Analysis

  • max time kernel
    82s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2023 06:43

General

  • Target

    819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c.exe

  • Size

    1.8MB

  • MD5

    1237a749cdfe8065f70beb76026fbf58

  • SHA1

    9e9febe7441cfaa52135c32ef1827af10bdc81bf

  • SHA256

    819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c

  • SHA512

    57217329975517c09c32c49be0da9c694a7492347c13024eef77203ee16d3caaba8e77235a991194bcab961071d7ff887a1e5501eafc234f52ee4f840d3e6166

  • SSDEEP

    49152:zGXOVDKuXtwIarveK9plB91K70myaigDmXI:ieVDx6IaaK9plBXO03xgDmXI

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

787878 --- TPB --- 787878

Mutex

Aakn1515knAakn1515kn

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    http://update-checker-status.cc/OCB-Async.txt

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Detect PureCrypter injector 1 IoCs
  • Detects Smokeloader packer 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Async RAT payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c.exe
    "C:\Users\Admin\AppData\Local\Temp\819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\qekjvo.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1196
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\qekjvo.exe"'
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Users\Admin\AppData\Local\Temp\qekjvo.exe
            "C:\Users\Admin\AppData\Local\Temp\qekjvo.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:808
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
              6⤵
                PID:1088
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rzaylm.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1512
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rzaylm.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1808
            • C:\Users\Admin\AppData\Local\Temp\rzaylm.exe
              "C:\Users\Admin\AppData\Local\Temp\rzaylm.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1684
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1728
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1012
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                6⤵
                • Suspicious behavior: AddClipboardFormatListener
                PID:2012
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tjmotg.exe"' & exit
          3⤵
            PID:660
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tjmotg.exe"'
              4⤵
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1020
              • C:\Users\Admin\AppData\Local\Temp\tjmotg.exe
                "C:\Users\Admin\AppData\Local\Temp\tjmotg.exe"
                5⤵
                • Modifies WinLogon for persistence
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:964
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1196
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  6⤵
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1752
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tjlmuu.exe"' & exit
            3⤵
              PID:1124
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tjlmuu.exe"'
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1680
                • C:\Users\Admin\AppData\Local\Temp\tjlmuu.exe
                  "C:\Users\Admin\AppData\Local\Temp\tjlmuu.exe"
                  5⤵
                    PID:1020

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\CabAE8A.tmp

            Filesize

            61KB

            MD5

            fc4666cbca561e864e7fdf883a9e6661

            SHA1

            2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

            SHA256

            10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

            SHA512

            c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

          • C:\Users\Admin\AppData\Local\Temp\TarB438.tmp

            Filesize

            161KB

            MD5

            73b4b714b42fc9a6aaefd0ae59adb009

            SHA1

            efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

            SHA256

            c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

            SHA512

            73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

          • C:\Users\Admin\AppData\Local\Temp\qekjvo.exe

            Filesize

            828KB

            MD5

            494969d84ee004227da4051403cbc098

            SHA1

            befd216439b68c83899476ea7bf5c7eff025bdc6

            SHA256

            c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

            SHA512

            ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

          • C:\Users\Admin\AppData\Local\Temp\qekjvo.exe

            Filesize

            828KB

            MD5

            494969d84ee004227da4051403cbc098

            SHA1

            befd216439b68c83899476ea7bf5c7eff025bdc6

            SHA256

            c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

            SHA512

            ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

          • C:\Users\Admin\AppData\Local\Temp\rzaylm.exe

            Filesize

            1.3MB

            MD5

            7bf2898f75b3974d2c53999f8d3f40fb

            SHA1

            c406aeef85ed1ce026b98b858af4be62da421119

            SHA256

            c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

            SHA512

            20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

          • C:\Users\Admin\AppData\Local\Temp\rzaylm.exe

            Filesize

            1.3MB

            MD5

            7bf2898f75b3974d2c53999f8d3f40fb

            SHA1

            c406aeef85ed1ce026b98b858af4be62da421119

            SHA256

            c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

            SHA512

            20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

          • C:\Users\Admin\AppData\Local\Temp\tjlmuu.exe

            Filesize

            5.8MB

            MD5

            a4f3e603a335cbd6d8f9ff11c8f9a9c2

            SHA1

            a5de59863fb4acc05a9253562172f802420ed21b

            SHA256

            2c1b6a652a62f7fde53d2e84e1211fef21dfde9eb0d4e2879bd997733af77a3e

            SHA512

            659d0175f4f496f5af6846f0af20345dec842c29eec7e78870b96d96bc712a39684be7a2cff1decabb6e447a477ddf8b92a1b22a12fe6ca07b1fd762540452f2

          • C:\Users\Admin\AppData\Local\Temp\tjlmuu.exe

            Filesize

            5.8MB

            MD5

            a4f3e603a335cbd6d8f9ff11c8f9a9c2

            SHA1

            a5de59863fb4acc05a9253562172f802420ed21b

            SHA256

            2c1b6a652a62f7fde53d2e84e1211fef21dfde9eb0d4e2879bd997733af77a3e

            SHA512

            659d0175f4f496f5af6846f0af20345dec842c29eec7e78870b96d96bc712a39684be7a2cff1decabb6e447a477ddf8b92a1b22a12fe6ca07b1fd762540452f2

