Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2023 06:43

General

  • Target

    819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c.exe

  • Size

    1.8MB

  • MD5

    1237a749cdfe8065f70beb76026fbf58

  • SHA1

    9e9febe7441cfaa52135c32ef1827af10bdc81bf

  • SHA256

    819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c

  • SHA512

    57217329975517c09c32c49be0da9c694a7492347c13024eef77203ee16d3caaba8e77235a991194bcab961071d7ff887a1e5501eafc234f52ee4f840d3e6166

  • SSDEEP

    49152:zGXOVDKuXtwIarveK9plB91K70myaigDmXI:ieVDx6IaaK9plBXO03xgDmXI

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

787878 --- TPB --- 787878

Mutex

Aakn1515knAakn1515kn

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    http://update-checker-status.cc/OCB-Async.txt

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Detects Smokeloader packer 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c.exe
    "C:\Users\Admin\AppData\Local\Temp\819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
        PID:3284
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3336
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rtimlm.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:648
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rtimlm.exe"'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4580
            • C:\Users\Admin\AppData\Local\Temp\rtimlm.exe
              "C:\Users\Admin\AppData\Local\Temp\rtimlm.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3572
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                6⤵
                • Suspicious behavior: GetForegroundWindowSpam
                PID:2472
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ezciiu.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ezciiu.exe"'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3744
            • C:\Users\Admin\AppData\Local\Temp\ezciiu.exe
              "C:\Users\Admin\AppData\Local\Temp\ezciiu.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2948
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4048
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4764
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                6⤵
                  PID:1104
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  6⤵
                  • Suspicious behavior: AddClipboardFormatListener
                  PID:4676
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\vxhqbm.exe"' & exit
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1748
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\vxhqbm.exe"'
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3880
              • C:\Users\Admin\AppData\Local\Temp\vxhqbm.exe
                "C:\Users\Admin\AppData\Local\Temp\vxhqbm.exe"
                5⤵
                • Modifies WinLogon for persistence
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3612
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4252
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  6⤵
                    PID:2976
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    6⤵
                      PID:1240
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      6⤵
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:4500
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      6⤵
                        PID:3628
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\fkytby.exe"' & exit
                  3⤵
                    PID:2360
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\fkytby.exe"'
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4540
                      • C:\Users\Admin\AppData\Local\Temp\fkytby.exe
                        "C:\Users\Admin\AppData\Local\Temp\fkytby.exe"
                        5⤵
                        • Executes dropped EXE
                        PID:4176

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                Filesize

                1KB

                MD5

                5315900105942deb090a358a315b06fe

                SHA1

                22fe5d2e1617c31afbafb91c117508d41ef0ce44

                SHA256

                e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

                SHA512

                77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                15KB

                MD5

                b65221b1b05b3d92a6d4bedba9014eb0

                SHA1

                34203816996d5e47c16893720d98de88e6df2802

                SHA256

                e95abbdf7deacde619683f68c9010500d6e47f9de79ff7f98e4ae1e1bbbb36a5

                SHA512

                1d6e4a99d65a37a56f50b8926a6fb04afdef362ddee3606680e52429b961db70a0c5cc1bece080f241ccd776c6ea751a6be6c2cf2dabc449924e1f9836bef820

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                15KB

                MD5

                0c3804deb057a26588c01312d798f46c

                SHA1

                c1bce310e3fcb8942bdea4538a051160ce5c7bd0

                SHA256

                ce672f64c78d0bd00b42f11aea454eecc925ec9397f109d08909089eeda68719

                SHA512

                1a1b3f18ed9ec3923c42b669cb08134855995244a57ab1c4df1734543bcbaf2785ab1d3acfb5eb3cc16c1d9c873198b4e074d004de5577c247016185cd5fc505

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                18KB

                MD5

                2a8f20e557c24c99a1a67ebd0fa15de2

                SHA1

                89be00be2a5971c9b5a2ac689a9c1e3bce57be49

                SHA256

                79cae3451465615e6488677cefd9f814acdf00df32a33df3760acaf5352f5c60

                SHA512

                3254664c4195e9ca21e634ca75645207c88b9ad0672b54bdeb1eb1c13b3b09c9c3c37a6830f2ad8d6048b7dee96e04e6597e22b93ac76213a8c94029e26071c5

