Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2023 03:09

General

  • Target

    90e82a94f9c3f9aedbee3b3e8cecdde8717ae0ec4c6a92c1178de0d7468984ba.exe

  • Size

    642KB

  • MD5

    66a66d4fb9e92ad3fd94422f8a87df5d

  • SHA1

    6eeb4e45aa959c6ba2e284ae17e1bc721dd055ce

  • SHA256

    90e82a94f9c3f9aedbee3b3e8cecdde8717ae0ec4c6a92c1178de0d7468984ba

  • SHA512

    9490322aa48755d95c1429cf63cf7b54c5fd3d2511ba621a4328478754354020a16a573096c5a252493d7c23b712192adbccbb944c1449a7b9c3a97de63b9609

  • SSDEEP

    12288:4Mr9y90EkLrDbAkJv7uenSXtgBqpSa4jHSaqHajI9Q5QquytZ:VyvkLZv77SXtUmfd+Kq9z

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

lodka

C2

77.91.124.156:19071

Attributes
  • auth_value

    76f99d6cc9332c02bb9728c3ba80d3a9

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90e82a94f9c3f9aedbee3b3e8cecdde8717ae0ec4c6a92c1178de0d7468984ba.exe
    "C:\Users\Admin\AppData\Local\Temp\90e82a94f9c3f9aedbee3b3e8cecdde8717ae0ec4c6a92c1178de0d7468984ba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4640745.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4640745.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6941454.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6941454.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7778447.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7778447.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3996
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8128585.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8128585.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6743711.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6743711.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2516
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3660
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:3304
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3504
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2256
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:1052
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:4172
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4980
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:4788
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:832
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:1948
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8253030.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8253030.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:2104
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2987023.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2987023.exe
                    3⤵
                    • Executes dropped EXE
                    PID:3564
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:944
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3492

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                229KB

                MD5

                75bc818c47178f9dcd63b7f67afc3e49

                SHA1

                03f44400b2d68d76c4cd9ce3c840fff9da2de4bb

                SHA256

                05cf8160ed4a36831e30697dfffd95051db2f99cc6ccebed204763a42cef3a98

                SHA512

                1540b96119027827fba21bd419c62607cda2d3329aec9826a3a15524c7bed27ad502ec8e91a922164491f29e10bb30bfc42132b8d824482ac9896a8d1a669a23

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                229KB

                MD5

                75bc818c47178f9dcd63b7f67afc3e49

                SHA1

                03f44400b2d68d76c4cd9ce3c840fff9da2de4bb

                SHA256

                05cf8160ed4a36831e30697dfffd95051db2f99cc6ccebed204763a42cef3a98

                SHA512

                1540b96119027827fba21bd419c62607cda2d3329aec9826a3a15524c7bed27ad502ec8e91a922164491f29e10bb30bfc42132b8d824482ac9896a8d1a669a23

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                229KB

                MD5

                75bc818c47178f9dcd63b7f67afc3e49

                SHA1

                03f44400b2d68d76c4cd9ce3c840fff9da2de4bb

                SHA256

                05cf8160ed4a36831e30697dfffd95051db2f99cc6ccebed204763a42cef3a98

                SHA512

                1540b96119027827fba21bd419c62607cda2d3329aec9826a3a15524c7bed27ad502ec8e91a922164491f29e10bb30bfc42132b8d824482ac9896a8d1a669a23

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                229KB

                MD5

                75bc818c47178f9dcd63b7f67afc3e49

                SHA1

                03f44400b2d68d76c4cd9ce3c840fff9da2de4bb

                SHA256

                05cf8160ed4a36831e30697dfffd95051db2f99cc6ccebed204763a42cef3a98

                SHA512

                1540b96119027827fba21bd419c62607cda2d3329aec9826a3a15524c7bed27ad502ec8e91a922164491f29e10bb30bfc42132b8d824482ac9896a8d1a669a23

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                229KB

                MD5

                75bc818c47178f9dcd63b7f67afc3e49

                SHA1

                03f44400b2d68d76c4cd9ce3c840fff9da2de4bb

                SHA256

                05cf8160ed4a36831e30697dfffd95051db2f99cc6ccebed204763a42cef3a98

                SHA512

                1540b96119027827fba21bd419c62607cda2d3329aec9826a3a15524c7bed27ad502ec8e91a922164491f29e10bb30bfc42132b8d824482ac9896a8d1a669a23

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4640745.exe

                Filesize

                514KB

                MD5

                f97121a1e9f6c7e1444e5fce423a6108

                SHA1

                74b8c828084139c8da06d233fb79d3bdadb73ccf

                SHA256

                6cbe90dcaa6a43d43161f7509c07bbddf87b6639a5b53df7c74af169ce1aefec

                SHA512

                784718582a43133f0440538eec358d7be94ba7f313007e5b78e882e4d0b79dac9e60fd910d2364b47ea720bb3fd68d121b989fd87338155c8abc4a1565af5b6b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4640745.exe