          • C:\Users\Admin\AppData\Local\Temp\tjmotg.exe

            Filesize

            2.3MB

            MD5

            a08e5952ddaaabe4b7deaf30e3e522d3

            SHA1

            d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

            SHA256

            52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

            SHA512

            2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

          • C:\Users\Admin\AppData\Local\Temp\tjmotg.exe

            Filesize

            2.3MB

            MD5

            a08e5952ddaaabe4b7deaf30e3e522d3

            SHA1

            d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

            SHA256

            52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

            SHA512

            2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SEYUE17MLALUHN0ZH03H.temp

            Filesize

            7KB

            MD5

            899bb4e811f6db63886060304509fb54

            SHA1

            86f72a84a4421ec4d48733385c644d61ab0dbecd

            SHA256

            dbc060b11450bc2716443019944d28ad25f3254fc45fa533cde0a17fada74e6b

            SHA512

            26197246e8ab91acb5d692fda233d93d95825f5b394fd210be907b268676c1c4e20457bacaa47f19ec349bac8c5308df7e794c767e6016e64281f8f0d5912c44

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            899bb4e811f6db63886060304509fb54

            SHA1

            86f72a84a4421ec4d48733385c644d61ab0dbecd

            SHA256

            dbc060b11450bc2716443019944d28ad25f3254fc45fa533cde0a17fada74e6b

            SHA512

            26197246e8ab91acb5d692fda233d93d95825f5b394fd210be907b268676c1c4e20457bacaa47f19ec349bac8c5308df7e794c767e6016e64281f8f0d5912c44

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            899bb4e811f6db63886060304509fb54

            SHA1

            86f72a84a4421ec4d48733385c644d61ab0dbecd

            SHA256

            dbc060b11450bc2716443019944d28ad25f3254fc45fa533cde0a17fada74e6b

            SHA512

            26197246e8ab91acb5d692fda233d93d95825f5b394fd210be907b268676c1c4e20457bacaa47f19ec349bac8c5308df7e794c767e6016e64281f8f0d5912c44

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            899bb4e811f6db63886060304509fb54

            SHA1

            86f72a84a4421ec4d48733385c644d61ab0dbecd

            SHA256

            dbc060b11450bc2716443019944d28ad25f3254fc45fa533cde0a17fada74e6b

            SHA512

            26197246e8ab91acb5d692fda233d93d95825f5b394fd210be907b268676c1c4e20457bacaa47f19ec349bac8c5308df7e794c767e6016e64281f8f0d5912c44

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            899bb4e811f6db63886060304509fb54

            SHA1

            86f72a84a4421ec4d48733385c644d61ab0dbecd

            SHA256

            dbc060b11450bc2716443019944d28ad25f3254fc45fa533cde0a17fada74e6b

            SHA512

            26197246e8ab91acb5d692fda233d93d95825f5b394fd210be907b268676c1c4e20457bacaa47f19ec349bac8c5308df7e794c767e6016e64281f8f0d5912c44

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            899bb4e811f6db63886060304509fb54

            SHA1

            86f72a84a4421ec4d48733385c644d61ab0dbecd

            SHA256

            dbc060b11450bc2716443019944d28ad25f3254fc45fa533cde0a17fada74e6b

            SHA512

            26197246e8ab91acb5d692fda233d93d95825f5b394fd210be907b268676c1c4e20457bacaa47f19ec349bac8c5308df7e794c767e6016e64281f8f0d5912c44

          • \Users\Admin\AppData\Local\Temp\qekjvo.exe

            Filesize

            828KB

            MD5

            494969d84ee004227da4051403cbc098

            SHA1

            befd216439b68c83899476ea7bf5c7eff025bdc6

            SHA256

            c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

            SHA512

            ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

          • \Users\Admin\AppData\Local\Temp\rzaylm.exe

            Filesize

            1.3MB

            MD5

            7bf2898f75b3974d2c53999f8d3f40fb

            SHA1

            c406aeef85ed1ce026b98b858af4be62da421119

            SHA256

            c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

            SHA512

            20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

          • \Users\Admin\AppData\Local\Temp\tjlmuu.exe

            Filesize

            5.8MB

            MD5

            a4f3e603a335cbd6d8f9ff11c8f9a9c2

            SHA1

            a5de59863fb4acc05a9253562172f802420ed21b

            SHA256

            2c1b6a652a62f7fde53d2e84e1211fef21dfde9eb0d4e2879bd997733af77a3e

            SHA512

            659d0175f4f496f5af6846f0af20345dec842c29eec7e78870b96d96bc712a39684be7a2cff1decabb6e447a477ddf8b92a1b22a12fe6ca07b1fd762540452f2

