Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-07-2023 19:54

General

  • Target

    c490985abec08ca11b3e2b80be7607b401aa079c270a5fe1de644525b52fc6c5.exe

  • Size

    514KB

  • MD5

    0da9ca9bb6d472240906c36b319e60e8

  • SHA1

    5126092475613cbeee5e3f1a2f923153370c4893

  • SHA256

    c490985abec08ca11b3e2b80be7607b401aa079c270a5fe1de644525b52fc6c5

  • SHA512

    821461344b39f7fec62fe4248fed164ce2077aae859cc5cfc0757e101198bd8cbd478b1b30d0463d94e7d6363b5c55d7e0bb74a530b7469167fcf88d85772a1c

  • SSDEEP

    12288:9MrZy9027AQanWHWg2iNhkWZYTEHLPInKD:AydAXa3kWZGEDI0

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c490985abec08ca11b3e2b80be7607b401aa079c270a5fe1de644525b52fc6c5.exe
    "C:\Users\Admin\AppData\Local\Temp\c490985abec08ca11b3e2b80be7607b401aa079c270a5fe1de644525b52fc6c5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9097142.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9097142.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222112.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222112.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9900679.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9900679.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3840
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2906880.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2906880.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1464
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2260
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:2928
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1456
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1660
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:1220
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:4840
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:1636
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:4232
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:4604
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:2368
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7165608.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7165608.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:2976
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3518053.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3518053.exe
                  2⤵
                  • Executes dropped EXE
                  PID:5016
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:4024
              • C:\Users\Admin\AppData\Local\Temp\30EA.exe
                C:\Users\Admin\AppData\Local\Temp\30EA.exe
                1⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2924
                • C:\Windows\SysWOW64\regsvr32.exe
                  "C:\Windows\System32\regsvr32.exe" /S .\uH6VGQlJ.tZt
                  2⤵
                  • Loads dropped DLL
                  PID:3520
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:1064
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:4760

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\30EA.exe

                Filesize

                1.9MB

                MD5

                3c1ea5ede6a2da157676f0f570e9dad7

                SHA1

                5369cf5e181a6b199653bb325945143cfec3b884

                SHA256

                c4bc459a1f131b302b2a8da7694f9762476a509e47a6fe9dd3d11dd7b9b10b78

                SHA512

                2ae3dee28ebc31476346da6dcf35c0410d942944584816923ecd6a835d6fb02999afc4740e6be7db6d8d0693d9c2cd08ec9102c4c82c5c624a04b20219555f04

              • C:\Users\Admin\AppData\Local\Temp\30EA.exe

                Filesize

                1.9MB

                MD5

                3c1ea5ede6a2da157676f0f570e9dad7

                SHA1

                5369cf5e181a6b199653bb325945143cfec3b884

                SHA256

                c4bc459a1f131b302b2a8da7694f9762476a509e47a6fe9dd3d11dd7b9b10b78

                SHA512

                2ae3dee28ebc31476346da6dcf35c0410d942944584816923ecd6a835d6fb02999afc4740e6be7db6d8d0693d9c2cd08ec9102c4c82c5c624a04b20219555f04

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                f7b81e74158d727f8f80780afc30c938

                SHA1

                6bacadde76bea81e4c91061103435a15a14f6972

                SHA256

                2ab246682a324d7376586a9d3e5c6d43877f23f89249beeb18da439461c71df0

                SHA512

                4cd4d74ae9fce75d7d552318691021e38ed1f7f200050994192c0af2028c0d6c3dce5600038022c021fffaa641566e35ab32cf60efb1741210b0e08603c67737

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                f7b81e74158d727f8f80780afc30c938

                SHA1

                6bacadde76bea81e4c91061103435a15a14f6972

                SHA256

                2ab246682a324d7376586a9d3e5c6d43877f23f89249beeb18da439461c71df0

                SHA512

                4cd4d74ae9fce75d7d552318691021e38ed1f7f200050994192c0af2028c0d6c3dce5600038022c021fffaa641566e35ab32cf60efb1741210b0e08603c67737

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                f7b81e74158d727f8f80780afc30c938

                SHA1

                6bacadde76bea81e4c91061103435a15a14f6972

                SHA256

                2ab246682a324d7376586a9d3e5c6d43877f23f89249beeb18da439461c71df0

                SHA512

                4cd4d74ae9fce75d7d552318691021e38ed1f7f200050994192c0af2028c0d6c3dce5600038022c021fffaa641566e35ab32cf60efb1741210b0e08603c67737

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                f7b81e74158d727f8f80780afc30c938

