Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-07-2023 14:29

General

  • Target

    e4124e0776e3b6d7f35e96c7fc666674c2485ac51d92914a1e5266d330e59360.exe

  • Size

    514KB

  • MD5

    9a63fbfe11cf52fc8609db042be9884d

  • SHA1

    2f158ba82832992b5940ab9b95f260a4bd03070e

  • SHA256

    e4124e0776e3b6d7f35e96c7fc666674c2485ac51d92914a1e5266d330e59360

  • SHA512

    94c17483e542dad371eec99ebd5ffa02ae5b74979cdfe581414040d5a770333bfc354ccab938b9f26f25a896ae9c4ff3a88328fa7b809ebe44837c041c3b2480

  • SSDEEP

    12288:PMrXy90c85lBl8RPMVzMXdnh8ESD67sx79ADjhuy/A:4ywlXVzUkzD67WeDjhumA

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4124e0776e3b6d7f35e96c7fc666674c2485ac51d92914a1e5266d330e59360.exe
    "C:\Users\Admin\AppData\Local\Temp\e4124e0776e3b6d7f35e96c7fc666674c2485ac51d92914a1e5266d330e59360.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9302516.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9302516.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2243228.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2243228.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3696
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8524428.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8524428.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3483142.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3483142.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4932
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4804
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4404
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4528
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "danke.exe" /P "Admin:N"
                7⤵
                  PID:1264
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  7⤵
                    PID:2128
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:3840
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4412
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:2812
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:1648
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:3956
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6480687.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6480687.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:244
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0511286.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0511286.exe
                  2⤵
                  • Executes dropped EXE
                  PID:3912
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:4592
              • C:\Users\Admin\AppData\Local\Temp\824.exe
                C:\Users\Admin\AppData\Local\Temp\824.exe
                1⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1972
                • C:\Windows\SysWOW64\regsvr32.exe
                  "C:\Windows\System32\regsvr32.exe" /S 7ACGX4K6.H
                  2⤵
                  • Loads dropped DLL
                  PID:1056
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:552

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9f5e4075afa9650718f7fb0629eae4b2

                SHA1

                0be25f312a3483afa6c25658a2bf0fb58b99c823

                SHA256

                1abfed5aebd9e8eeeb82c4cb37cdf6fcfb62076c778ed37df19158dda581e768

                SHA512

                6da88c0fdeab036d85b14720c8c46259e50285929e5f1305390c85f393b41add1a46b5b8bf2b725288e36f4220c809b206eaaee71c96032681ba0fa05e21e59d

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9f5e4075afa9650718f7fb0629eae4b2

                SHA1

                0be25f312a3483afa6c25658a2bf0fb58b99c823

                SHA256

                1abfed5aebd9e8eeeb82c4cb37cdf6fcfb62076c778ed37df19158dda581e768

                SHA512

                6da88c0fdeab036d85b14720c8c46259e50285929e5f1305390c85f393b41add1a46b5b8bf2b725288e36f4220c809b206eaaee71c96032681ba0fa05e21e59d

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9f5e4075afa9650718f7fb0629eae4b2

                SHA1

                0be25f312a3483afa6c25658a2bf0fb58b99c823

                SHA256

                1abfed5aebd9e8eeeb82c4cb37cdf6fcfb62076c778ed37df19158dda581e768

                SHA512

                6da88c0fdeab036d85b14720c8c46259e50285929e5f1305390c85f393b41add1a46b5b8bf2b725288e36f4220c809b206eaaee71c96032681ba0fa05e21e59d

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9f5e4075afa9650718f7fb0629eae4b2

                SHA1

                0be25f312a3483afa6c25658a2bf0fb58b99c823

                SHA256

                1abfed5aebd9e8eeeb82c4cb37cdf6fcfb62076c778ed37df19158dda581e768

                SHA512

                6da88c0fdeab036d85b14720c8c46259e50285929e5f1305390c85f393b41add1a46b5b8bf2b725288e36f4220c809b206eaaee71c96032681ba0fa05e21e59d

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                225KB

                MD5

                9f5e4075afa9650718f7fb0629eae4b2

                SHA1

                0be25f312a3483afa6c25658a2bf0fb58b99c823

                SHA256

                1abfed5aebd9e8eeeb82c4cb37cdf6fcfb62076c778ed37df19158dda581e768

                SHA512

                6da88c0fdeab036d85b14720c8c46259e50285929e5f1305390c85f393b41add1a46b5b8bf2b725288e36f4220c809b206eaaee71c96032681ba0fa05e21e59d

