Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2023, 03:03

General

  • Target

    8ba5f288170baa146e61a923617820d71259b3fd92eb30364d9c71f03405d9c7.exe

  • Size

    680KB

  • MD5

    8e5e0ba7a054cfa3e494b4efcfe774f3

  • SHA1

    f5cdba789784ea8708b6049210c89673432f2d68

  • SHA256

    8ba5f288170baa146e61a923617820d71259b3fd92eb30364d9c71f03405d9c7

  • SHA512

    c7a212f8a5a697488798dac911f8be758f2baa12999ccd68ae7b22f7fe249d4faccc19af70935a8b60fb8460152e0628259ad2a0092e9bb9a087ec302ecb62f7

  • SSDEEP

    12288:EMrGy90ZC0gDJxO0AnexN4j26rnC/6CXgm49It9DpX1/dUPMPmCri:yyZDJZxa26BGxldSWmCri

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ba5f288170baa146e61a923617820d71259b3fd92eb30364d9c71f03405d9c7.exe
    "C:\Users\Admin\AppData\Local\Temp\8ba5f288170baa146e61a923617820d71259b3fd92eb30364d9c71f03405d9c7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1196871.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1196871.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6553390.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6553390.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4360
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9547254.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9547254.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4936
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8814899.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8814899.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2192
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1600749.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1600749.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3564
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:5108
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:5032
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:1992
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:4236
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:680
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:3628
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:5048
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:4644
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:652
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9163302.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9163302.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:3124
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6325834.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6325834.exe
                    3⤵
                    • Executes dropped EXE
                    PID:2952
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3316
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:2540

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                3e9bf372a33f6642836f516797bb8a5a

                SHA1

                2a83dc7b3077208ff3421ea7fce1b971aed986f3

                SHA256

                71ad6f4037fa90c14a60e47fb53610ae1d43410ddd79bafaacd46a2ff6743101

                SHA512

                fdf33a30fffd7e24bd0cab264d4dfc5ee666255bf3938ff39186392c34394a15fcc149dbb277e675f43173b8b9ae045a7b52f8eff80930047e93faa1b35e980d

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                3e9bf372a33f6642836f516797bb8a5a

                SHA1

                2a83dc7b3077208ff3421ea7fce1b971aed986f3

                SHA256

                71ad6f4037fa90c14a60e47fb53610ae1d43410ddd79bafaacd46a2ff6743101

                SHA512

                fdf33a30fffd7e24bd0cab264d4dfc5ee666255bf3938ff39186392c34394a15fcc149dbb277e675f43173b8b9ae045a7b52f8eff80930047e93faa1b35e980d

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                3e9bf372a33f6642836f516797bb8a5a

                SHA1

                2a83dc7b3077208ff3421ea7fce1b971aed986f3

                SHA256

                71ad6f4037fa90c14a60e47fb53610ae1d43410ddd79bafaacd46a2ff6743101

                SHA512

                fdf33a30fffd7e24bd0cab264d4dfc5ee666255bf3938ff39186392c34394a15fcc149dbb277e675f43173b8b9ae045a7b52f8eff80930047e93faa1b35e980d

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                3e9bf372a33f6642836f516797bb8a5a

                SHA1

                2a83dc7b3077208ff3421ea7fce1b971aed986f3

                SHA256

                71ad6f4037fa90c14a60e47fb53610ae1d43410ddd79bafaacd46a2ff6743101

                SHA512

                fdf33a30fffd7e24bd0cab264d4dfc5ee666255bf3938ff39186392c34394a15fcc149dbb277e675f43173b8b9ae045a7b52f8eff80930047e93faa1b35e980d

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                231KB

                MD5

                3e9bf372a33f6642836f516797bb8a5a

                SHA1

                2a83dc7b3077208ff3421ea7fce1b971aed986f3

                SHA256

                71ad6f4037fa90c14a60e47fb53610ae1d43410ddd79bafaacd46a2ff6743101

                SHA512

                fdf33a30fffd7e24bd0cab264d4dfc5ee666255bf3938ff39186392c34394a15fcc149dbb277e675f43173b8b9ae045a7b52f8eff80930047e93faa1b35e980d

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1196871.exe

                Filesize

                515KB

                MD5

                933ff816701b4d45d45165dbaf7a6330

                SHA1

                678c65ef3332b30ee8f8babeb36c1376759028fb

                SHA256

                5b2480a320d0cb7f534a63447ddc5e7e0ef604b28ae0478d7883c6409f241a0f

                SHA512

                4775b0cb1a147b0bb1652d867c5f74655b3a777c3a0ebee3914e8e13b9d6557cfb91010a50cd89c068cbb37f912c8b75fe5d18a045e4a57cea96754185c02cfd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1196871.exe

                Filesize

                515KB

                MD5

                933ff816701b4d45d45165dbaf7a6330

                SHA1

                678c65ef3332b30ee8f8babeb36c1376759028fb

                SHA256

                5b2480a320d0cb7f534a63447ddc5e7e0ef604b28ae0478d7883c6409f241a0f

                SHA512

                4775b0cb1a147b0bb1652d867c5f74655b3a777c3a0ebee3914e8e13b9d6557cfb91010a50cd89c068cbb37f912c8b75fe5d18a045e4a57cea96754185c02cfd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6325834.exe

                Filesize

                175KB

                MD5

                52d35e3484d86f97200d3efef2f5a7fa

                SHA1

                b976753c94ef9059bf73e256332bc25879e3875b

                SHA256

                9e8cc9b337da6cb1df137ab281819d654e3aa58b5fe1414f7c5cb1c373ce6503

                SHA512

                cc0623bc58fc12063a2fb900af1587a01b56dcb95d2ab7f6ec32d422232efbfc0a015eace75a7cb19515bd9d37fc5bf2af8803f9d142e1917c34c133dfdecb84

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6325834.exe

                Filesize

                175KB

                MD5

                52d35e3484d86f97200d3efef2f5a7fa

                SHA1

                b976753c94ef9059bf73e256332bc25879e3875b

                SHA256

                9e8cc9b337da6cb1df137ab281819d654e3aa58b5fe1414f7c5cb1c373ce6503

                SHA512

                cc0623bc58fc12063a2fb900af1587a01b56dcb95d2ab7f6ec32d422232efbfc0a015eace75a7cb19515bd9d37fc5bf2af8803f9d142e1917c34c133dfdecb84

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6553390.exe

                Filesize

                359KB

                MD5

                e48a49fddf4b66c85bb14483fe6cefb1

                SHA1

                f2527f41685bc146a435ac3e5ca04f1966f994bc

                SHA256

                b199f00a4ba8838bfc52a037a4df79474f6c9f8f3cec3f701957a4024b29a01b

                SHA512

                a02262e5cb628a7667994b8cbeba51cde5001722455ea491226888d45dc59d99370310f64ee9aeddde7680cdaeb7bcaff5a7cb75ccb7bdf2951518e621953cd5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6553390.exe

                Filesize

                359KB

                MD5

                e48a49fddf4b66c85bb14483fe6cefb1

                SHA1

                f2527f41685bc146a435ac3e5ca04f1966f994bc

                SHA256

                b199f00a4ba8838bfc52a037a4df79474f6c9f8f3cec3f701957a4024b29a01b

                SHA512

                a02262e5cb628a7667994b8cbeba51cde5001722455ea491226888d45dc59d99370310f64ee9aeddde7680cdaeb7bcaff5a7cb75ccb7bdf2951518e621953cd5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9163302.exe

                Filesize

                39KB

                MD5

                1f0610f47ff4bb8369cc53267a393fb3

                SHA1

                61cbb112119f5a6d81130c2979f46615f3961ab4

                SHA256

                b9e1ff30782d9d0f40952533c7a02d63164aa42e07c2f3afa5e64281a8ec57c0

                SHA512

                ab363d2e5fe8e8e985b385f40dcdedafc1084b5705f0cc7ae7c0ce848487fcd61a8ea63a6989a88226d2e47b5e078504b3803fac4e7ee881dd207c34f4e2846b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9163302.exe

                Filesize

                39KB

                MD5

                1f0610f47ff4bb8369cc53267a393fb3

                SHA1

                61cbb112119f5a6d81130c2979f46615f3961ab4

                SHA256

                b9e1ff30782d9d0f40952533c7a02d63164aa42e07c2f3afa5e64281a8ec57c0

                SHA512

                ab363d2e5fe8e8e985b385f40dcdedafc1084b5705f0cc7ae7c0ce848487fcd61a8ea63a6989a88226d2e47b5e078504b3803fac4e7ee881dd207c34f4e2846b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9547254.exe

                Filesize

                234KB

                MD5

                5d17c89f8b61ede27912ff7375d2492e

                SHA1

                3accef117fc2ffba95d9d09b225ea1f25154b169

                SHA256

                57810f9322e198a5350aa7c276c855ab3ce48ad3b7bae6961733aa7a9776d6ea

                SHA512

                67901daab38ceb9b3ba383cb6f99c840813b553623bfc9277838d3f78fa76339a2dc9fee61098c84a3d6c7282acee2451bf2ef3fc17c7aa0325721972f505b82

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9547254.exe

                Filesize

                234KB

                MD5

                5d17c89f8b61ede27912ff7375d2492e

                SHA1

                3accef117fc2ffba95d9d09b225ea1f25154b169

                SHA256

                57810f9322e198a5350aa7c276c855ab3ce48ad3b7bae6961733aa7a9776d6ea

                SHA512

                67901daab38ceb9b3ba383cb6f99c840813b553623bfc9277838d3f78fa76339a2dc9fee61098c84a3d6c7282acee2451bf2ef3fc17c7aa0325721972f505b82

