Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-07-2023 13:13

General

  • Target

    f3a5341e80f29bf4ed57c79bad497af18dfa413267e585208f3fcc0311c23158.exe

  • Size

    515KB

  • MD5

    5d9fe0bf12553da3228c622d18ca5c5d

  • SHA1

    807fb332ad16075470f1a56715f89c134b400c22

  • SHA256

    f3a5341e80f29bf4ed57c79bad497af18dfa413267e585208f3fcc0311c23158

  • SHA512

    6286be2824688cbbb0cf3e6475f8f7e57f3471b9ee5a1d7c7d4d2f94a4b9a8f73ccccdc477943416d6c375efc021e94b8c682be83ad35951af66aeaf89f8348d

  • SSDEEP

    12288:3Mrly90Z+gywzeTUj8lEDid5NwpiXX+5s:iymZ7zeTUj8lEDid5NwUX4s

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

news

C2

77.91.68.68:19071

Attributes
  • auth_value

    99ba2ffe8d72ebe9fdc7e758c94db148

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3a5341e80f29bf4ed57c79bad497af18dfa413267e585208f3fcc0311c23158.exe
    "C:\Users\Admin\AppData\Local\Temp\f3a5341e80f29bf4ed57c79bad497af18dfa413267e585208f3fcc0311c23158.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4360
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4621318.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4621318.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4888280.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4888280.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5938486.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5938486.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4876
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8917283.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8917283.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4668
          • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
            "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1144
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4940
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:340
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4744
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  7⤵
                    PID:1912
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:R" /E
                    7⤵
                      PID:224
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:4568
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\925e7e99c5" /P "Admin:N"
                        7⤵
                          PID:4348
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:R" /E
                          7⤵
                            PID:4292
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:4020
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3041393.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3041393.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:3088
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2847196.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2847196.exe
                  2⤵
                  • Executes dropped EXE
                  PID:792
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:1004
              • C:\Users\Admin\AppData\Local\Temp\15E0.exe
                C:\Users\Admin\AppData\Local\Temp\15E0.exe
                1⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2888
                • C:\Windows\SysWOW64\control.exe
                  "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\H1TF.Cpl",
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4492
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\H1TF.Cpl",
                    3⤵
                    • Loads dropped DLL
                    • Suspicious use of WriteProcessMemory
                    PID:848
                    • C:\Windows\system32\RunDll32.exe
                      C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\H1TF.Cpl",
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2564
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\H1TF.Cpl",
                        5⤵
                        • Loads dropped DLL
                        PID:4240

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\15E0.exe

                Filesize

                1.9MB

                MD5

                9fed2b1056b26fe6a1c77fc5a6c0e91e

                SHA1

                202dae4de54d29840a0aa5a4b08baff652e0acb5

                SHA256

                a456dceb27961e0766a36b377590d2fc5c9a0e69d3661ef53af40054db7406f5

                SHA512

                6b9e200ea3d7ff9bb65eef50cd8513ba9fc8694c78ae4881a2c578d1dd7284a93228fbb630131b31f331c1fd100150b7ec851ebc67b093cbee18a15ed751b170

              • C:\Users\Admin\AppData\Local\Temp\15E0.exe

                Filesize

                1.9MB

                MD5

                9fed2b1056b26fe6a1c77fc5a6c0e91e

                SHA1

                202dae4de54d29840a0aa5a4b08baff652e0acb5

                SHA256

                a456dceb27961e0766a36b377590d2fc5c9a0e69d3661ef53af40054db7406f5

                SHA512

                6b9e200ea3d7ff9bb65eef50cd8513ba9fc8694c78ae4881a2c578d1dd7284a93228fbb630131b31f331c1fd100150b7ec851ebc67b093cbee18a15ed751b170

