Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2023 14:38

General

  • Target

    d1e6d4dc9fae2d66ac5a95041864791548b759951bd543ee38cf14fd91d16830.exe

  • Size

    680KB

  • MD5

    333feca0e99f5c53dcef4f6c8e0013dc

  • SHA1

    f624e5f5c750f90e78a06bb1eaad3fb76e94b887

  • SHA256

    d1e6d4dc9fae2d66ac5a95041864791548b759951bd543ee38cf14fd91d16830

  • SHA512

    9c9153e9cd3bf38f5cd48940e60c85f665de49a43b192a11e27e50988b33642189145bbd0dfea9c85028d7e631f33e5993c3f4cb9b650fb0ebb0324d6c95a304

  • SSDEEP

    12288:3Mrzy90YtffTZh/ZLqLEyz/rBhRH3PtaC0DH0j7rwOanPI48/MB9ntX:UyZfflhBOLEER/0C42grbHF

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

micky

C2

77.91.124.172:19071

Attributes
  • auth_value

    748f3c67c004f4a994500f05127b4428

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1e6d4dc9fae2d66ac5a95041864791548b759951bd543ee38cf14fd91d16830.exe
    "C:\Users\Admin\AppData\Local\Temp\d1e6d4dc9fae2d66ac5a95041864791548b759951bd543ee38cf14fd91d16830.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2278197.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2278197.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4044500.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4044500.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9789190.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9789190.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9845086.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9845086.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4204
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1710503.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1710503.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3380
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4408
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:5008
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3004
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:2292
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:5076
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:2144
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:1676
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:4184
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:4168
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3776
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4766274.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4766274.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:1752
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2305981.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2305981.exe
                    3⤵
                    • Executes dropped EXE
                    PID:452
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:5092
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3864
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:3264
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4452

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                232KB

                MD5

                add9f975ecee7fd6f318a27ae675cdbd

                SHA1

                2e0d0f07b8269e3333e2ee49ba1a63dc258b46a2

                SHA256

                3f760518c45d65c22d0ba2d6b96eb0eb09bbbf25246e0b7c146205b1977ace4a

                SHA512

                95f0b8c8b0c5f5f6095e216b35bab71c045dcf19e62c0ea31c00884563609bda398198dbb05cdb54356e19109052a0957b3b1747121b541cad96bccad1ce0ca9

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                232KB

                MD5

                add9f975ecee7fd6f318a27ae675cdbd

                SHA1

                2e0d0f07b8269e3333e2ee49ba1a63dc258b46a2

                SHA256

                3f760518c45d65c22d0ba2d6b96eb0eb09bbbf25246e0b7c146205b1977ace4a

                SHA512

                95f0b8c8b0c5f5f6095e216b35bab71c045dcf19e62c0ea31c00884563609bda398198dbb05cdb54356e19109052a0957b3b1747121b541cad96bccad1ce0ca9

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                232KB

                MD5

                add9f975ecee7fd6f318a27ae675cdbd

                SHA1

                2e0d0f07b8269e3333e2ee49ba1a63dc258b46a2

                SHA256

                3f760518c45d65c22d0ba2d6b96eb0eb09bbbf25246e0b7c146205b1977ace4a

                SHA512

                95f0b8c8b0c5f5f6095e216b35bab71c045dcf19e62c0ea31c00884563609bda398198dbb05cdb54356e19109052a0957b3b1747121b541cad96bccad1ce0ca9

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                232KB

                MD5

                add9f975ecee7fd6f318a27ae675cdbd

                SHA1

                2e0d0f07b8269e3333e2ee49ba1a63dc258b46a2

                SHA256

                3f760518c45d65c22d0ba2d6b96eb0eb09bbbf25246e0b7c146205b1977ace4a

                SHA512

                95f0b8c8b0c5f5f6095e216b35bab71c045dcf19e62c0ea31c00884563609bda398198dbb05cdb54356e19109052a0957b3b1747121b541cad96bccad1ce0ca9