                SHA1

                6bacadde76bea81e4c91061103435a15a14f6972

                SHA256

                2ab246682a324d7376586a9d3e5c6d43877f23f89249beeb18da439461c71df0

                SHA512

                4cd4d74ae9fce75d7d552318691021e38ed1f7f200050994192c0af2028c0d6c3dce5600038022c021fffaa641566e35ab32cf60efb1741210b0e08603c67737

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                226KB

                MD5

                f7b81e74158d727f8f80780afc30c938

                SHA1

                6bacadde76bea81e4c91061103435a15a14f6972

                SHA256

                2ab246682a324d7376586a9d3e5c6d43877f23f89249beeb18da439461c71df0

                SHA512

                4cd4d74ae9fce75d7d552318691021e38ed1f7f200050994192c0af2028c0d6c3dce5600038022c021fffaa641566e35ab32cf60efb1741210b0e08603c67737

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3518053.exe

                Filesize

                174KB

                MD5

                a21c7a26769fa05b39925ab3f8d945f6

                SHA1

                217bd545b53f581240f4d83080e079a2e72c45bb

                SHA256

                e674212dd64f0b42365eaad913dd111e62154f6b0cee98cda7d2b3c504fd591c

                SHA512

                de702205946bc3d02625fb4843e8d6a00372c95627345c1533678f5047b497b9b062216cfbcc0cf4edbd17789d6c0a4ae753795554be6696c6c560c1d61f86cd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3518053.exe

                Filesize

                174KB

                MD5

                a21c7a26769fa05b39925ab3f8d945f6

                SHA1

                217bd545b53f581240f4d83080e079a2e72c45bb

                SHA256

                e674212dd64f0b42365eaad913dd111e62154f6b0cee98cda7d2b3c504fd591c

                SHA512

                de702205946bc3d02625fb4843e8d6a00372c95627345c1533678f5047b497b9b062216cfbcc0cf4edbd17789d6c0a4ae753795554be6696c6c560c1d61f86cd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9097142.exe

                Filesize

                359KB

                MD5

                88971a84d1811f8eb3cdad5981d13359

                SHA1

                213e1607e9ac3d5b4daa8d617a92f9c9eaf18cf0

                SHA256

                8efdc2e360b94507d40833b596fc3a945c6a54b4ccf30bc3f952940cefee0c5d

                SHA512

                03a26d4103ae3133e169c55d2fc2b880d6f97283fd7fc549c54f546a22fc51de9ba94ae14aa40b1147228714271460880c3b8d0f7b6e666142270c64a1f478cc

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9097142.exe

                Filesize

                359KB

                MD5

                88971a84d1811f8eb3cdad5981d13359

                SHA1

                213e1607e9ac3d5b4daa8d617a92f9c9eaf18cf0

                SHA256

                8efdc2e360b94507d40833b596fc3a945c6a54b4ccf30bc3f952940cefee0c5d

                SHA512

                03a26d4103ae3133e169c55d2fc2b880d6f97283fd7fc549c54f546a22fc51de9ba94ae14aa40b1147228714271460880c3b8d0f7b6e666142270c64a1f478cc

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7165608.exe

                Filesize

                31KB

                MD5

                7a70fbb1e740a5d8ce7f44f1628f85ac

                SHA1

                1a8b3bb1b7d3ecb2c0f03cd189833610609071aa

                SHA256

                5145096cde43e931b9d1d04f6a57c3bb4f0e8f4b3cb5eeb89d14cb3f0ab0ca32

                SHA512

                b01045a273010c31a5bdb1f9bde48c7b807ff621ccab5d470b93dd629a06fc110db7a6c1ee89fd5b3377113290c3023bd71a0d9c5c18d092b40d29730de1fad4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7165608.exe

                Filesize

                31KB

                MD5

                7a70fbb1e740a5d8ce7f44f1628f85ac

                SHA1

                1a8b3bb1b7d3ecb2c0f03cd189833610609071aa

                SHA256

                5145096cde43e931b9d1d04f6a57c3bb4f0e8f4b3cb5eeb89d14cb3f0ab0ca32

                SHA512

                b01045a273010c31a5bdb1f9bde48c7b807ff621ccab5d470b93dd629a06fc110db7a6c1ee89fd5b3377113290c3023bd71a0d9c5c18d092b40d29730de1fad4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222112.exe

                Filesize

                235KB

                MD5

                c096f077d4c083b956f46017ab675bf6

                SHA1

                1b8609692ac8ec97aa487df8102bc3c5044d35d5

                SHA256

                3bf676e9a7466e2da50f1f6276f3ac40bb21c499fa8d12dd0a76114645825c1e

                SHA512

                db551beb5393c89badd66400aedd18cd3f2e19a3764cc514cca0c663eabd958fb5a7c0feaaf16525c4a6e766c00eeab739db1e9c1597585efd089806f40e60ba