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                223KB

                MD5

                8d91c52b87608d49b58e70d1408c6560

                SHA1

                fdcec32d4531a03860ada1a2aabecf4c66e3bbd2

                SHA256

                ad148b2e536e205e1e44bd2d502cf0ff825555e95445703f0182ce221743ca62

                SHA512

                e0815841f874dd907b96a22012a843e6e44bf4181286e488bf4ccbe53425a80311532f293c8f4c2102c5cc270bd4d21ebfb92bafbee326b0607b21b71f736472

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                223KB

                MD5

                8d91c52b87608d49b58e70d1408c6560

                SHA1

                fdcec32d4531a03860ada1a2aabecf4c66e3bbd2

                SHA256

                ad148b2e536e205e1e44bd2d502cf0ff825555e95445703f0182ce221743ca62

                SHA512

                e0815841f874dd907b96a22012a843e6e44bf4181286e488bf4ccbe53425a80311532f293c8f4c2102c5cc270bd4d21ebfb92bafbee326b0607b21b71f736472

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                223KB

                MD5

                8d91c52b87608d49b58e70d1408c6560

                SHA1

                fdcec32d4531a03860ada1a2aabecf4c66e3bbd2

                SHA256

                ad148b2e536e205e1e44bd2d502cf0ff825555e95445703f0182ce221743ca62

                SHA512

                e0815841f874dd907b96a22012a843e6e44bf4181286e488bf4ccbe53425a80311532f293c8f4c2102c5cc270bd4d21ebfb92bafbee326b0607b21b71f736472

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                223KB

                MD5

                8d91c52b87608d49b58e70d1408c6560

                SHA1

                fdcec32d4531a03860ada1a2aabecf4c66e3bbd2

                SHA256

                ad148b2e536e205e1e44bd2d502cf0ff825555e95445703f0182ce221743ca62

                SHA512

                e0815841f874dd907b96a22012a843e6e44bf4181286e488bf4ccbe53425a80311532f293c8f4c2102c5cc270bd4d21ebfb92bafbee326b0607b21b71f736472

              • C:\Users\Admin\AppData\Local\Temp\H1TF.Cpl

                Filesize

                1.4MB

                MD5

                a18e89e4448a03f1ed59f3e717c01cb0

                SHA1

                8f8bd6396e1b543ee8a0dc0ebea195a63ec21521

                SHA256

                8c18211d65ca238a1b699174c27efb5b6761d8cd469f3831b01e218122e42740

                SHA512

                38efd78de679b0a98230c19a863f692143339aa062fe40e6ba828a96bccda5321efaf63add3067f070f1929d51a868967be778d5cc623c1f0a03f849734268fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2847196.exe

                Filesize

                175KB

                MD5

                44ffecf524c1c5e54958b7e9f8250018

                SHA1

                fd87fe75e0b66f429581bd47aebde5e0b0cb6aa8

                SHA256

                57a592c0a33e2ffa4021b0cc78b1e70b135adf46e1837222ae69ed325973d52b

                SHA512

                975ed6f141c8f5744a59bf55a5255a5215535d759ba63c75093fb0f3f2e7e3af1a663b009882f21f777b609151fd98b07703ac59062d90c4ad5795ce398eb823

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2847196.exe

                Filesize

                175KB

                MD5

                44ffecf524c1c5e54958b7e9f8250018

                SHA1

                fd87fe75e0b66f429581bd47aebde5e0b0cb6aa8

                SHA256

                57a592c0a33e2ffa4021b0cc78b1e70b135adf46e1837222ae69ed325973d52b

                SHA512

                975ed6f141c8f5744a59bf55a5255a5215535d759ba63c75093fb0f3f2e7e3af1a663b009882f21f777b609151fd98b07703ac59062d90c4ad5795ce398eb823