              • C:\Users\Admin\AppData\Local\Temp\7ACGX4K6.H

                Filesize

                1.3MB

                MD5

                1a805c5bd6a86b21deb78f7caad056d9

                SHA1

                ee0bb0c347adcdcf63a70d83eda729910a0ec546

                SHA256

                c25cf11c3e153c9ac58439edc383ff674a16c443e9c473ed017177d3dbbaa763

                SHA512

                0bfed608eeec70165922459cded7fc08d8c787799ac3f19811c2f385a2e35cff0138acd3074c1987e068c55eaf35b63ba2c9d66df141a91a34cfc1f22aff6bd5

              • C:\Users\Admin\AppData\Local\Temp\7ACGX4K6.H

                Filesize

                1.3MB

                MD5

                1a805c5bd6a86b21deb78f7caad056d9

                SHA1

                ee0bb0c347adcdcf63a70d83eda729910a0ec546

                SHA256

                c25cf11c3e153c9ac58439edc383ff674a16c443e9c473ed017177d3dbbaa763

                SHA512

                0bfed608eeec70165922459cded7fc08d8c787799ac3f19811c2f385a2e35cff0138acd3074c1987e068c55eaf35b63ba2c9d66df141a91a34cfc1f22aff6bd5

              • C:\Users\Admin\AppData\Local\Temp\824.exe

                Filesize

                1.5MB

                MD5

                66cab81941e9f7466171786314664b25

                SHA1

                53a6a5bf368191542fbc67efa1d8ac53228bfb71

                SHA256

                2a9150caeb799d40405056c99e1108e548cd2d6b0a1995ff5af0f01580138bd3

                SHA512

                4631c803b2f4b556c51e2b240cbb2eb70b7cbf6f4ac6874891a195c0413adba0e04b7c7efc412517d926de9e705ae0e18805e4540f60e52cef7988d24f8a7fb0

              • C:\Users\Admin\AppData\Local\Temp\824.exe

                Filesize

                1.5MB

                MD5

                66cab81941e9f7466171786314664b25

                SHA1

                53a6a5bf368191542fbc67efa1d8ac53228bfb71

                SHA256

                2a9150caeb799d40405056c99e1108e548cd2d6b0a1995ff5af0f01580138bd3

                SHA512

                4631c803b2f4b556c51e2b240cbb2eb70b7cbf6f4ac6874891a195c0413adba0e04b7c7efc412517d926de9e705ae0e18805e4540f60e52cef7988d24f8a7fb0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0511286.exe

                Filesize

                174KB

                MD5

                83f2e68746108cdbe698b6b34a428788

                SHA1

                6277c83b49c26adf804655e16b57f812a481ece6

                SHA256

                1597d452a68178838b55cda409c98c97d73a94bf8ae01ef04cd29ea5926a07f6

                SHA512

                2be765944767411b3f2fd0a1758d65f6256f749a0bd62a8677b488dea1f44d9b772230e30f3450466041abe58118e003bf198b522b31f6932fc925f5cf42593c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0511286.exe

                Filesize

                174KB

                MD5

                83f2e68746108cdbe698b6b34a428788

                SHA1

                6277c83b49c26adf804655e16b57f812a481ece6

                SHA256

                1597d452a68178838b55cda409c98c97d73a94bf8ae01ef04cd29ea5926a07f6

                SHA512

                2be765944767411b3f2fd0a1758d65f6256f749a0bd62a8677b488dea1f44d9b772230e30f3450466041abe58118e003bf198b522b31f6932fc925f5cf42593c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9302516.exe

                Filesize

                359KB

                MD5

                1acca3d5e5e932a19d4340b681fcf9c7

                SHA1

                4d990eea88604bed48e3734c1c8180705396e3ac

                SHA256

                cdd277e99de7c6f9ab733b53794853c7fbe8636a717e0f8de86ca87f1f66e4d2

                SHA512

                e6f75c58d902696a76e1ba7449d1800226490df23c3b62a6133cb8c6330645484073bfa03c5bcec3e94f720ddef56b9a58a6d08966a89bb6a043ebe0dbc9815f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9302516.exe

                Filesize

                359KB

                MD5

                1acca3d5e5e932a19d4340b681fcf9c7

                SHA1

                4d990eea88604bed48e3734c1c8180705396e3ac

                SHA256

                cdd277e99de7c6f9ab733b53794853c7fbe8636a717e0f8de86ca87f1f66e4d2

                SHA512

                e6f75c58d902696a76e1ba7449d1800226490df23c3b62a6133cb8c6330645484073bfa03c5bcec3e94f720ddef56b9a58a6d08966a89bb6a043ebe0dbc9815f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6480687.exe

