Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/08/2023, 13:23

General

  • Target

    56238ebec9d3c4dd63413e436a768a646c25e5a9fcc5d26c45b15b07da5e0ec8.exe

  • Size

    639KB

  • MD5

    f5737b851c370e82275a4b5d83e678d5

  • SHA1

    9ced6df107fd0301c5538978af823233ef9948a2

  • SHA256

    56238ebec9d3c4dd63413e436a768a646c25e5a9fcc5d26c45b15b07da5e0ec8

  • SHA512

    30d8106ccf6be48ce32d42fecb871da0df7e41bd1a4c49918c5e09b8f0a7cbf26b7cdfdadaf713ea49bb10fbaa6cb3a9e6159980f5a844177c5608c5f66d436a

  • SSDEEP

    12288:HMr/y90rH71obT3MiI3s8F+EcvoTUYVV1USKS1/PCYBHZl2iBsOYXX3kPNNkC:kyWH+bTrI3spLvAke9ldBs/XHsj

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56238ebec9d3c4dd63413e436a768a646c25e5a9fcc5d26c45b15b07da5e0ec8.exe
    "C:\Users\Admin\AppData\Local\Temp\56238ebec9d3c4dd63413e436a768a646c25e5a9fcc5d26c45b15b07da5e0ec8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3669142.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3669142.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5767061.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5767061.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7272702.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7272702.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4952
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8524211.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8524211.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2732
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6492259.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6492259.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1020
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3820
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4412
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1448
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:3472
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:1252
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:2868
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:1028
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:1380
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:848
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:2648
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2242469.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2242469.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:4920
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6131229.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6131229.exe
                    3⤵
                    • Executes dropped EXE
                    PID:4532
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4940

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                8fa3284869b9d3a0eb784485add882b2

                SHA1

                e0a78ac23d094184719403be529a8204fd506efd

                SHA256

                5b990b7a69b59ba7100b5cd2227b0cab5eebfeb8c49bdf160be1d2260a237373

                SHA512

                dfa17d9724d7520ceec133fe6ecd293adcd21d0047d08cc13be6492ed606c906e479f7808c05521d63c097f3b4381ca36604ae2b0577387191da010347b28cf1

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                8fa3284869b9d3a0eb784485add882b2

                SHA1

                e0a78ac23d094184719403be529a8204fd506efd

                SHA256

                5b990b7a69b59ba7100b5cd2227b0cab5eebfeb8c49bdf160be1d2260a237373

                SHA512

                dfa17d9724d7520ceec133fe6ecd293adcd21d0047d08cc13be6492ed606c906e479f7808c05521d63c097f3b4381ca36604ae2b0577387191da010347b28cf1

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                8fa3284869b9d3a0eb784485add882b2

                SHA1

                e0a78ac23d094184719403be529a8204fd506efd

                SHA256

                5b990b7a69b59ba7100b5cd2227b0cab5eebfeb8c49bdf160be1d2260a237373

                SHA512

                dfa17d9724d7520ceec133fe6ecd293adcd21d0047d08cc13be6492ed606c906e479f7808c05521d63c097f3b4381ca36604ae2b0577387191da010347b28cf1

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                8fa3284869b9d3a0eb784485add882b2

                SHA1

                e0a78ac23d094184719403be529a8204fd506efd

                SHA256

                5b990b7a69b59ba7100b5cd2227b0cab5eebfeb8c49bdf160be1d2260a237373

                SHA512

                dfa17d9724d7520ceec133fe6ecd293adcd21d0047d08cc13be6492ed606c906e479f7808c05521d63c097f3b4381ca36604ae2b0577387191da010347b28cf1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3669142.exe

                Filesize

                515KB

                MD5

                07d9fca30f5c72943ec0f28a86025f44

                SHA1

                991ff27b43e85f419c7d86d6d7f4df66bcc0872a

                SHA256

                ce1fa5a83df58494b90506e6c1a4d5ff866e96e42cfc30b5ad118e8d18144656

                SHA512

                5159142699baadc672894f7ba5e650fc89f49690d7f9dafea6b2cec8b0ebcc7039423ce91da094271526de9743665a1db2c427e6fe60d461f8fb2af32f4bfa22

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3669142.exe

                Filesize

                515KB

                MD5

                07d9fca30f5c72943ec0f28a86025f44

                SHA1

                991ff27b43e85f419c7d86d6d7f4df66bcc0872a

                SHA256

                ce1fa5a83df58494b90506e6c1a4d5ff866e96e42cfc30b5ad118e8d18144656

                SHA512

                5159142699baadc672894f7ba5e650fc89f49690d7f9dafea6b2cec8b0ebcc7039423ce91da094271526de9743665a1db2c427e6fe60d461f8fb2af32f4bfa22

