Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/07/2023, 06:28

General

  • Target

    463c906ced603571cbfca2daa7ffc5e10d063dedce5a1611fbea17cbaccffd89.exe

  • Size

    515KB

  • MD5

    bd12528cb9e9b4eb11b42db20a21df9e

  • SHA1

    f2ee727a6c436b0ab818d3ba2bc5bb4cacb5585c

  • SHA256

    463c906ced603571cbfca2daa7ffc5e10d063dedce5a1611fbea17cbaccffd89

  • SHA512

    4b8ec9b94df5461e8ed8e76348468a3a18703e40c1f17f027ed4f5e40adec304012061a1e6eb924fa4e5a254afdae5d3facd357a5a480c1c87d14f856be9acf5

  • SSDEEP

    12288:4MrPy90z3yBYmrg6fPW+22zupYhdbhgAdOhKZ8jXCdxNBn:Hyi+gQRuklKvqBn

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

news

C2

77.91.68.68:19071

Attributes
  • auth_value

    99ba2ffe8d72ebe9fdc7e758c94db148

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\463c906ced603571cbfca2daa7ffc5e10d063dedce5a1611fbea17cbaccffd89.exe
    "C:\Users\Admin\AppData\Local\Temp\463c906ced603571cbfca2daa7ffc5e10d063dedce5a1611fbea17cbaccffd89.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0994271.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0994271.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0911247.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0911247.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4176
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3132733.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3132733.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7031927.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7031927.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4604
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:692
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:3080
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2208
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1348
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:2160
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:3904
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:1860
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:4144
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:4528
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:4992
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5765871.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5765871.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:4280
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4936353.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4936353.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4524
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:584
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:2600
              • C:\Users\Admin\AppData\Local\Temp\5346.exe
                C:\Users\Admin\AppData\Local\Temp\5346.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:412
                • C:\Windows\SysWOW64\msiexec.exe
                  "C:\Windows\System32\msiexec.exe" -y .\_E62LIn4.O
                  2⤵
                  • Loads dropped DLL
                  PID:3784

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                977957a189c300b3ae6f1c90c3c45d5b

                SHA1

                bae915aebe47ac5b7dff369dfda5e6385f12c565

                SHA256

                780d04631d154e0cd6987b6ad43239458e84967eaa39c02439f0314f1f4490e4

                SHA512

                e0a6bc6cd0377d07f57f4ed8285b2e2969389a368be81c2748ef92844fbe51be095b1f870c52e69758da5a82981a62f5c60714f7ee830b4620a7be36e996a0a7

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                977957a189c300b3ae6f1c90c3c45d5b

                SHA1

                bae915aebe47ac5b7dff369dfda5e6385f12c565

                SHA256

                780d04631d154e0cd6987b6ad43239458e84967eaa39c02439f0314f1f4490e4

                SHA512

                e0a6bc6cd0377d07f57f4ed8285b2e2969389a368be81c2748ef92844fbe51be095b1f870c52e69758da5a82981a62f5c60714f7ee830b4620a7be36e996a0a7

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                977957a189c300b3ae6f1c90c3c45d5b

                SHA1

                bae915aebe47ac5b7dff369dfda5e6385f12c565

                SHA256

                780d04631d154e0cd6987b6ad43239458e84967eaa39c02439f0314f1f4490e4

                SHA512

                e0a6bc6cd0377d07f57f4ed8285b2e2969389a368be81c2748ef92844fbe51be095b1f870c52e69758da5a82981a62f5c60714f7ee830b4620a7be36e996a0a7

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                977957a189c300b3ae6f1c90c3c45d5b

                SHA1

                bae915aebe47ac5b7dff369dfda5e6385f12c565

                SHA256

                780d04631d154e0cd6987b6ad43239458e84967eaa39c02439f0314f1f4490e4

                SHA512

                e0a6bc6cd0377d07f57f4ed8285b2e2969389a368be81c2748ef92844fbe51be095b1f870c52e69758da5a82981a62f5c60714f7ee830b4620a7be36e996a0a7