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2222112.exe

                Filesize

                235KB

                MD5

                c096f077d4c083b956f46017ab675bf6

                SHA1

                1b8609692ac8ec97aa487df8102bc3c5044d35d5

                SHA256

                3bf676e9a7466e2da50f1f6276f3ac40bb21c499fa8d12dd0a76114645825c1e

                SHA512

                db551beb5393c89badd66400aedd18cd3f2e19a3764cc514cca0c663eabd958fb5a7c0feaaf16525c4a6e766c00eeab739db1e9c1597585efd089806f40e60ba

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9900679.exe

                Filesize

                13KB

                MD5

                9b46e4e8528cef895b94f16758046537

                SHA1

                a83499685a5524974c4e86b85d373e9f4a5510da

                SHA256

                d03e3c13f000ecee00d41a17b7b4d0a537c91f580a15e0fb1ab46418b1c000cb

                SHA512

                60e9a0b3d96008d24c287711a22559ec7c3efcf0816d68b3629151967a38f5b3ae3c5fdf1cf0425c6b3d1a379a405bb2aac40b4ac066d0d1d17dbd4dacb023c3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9900679.exe

                Filesize

                13KB

                MD5

                9b46e4e8528cef895b94f16758046537

                SHA1

                a83499685a5524974c4e86b85d373e9f4a5510da

                SHA256

                d03e3c13f000ecee00d41a17b7b4d0a537c91f580a15e0fb1ab46418b1c000cb

                SHA512

                60e9a0b3d96008d24c287711a22559ec7c3efcf0816d68b3629151967a38f5b3ae3c5fdf1cf0425c6b3d1a379a405bb2aac40b4ac066d0d1d17dbd4dacb023c3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2906880.exe

                Filesize

                226KB

                MD5

                f7b81e74158d727f8f80780afc30c938

                SHA1

                6bacadde76bea81e4c91061103435a15a14f6972

                SHA256

                2ab246682a324d7376586a9d3e5c6d43877f23f89249beeb18da439461c71df0

                SHA512

                4cd4d74ae9fce75d7d552318691021e38ed1f7f200050994192c0af2028c0d6c3dce5600038022c021fffaa641566e35ab32cf60efb1741210b0e08603c67737

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2906880.exe

                Filesize

                226KB

                MD5

                f7b81e74158d727f8f80780afc30c938

                SHA1

                6bacadde76bea81e4c91061103435a15a14f6972

                SHA256

                2ab246682a324d7376586a9d3e5c6d43877f23f89249beeb18da439461c71df0

                SHA512

                4cd4d74ae9fce75d7d552318691021e38ed1f7f200050994192c0af2028c0d6c3dce5600038022c021fffaa641566e35ab32cf60efb1741210b0e08603c67737

              • C:\Users\Admin\AppData\Local\Temp\uH6VGQlJ.tZt

                Filesize

                1.3MB

                MD5

                1efffe1e67dfc6135c74e6c3f901306c

                SHA1

                8f50e55e552079323d7c72dec0e2b0de35587d73

                SHA256

                d684745284bcbf0be881935d91dbba0dd11765386f4419bb8fbe64c503047c9c

                SHA512

                1c6f74effe27ed3295df8719dc9697d868fdcd6add0b1d58128354453b2567eee11f6021fa7a347f5ba6de7ae97547ffa499ba2fde40807f315aec2e70c33003

              • C:\Users\Admin\AppData\Local\Temp\uH6vGQlj.tZt

                Filesize

                1.3MB

                MD5

                1efffe1e67dfc6135c74e6c3f901306c

                SHA1

                8f50e55e552079323d7c72dec0e2b0de35587d73

                SHA256

                d684745284bcbf0be881935d91dbba0dd11765386f4419bb8fbe64c503047c9c

                SHA512

                1c6f74effe27ed3295df8719dc9697d868fdcd6add0b1d58128354453b2567eee11f6021fa7a347f5ba6de7ae97547ffa499ba2fde40807f315aec2e70c33003

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                272B

                MD5

                d867eabb1be5b45bc77bb06814e23640

                SHA1

                3139a51ce7e8462c31070363b9532c13cc52c82d

                SHA256

                38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                SHA512

                afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

              • memory/2976-173-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/2976-176-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3148-194-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-259-0x00000000031D0000-0x00000000031E0000-memory.dmp