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4621318.exe

                Filesize

                359KB

                MD5

                dd478afbe6b3b0c4e3d7ac28a66c200c

                SHA1

                5b3f1c753d9a856fc092c484eb95c26c749bede3

                SHA256

                88c69729256a8e4b76471b264afa613e3b496ff2bd93065b4c98d627c5b200bd

                SHA512

                e15b0254346a53cf728ae2ef3fbd4cd42f97d23bbbb1799d08e39e534e8988be9f38843b42a788426c643f9071c9ab69dd960fd54b8bac925ff1938d41bfe1b2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4621318.exe

                Filesize

                359KB

                MD5

                dd478afbe6b3b0c4e3d7ac28a66c200c

                SHA1

                5b3f1c753d9a856fc092c484eb95c26c749bede3

                SHA256

                88c69729256a8e4b76471b264afa613e3b496ff2bd93065b4c98d627c5b200bd

                SHA512

                e15b0254346a53cf728ae2ef3fbd4cd42f97d23bbbb1799d08e39e534e8988be9f38843b42a788426c643f9071c9ab69dd960fd54b8bac925ff1938d41bfe1b2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3041393.exe

                Filesize

                35KB

                MD5

                bf12b6464a7041d1231a632876173a12

                SHA1

                b4cde522b59dbf45938e6d359e05202c88f1f6df

                SHA256

                a99462eca2aa4c4a1353506300f0697b1b9460b29032674a18c38ccd3205e055

                SHA512

                a9352768d7d729706febac492be3e2071602ca23fd47d8d52285c19caeb9d83a4e4ac6ce578420dae91b1e0122a2e7d6d099fa604c3804787aa78204ef41a243

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3041393.exe

                Filesize

                35KB

                MD5

                bf12b6464a7041d1231a632876173a12

                SHA1

                b4cde522b59dbf45938e6d359e05202c88f1f6df

                SHA256

                a99462eca2aa4c4a1353506300f0697b1b9460b29032674a18c38ccd3205e055

                SHA512

                a9352768d7d729706febac492be3e2071602ca23fd47d8d52285c19caeb9d83a4e4ac6ce578420dae91b1e0122a2e7d6d099fa604c3804787aa78204ef41a243

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4888280.exe

                Filesize

                234KB

                MD5

                e5f0b55554acd1b75116bff0c2c05ac7

                SHA1

                c1fb743603c53bd0931cfbadd469fb6456bfacdc

                SHA256

                4b5b5ec57629e72d7e79d502af156d45316c40bdd5bd78cd9a013553ac591571

                SHA512

                a5212a7613a4cf840fdd2480587b6edd9e0d84fdc5c30af7bcf4f0506c3a7269b415e5c3ce13c578e0b87d47f45f86f90d66a55c4480527df2f77fcea104d51d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4888280.exe

                Filesize

                234KB

                MD5

                e5f0b55554acd1b75116bff0c2c05ac7

                SHA1

                c1fb743603c53bd0931cfbadd469fb6456bfacdc

                SHA256

                4b5b5ec57629e72d7e79d502af156d45316c40bdd5bd78cd9a013553ac591571

                SHA512

                a5212a7613a4cf840fdd2480587b6edd9e0d84fdc5c30af7bcf4f0506c3a7269b415e5c3ce13c578e0b87d47f45f86f90d66a55c4480527df2f77fcea104d51d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5938486.exe

                Filesize

                13KB

                MD5

                129f59b99d62988203f00a4b76a956a9

                SHA1

                a894bd69049ba5491230cd0f12f982d588cb0dc0

                SHA256

                5ce808727c7f55dc0bfc5f3817fd011aaaebc8f0749e42440e79b0892c3447d3

                SHA512

                a9b5741b0a1fa3763603bfadadcfba0688ee78a70ba958b250191b3f6fff304c8ecedaf9013e28f95d3c107d22ae5cebf6f52bbea7081303502e4dcc349c54c6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5938486.exe