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8814899.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8814899.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1600749.exe

                Filesize

                231KB

                MD5

                3e9bf372a33f6642836f516797bb8a5a

                SHA1

                2a83dc7b3077208ff3421ea7fce1b971aed986f3

                SHA256

                71ad6f4037fa90c14a60e47fb53610ae1d43410ddd79bafaacd46a2ff6743101

                SHA512

                fdf33a30fffd7e24bd0cab264d4dfc5ee666255bf3938ff39186392c34394a15fcc149dbb277e675f43173b8b9ae045a7b52f8eff80930047e93faa1b35e980d

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1600749.exe

                Filesize

                231KB

                MD5

                3e9bf372a33f6642836f516797bb8a5a

                SHA1

                2a83dc7b3077208ff3421ea7fce1b971aed986f3

                SHA256

                71ad6f4037fa90c14a60e47fb53610ae1d43410ddd79bafaacd46a2ff6743101

                SHA512

                fdf33a30fffd7e24bd0cab264d4dfc5ee666255bf3938ff39186392c34394a15fcc149dbb277e675f43173b8b9ae045a7b52f8eff80930047e93faa1b35e980d

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/2192-164-0x00007FF837A00000-0x00007FF8384C1000-memory.dmp

                Filesize

                10.8MB

              • memory/2192-162-0x00007FF837A00000-0x00007FF8384C1000-memory.dmp

                Filesize

                10.8MB

              • memory/2192-161-0x0000000000F00000-0x0000000000F0A000-memory.dmp

                Filesize

                40KB

              • memory/2952-194-0x0000000005560000-0x0000000005570000-memory.dmp

                Filesize

                64KB

              • memory/2952-192-0x000000000AA60000-0x000000000AB6A000-memory.dmp

                Filesize

                1.0MB

              • memory/2952-193-0x000000000A9A0000-0x000000000A9B2000-memory.dmp

                Filesize

                72KB

              • memory/2952-195-0x000000000AA00000-0x000000000AA3C000-memory.dmp

                Filesize

                240KB

              • memory/2952-196-0x0000000073380000-0x0000000073B30000-memory.dmp

                Filesize

                7.7MB

              • memory/2952-197-0x0000000005560000-0x0000000005570000-memory.dmp

                Filesize

                64KB

              • memory/2952-191-0x000000000AF10000-0x000000000B528000-memory.dmp

                Filesize

                6.1MB

              • memory/2952-190-0x0000000073380000-0x0000000073B30000-memory.dmp

                Filesize

                7.7MB

              • memory/2952-189-0x0000000000BF0000-0x0000000000C20000-memory.dmp

                Filesize

                192KB

              • memory/3124-183-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3124-181-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3132-221-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-249-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-199-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-207-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-209-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-210-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-211-0x0000000007B30000-0x0000000007B40000-memory.dmp

                Filesize

                64KB

              • memory/3132-212-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-213-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-214-0x0000000007B30000-0x0000000007B40000-memory.dmp

                Filesize

                64KB

              • memory/3132-217-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-215-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-219-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-204-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-218-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-223-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-224-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-225-0x0000000007B30000-0x0000000007B40000-memory.dmp

                Filesize

                64KB

              • memory/3132-226-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-228-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-227-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-230-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-229-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-232-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-233-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-203-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-202-0x0000000007A80000-0x0000000007A90000-memory.dmp

                Filesize

                64KB

              • memory/3132-201-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-200-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-198-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-248-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-205-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-251-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-252-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-250-0x0000000000AC0000-0x0000000000AD0000-memory.dmp

                Filesize

                64KB

              • memory/3132-253-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-254-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-255-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-257-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-256-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-259-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-260-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-261-0x0000000002C60000-0x0000000002C70000-memory.dmp

                Filesize

                64KB

              • memory/3132-262-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-263-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-264-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-267-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-269-0x0000000000AC0000-0x0000000000AD0000-memory.dmp

                Filesize

                64KB

              • memory/3132-271-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-268-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-265-0x0000000002C60000-0x0000000002C70000-memory.dmp

                Filesize

                64KB

              • memory/3132-273-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-274-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-275-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-276-0x0000000002C60000-0x0000000002C70000-memory.dmp

                Filesize

                64KB

              • memory/3132-277-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-280-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-281-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-282-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-279-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-283-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-284-0x0000000007A70000-0x0000000007A80000-memory.dmp

                Filesize

                64KB

              • memory/3132-182-0x0000000000A80000-0x0000000000A96000-memory.dmp

                Filesize

                88KB