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                232KB

                MD5

                add9f975ecee7fd6f318a27ae675cdbd

                SHA1

                2e0d0f07b8269e3333e2ee49ba1a63dc258b46a2

                SHA256

                3f760518c45d65c22d0ba2d6b96eb0eb09bbbf25246e0b7c146205b1977ace4a

                SHA512

                95f0b8c8b0c5f5f6095e216b35bab71c045dcf19e62c0ea31c00884563609bda398198dbb05cdb54356e19109052a0957b3b1747121b541cad96bccad1ce0ca9

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                232KB

                MD5

                add9f975ecee7fd6f318a27ae675cdbd

                SHA1

                2e0d0f07b8269e3333e2ee49ba1a63dc258b46a2

                SHA256

                3f760518c45d65c22d0ba2d6b96eb0eb09bbbf25246e0b7c146205b1977ace4a

                SHA512

                95f0b8c8b0c5f5f6095e216b35bab71c045dcf19e62c0ea31c00884563609bda398198dbb05cdb54356e19109052a0957b3b1747121b541cad96bccad1ce0ca9

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2278197.exe

                Filesize

                515KB

                MD5

                27ca0d451529f5361e854d3b7f49a4e8

                SHA1

                d00dc5cdfe8878f716d2f057fb2adbd5b928360e

                SHA256

                8e06984ac92d3a96524772ea854bce63bcfcd79c97bb6ae90e704d8fae42a233

                SHA512

                e28a25d11a654ce8e9d51084aba6cd42f1d228f2ff34b03974180e06f80c88c58e0ead077501b2ac8dca0e52e36df4951ee25cb5b59eac57643a825cebdf5951

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2278197.exe

                Filesize

                515KB

                MD5

                27ca0d451529f5361e854d3b7f49a4e8

                SHA1

                d00dc5cdfe8878f716d2f057fb2adbd5b928360e

                SHA256

                8e06984ac92d3a96524772ea854bce63bcfcd79c97bb6ae90e704d8fae42a233

                SHA512

                e28a25d11a654ce8e9d51084aba6cd42f1d228f2ff34b03974180e06f80c88c58e0ead077501b2ac8dca0e52e36df4951ee25cb5b59eac57643a825cebdf5951

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2305981.exe

                Filesize

                175KB

                MD5

                e326b687ea575ef23ae0013065a85741

                SHA1

                b3debefbcd33cf96e58f0839f2bc5233d90e7ca3

                SHA256

                bcef100981696cf4c5cd671ecc16662012a2cda468f931b136e5c1338b3d3675

                SHA512

                e2d1bdf34c5c89ca8718fcf093bcd39da01ae138c226700fcabbf48072ac26b517022a59b635a209bd7655624e691467a42884bd376f9c03153868038fa4e602

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2305981.exe

                Filesize

                175KB

                MD5

                e326b687ea575ef23ae0013065a85741

                SHA1

                b3debefbcd33cf96e58f0839f2bc5233d90e7ca3

                SHA256

                bcef100981696cf4c5cd671ecc16662012a2cda468f931b136e5c1338b3d3675

                SHA512

                e2d1bdf34c5c89ca8718fcf093bcd39da01ae138c226700fcabbf48072ac26b517022a59b635a209bd7655624e691467a42884bd376f9c03153868038fa4e602

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4044500.exe

                Filesize

                359KB

                MD5

                38664265a5b9f3f1f862c94384c49722

                SHA1

                ed561f1122ee4540a2c5d8a5b2dc05893f5b76e3

                SHA256

                a760e0c6e106d681406dd2881a2cac0b9950664f021acbf6b93ff423add62129

                SHA512

                ef1f1931c54b44d02481e048ea6d8af56ef89558e80084045b3124ff4a864137c46ad43972f90140e2000c01ac2bdfe7e60a32438d7c007ce85996b310469fa3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4044500.exe