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                15KB

                MD5

                b687ef43eeeef6b2c7593b4ee9c04934

                SHA1

                f3df62b9c57b8d7025cdf0557a5b09e9e8257fc4

                SHA256

                e6201c20476964e81a9283981aca9322199bcabaeecb683b3184d93ef6ec4cde

                SHA512

                d7fc2466760a8f73e718c52fcc5a6be060c69aabb8e12e43761bb3a309a5b2ed419f56d0a70871d04f2b868fdc3d653fbae81b742b78cede1714e0567a90d9c4

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                15KB

                MD5

                b22d1c5159fa97764f06b9bf25710c3c

                SHA1

                78df3f3d3edbec3c1126ecf65c3f0db9403065f3

                SHA256

                a116123461640b3e53e88727026e835e15d3a9def2a95f2ecde06ef0d4e69d89

                SHA512

                785c5ac714fd7aeed8fc60f0d82331e3b5c9b3515092e61fef4aedf51a505431e3d72e06b6ac2d2e2ab35b45d9d30bdbf4ab6f947cc17ac29f6f1a88477b5f0d

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_n1teaz35.rwq.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\ezciiu.exe

                Filesize

                1.3MB

                MD5

                7bf2898f75b3974d2c53999f8d3f40fb

                SHA1

                c406aeef85ed1ce026b98b858af4be62da421119

                SHA256

                c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

                SHA512

                20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

              • C:\Users\Admin\AppData\Local\Temp\ezciiu.exe

                Filesize

                1.3MB

                MD5

                7bf2898f75b3974d2c53999f8d3f40fb

                SHA1

                c406aeef85ed1ce026b98b858af4be62da421119

                SHA256

                c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

                SHA512

                20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

              • C:\Users\Admin\AppData\Local\Temp\fkytby.exe

                Filesize

                5.8MB

                MD5

                a4f3e603a335cbd6d8f9ff11c8f9a9c2

                SHA1

                a5de59863fb4acc05a9253562172f802420ed21b

                SHA256

                2c1b6a652a62f7fde53d2e84e1211fef21dfde9eb0d4e2879bd997733af77a3e

                SHA512

                659d0175f4f496f5af6846f0af20345dec842c29eec7e78870b96d96bc712a39684be7a2cff1decabb6e447a477ddf8b92a1b22a12fe6ca07b1fd762540452f2

              • C:\Users\Admin\AppData\Local\Temp\fkytby.exe

                Filesize

                5.8MB

                MD5

                a4f3e603a335cbd6d8f9ff11c8f9a9c2

                SHA1

                a5de59863fb4acc05a9253562172f802420ed21b

                SHA256

                2c1b6a652a62f7fde53d2e84e1211fef21dfde9eb0d4e2879bd997733af77a3e

                SHA512

                659d0175f4f496f5af6846f0af20345dec842c29eec7e78870b96d96bc712a39684be7a2cff1decabb6e447a477ddf8b92a1b22a12fe6ca07b1fd762540452f2