          • \Users\Admin\AppData\Local\Temp\tjmotg.exe

            Filesize

            2.3MB

            MD5

            a08e5952ddaaabe4b7deaf30e3e522d3

            SHA1

            d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

            SHA256

            52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

            SHA512

            2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

          • memory/808-2461-0x000000001B2C0000-0x000000001B340000-memory.dmp

            Filesize

            512KB

          • memory/808-2460-0x000000001ACC0000-0x000000001AD84000-memory.dmp

            Filesize

            784KB

          • memory/808-2459-0x000000013FB30000-0x000000013FC02000-memory.dmp

            Filesize

            840KB

          • memory/964-2558-0x0000000001390000-0x00000000015E6000-memory.dmp

            Filesize

            2.3MB

          • memory/964-2559-0x0000000000C10000-0x0000000000CB8000-memory.dmp

            Filesize

            672KB

          • memory/964-2560-0x0000000000570000-0x00000000005B0000-memory.dmp

            Filesize

            256KB

          • memory/1012-2524-0x00000000027B0000-0x00000000027F0000-memory.dmp

            Filesize

            256KB

          • memory/1012-2522-0x00000000027B0000-0x00000000027F0000-memory.dmp

            Filesize

            256KB

          • memory/1012-2520-0x00000000027B0000-0x00000000027F0000-memory.dmp

            Filesize

            256KB

          • memory/1020-2606-0x000000001CAD0000-0x000000001D1D8000-memory.dmp

            Filesize

            7.0MB

          • memory/1020-2605-0x0000000000CC0000-0x000000000129A000-memory.dmp

            Filesize

            5.9MB

          • memory/1020-2607-0x000000001C470000-0x000000001C4F0000-memory.dmp

            Filesize

            512KB

          • memory/1020-2946-0x000000001C470000-0x000000001C4F0000-memory.dmp

            Filesize

            512KB

          • memory/1076-2463-0x0000000004E00000-0x0000000004E40000-memory.dmp

            Filesize

            256KB

          • memory/1076-2413-0x0000000000400000-0x0000000000412000-memory.dmp

            Filesize

            72KB

          • memory/1076-2414-0x0000000004E00000-0x0000000004E40000-memory.dmp

            Filesize

            256KB

          • memory/1076-2431-0x0000000000810000-0x000000000081C000-memory.dmp

            Filesize

            48KB

          • memory/1088-2474-0x0000000140000000-0x00000001400D9000-memory.dmp

            Filesize

            868KB

          • memory/1196-2568-0x00000000026A0000-0x00000000026E0000-memory.dmp

            Filesize

            256KB

          • memory/1196-2569-0x00000000026A0000-0x00000000026E0000-memory.dmp

            Filesize

            256KB

          • memory/1484-65-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-109-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-105-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-103-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-101-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-99-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-97-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-95-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-113-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-115-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-93-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-91-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-89-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-87-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-85-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-83-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-117-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-119-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-55-0x0000000004300000-0x00000000043D2000-memory.dmp

            Filesize

            840KB

          • memory/1484-57-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-56-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-81-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-79-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-59-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-107-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-2400-0x00000000043D0000-0x0000000004462000-memory.dmp

            Filesize

            584KB

          • memory/1484-54-0x0000000000D20000-0x0000000000EFA000-memory.dmp

            Filesize

            1.9MB

          • memory/1484-2401-0x0000000004E70000-0x0000000004EB0000-memory.dmp

            Filesize

            256KB

          • memory/1484-61-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-77-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-75-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-73-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-71-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-69-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-67-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-111-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1484-63-0x0000000004300000-0x00000000043CB000-memory.dmp

            Filesize

            812KB

          • memory/1680-2602-0x0000000002840000-0x0000000002880000-memory.dmp

            Filesize

            256KB

          • memory/1684-2507-0x00000000002F0000-0x0000000000302000-memory.dmp

            Filesize

            72KB

          • memory/1684-2506-0x0000000004830000-0x00000000048DA000-memory.dmp

            Filesize

            680KB

          • memory/1684-2503-0x0000000000990000-0x0000000000AE0000-memory.dmp

            Filesize

            1.3MB

          • memory/1684-2518-0x0000000004960000-0x00000000049A0000-memory.dmp

            Filesize

            256KB

          • memory/1732-2455-0x0000000001D90000-0x0000000001DD0000-memory.dmp

            Filesize

            256KB

          • memory/1732-2453-0x0000000001D90000-0x0000000001DD0000-memory.dmp

            Filesize

            256KB

          • memory/1732-2454-0x0000000001D90000-0x0000000001DD0000-memory.dmp

            Filesize

            256KB

          • memory/1752-2603-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1752-2674-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1808-2504-0x00000000023D0000-0x0000000002410000-memory.dmp

            Filesize

            256KB

          • memory/1808-2505-0x00000000023D0000-0x0000000002410000-memory.dmp

            Filesize

            256KB

          • memory/2012-2530-0x0000000004F20000-0x0000000004F60000-memory.dmp

            Filesize

            256KB

          • memory/2012-2529-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/2012-2567-0x0000000004F20000-0x0000000004F60000-memory.dmp

            Filesize

            256KB