x00000000026C9000-memory.dmp
                  Filesize

                  36KB

                • memory/4520-277-0x0000000000400000-0x0000000002574000-memory.dmp
                  Filesize

                  33.5MB