              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe

                Filesize

                230KB

                MD5

                977957a189c300b3ae6f1c90c3c45d5b

                SHA1

                bae915aebe47ac5b7dff369dfda5e6385f12c565

                SHA256

                780d04631d154e0cd6987b6ad43239458e84967eaa39c02439f0314f1f4490e4

                SHA512

                e0a6bc6cd0377d07f57f4ed8285b2e2969389a368be81c2748ef92844fbe51be095b1f870c52e69758da5a82981a62f5c60714f7ee830b4620a7be36e996a0a7

              • C:\Users\Admin\AppData\Local\Temp\5346.exe

                Filesize

                1.6MB

                MD5

                436c574c5b11a763dd96c83bca8bb4b3

                SHA1

                3d0bca0898cb7cb43c93f5b1a24b3a099f760891

                SHA256

                a4996fca522880b7495304b8b0959c56b71dd62e42d8dfd2001e73bcb5023499

                SHA512

                bfbc35d14d682018608f30f874c71608cb1ffd0077e4445ced049344e359ab1d2a114013c2bb7c49a32982a9cffdba4667646e45a1ec7fbafead221fb9d84144

              • C:\Users\Admin\AppData\Local\Temp\5346.exe

                Filesize

                1.6MB

                MD5

                436c574c5b11a763dd96c83bca8bb4b3

                SHA1

                3d0bca0898cb7cb43c93f5b1a24b3a099f760891

                SHA256

                a4996fca522880b7495304b8b0959c56b71dd62e42d8dfd2001e73bcb5023499

                SHA512

                bfbc35d14d682018608f30f874c71608cb1ffd0077e4445ced049344e359ab1d2a114013c2bb7c49a32982a9cffdba4667646e45a1ec7fbafead221fb9d84144

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4936353.exe

                Filesize

                175KB

                MD5

                10ec7c9827d988d080eb39ff3cb9b9c0

                SHA1

                8779c0cc57fe64fcffea46655623f9a24d3114e6

                SHA256

                f4cd1f5e200f865a000bfb4c4fff3d6a9441e63cd18403468a5cf4d8a64e10d2

                SHA512

                082d3c50be7c9bc17f7f3fae7b6d423157d95cde66a6bb395f1ee6f9b87126c3f7eebb5637c8b2641f3d1604be87f90e5f4ba458be677a74a6994894a9401ada

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4936353.exe

                Filesize

                175KB

                MD5

                10ec7c9827d988d080eb39ff3cb9b9c0

                SHA1

                8779c0cc57fe64fcffea46655623f9a24d3114e6

                SHA256

                f4cd1f5e200f865a000bfb4c4fff3d6a9441e63cd18403468a5cf4d8a64e10d2

                SHA512

                082d3c50be7c9bc17f7f3fae7b6d423157d95cde66a6bb395f1ee6f9b87126c3f7eebb5637c8b2641f3d1604be87f90e5f4ba458be677a74a6994894a9401ada

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0994271.exe

                Filesize

                359KB

                MD5

                f12a7363535b31afb36a4cdcd95e1e25

                SHA1

                735ba13f1ee8b5b8e5dc9712e3c78fe16f4ca686

                SHA256

                f181adc1452b40d27c31700a613eb46c68c476fed59089e54db1e0ae3567175e

                SHA512

                65524a21c87d4e2b138a54020d7d91cd8f9679a873bc28938c09edc76fe58350604fab25df660ceabb724d917f19997d79d0b6fcefca53d605a544c2896d6efb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0994271.exe

                Filesize

                359KB

                MD5

                f12a7363535b31afb36a4cdcd95e1e25

                SHA1

                735ba13f1ee8b5b8e5dc9712e3c78fe16f4ca686

                SHA256

                f181adc1452b40d27c31700a613eb46c68c476fed59089e54db1e0ae3567175e

                SHA512

                65524a21c87d4e2b138a54020d7d91cd8f9679a873bc28938c09edc76fe58350604fab25df660ceabb724d917f19997d79d0b6fcefca53d605a544c2896d6efb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5765871.exe

                Filesize

                34KB

                MD5

                fc94509d62dabd9c54586c6e411d144e

                SHA1

                8be0774298166b1db584cae57a4c4d854c5ec7ea

                SHA256

                47f86fb7862296b185d156c866a64ff800c511e0ce4e18a94bc2ea5cbf75ef38

                SHA512

                19723731bf05714f1d960e61c00b2df6cd3be712ea7d6ef92dd7f379f7f024e87b290bd93c9fa0debf33531c8025e5e40f983f9b9ca9a6617386271bdf8d577c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5765871.exe