                Filesize

                359KB

                MD5

                38664265a5b9f3f1f862c94384c49722

                SHA1

                ed561f1122ee4540a2c5d8a5b2dc05893f5b76e3

                SHA256

                a760e0c6e106d681406dd2881a2cac0b9950664f021acbf6b93ff423add62129

                SHA512

                ef1f1931c54b44d02481e048ea6d8af56ef89558e80084045b3124ff4a864137c46ad43972f90140e2000c01ac2bdfe7e60a32438d7c007ce85996b310469fa3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4766274.exe

                Filesize

                40KB

                MD5

                5b2312863b9717fa5a527f2dcf8e6d95

                SHA1

                8af2bf0aa1d952e9c82b0d1048704bb7819042c9

                SHA256

                4c917257fa6ae04677ee13eb0928b8d5530458c9710a7782ac8c577fc3990e95

                SHA512

                9f715304e0c524cc291b53d5226098d92a99daba48697c3c980f6e923c69ea6594e3d665c0c730051bb133214ac4e2405ab1e2e0ce3534374bef352a4755225e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4766274.exe

                Filesize

                40KB

                MD5

                5b2312863b9717fa5a527f2dcf8e6d95

                SHA1

                8af2bf0aa1d952e9c82b0d1048704bb7819042c9

                SHA256

                4c917257fa6ae04677ee13eb0928b8d5530458c9710a7782ac8c577fc3990e95

                SHA512

                9f715304e0c524cc291b53d5226098d92a99daba48697c3c980f6e923c69ea6594e3d665c0c730051bb133214ac4e2405ab1e2e0ce3534374bef352a4755225e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9789190.exe

                Filesize

                234KB

                MD5

                20b59d013589cf9a9972a15154cd68e4

                SHA1

                a4090170510205fd555a18213ca7e6f9c9f415fe

                SHA256

                bd03ad2dc784ff7b54a69d07cc09b49cfba026615bad10d6c6c85b781f0dc912

                SHA512

                f00b3db2025e37ad505cc0f5a43ec7ecb288c6606869e27e306ee4aeaa328d04b50fb900b1a482a3cd5a29a753f14852438f5f2f4dced4fd5a5aa8b1dc776ccf

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9789190.exe

                Filesize

                234KB

                MD5

                20b59d013589cf9a9972a15154cd68e4

                SHA1

                a4090170510205fd555a18213ca7e6f9c9f415fe

                SHA256

                bd03ad2dc784ff7b54a69d07cc09b49cfba026615bad10d6c6c85b781f0dc912

                SHA512

                f00b3db2025e37ad505cc0f5a43ec7ecb288c6606869e27e306ee4aeaa328d04b50fb900b1a482a3cd5a29a753f14852438f5f2f4dced4fd5a5aa8b1dc776ccf

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9845086.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9845086.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1710503.exe

                Filesize

                232KB

                MD5

                add9f975ecee7fd6f318a27ae675cdbd

                SHA1

                2e0d0f07b8269e3333e2ee49ba1a63dc258b46a2

                SHA256

                3f760518c45d65c22d0ba2d6b96eb0eb09bbbf25246e0b7c146205b1977ace4a

                SHA512

                95f0b8c8b0c5f5f6095e216b35bab71c045dcf19e62c0ea31c00884563609bda398198dbb05cdb54356e19109052a0957b3b1747121b541cad96bccad1ce0ca9

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1710503.exe

                Filesize

                232KB

                MD5

                add9f975ecee7fd6f318a27ae675cdbd

                SHA1

                2e0d0f07b8269e3333e2ee49ba1a63dc258b46a2

                SHA256

                3f760518c45d65c22d0ba2d6b96eb0eb09bbbf25246e0b7c146205b1977ace4a

                SHA512

                95f0b8c8b0c5f5f6095e216b35bab71c045dcf19e62c0ea31c00884563609bda398198dbb05cdb54356e19109052a0957b3b1747121b541cad96bccad1ce0ca9