                Filesize

                514KB

                MD5

                f97121a1e9f6c7e1444e5fce423a6108

                SHA1

                74b8c828084139c8da06d233fb79d3bdadb73ccf

                SHA256

                6cbe90dcaa6a43d43161f7509c07bbddf87b6639a5b53df7c74af169ce1aefec

                SHA512

                784718582a43133f0440538eec358d7be94ba7f313007e5b78e882e4d0b79dac9e60fd910d2364b47ea720bb3fd68d121b989fd87338155c8abc4a1565af5b6b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2987023.exe

                Filesize

                173KB

                MD5

                11a01b9e1cc2f55acd982801f1d2fd23

                SHA1

                b7d20e3fd0628caf9fcd6ed6ca051206d08ba20f

                SHA256

                615b32a8524b78acd4d87d36c61518edb35a9421c2b0286eef5df4b06f39517a

                SHA512

                f749f2c37202dd7314e45665a7225dfec96eb73545e017c1ebf7cd8e102f7eed068eae85877b5c73c6519ecda358c68b8edd62a5f19bce07fc50c8c80ca6beb9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2987023.exe

                Filesize

                173KB

                MD5

                11a01b9e1cc2f55acd982801f1d2fd23

                SHA1

                b7d20e3fd0628caf9fcd6ed6ca051206d08ba20f

                SHA256

                615b32a8524b78acd4d87d36c61518edb35a9421c2b0286eef5df4b06f39517a

                SHA512

                f749f2c37202dd7314e45665a7225dfec96eb73545e017c1ebf7cd8e102f7eed068eae85877b5c73c6519ecda358c68b8edd62a5f19bce07fc50c8c80ca6beb9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6941454.exe

                Filesize

                359KB

                MD5

                23aec3fae011b5cfe3ff3a0f1e5baf18

                SHA1

                005aae1093b701a529f89e0122b01ed29ac26da2

                SHA256

                03382307047c3b61479ba71283913b165e38d6e859d88dca14996449374c994d

                SHA512

                0d07752633cba6e6c0ff5126a040aa75cb9ec9d942d4feb26e7eadc379516485e15bf5165be8aee3cd5740359a597fb1ee5aab50fd6dedf19dbdd031f0e69acc

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6941454.exe

                Filesize

                359KB

                MD5

                23aec3fae011b5cfe3ff3a0f1e5baf18

                SHA1

                005aae1093b701a529f89e0122b01ed29ac26da2

                SHA256

                03382307047c3b61479ba71283913b165e38d6e859d88dca14996449374c994d

                SHA512

                0d07752633cba6e6c0ff5126a040aa75cb9ec9d942d4feb26e7eadc379516485e15bf5165be8aee3cd5740359a597fb1ee5aab50fd6dedf19dbdd031f0e69acc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8253030.exe

                Filesize

                38KB

                MD5

                a405ce7dee92201c100bdc7ba8bac05e

                SHA1

                a0a675490d6f8ba92d199375294002ea297892ff

                SHA256

                33890eb25fb5eec265981d073c98cb35e8b230788d5d81641b75ba486a54f777

                SHA512

                36ef126bee18c862e91b164b40b13923422e50856a9ab2c248876fb814f6dc650ce1ad83c09bbf71d207955c831629015dd676be83bf772f3183a68c1bbea0bc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8253030.exe

                Filesize

                38KB

                MD5

                a405ce7dee92201c100bdc7ba8bac05e

                SHA1

                a0a675490d6f8ba92d199375294002ea297892ff

                SHA256

                33890eb25fb5eec265981d073c98cb35e8b230788d5d81641b75ba486a54f777

                SHA512

                36ef126bee18c862e91b164b40b13923422e50856a9ab2c248876fb814f6dc650ce1ad83c09bbf71d207955c831629015dd676be83bf772f3183a68c1bbea0bc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7778447.exe

                Filesize

                234KB

                MD5

                e6c25594adbfdf3127c4e2e362a41314

                SHA1

                a1966915cf6f0aed55799bccf67768d5d947646f

                SHA256

                95443fa0139fe5cfc1dbd3b43514afe4181ef787a55855c5162eb1066e672146

                SHA512

                6a2136f1353aac72e4452fc84b03e2a70f198342b279fa741689f56b220e619cd2bb9245ce9acc7b73434a58ee81a394c9ecf88e76286c9666efe47cdbb45318

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7778447.exe

                Filesize

                234KB

                MD5

                e6c25594adbfdf3127c4e2e362a41314

                SHA1

                a1966915cf6f0aed55799bccf67768d5d947646f

                SHA256

                95443fa0139fe5cfc1dbd3b43514afe4181ef787a55855c5162eb1066e672146

                SHA512

                6a2136f1353aac72e4452fc84b03e2a70f198342b279fa741689f56b220e619cd2bb9245ce9acc7b73434a58ee81a394c9ecf88e76286c9666efe47cdbb45318