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6131229.exe

                Filesize

                174KB

                MD5

                d3d752f1c9b86e4162a7472eaff839ec

                SHA1

                0dd0556265eaf38eb67b1dd1233099ae66976ec0

                SHA256

                45b924bff7527063eb8c2320a2eefb24fcbd9ce8245f3511ce233ecb20d92b0c

                SHA512

                e291a8b8bed16ed3a3816aeb2d66900743af8d8a6be702833110d35e061bb84b5dd12fb36c6fd0f8b86311db4c5868618908a4205046efdbc33de6a493974094

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6131229.exe

                Filesize

                174KB

                MD5

                d3d752f1c9b86e4162a7472eaff839ec

                SHA1

                0dd0556265eaf38eb67b1dd1233099ae66976ec0

                SHA256

                45b924bff7527063eb8c2320a2eefb24fcbd9ce8245f3511ce233ecb20d92b0c

                SHA512

                e291a8b8bed16ed3a3816aeb2d66900743af8d8a6be702833110d35e061bb84b5dd12fb36c6fd0f8b86311db4c5868618908a4205046efdbc33de6a493974094

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5767061.exe

                Filesize

                359KB

                MD5

                447154702edb3ee1061b0f71ecd6f671

                SHA1

                e420404d8a6119d88c23845f42caaffe582f6cd5

                SHA256

                cad1aa60dd3fbdc0ea771db323e284212462832727049731242481b6e4b33a3a

                SHA512

                1b4eb173aef6a70d859252dd1e6bb2d96b0900c6ab5eadda85015ee982309b6b3412035d1218e5e574517dc9a2ea47385f302aefb2a82f61ab84718245c97471

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5767061.exe

                Filesize

                359KB

                MD5

                447154702edb3ee1061b0f71ecd6f671

                SHA1

                e420404d8a6119d88c23845f42caaffe582f6cd5

                SHA256

                cad1aa60dd3fbdc0ea771db323e284212462832727049731242481b6e4b33a3a

                SHA512

                1b4eb173aef6a70d859252dd1e6bb2d96b0900c6ab5eadda85015ee982309b6b3412035d1218e5e574517dc9a2ea47385f302aefb2a82f61ab84718245c97471

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2242469.exe

                Filesize

                39KB

                MD5

                85eefddad0bb600f457b3271a5176cd3

                SHA1

                a6982531871211071a3fa084c4b5284383860561

                SHA256

                501db3a4085642f097033556ca0e684e79766cd90cf321a8962bab437ad47c8c

                SHA512

                fce836deab561224a78dabc4faed2087e407686123c58622c278a3bf36dec172d49e34a935bdad0d5ed78608cf8c7ec06f6a756ec2ad604215d8b6f89a8c36ca

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2242469.exe

                Filesize

                39KB

                MD5

                85eefddad0bb600f457b3271a5176cd3

                SHA1

                a6982531871211071a3fa084c4b5284383860561

                SHA256

                501db3a4085642f097033556ca0e684e79766cd90cf321a8962bab437ad47c8c

                SHA512

                fce836deab561224a78dabc4faed2087e407686123c58622c278a3bf36dec172d49e34a935bdad0d5ed78608cf8c7ec06f6a756ec2ad604215d8b6f89a8c36ca

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7272702.exe

                Filesize

                234KB

                MD5

                c9657990bf48a02974ae609ae5df53c2

                SHA1

                6a2b66af99f5d0796f1c1de00b4e380e8f527073

                SHA256

                d42fa21b6b485660bf49f8ee60ed6e70d5cb68b26dfd30ab74da95839e15a78d

                SHA512

                2569a9f6ca4d322b3d4888d6b38641c3be73565cd2a56b761e90ac015e8cbec899cec0a3cee3f7231814257e58687ce430274300c8f7aaa24a39e2edb55e14c3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7272702.exe

                Filesize

                234KB

                MD5

                c9657990bf48a02974ae609ae5df53c2

                SHA1

                6a2b66af99f5d0796f1c1de00b4e380e8f527073

                SHA256

                d42fa21b6b485660bf49f8ee60ed6e70d5cb68b26dfd30ab74da95839e15a78d

                SHA512

                2569a9f6ca4d322b3d4888d6b38641c3be73565cd2a56b761e90ac015e8cbec899cec0a3cee3f7231814257e58687ce430274300c8f7aaa24a39e2edb55e14c3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8524211.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8524211.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6492259.exe