                Filesize

                31KB

                MD5

                156a8fd382de3e96678ba8fe0399675f

                SHA1

                e6f4c54ee27de86fec3020ce3c8242ec061a898b

                SHA256

                b28c256538e6f80db004a1534bfbad622c4d53562f33323fd3ba8a83c82c60be

                SHA512

                b693c5ce93849780e4af11155b3a811b44c0b2baa0cef9fc2477e6869e3f26c99d5af7cf82bf871caef83d64aa96933bf5da59d9bcf30f39074c196ae82882e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6480687.exe

                Filesize

                31KB

                MD5

                156a8fd382de3e96678ba8fe0399675f

                SHA1

                e6f4c54ee27de86fec3020ce3c8242ec061a898b

                SHA256

                b28c256538e6f80db004a1534bfbad622c4d53562f33323fd3ba8a83c82c60be

                SHA512

                b693c5ce93849780e4af11155b3a811b44c0b2baa0cef9fc2477e6869e3f26c99d5af7cf82bf871caef83d64aa96933bf5da59d9bcf30f39074c196ae82882e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2243228.exe

                Filesize

                235KB

                MD5

                7031e924c398bd094bfece2f80d46c98

                SHA1

                d4c3442300a42c0db64d3f7d779f8d862685ab70

                SHA256

                4fb3c00b7fa62e149533ed8d88840cc6958605d1a63d0945240e554c78493883

                SHA512

                c700d727a6eea177bf6ddf8381f48e24637bd091acdca54171947710595a4e81facea9199fcf31721f2e6937b6d7cd952e1fb2cd6bee06ebf9cf17d842f380dd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2243228.exe

                Filesize

                235KB

                MD5

                7031e924c398bd094bfece2f80d46c98

                SHA1

                d4c3442300a42c0db64d3f7d779f8d862685ab70

                SHA256

                4fb3c00b7fa62e149533ed8d88840cc6958605d1a63d0945240e554c78493883

                SHA512

                c700d727a6eea177bf6ddf8381f48e24637bd091acdca54171947710595a4e81facea9199fcf31721f2e6937b6d7cd952e1fb2cd6bee06ebf9cf17d842f380dd

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8524428.exe

                Filesize

                13KB

                MD5

                0e5692c089edca2267fae07e3fff0459

                SHA1

                e28a00e0f01ffb4f7a539797d9a4eaa3c8d14a5d

                SHA256

                b1d223abad362796afcab0e08f237d4b43fe7bf054ee8f040842915f6bf9203a

                SHA512

                f07fee4b2a97aca99e31b2a7ba4832b2109d81966fd47f37146a5a79fb80d9246437dbc83b42001875d8bcc84b369b6f223ade53cbb9cb2ebdca66bae4c69051

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8524428.exe

                Filesize

                13KB

                MD5

                0e5692c089edca2267fae07e3fff0459

                SHA1

                e28a00e0f01ffb4f7a539797d9a4eaa3c8d14a5d

                SHA256

                b1d223abad362796afcab0e08f237d4b43fe7bf054ee8f040842915f6bf9203a

                SHA512

                f07fee4b2a97aca99e31b2a7ba4832b2109d81966fd47f37146a5a79fb80d9246437dbc83b42001875d8bcc84b369b6f223ade53cbb9cb2ebdca66bae4c69051

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3483142.exe

                Filesize

                225KB

                MD5

                9f5e4075afa9650718f7fb0629eae4b2

                SHA1

                0be25f312a3483afa6c25658a2bf0fb58b99c823

                SHA256

                1abfed5aebd9e8eeeb82c4cb37cdf6fcfb62076c778ed37df19158dda581e768

                SHA512

                6da88c0fdeab036d85b14720c8c46259e50285929e5f1305390c85f393b41add1a46b5b8bf2b725288e36f4220c809b206eaaee71c96032681ba0fa05e21e59d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3483142.exe

                Filesize

                225KB

                MD5

                9f5e4075afa9650718f7fb0629eae4b2

                SHA1

                0be25f312a3483afa6c25658a2bf0fb58b99c823

                SHA256

                1abfed5aebd9e8eeeb82c4cb37cdf6fcfb62076c778ed37df19158dda581e768

                SHA512

                6da88c0fdeab036d85b14720c8c46259e50285929e5f1305390c85f393b41add1a46b5b8bf2b725288e36f4220c809b206eaaee71c96032681ba0fa05e21e59d

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                272B

                MD5

                d867eabb1be5b45bc77bb06814e23640

                SHA1

                3139a51ce7e8462c31070363b9532c13cc52c82d

                SHA256

                38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                SHA512

                afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

              • memory/244-173-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/244-176-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/1056-299-0x0000000003260000-0x000000000335B000-memory.dmp

                Filesize

                1004KB

              • memory/1056-298-0x0000000003260000-0x000000000335B000-memory.dmp

                Filesize

                1004KB

              • memory/1056-295-0x0000000003260000-0x000000000335B000-memory.dmp

                Filesize

                1004KB

              • memory/1056-294-0x0000000003140000-0x0000000003256000-memory.dmp

                Filesize

                1.1MB

              • memory/1056-291-0x0000000001290000-0x0000000001296000-memory.dmp

                Filesize

                24KB

              • memory/1056-292-0x0000000000400000-0x0000000000543000-memory.dmp

                Filesize

                1.3MB

              • memory/2784-219-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-258-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-196-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-198-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-200-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-201-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-202-0x0000000007ED0000-0x0000000007EE0000-memory.dmp

                Filesize

                64KB

              • memory/2784-203-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-205-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-204-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-333-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-208-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-210-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-213-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-212-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-332-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-216-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-265-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-215-0x0000000007D60000-0x0000000007D70000-memory.dmp

                Filesize

                64KB

              • memory/2784-220-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-218-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-222-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-224-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-223-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-225-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-209-0x0000000007ED0000-0x0000000007EE0000-memory.dmp

                Filesize

                64KB

              • memory/2784-226-0x0000000007ED0000-0x0000000007EE0000-memory.dmp

                Filesize

                64KB

              • memory/2784-263-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-191-0x0000000007D60000-0x0000000007D70000-memory.dmp

                Filesize

                64KB

              • memory/2784-330-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-328-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-266-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-247-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-248-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-250-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-251-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-249-0x0000000000640000-0x0000000000650000-memory.dmp

                Filesize

                64KB

              • memory/2784-252-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-256-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-254-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-253-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-312-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-259-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-260-0x0000000000660000-0x0000000000670000-memory.dmp

                Filesize

                64KB

              • memory/2784-261-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-262-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-195-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-320-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-194-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-269-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-267-0x0000000000640000-0x0000000000650000-memory.dmp

                Filesize

                64KB

              • memory/2784-271-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-272-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-273-0x0000000000660000-0x0000000000670000-memory.dmp

                Filesize

                64KB

              • memory/2784-274-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-275-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-276-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-277-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-278-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-280-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-281-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-279-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-282-0x0000000000660000-0x0000000000670000-memory.dmp

                Filesize

                64KB

              • memory/2784-175-0x0000000000600000-0x0000000000616000-memory.dmp

                Filesize

                88KB

              • memory/2784-192-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-322-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-317-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-193-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-190-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-189-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-316-0x0000000008130000-0x0000000008140000-memory.dmp

                Filesize

                64KB

              • memory/2784-315-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-314-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-313-0x0000000008130000-0x0000000008140000-memory.dmp

                Filesize

                64KB

              • memory/2784-301-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-302-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-303-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-304-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-305-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-306-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-307-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-309-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-311-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/2784-310-0x0000000007D70000-0x0000000007D80000-memory.dmp

                Filesize

                64KB

              • memory/3912-184-0x00000000055C0000-0x0000000005BD8000-memory.dmp

                Filesize

                6.1MB

              • memory/3912-187-0x0000000004F90000-0x0000000004FA0000-memory.dmp

                Filesize

                64KB

              • memory/3912-186-0x0000000004FA0000-0x0000000004FB2000-memory.dmp

                Filesize

                72KB

              • memory/3912-188-0x0000000005000000-0x000000000503C000-memory.dmp

                Filesize

                240KB

              • memory/3912-185-0x00000000050B0000-0x00000000051BA000-memory.dmp

                Filesize

                1.0MB

              • memory/3912-182-0x00000000004D0000-0x0000000000500000-memory.dmp

                Filesize

                192KB

              • memory/3912-183-0x0000000072F20000-0x00000000736D0000-memory.dmp

                Filesize

                7.7MB

              • memory/3912-214-0x0000000004F90000-0x0000000004FA0000-memory.dmp

                Filesize

                64KB

              • memory/3912-206-0x0000000072F20000-0x00000000736D0000-memory.dmp

                Filesize

                7.7MB

              • memory/4856-154-0x0000000000500000-0x000000000050A000-memory.dmp

                Filesize

                40KB

              • memory/4856-155-0x00007FFE41DB0000-0x00007FFE42871000-memory.dmp

                Filesize

                10.8MB

              • memory/4856-157-0x00007FFE41DB0000-0x00007FFE42871000-memory.dmp

                Filesize

                10.8MB