              • C:\Users\Admin\AppData\Local\Temp\rtimlm.exe

                Filesize

                828KB

                MD5

                494969d84ee004227da4051403cbc098

                SHA1

                befd216439b68c83899476ea7bf5c7eff025bdc6

                SHA256

                c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

                SHA512

                ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

              • C:\Users\Admin\AppData\Local\Temp\rtimlm.exe

                Filesize

                828KB

                MD5

                494969d84ee004227da4051403cbc098

                SHA1

                befd216439b68c83899476ea7bf5c7eff025bdc6

                SHA256

                c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

                SHA512

                ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

              • C:\Users\Admin\AppData\Local\Temp\vxhqbm.exe

                Filesize

                2.3MB

                MD5

                a08e5952ddaaabe4b7deaf30e3e522d3

                SHA1

                d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

                SHA256

                52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

                SHA512

                2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

              • C:\Users\Admin\AppData\Local\Temp\vxhqbm.exe

                Filesize

                2.3MB

                MD5

                a08e5952ddaaabe4b7deaf30e3e522d3

                SHA1

                d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

                SHA256

                52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

                SHA512

                2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

              • memory/2472-2524-0x0000000140000000-0x00000001400D9000-memory.dmp

                Filesize

                868KB

              • memory/2948-2541-0x0000000000970000-0x0000000000AC0000-memory.dmp

                Filesize

                1.3MB

              • memory/2948-2543-0x00000000054D0000-0x00000000054E0000-memory.dmp

                Filesize

                64KB

              • memory/3336-2488-0x0000000005990000-0x0000000005A2C000-memory.dmp

                Filesize

                624KB

              • memory/3336-2517-0x00000000051E0000-0x00000000051F0000-memory.dmp

                Filesize

                64KB

              • memory/3336-2486-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/3336-2487-0x00000000051E0000-0x00000000051F0000-memory.dmp

                Filesize

                64KB

              • memory/3336-2489-0x0000000006B90000-0x0000000006C06000-memory.dmp

                Filesize

                472KB

              • memory/3336-2490-0x0000000006B40000-0x0000000006B5E000-memory.dmp

                Filesize

                120KB

              • memory/3572-2518-0x000000001C9E0000-0x000000001C9F0000-memory.dmp

                Filesize

                64KB

              • memory/3572-2516-0x00000000027F0000-0x0000000002812000-memory.dmp

                Filesize

                136KB

              • memory/3572-2515-0x0000000000510000-0x00000000005E2000-memory.dmp

                Filesize

                840KB

              • memory/3612-2614-0x0000000004B80000-0x0000000004B90000-memory.dmp

                Filesize

                64KB

              • memory/3612-2599-0x0000000000060000-0x00000000002B6000-memory.dmp

                Filesize

                2.3MB

              • memory/3612-2600-0x0000000004B80000-0x0000000004B90000-memory.dmp

                Filesize

                64KB

              • memory/3744-2528-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/3744-2527-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

                Filesize

                64KB

              • memory/3880-2593-0x0000000004980000-0x0000000004990000-memory.dmp

                Filesize

                64KB

              • memory/3880-2595-0x0000000004980000-0x0000000004990000-memory.dmp

                Filesize

                64KB

              • memory/4176-2647-0x000000001DB20000-0x000000001DB30000-memory.dmp

                Filesize

                64KB

              • memory/4176-2646-0x00000000002E0000-0x00000000008BA000-memory.dmp

                Filesize

                5.9MB

              • memory/4252-2613-0x0000000004870000-0x0000000004880000-memory.dmp

                Filesize

                64KB

              • memory/4252-2615-0x0000000004870000-0x0000000004880000-memory.dmp

                Filesize

                64KB

              • memory/4252-2616-0x0000000004870000-0x0000000004880000-memory.dmp

                Filesize

                64KB

              • memory/4252-2618-0x000000006ED20000-0x000000006ED6C000-memory.dmp

                Filesize

                304KB

              • memory/4252-2633-0x0000000004870000-0x0000000004880000-memory.dmp

                Filesize

                64KB

              • memory/4252-2638-0x000000007F010000-0x000000007F020000-memory.dmp

                Filesize

                64KB

              • memory/4252-2612-0x0000000004870000-0x0000000004880000-memory.dmp

                Filesize

                64KB

              • memory/4252-2611-0x0000000004870000-0x0000000004880000-memory.dmp

                Filesize

                64KB

              • memory/4400-187-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-163-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-134-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-135-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-137-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-139-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-141-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-143-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-145-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-147-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-2482-0x0000000031FA0000-0x0000000032544000-memory.dmp

                Filesize

                5.6MB

              • memory/4400-149-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-2481-0x0000000031950000-0x00000000319E2000-memory.dmp

                Filesize

                584KB

              • memory/4400-2480-0x0000000005330000-0x0000000005396000-memory.dmp

                Filesize

                408KB

              • memory/4400-2479-0x0000000005250000-0x0000000005272000-memory.dmp

                Filesize

                136KB

              • memory/4400-2478-0x0000000005110000-0x0000000005120000-memory.dmp

                Filesize

                64KB

              • memory/4400-197-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-195-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-193-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-191-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-189-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-133-0x0000000000490000-0x000000000066A000-memory.dmp

                Filesize

                1.9MB

              • memory/4400-185-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-183-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-181-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-179-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-177-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-151-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-153-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-155-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-157-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-159-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-161-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-165-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-167-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-169-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-171-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-173-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4400-175-0x0000000004FD0000-0x000000000509B000-memory.dmp

                Filesize

                812KB

              • memory/4500-2657-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4540-2640-0x00000000027E0000-0x00000000027F0000-memory.dmp

                Filesize

                64KB

              • memory/4540-2639-0x00000000027E0000-0x00000000027F0000-memory.dmp

                Filesize

                64KB

              • memory/4580-2495-0x0000000002D80000-0x0000000002D90000-memory.dmp

                Filesize

                64KB

              • memory/4580-2493-0x0000000005720000-0x0000000005D48000-memory.dmp

                Filesize

                6.2MB

              • memory/4580-2501-0x0000000005D50000-0x0000000005DB6000-memory.dmp

                Filesize

                408KB

              • memory/4580-2492-0x0000000002AC0000-0x0000000002AF6000-memory.dmp

                Filesize

                216KB

              • memory/4580-2506-0x0000000006400000-0x000000000641E000-memory.dmp

                Filesize

                120KB

              • memory/4580-2508-0x00000000068F0000-0x000000000690A000-memory.dmp

                Filesize

                104KB

              • memory/4580-2494-0x0000000002D80000-0x0000000002D90000-memory.dmp

                Filesize

                64KB

              • memory/4580-2511-0x0000000002D80000-0x0000000002D90000-memory.dmp

                Filesize

                64KB

              • memory/4580-2507-0x00000000075C0000-0x0000000007656000-memory.dmp

                Filesize

                600KB

              • memory/4580-2509-0x0000000006940000-0x0000000006962000-memory.dmp

                Filesize

                136KB

              • memory/4676-2558-0x00000000052A0000-0x00000000052AA000-memory.dmp

                Filesize

                40KB

              • memory/4676-2582-0x00000000052D0000-0x00000000052E0000-memory.dmp

                Filesize

                64KB

              • memory/4676-2559-0x00000000052D0000-0x00000000052E0000-memory.dmp

                Filesize

                64KB

              • memory/4676-2557-0x0000000000400000-0x0000000000436000-memory.dmp

                Filesize

                216KB

              • memory/4764-2574-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/4764-2560-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/4764-2561-0x0000000002D90000-0x0000000002DA0000-memory.dmp

                Filesize

                64KB

              • memory/4764-2562-0x0000000007560000-0x0000000007592000-memory.dmp

                Filesize

                200KB

              • memory/4764-2563-0x000000006F1B0000-0x000000006F1FC000-memory.dmp

                Filesize

                304KB

              • memory/4764-2573-0x0000000007520000-0x000000000753E000-memory.dmp

                Filesize

                120KB

              • memory/4764-2578-0x00000000078F0000-0x00000000078FE000-memory.dmp

                Filesize

                56KB

              • memory/4764-2575-0x000000007FCC0000-0x000000007FCD0000-memory.dmp

                Filesize

                64KB

              • memory/4764-2576-0x0000000007D80000-0x00000000083FA000-memory.dmp

                Filesize

                6.5MB

              • memory/4764-2577-0x0000000007730000-0x000000000773A000-memory.dmp

                Filesize

                40KB

              • memory/4764-2580-0x00000000079E0000-0x00000000079E8000-memory.dmp

                Filesize

                32KB

              • memory/4764-2579-0x0000000007A00000-0x0000000007A1A000-memory.dmp

                Filesize

                104KB