                Filesize

                230KB

                MD5

                8fa3284869b9d3a0eb784485add882b2

                SHA1

                e0a78ac23d094184719403be529a8204fd506efd

                SHA256

                5b990b7a69b59ba7100b5cd2227b0cab5eebfeb8c49bdf160be1d2260a237373

                SHA512

                dfa17d9724d7520ceec133fe6ecd293adcd21d0047d08cc13be6492ed606c906e479f7808c05521d63c097f3b4381ca36604ae2b0577387191da010347b28cf1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6492259.exe

                Filesize

                230KB

                MD5

                8fa3284869b9d3a0eb784485add882b2

                SHA1

                e0a78ac23d094184719403be529a8204fd506efd

                SHA256

                5b990b7a69b59ba7100b5cd2227b0cab5eebfeb8c49bdf160be1d2260a237373

                SHA512

                dfa17d9724d7520ceec133fe6ecd293adcd21d0047d08cc13be6492ed606c906e479f7808c05521d63c097f3b4381ca36604ae2b0577387191da010347b28cf1

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • memory/2732-153-0x00007FFEF45C0000-0x00007FFEF4FAC000-memory.dmp

                Filesize

                9.9MB

              • memory/2732-151-0x00007FFEF45C0000-0x00007FFEF4FAC000-memory.dmp

                Filesize

                9.9MB

              • memory/2732-150-0x0000000000870000-0x000000000087A000-memory.dmp

                Filesize

                40KB

              • memory/3216-252-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-262-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-288-0x00000000025D0000-0x00000000025E0000-memory.dmp

                Filesize

                64KB

              • memory/3216-287-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-285-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-286-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-284-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-186-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

                Filesize

                64KB

              • memory/3216-187-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

                Filesize

                64KB

              • memory/3216-189-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-190-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-191-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-192-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-194-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-195-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-196-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-198-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-200-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-201-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-203-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-205-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-206-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-207-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-209-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-213-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-211-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-215-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-216-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-218-0x0000000002620000-0x0000000002630000-memory.dmp

                Filesize

                64KB

              • memory/3216-220-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-222-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-221-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-223-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-224-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-226-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-225-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-227-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-283-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-280-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-282-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-281-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-168-0x0000000000D60000-0x0000000000D76000-memory.dmp

                Filesize

                88KB

              • memory/3216-242-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

                Filesize

                64KB

              • memory/3216-243-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-244-0x0000000000DC0000-0x0000000000DD0000-memory.dmp

                Filesize

                64KB

              • memory/3216-246-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-247-0x00000000025D0000-0x00000000025E0000-memory.dmp

                Filesize

                64KB

              • memory/3216-249-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-250-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-251-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-278-0x00000000025D0000-0x00000000025E0000-memory.dmp

                Filesize

                64KB

              • memory/3216-253-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-255-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-254-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-256-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-257-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-258-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-260-0x00000000025D0000-0x00000000025E0000-memory.dmp

                Filesize

                64KB

              • memory/3216-276-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-264-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-265-0x00000000025D0000-0x00000000025E0000-memory.dmp

                Filesize

                64KB

              • memory/3216-267-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-269-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-268-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-273-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-271-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/3216-275-0x00000000025F0000-0x0000000002600000-memory.dmp

                Filesize

                64KB

              • memory/4532-178-0x000000000AF00000-0x000000000B506000-memory.dmp

                Filesize

                6.0MB

              • memory/4532-175-0x0000000000C70000-0x0000000000CA0000-memory.dmp

                Filesize

                192KB

              • memory/4532-176-0x0000000071AF0000-0x00000000721DE000-memory.dmp

                Filesize

                6.9MB

              • memory/4532-177-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

                Filesize

                24KB

              • memory/4532-183-0x0000000071AF0000-0x00000000721DE000-memory.dmp

                Filesize

                6.9MB

              • memory/4532-182-0x000000000AB90000-0x000000000ABDB000-memory.dmp

                Filesize

                300KB

              • memory/4532-181-0x000000000AA10000-0x000000000AA4E000-memory.dmp

                Filesize

                248KB

              • memory/4532-180-0x000000000A9B0000-0x000000000A9C2000-memory.dmp

                Filesize

                72KB

              • memory/4532-179-0x000000000AA80000-0x000000000AB8A000-memory.dmp

                Filesize

                1.0MB

              • memory/4920-167-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4920-169-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB