Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-08-2023 14:54

General

  • Target

    98053138d2e314ed848756b6f6559b1fd7cecfa7281c3aac86b50f9f9812c707.exe

  • Size

    641KB

  • MD5

    d45e666169729a5485554594e6c9adea

  • SHA1

    c1391f77be26d7c10bcc2511879ba7b9c60d012d

  • SHA256

    98053138d2e314ed848756b6f6559b1fd7cecfa7281c3aac86b50f9f9812c707

  • SHA512

    d3d3bdfbdab718974aa82e5a1e69a139a04c142597503d47f5b2a272bc3e41aeab83076c8f64d0cf25224dd233735c427fa50d899bdd64fe2b91b3122c25f903

  • SSDEEP

    12288:/Mrry900orc53XHd6WlzjWYBxEFqjNBXmcRm8nHSpQm9i5EgZbj11:kyB3XHAWlzjWK8qJdKkyM5EgZbjH

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98053138d2e314ed848756b6f6559b1fd7cecfa7281c3aac86b50f9f9812c707.exe
    "C:\Users\Admin\AppData\Local\Temp\98053138d2e314ed848756b6f6559b1fd7cecfa7281c3aac86b50f9f9812c707.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2769709.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2769709.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6331013.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6331013.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8477050.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8477050.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0875132.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0875132.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:216
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4028754.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4028754.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3964
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:32
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:4468
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2192
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:64
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:1084
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:3860
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3556
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:2388
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:3096
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:5024
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8570945.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8570945.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:192
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1116836.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1116836.exe
                    3⤵
                    • Executes dropped EXE
                    PID:2096
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:2452

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                99c790d8885cb1d0970301a2775fd096

                SHA1

                b19053e0953a860a277139d7495b402e0d78babe

                SHA256

                364217cad70f1d7fc366e509cd2116a8cbd8c1d46baa1310328cf6d3ae7ad650

                SHA512

                f85dd55746919d3c3426c2dab62a1ad7dcf273685de21b5a83895acd1dd1a5c3dbd6e5cb8d3134a37e6240a83395017b4e49a94c1db1c6c2f8f8c34cbf0628be

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                99c790d8885cb1d0970301a2775fd096

                SHA1

                b19053e0953a860a277139d7495b402e0d78babe

                SHA256

                364217cad70f1d7fc366e509cd2116a8cbd8c1d46baa1310328cf6d3ae7ad650

                SHA512

                f85dd55746919d3c3426c2dab62a1ad7dcf273685de21b5a83895acd1dd1a5c3dbd6e5cb8d3134a37e6240a83395017b4e49a94c1db1c6c2f8f8c34cbf0628be

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                99c790d8885cb1d0970301a2775fd096

                SHA1

                b19053e0953a860a277139d7495b402e0d78babe

                SHA256

                364217cad70f1d7fc366e509cd2116a8cbd8c1d46baa1310328cf6d3ae7ad650

                SHA512

                f85dd55746919d3c3426c2dab62a1ad7dcf273685de21b5a83895acd1dd1a5c3dbd6e5cb8d3134a37e6240a83395017b4e49a94c1db1c6c2f8f8c34cbf0628be

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                99c790d8885cb1d0970301a2775fd096

                SHA1

                b19053e0953a860a277139d7495b402e0d78babe

                SHA256

                364217cad70f1d7fc366e509cd2116a8cbd8c1d46baa1310328cf6d3ae7ad650

                SHA512

                f85dd55746919d3c3426c2dab62a1ad7dcf273685de21b5a83895acd1dd1a5c3dbd6e5cb8d3134a37e6240a83395017b4e49a94c1db1c6c2f8f8c34cbf0628be

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2769709.exe

                Filesize

                514KB

                MD5

                9717cb9004c0754c3c08c08498e40bee

                SHA1

                27e0bc1e377e3e1cfee8f24f139f7976c7ef16b5

                SHA256

                2c92d84ca34609e4268fd32a4c0f93edd48fc37c474b59adb1b0719d22bce88c

                SHA512

                4b2e577aa3a96a3e4ec73c2764305219d7dd16a7f8fec8e29809730dd1b974186db947fd22a3d9d14b4b1e1c7d6f2459c65dac0da74b51c0b4012bb4604405d9

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2769709.exe

                Filesize

                514KB

                MD5

                9717cb9004c0754c3c08c08498e40bee

                SHA1

                27e0bc1e377e3e1cfee8f24f139f7976c7ef16b5

                SHA256

                2c92d84ca34609e4268fd32a4c0f93edd48fc37c474b59adb1b0719d22bce88c

                SHA512

                4b2e577aa3a96a3e4ec73c2764305219d7dd16a7f8fec8e29809730dd1b974186db947fd22a3d9d14b4b1e1c7d6f2459c65dac0da74b51c0b4012bb4604405d9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1116836.exe

                Filesize

                174KB

                MD5

                3f27d34fd8704ad88361953636b5850a

                SHA1

                eb435ae5fd9aa63f94986966fc9b5cb69da30657

                SHA256

                0299c5a916767c074e17e9a5b266fafa0a067c433694e4638993bd481d3b528d

                SHA512

                2b86c4b3dae71333acba5ddaa3b9333981527dca4e9fe0018e46f53def949c9305459c0cc74e57c537b96f888398cb4305a0ee6d940af4081530e1420336b4ec

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1116836.exe

                Filesize

                174KB

                MD5

                3f27d34fd8704ad88361953636b5850a

                SHA1

                eb435ae5fd9aa63f94986966fc9b5cb69da30657

                SHA256

                0299c5a916767c074e17e9a5b266fafa0a067c433694e4638993bd481d3b528d

                SHA512

                2b86c4b3dae71333acba5ddaa3b9333981527dca4e9fe0018e46f53def949c9305459c0cc74e57c537b96f888398cb4305a0ee6d940af4081530e1420336b4ec

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6331013.exe

                Filesize

                359KB

                MD5

                ef1b08fb2e5e98b85a222258b4e0a55b

                SHA1

                bf8f53591710f3cad20641eb2e5511d1a9fc019a

                SHA256

                c8d6e82a0df6583fdc35d57e0b206e4b8006816e26b36fb20f80c8189a397b9d

                SHA512

                03864ff1c8d7b0b27734a11369106dfe24bd6f27ea4548ace58d7efc053ee9151535f8edade23d64e9d11bc091574a242824c7633251a3974eb8e2467548565e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6331013.exe

                Filesize

                359KB

                MD5

                ef1b08fb2e5e98b85a222258b4e0a55b

                SHA1

                bf8f53591710f3cad20641eb2e5511d1a9fc019a

                SHA256

                c8d6e82a0df6583fdc35d57e0b206e4b8006816e26b36fb20f80c8189a397b9d

                SHA512

                03864ff1c8d7b0b27734a11369106dfe24bd6f27ea4548ace58d7efc053ee9151535f8edade23d64e9d11bc091574a242824c7633251a3974eb8e2467548565e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8570945.exe

                Filesize

                39KB

                MD5

                b980249780460fe275a1ed278ce8b2e5

                SHA1

                b1771494306bf10ce49c6f9d82a15fc264d86035

                SHA256

                44054867bb73dbe7d2f7e8e3d290853bbc64338df866383810c2c36976e47dcd

                SHA512

                53f080f48654cf26d2f673497c8e07f977f53dbce15b1fd020362d0d8bf6d23cb18ac41f6c5703c4edf585e3e534506a5d25b75afa7f067c3534e69beb81086b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8570945.exe

                Filesize

                39KB

                MD5

                b980249780460fe275a1ed278ce8b2e5

                SHA1

                b1771494306bf10ce49c6f9d82a15fc264d86035

                SHA256

                44054867bb73dbe7d2f7e8e3d290853bbc64338df866383810c2c36976e47dcd

                SHA512

                53f080f48654cf26d2f673497c8e07f977f53dbce15b1fd020362d0d8bf6d23cb18ac41f6c5703c4edf585e3e534506a5d25b75afa7f067c3534e69beb81086b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8477050.exe

                Filesize

                234KB

                MD5

                c45d5cc40f933085ebac8652f0908744

                SHA1

                ab31c847e5ee83bb1367863bf997841ab71c9f09

                SHA256

                1148e68ed96087e60d3f4bb1732cdfc94d91069b658a4cce8284caeb8546adca

                SHA512

                a5f212310d088538912d26555aa9fca56bac5f655ce446ce19efa8bbba6de122d4d4e42401a0a838fa651bf500d3150268f5fb922e74566af6696f6d6864c9e9

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8477050.exe

                Filesize

                234KB

                MD5

                c45d5cc40f933085ebac8652f0908744

                SHA1

                ab31c847e5ee83bb1367863bf997841ab71c9f09

                SHA256

                1148e68ed96087e60d3f4bb1732cdfc94d91069b658a4cce8284caeb8546adca

                SHA512

                a5f212310d088538912d26555aa9fca56bac5f655ce446ce19efa8bbba6de122d4d4e42401a0a838fa651bf500d3150268f5fb922e74566af6696f6d6864c9e9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0875132.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0875132.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4028754.exe

                Filesize

                230KB

                MD5

                99c790d8885cb1d0970301a2775fd096

                SHA1

                b19053e0953a860a277139d7495b402e0d78babe

                SHA256

                364217cad70f1d7fc366e509cd2116a8cbd8c1d46baa1310328cf6d3ae7ad650

                SHA512

                f85dd55746919d3c3426c2dab62a1ad7dcf273685de21b5a83895acd1dd1a5c3dbd6e5cb8d3134a37e6240a83395017b4e49a94c1db1c6c2f8f8c34cbf0628be