                Filesize

                13KB

                MD5

                129f59b99d62988203f00a4b76a956a9

                SHA1

                a894bd69049ba5491230cd0f12f982d588cb0dc0

                SHA256

                5ce808727c7f55dc0bfc5f3817fd011aaaebc8f0749e42440e79b0892c3447d3

                SHA512

                a9b5741b0a1fa3763603bfadadcfba0688ee78a70ba958b250191b3f6fff304c8ecedaf9013e28f95d3c107d22ae5cebf6f52bbea7081303502e4dcc349c54c6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8917283.exe

                Filesize

                223KB

                MD5

                8d91c52b87608d49b58e70d1408c6560

                SHA1

                fdcec32d4531a03860ada1a2aabecf4c66e3bbd2

                SHA256

                ad148b2e536e205e1e44bd2d502cf0ff825555e95445703f0182ce221743ca62

                SHA512

                e0815841f874dd907b96a22012a843e6e44bf4181286e488bf4ccbe53425a80311532f293c8f4c2102c5cc270bd4d21ebfb92bafbee326b0607b21b71f736472

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8917283.exe

                Filesize

                223KB

                MD5

                8d91c52b87608d49b58e70d1408c6560

                SHA1

                fdcec32d4531a03860ada1a2aabecf4c66e3bbd2

                SHA256

                ad148b2e536e205e1e44bd2d502cf0ff825555e95445703f0182ce221743ca62

                SHA512

                e0815841f874dd907b96a22012a843e6e44bf4181286e488bf4ccbe53425a80311532f293c8f4c2102c5cc270bd4d21ebfb92bafbee326b0607b21b71f736472

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • \Users\Admin\AppData\Local\Temp\h1TF.cpl

                Filesize

                1.4MB

                MD5

                a18e89e4448a03f1ed59f3e717c01cb0

                SHA1

                8f8bd6396e1b543ee8a0dc0ebea195a63ec21521

                SHA256

                8c18211d65ca238a1b699174c27efb5b6761d8cd469f3831b01e218122e42740

                SHA512

                38efd78de679b0a98230c19a863f692143339aa062fe40e6ba828a96bccda5321efaf63add3067f070f1929d51a868967be778d5cc623c1f0a03f849734268fd

              • \Users\Admin\AppData\Local\Temp\h1TF.cpl

                Filesize

                1.4MB

                MD5

                a18e89e4448a03f1ed59f3e717c01cb0

                SHA1

                8f8bd6396e1b543ee8a0dc0ebea195a63ec21521

                SHA256

                8c18211d65ca238a1b699174c27efb5b6761d8cd469f3831b01e218122e42740

                SHA512

                38efd78de679b0a98230c19a863f692143339aa062fe40e6ba828a96bccda5321efaf63add3067f070f1929d51a868967be778d5cc623c1f0a03f849734268fd

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • memory/792-170-0x0000000004CE0000-0x0000000004DEA000-memory.dmp