                Filesize

                34KB

                MD5

                fc94509d62dabd9c54586c6e411d144e

                SHA1

                8be0774298166b1db584cae57a4c4d854c5ec7ea

                SHA256

                47f86fb7862296b185d156c866a64ff800c511e0ce4e18a94bc2ea5cbf75ef38

                SHA512

                19723731bf05714f1d960e61c00b2df6cd3be712ea7d6ef92dd7f379f7f024e87b290bd93c9fa0debf33531c8025e5e40f983f9b9ca9a6617386271bdf8d577c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0911247.exe

                Filesize

                235KB

                MD5

                b30228f464c303b04a051c5f11939805

                SHA1

                46fec83a3e5c3e116a6f24cd86b9236476e7522d

                SHA256

                970f3876fa56dc8db99bbdd9fc3758c468a876c49dfe95700f71a3f095e76ff6

                SHA512

                37763a5e695e2bc4abcd998021dc9ad39cd2299bf7c3815b476e13fbaddb65089ea89f2b607d59fced8b6ba4b402d1165e828ab2798fd63c6c38d1f8d165749b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0911247.exe

                Filesize

                235KB

                MD5

                b30228f464c303b04a051c5f11939805

                SHA1

                46fec83a3e5c3e116a6f24cd86b9236476e7522d

                SHA256

                970f3876fa56dc8db99bbdd9fc3758c468a876c49dfe95700f71a3f095e76ff6

                SHA512

                37763a5e695e2bc4abcd998021dc9ad39cd2299bf7c3815b476e13fbaddb65089ea89f2b607d59fced8b6ba4b402d1165e828ab2798fd63c6c38d1f8d165749b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3132733.exe

                Filesize

                13KB

                MD5

                e0d4192c14cbd4225bc84a6d391d51f0

                SHA1

                a0dea61d5e2c1dc6c7e0fc18d822e311ad154333

                SHA256

                197f5ee5622f8d57b93009079d9e39b704ab3b544dbd78d231cf956b28c71da8

                SHA512

                34ecf6c93952433521c32ce8219593126be76a642fa0b72f0114bedacf9e302cbaeb051c6f61ad6fa773bae963afee393b02733b5107619f4dd994793a7105cf

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3132733.exe

                Filesize

                13KB

                MD5

                e0d4192c14cbd4225bc84a6d391d51f0

                SHA1

                a0dea61d5e2c1dc6c7e0fc18d822e311ad154333

                SHA256

                197f5ee5622f8d57b93009079d9e39b704ab3b544dbd78d231cf956b28c71da8

                SHA512

                34ecf6c93952433521c32ce8219593126be76a642fa0b72f0114bedacf9e302cbaeb051c6f61ad6fa773bae963afee393b02733b5107619f4dd994793a7105cf

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7031927.exe

                Filesize

                230KB

                MD5

                977957a189c300b3ae6f1c90c3c45d5b

                SHA1

                bae915aebe47ac5b7dff369dfda5e6385f12c565

                SHA256

                780d04631d154e0cd6987b6ad43239458e84967eaa39c02439f0314f1f4490e4

                SHA512

                e0a6bc6cd0377d07f57f4ed8285b2e2969389a368be81c2748ef92844fbe51be095b1f870c52e69758da5a82981a62f5c60714f7ee830b4620a7be36e996a0a7

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7031927.exe

                Filesize

                230KB

                MD5

                977957a189c300b3ae6f1c90c3c45d5b

                SHA1

                bae915aebe47ac5b7dff369dfda5e6385f12c565

                SHA256

                780d04631d154e0cd6987b6ad43239458e84967eaa39c02439f0314f1f4490e4

                SHA512

                e0a6bc6cd0377d07f57f4ed8285b2e2969389a368be81c2748ef92844fbe51be095b1f870c52e69758da5a82981a62f5c60714f7ee830b4620a7be36e996a0a7

              • C:\Users\Admin\AppData\Local\Temp\_E62LIn4.O

                Filesize

                1.2MB

                MD5

                6dfa9d2297b99fd1d1785ccc47b9e0b3

                SHA1

                14159b943859a32c8016ecdc616ce935eee769e3

                SHA256

                6d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33

                SHA512

                bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                272B

                MD5

                d867eabb1be5b45bc77bb06814e23640

                SHA1

                3139a51ce7e8462c31070363b9532c13cc52c82d

                SHA256

                38c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349

                SHA512

                afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59

              • \Users\Admin\AppData\Local\Temp\_E62Lin4.O

                Filesize

                1.2MB

                MD5

                6dfa9d2297b99fd1d1785ccc47b9e0b3

                SHA1

                14159b943859a32c8016ecdc616ce935eee769e3

                SHA256

                6d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33

                SHA512

                bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                dc587d08b8ca3cd62e5dc057d41a966b

                SHA1

                0ba6a88377c74a0c53b956d405ad17dd5f8c4164

                SHA256

                7d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426

                SHA512

                7300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9

              • memory/3216-272-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-280-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-311-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-310-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-308-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-306-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-180-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

                Filesize

                64KB

              • memory/3216-181-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

                Filesize

                64KB

              • memory/3216-183-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-184-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-185-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-186-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-188-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-189-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-190-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-192-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-195-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-194-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-197-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-199-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-200-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-201-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-203-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-202-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-205-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-207-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-209-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-210-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-212-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-214-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-216-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-215-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-217-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-218-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-220-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-221-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-222-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-223-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-304-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-305-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-303-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-301-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-299-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-161-0x0000000000D60000-0x0000000000D76000-memory.dmp

                Filesize

                88KB

              • memory/3216-297-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-298-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-296-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-291-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-294-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-292-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-290-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-288-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-286-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-285-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-265-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

                Filesize

                64KB

              • memory/3216-267-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-266-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

                Filesize

                64KB

              • memory/3216-269-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-270-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-283-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-273-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-274-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-276-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-275-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-277-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-278-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-282-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3784-264-0x0000000004AC0000-0x0000000004BA6000-memory.dmp

                Filesize

                920KB

              • memory/3784-263-0x0000000004AC0000-0x0000000004BA6000-memory.dmp

                Filesize

                920KB

              • memory/3784-261-0x0000000004AC0000-0x0000000004BA6000-memory.dmp

                Filesize

                920KB

              • memory/3784-260-0x0000000004AC0000-0x0000000004BA6000-memory.dmp

                Filesize

                920KB

              • memory/3784-259-0x00000000049C0000-0x0000000004ABF000-memory.dmp

                Filesize

                1020KB

              • memory/3784-257-0x0000000004700000-0x0000000004706000-memory.dmp

                Filesize

                24KB

              • memory/3784-256-0x0000000000400000-0x000000000053C000-memory.dmp

                Filesize

                1.2MB

              • memory/4280-160-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4280-162-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4524-170-0x00000000009B0000-0x00000000009B6000-memory.dmp

                Filesize

                24KB

              • memory/4524-168-0x00000000001E0000-0x0000000000210000-memory.dmp

                Filesize

                192KB

              • memory/4524-169-0x00000000718D0000-0x0000000071FBE000-memory.dmp

                Filesize

                6.9MB

              • memory/4524-173-0x0000000009F20000-0x0000000009F32000-memory.dmp

                Filesize

                72KB

              • memory/4524-171-0x000000000A4D0000-0x000000000AAD6000-memory.dmp

                Filesize

                6.0MB

              • memory/4524-172-0x0000000009FF0000-0x000000000A0FA000-memory.dmp

                Filesize

                1.0MB

              • memory/4524-176-0x00000000718D0000-0x0000000071FBE000-memory.dmp

                Filesize

                6.9MB

              • memory/4524-175-0x000000000A100000-0x000000000A14B000-memory.dmp

                Filesize

                300KB

              • memory/4524-174-0x0000000009F80000-0x0000000009FBE000-memory.dmp

                Filesize

                248KB

              • memory/4844-146-0x00007FFEF45C0000-0x00007FFEF4FAC000-memory.dmp

                Filesize

                9.9MB

              • memory/4844-144-0x00007FFEF45C0000-0x00007FFEF4FAC000-memory.dmp

                Filesize

                9.9MB

              • memory/4844-143-0x0000000000530000-0x000000000053A000-memory.dmp

                Filesize

                40KB