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8128585.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8128585.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6743711.exe

                Filesize

                229KB

                MD5

                75bc818c47178f9dcd63b7f67afc3e49

                SHA1

                03f44400b2d68d76c4cd9ce3c840fff9da2de4bb

                SHA256

                05cf8160ed4a36831e30697dfffd95051db2f99cc6ccebed204763a42cef3a98

                SHA512

                1540b96119027827fba21bd419c62607cda2d3329aec9826a3a15524c7bed27ad502ec8e91a922164491f29e10bb30bfc42132b8d824482ac9896a8d1a669a23

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6743711.exe

                Filesize

                229KB

                MD5

                75bc818c47178f9dcd63b7f67afc3e49

                SHA1

                03f44400b2d68d76c4cd9ce3c840fff9da2de4bb

                SHA256

                05cf8160ed4a36831e30697dfffd95051db2f99cc6ccebed204763a42cef3a98

                SHA512

                1540b96119027827fba21bd419c62607cda2d3329aec9826a3a15524c7bed27ad502ec8e91a922164491f29e10bb30bfc42132b8d824482ac9896a8d1a669a23

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/636-164-0x00007FF93FDF0000-0x00007FF9408B1000-memory.dmp

                Filesize

                10.8MB

              • memory/636-162-0x00007FF93FDF0000-0x00007FF9408B1000-memory.dmp

                Filesize

                10.8MB

              • memory/636-161-0x00000000001F0000-0x00000000001FA000-memory.dmp

                Filesize

                40KB

              • memory/680-274-0x0000000003290000-0x00000000032A0000-memory.dmp

                Filesize

                64KB

              • memory/680-253-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-317-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-315-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-196-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-197-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-198-0x0000000003550000-0x0000000003560000-memory.dmp

                Filesize

                64KB

              • memory/680-200-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-199-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-201-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-203-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-205-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-206-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-207-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-209-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-211-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-313-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-214-0x0000000008E00000-0x0000000008E10000-memory.dmp

                Filesize

                64KB

              • memory/680-213-0x0000000008E00000-0x0000000008E10000-memory.dmp

                Filesize

                64KB

              • memory/680-212-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-215-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-217-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-218-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-220-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-222-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-223-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-311-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-226-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-227-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-228-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-229-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-230-0x0000000003550000-0x0000000003560000-memory.dmp

                Filesize

                64KB

              • memory/680-231-0x0000000008E00000-0x0000000008E10000-memory.dmp

                Filesize

                64KB

              • memory/680-232-0x0000000008E00000-0x0000000008E10000-memory.dmp

                Filesize

                64KB

              • memory/680-305-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-304-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-301-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-302-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-299-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-247-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-248-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-249-0x0000000003280000-0x0000000003290000-memory.dmp

                Filesize

                64KB

              • memory/680-250-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-251-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-252-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-256-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-254-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-300-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-258-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-259-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-260-0x0000000003290000-0x00000000032A0000-memory.dmp

                Filesize

                64KB

              • memory/680-261-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-262-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-263-0x0000000003290000-0x00000000032A0000-memory.dmp

                Filesize

                64KB

              • memory/680-264-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-266-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-268-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-265-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-270-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-272-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-273-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-182-0x00000000014D0000-0x00000000014E6000-memory.dmp

                Filesize

                88KB

              • memory/680-275-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-276-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-278-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-277-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-279-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-281-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-282-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-298-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-284-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-285-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-286-0x00000000032D0000-0x00000000032E0000-memory.dmp

                Filesize

                64KB

              • memory/680-287-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-288-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-289-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-291-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-290-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-293-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-295-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-296-0x0000000003530000-0x0000000003540000-memory.dmp

                Filesize

                64KB

              • memory/680-297-0x00000000032D0000-0x00000000032E0000-memory.dmp

                Filesize

                64KB

              • memory/2104-180-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/2104-183-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3564-193-0x00000000057F0000-0x0000000005802000-memory.dmp

                Filesize

                72KB

              • memory/3564-189-0x0000000000E30000-0x0000000000E60000-memory.dmp

                Filesize

                192KB

              • memory/3564-190-0x0000000072B30000-0x00000000732E0000-memory.dmp

                Filesize

                7.7MB

              • memory/3564-191-0x0000000005F90000-0x00000000065A8000-memory.dmp

                Filesize

                6.1MB

              • memory/3564-192-0x0000000005A80000-0x0000000005B8A000-memory.dmp

                Filesize

                1.0MB

              • memory/3564-224-0x0000000005860000-0x0000000005870000-memory.dmp

                Filesize

                64KB

              • memory/3564-208-0x0000000072B30000-0x00000000732E0000-memory.dmp

                Filesize

                7.7MB

              • memory/3564-195-0x0000000005970000-0x00000000059AC000-memory.dmp

                Filesize

                240KB

              • memory/3564-194-0x0000000005860000-0x0000000005870000-memory.dmp

                Filesize

                64KB