                Filesize

                1.0MB

              • memory/792-171-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

                Filesize

                72KB

              • memory/792-172-0x0000000004C30000-0x0000000004C6E000-memory.dmp

                Filesize

                248KB

              • memory/792-173-0x0000000004C70000-0x0000000004CBB000-memory.dmp

                Filesize

                300KB

              • memory/792-169-0x00000000051E0000-0x00000000057E6000-memory.dmp

                Filesize

                6.0MB

              • memory/792-194-0x00000000728D0000-0x0000000072FBE000-memory.dmp

                Filesize

                6.9MB

              • memory/792-168-0x0000000004B70000-0x0000000004B76000-memory.dmp

                Filesize

                24KB

              • memory/792-167-0x00000000728D0000-0x0000000072FBE000-memory.dmp

                Filesize

                6.9MB

              • memory/792-166-0x0000000000170000-0x00000000001A0000-memory.dmp

                Filesize

                192KB

              • memory/848-295-0x0000000000400000-0x000000000055E000-memory.dmp

                Filesize

                1.4MB

              • memory/848-301-0x00000000052E0000-0x00000000053C7000-memory.dmp

                Filesize

                924KB

              • memory/848-302-0x00000000052E0000-0x00000000053C7000-memory.dmp

                Filesize

                924KB

              • memory/848-294-0x0000000002FF0000-0x0000000002FF6000-memory.dmp

                Filesize

                24KB

              • memory/848-299-0x00000000052E0000-0x00000000053C7000-memory.dmp

                Filesize

                924KB

              • memory/848-297-0x00000000051D0000-0x00000000052D1000-memory.dmp

                Filesize

                1.0MB

              • memory/848-298-0x00000000052E0000-0x00000000053C7000-memory.dmp

                Filesize

                924KB

              • memory/3088-158-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3088-160-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3320-183-0x0000000001010000-0x0000000001020000-memory.dmp

                Filesize

                64KB

              • memory/3320-262-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-201-0x0000000002E10000-0x0000000002E20000-memory.dmp

                Filesize

                64KB

              • memory/3320-203-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-207-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-206-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-205-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-204-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-209-0x0000000001010000-0x0000000001020000-memory.dmp

                Filesize

                64KB

              • memory/3320-208-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-210-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-211-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-213-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-214-0x0000000002E10000-0x0000000002E20000-memory.dmp

                Filesize

                64KB

              • memory/3320-216-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-217-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-218-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-219-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-220-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-222-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-223-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-224-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-225-0x0000000002E10000-0x0000000002E20000-memory.dmp

                Filesize

                64KB

              • memory/3320-198-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-196-0x0000000002E10000-0x0000000002E20000-memory.dmp

                Filesize

                64KB

              • memory/3320-195-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-191-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-192-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-240-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/3320-241-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/3320-242-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-244-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-245-0x0000000001070000-0x0000000001080000-memory.dmp

                Filesize

                64KB

              • memory/3320-247-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-248-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-249-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-250-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-252-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-251-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-253-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-255-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-256-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-258-0x0000000001070000-0x0000000001080000-memory.dmp

                Filesize

                64KB

              • memory/3320-260-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-261-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-200-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-264-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-263-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-268-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-266-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-270-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-271-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-273-0x0000000001070000-0x0000000001080000-memory.dmp

                Filesize

                64KB

              • memory/3320-275-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-277-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-278-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-276-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-279-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-281-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-280-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-282-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-189-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-187-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-185-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-184-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-181-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-179-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-177-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/3320-176-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/3320-159-0x0000000000BA0000-0x0000000000BB6000-memory.dmp

                Filesize

                88KB

              • memory/3320-336-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-335-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-330-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-318-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-319-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-325-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-323-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-320-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-313-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/3320-315-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-314-0x0000000000B80000-0x0000000000B90000-memory.dmp

                Filesize

                64KB

              • memory/3320-316-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-317-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/3320-321-0x0000000001000000-0x0000000001010000-memory.dmp

                Filesize

                64KB

              • memory/4240-312-0x0000000005460000-0x0000000005547000-memory.dmp

                Filesize

                924KB

              • memory/4240-311-0x0000000005460000-0x0000000005547000-memory.dmp

                Filesize

                924KB

              • memory/4240-309-0x0000000005460000-0x0000000005547000-memory.dmp

                Filesize

                924KB

              • memory/4240-307-0x0000000005350000-0x0000000005451000-memory.dmp

                Filesize

                1.0MB

              • memory/4240-304-0x0000000003340000-0x0000000003346000-memory.dmp

                Filesize

                24KB

              • memory/4876-141-0x0000000000CC0000-0x0000000000CCA000-memory.dmp

                Filesize

                40KB

              • memory/4876-142-0x00007FFB7CDC0000-0x00007FFB7D7AC000-memory.dmp

                Filesize

                9.9MB

              • memory/4876-144-0x00007FFB7CDC0000-0x00007FFB7D7AC000-memory.dmp

                Filesize

                9.9MB