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4028754.exe

                Filesize

                230KB

                MD5

                99c790d8885cb1d0970301a2775fd096

                SHA1

                b19053e0953a860a277139d7495b402e0d78babe

                SHA256

                364217cad70f1d7fc366e509cd2116a8cbd8c1d46baa1310328cf6d3ae7ad650

                SHA512

                f85dd55746919d3c3426c2dab62a1ad7dcf273685de21b5a83895acd1dd1a5c3dbd6e5cb8d3134a37e6240a83395017b4e49a94c1db1c6c2f8f8c34cbf0628be

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • memory/192-162-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/192-164-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/216-148-0x00007FF985AB0000-0x00007FF98649C000-memory.dmp

                Filesize

                9.9MB

              • memory/216-146-0x00007FF985AB0000-0x00007FF98649C000-memory.dmp

                Filesize

                9.9MB

              • memory/216-145-0x00000000003C0000-0x00000000003CA000-memory.dmp

                Filesize

                40KB

              • memory/2096-172-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

                Filesize

                24KB

              • memory/2096-173-0x000000000B070000-0x000000000B676000-memory.dmp

                Filesize

                6.0MB

              • memory/2096-174-0x000000000AB80000-0x000000000AC8A000-memory.dmp

                Filesize

                1.0MB

              • memory/2096-175-0x000000000AAB0000-0x000000000AAC2000-memory.dmp

                Filesize

                72KB

              • memory/2096-176-0x000000000AB10000-0x000000000AB4E000-memory.dmp

                Filesize

                248KB

              • memory/2096-177-0x000000000AC90000-0x000000000ACDB000-memory.dmp

                Filesize

                300KB

              • memory/2096-171-0x0000000071F80000-0x000000007266E000-memory.dmp

                Filesize

                6.9MB

              • memory/2096-170-0x0000000000C30000-0x0000000000C60000-memory.dmp

                Filesize

                192KB

              • memory/2096-189-0x0000000071F80000-0x000000007266E000-memory.dmp

                Filesize

                6.9MB

              • memory/3220-223-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-254-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-188-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-192-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-193-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-194-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-195-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-196-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-198-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-199-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-201-0x0000000002A20000-0x0000000002A30000-memory.dmp

                Filesize

                64KB

              • memory/3220-203-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-205-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-206-0x0000000002A20000-0x0000000002A30000-memory.dmp

                Filesize

                64KB

              • memory/3220-208-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-210-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-209-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-212-0x00000000029E0000-0x00000000029F0000-memory.dmp

                Filesize

                64KB

              • memory/3220-211-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-214-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-218-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-216-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-219-0x0000000002A20000-0x0000000002A30000-memory.dmp

                Filesize

                64KB

              • memory/3220-221-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-187-0x00000000029E0000-0x00000000029F0000-memory.dmp

                Filesize

                64KB

              • memory/3220-225-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-224-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-226-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-227-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-228-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-185-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-183-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-181-0x0000000000B40000-0x0000000000B50000-memory.dmp

                Filesize

                64KB

              • memory/3220-180-0x0000000000B40000-0x0000000000B50000-memory.dmp

                Filesize

                64KB

              • memory/3220-163-0x0000000000B20000-0x0000000000B36000-memory.dmp

                Filesize

                88KB

              • memory/3220-244-0x0000000000B40000-0x0000000000B50000-memory.dmp

                Filesize

                64KB

              • memory/3220-243-0x0000000000B40000-0x0000000000B50000-memory.dmp

                Filesize

                64KB

              • memory/3220-245-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-247-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-248-0x0000000002900000-0x0000000002910000-memory.dmp

                Filesize

                64KB

              • memory/3220-250-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-251-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-252-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-190-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-256-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-258-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-253-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-260-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-261-0x0000000002900000-0x0000000002910000-memory.dmp

                Filesize

                64KB

              • memory/3220-263-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-265-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-266-0x0000000002900000-0x0000000002910000-memory.dmp

                Filesize

                64KB

              • memory/3220-268-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-270-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-272-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-274-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-276-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-277-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-279-0x0000000002900000-0x0000000002910000-memory.dmp

                Filesize

                64KB

              • memory/3220-281-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-283-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-282-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-284-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-285-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-287-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-288-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-289-0x0000000000B40000-0x0000000000B50000-memory.dmp

                Filesize

                64KB

              • memory/3220-291-0x0000000000B40000-0x0000000000B50000-memory.dmp

                Filesize

                64KB

              • memory/3220-292-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-290-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-293-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-294-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-295-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-299-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-297-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-303-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-301-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-296-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-304-0x0000000002910000-0x0000000002920000-memory.dmp

                Filesize

                64KB

              • memory/3220-306-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-311-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-313-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-326-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-324-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-330-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB

              • memory/3220-329-0x0000000002A00000-0x0000000002A10000-memory.dmp

                Filesize

                64KB