                Filesize

                64KB

              • memory/3148-191-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-192-0x0000000008DA0000-0x0000000008DB0000-memory.dmp

                Filesize

                64KB

              • memory/3148-193-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-337-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-195-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-196-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-198-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-199-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-335-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-201-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-202-0x0000000008E20000-0x0000000008E30000-memory.dmp

                Filesize

                64KB

              • memory/3148-203-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-332-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-205-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-206-0x0000000008E20000-0x0000000008E30000-memory.dmp

                Filesize

                64KB

              • memory/3148-207-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-210-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-211-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-209-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-213-0x0000000008DA0000-0x0000000008DB0000-memory.dmp

                Filesize

                64KB

              • memory/3148-215-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-216-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-212-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-217-0x0000000008E20000-0x0000000008E30000-memory.dmp

                Filesize

                64KB

              • memory/3148-218-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-219-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-220-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-221-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-222-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-224-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-225-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-223-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-331-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-323-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-318-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-320-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-317-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-246-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-247-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-248-0x00000000031C0000-0x00000000031D0000-memory.dmp

                Filesize

                64KB

              • memory/3148-250-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-249-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-251-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-253-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-252-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-255-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-257-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-258-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-256-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-189-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-260-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-261-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-262-0x00000000031D0000-0x00000000031E0000-memory.dmp

                Filesize

                64KB

              • memory/3148-263-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-265-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-264-0x00000000031C0000-0x00000000031D0000-memory.dmp

                Filesize

                64KB

              • memory/3148-270-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-268-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-271-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-267-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-272-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-273-0x00000000031D0000-0x00000000031E0000-memory.dmp

                Filesize

                64KB

              • memory/3148-274-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-275-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-277-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-276-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-278-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-280-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-279-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-281-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-316-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-175-0x00000000078F0000-0x0000000007906000-memory.dmp

                Filesize

                88KB

              • memory/3148-315-0x0000000003160000-0x0000000003170000-memory.dmp

                Filesize

                64KB

              • memory/3148-314-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-313-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-309-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-311-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-308-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-307-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-306-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-304-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3148-305-0x00000000031B0000-0x00000000031C0000-memory.dmp

                Filesize

                64KB

              • memory/3148-302-0x0000000007960000-0x0000000007970000-memory.dmp

                Filesize

                64KB

              • memory/3520-290-0x00000000027F0000-0x00000000027F6000-memory.dmp

                Filesize

                24KB

              • memory/3520-300-0x0000000000400000-0x0000000000556000-memory.dmp

                Filesize

                1.3MB

              • memory/3520-299-0x0000000002C40000-0x0000000002D41000-memory.dmp

                Filesize

                1.0MB

              • memory/3520-296-0x0000000002C40000-0x0000000002D41000-memory.dmp

                Filesize

                1.0MB

              • memory/3520-295-0x0000000002B10000-0x0000000002C2B000-memory.dmp

                Filesize

                1.1MB

              • memory/3520-301-0x0000000002C40000-0x0000000002D41000-memory.dmp

                Filesize

                1.0MB

              • memory/3520-291-0x0000000000400000-0x0000000000556000-memory.dmp

                Filesize

                1.3MB

              • memory/3840-155-0x00007FFEF3850000-0x00007FFEF4311000-memory.dmp

                Filesize

                10.8MB

              • memory/3840-154-0x0000000000FE0000-0x0000000000FEA000-memory.dmp

                Filesize

                40KB

              • memory/3840-157-0x00007FFEF3850000-0x00007FFEF4311000-memory.dmp

                Filesize

                10.8MB

              • memory/5016-182-0x0000000000FD0000-0x0000000001000000-memory.dmp

                Filesize

                192KB

              • memory/5016-183-0x0000000073260000-0x0000000073A10000-memory.dmp

                Filesize

                7.7MB

              • memory/5016-184-0x000000000B320000-0x000000000B938000-memory.dmp

                Filesize

                6.1MB

              • memory/5016-185-0x000000000AE50000-0x000000000AF5A000-memory.dmp

                Filesize

                1.0MB

              • memory/5016-187-0x000000000AD80000-0x000000000AD92000-memory.dmp

                Filesize

                72KB

              • memory/5016-186-0x0000000005870000-0x0000000005880000-memory.dmp

                Filesize

                64KB

              • memory/5016-204-0x0000000005870000-0x0000000005880000-memory.dmp

                Filesize

                64KB

              • memory/5016-200-0x0000000073260000-0x0000000073A10000-memory.dmp

                Filesize

                7.7MB

              • memory/5016-188-0x000000000ADE0000-0x000000000AE1C000-memory.dmp

                Filesize

                240KB