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/452-195-0x00000000053C0000-0x00000000053FC000-memory.dmp

                Filesize

                240KB

              • memory/452-191-0x000000000AFE0000-0x000000000B5F8000-memory.dmp

                Filesize

                6.1MB

              • memory/452-192-0x000000000AAD0000-0x000000000ABDA000-memory.dmp

                Filesize

                1.0MB

              • memory/452-194-0x0000000005430000-0x0000000005440000-memory.dmp

                Filesize

                64KB

              • memory/452-193-0x0000000005360000-0x0000000005372000-memory.dmp

                Filesize

                72KB

              • memory/452-190-0x0000000072F10000-0x00000000736C0000-memory.dmp

                Filesize

                7.7MB

              • memory/452-189-0x00000000009F0000-0x0000000000A20000-memory.dmp

                Filesize

                192KB

              • memory/452-213-0x0000000072F10000-0x00000000736C0000-memory.dmp

                Filesize

                7.7MB

              • memory/452-217-0x0000000005430000-0x0000000005440000-memory.dmp

                Filesize

                64KB

              • memory/1752-183-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/1752-181-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/3232-198-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-261-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/3232-205-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-207-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-208-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-209-0x0000000002950000-0x0000000002960000-memory.dmp

                Filesize

                64KB

              • memory/3232-210-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-211-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-202-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-215-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-212-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-216-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-218-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-201-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-219-0x0000000002940000-0x0000000002950000-memory.dmp

                Filesize

                64KB

              • memory/3232-221-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-220-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-223-0x0000000002950000-0x0000000002953000-memory.dmp

                Filesize

                12KB

              • memory/3232-222-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-224-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-225-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-227-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-228-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-199-0x0000000002940000-0x0000000002950000-memory.dmp

                Filesize

                64KB

              • memory/3232-230-0x0000000002950000-0x0000000002960000-memory.dmp

                Filesize

                64KB

              • memory/3232-200-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-196-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-182-0x00000000025C0000-0x00000000025D6000-memory.dmp

                Filesize

                88KB

              • memory/3232-312-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-310-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-245-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-246-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-250-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-249-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-248-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-247-0x00000000024E0000-0x00000000024F0000-memory.dmp

                Filesize

                64KB

              • memory/3232-251-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-252-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-254-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-255-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-256-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-257-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-258-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/3232-259-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-260-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-203-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-262-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-264-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-266-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-268-0x00000000024E0000-0x00000000024F0000-memory.dmp

                Filesize

                64KB

              • memory/3232-267-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-269-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-270-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-272-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-274-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-273-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-276-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-275-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-271-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-278-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-279-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-280-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/3232-308-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-282-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-284-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-283-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-285-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-286-0x0000000002910000-0x0000000002920000-memory.dmp

                Filesize

                64KB

              • memory/3232-287-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-289-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-288-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-292-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-290-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-293-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-294-0x0000000002910000-0x0000000002920000-memory.dmp

                Filesize

                64KB

              • memory/3232-295-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-296-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-297-0x0000000002910000-0x0000000002920000-memory.dmp

                Filesize

                64KB

              • memory/3232-298-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-300-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-299-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-302-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-301-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-303-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-305-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-306-0x0000000002920000-0x0000000002930000-memory.dmp

                Filesize

                64KB

              • memory/3232-307-0x0000000002910000-0x0000000002920000-memory.dmp

                Filesize

                64KB

              • memory/4204-161-0x0000000000240000-0x000000000024A000-memory.dmp

                Filesize

                40KB

              • memory/4204-162-0x00007FFAEECF0000-0x00007FFAEF7B1000-memory.dmp

                Filesize

                10.8MB

              • memory/4204-164-0x00007FFAEECF0000-0x00007FFAEF7B1000-memory.dmp

                Filesize

                10.8MB