Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2023 07:58

General

  • Target

    tmp.exe

  • Size

    597KB

  • MD5

    adf266d3870069d9c6ec30091d347f68

  • SHA1

    dc27468702ccd3139f773c72ba64d38d8a50ff07

  • SHA256

    dd44612801b32da18885221e9211c565eecceeef71217b5b9858b839d6f8dc0d

  • SHA512

    cf57167932dde49b92cfcb72ee84dca1df51fe66d2ca2d832488bb4d410fd1f5ed9e0e8755a8fd5de41bb96f0e40fce35fa6c678ff4c794b7077026441ba26cd

  • SSDEEP

    6144:xSyBmqk0G78MNNhrXN8d9sx40RZGI8i6e6jherVXLw1Ig:xSycICXhrMWx/4Iae6VkXUWg

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Mutex

Aakn1515knAakn1515kn!

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

smokeloader

Version

2022

C2

http://glueberry-og.cc/

http://glueberry-og.co/

http://glueberry-og.to/

rc4.i32
rc4.i32

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect PureCrypter injector 28 IoCs
  • Detects Smokeloader packer 4 IoCs
  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
        PID:2536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        2⤵
          PID:4820
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          2⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3384
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\pcvvgq.exe"' & exit
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4700
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\pcvvgq.exe"'
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3712
              • C:\Users\Admin\AppData\Local\Temp\pcvvgq.exe
                "C:\Users\Admin\AppData\Local\Temp\pcvvgq.exe"
                5⤵
                • Modifies WinLogon for persistence
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4884
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                  6⤵
                  • Suspicious behavior: GetForegroundWindowSpam
                  PID:1744
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\wstfjq.exe"' & exit
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\wstfjq.exe"'
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2544
              • C:\Users\Admin\AppData\Local\Temp\wstfjq.exe
                "C:\Users\Admin\AppData\Local\Temp\wstfjq.exe"
                5⤵
                • Modifies WinLogon for persistence
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4720
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4544
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:916
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  6⤵
                  • Suspicious behavior: AddClipboardFormatListener
                  PID:1412
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\nfadyz.exe"' & exit
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4372
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\nfadyz.exe"'
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4488
              • C:\Users\Admin\AppData\Local\Temp\nfadyz.exe
                "C:\Users\Admin\AppData\Local\Temp\nfadyz.exe"
                5⤵
                • Modifies WinLogon for persistence
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2112
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5044
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  6⤵
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  PID:1496
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\mwcfht.exe"' & exit
            3⤵
              PID:1380
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\mwcfht.exe"'
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3388
                • C:\Users\Admin\AppData\Local\Temp\mwcfht.exe
                  "C:\Users\Admin\AppData\Local\Temp\mwcfht.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:1492

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          1KB

          MD5

          5315900105942deb090a358a315b06fe

          SHA1

          22fe5d2e1617c31afbafb91c117508d41ef0ce44

          SHA256

          e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

          SHA512

          77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          15KB

          MD5

          62b2234289304512f0c6bcd234bd0bb0

          SHA1

          d6e8267c36e9eb3841aef3f3b4b4b19c3092d906

          SHA256

          eb9eb7cfe19250ce356886b498a70ec3c3507eb7da2eb3ea7829c01c8acaeee0

          SHA512

          12d0b4e3c9560725c6d6378ee26f890081d8530bcf638ed459fb8dd67510787fd67c27431d8d209981df3385ec2b94397a7ddb5ae40900d445e1c004f4bd1f9f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          15KB

          MD5

          bfa62a22e16b28d0d73b91eb7371a533

          SHA1

          c0118a91530ed3aebb2cde7d5e84fcdc9f9ac0dc

          SHA256

          06aedec7d8465a4bd5e96e9b52f175351b6ea15a6278004f51b52e4d76773f7b

          SHA512

          40191698c85b5cd0d6d9692a47d82cc712aa4b3ac20457343498da072ab7ccca224687e4943a6331657a4e394c47dcfdf0dd212960a6278cf50ec5d25b3bdca7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          494c18eec59cf14e8ef1e12472911688

          SHA1

          2a618fabe7449bd2e7901a2fa048bdf6603289dd

          SHA256

          eeaee9d74effdc7ca9a8c56dbb387cc2e86450f55ec5bbd0bd02bc2a10e9ef30

          SHA512

          a630cbe16b481e42af35080413a43ea16bc288d7525793b64a6d1051d3796f52260a727c77d164c595e1f29cd6afc0b64a260e1bec82fb2f0b0894f30a604302

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          15KB

          MD5

          a95d7c1b2779e580ea365fd187394f3c

          SHA1

          9387e6d3c6939b9274b37d8c4013d489b5161929

          SHA256

          d8e27a4bd8ab7638f471e296f03be0fd96dd89509ee091a351682ebc26652c6d

          SHA512

          a756a95d11f9b04a5a26e279a4ecf9344b0a2f42f0736d42ed2b1a71959abdb9c64bcc1f95bea16932936e0890fc61215ca276a2f5c0789ccd4da61e8b0e9c39

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          fb1b8e4cf7419a84a372c2c1fec09418

          SHA1

          66e1a693201f3e5148ef089f88cd92556859a685

          SHA256

          7069ae83d43f9fa57c84ffeb127c19160508145a901162f5e971810c7f28e144

          SHA512

          f9ff6f50833058c6dddac59dc6bd8a36648fb6d1a3a4620e5cd01d1d5d9ba223c86089745a66d86b978d795e331519a0575006f38b7c08989839157ce1a6c32b

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3x50bsww.tmb.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\mwcfht.exe

          Filesize

          5.8MB

          MD5

          a4f3e603a335cbd6d8f9ff11c8f9a9c2

          SHA1

          a5de59863fb4acc05a9253562172f802420ed21b

          SHA256

          2c1b6a652a62f7fde53d2e84e1211fef21dfde9eb0d4e2879bd997733af77a3e

          SHA512

          659d0175f4f496f5af6846f0af20345dec842c29eec7e78870b96d96bc712a39684be7a2cff1decabb6e447a477ddf8b92a1b22a12fe6ca07b1fd762540452f2

        • C:\Users\Admin\AppData\Local\Temp\mwcfht.exe

          Filesize

          5.8MB

          MD5

          a4f3e603a335cbd6d8f9ff11c8f9a9c2

          SHA1

          a5de59863fb4acc05a9253562172f802420ed21b

          SHA256

          2c1b6a652a62f7fde53d2e84e1211fef21dfde9eb0d4e2879bd997733af77a3e

          SHA512

          659d0175f4f496f5af6846f0af20345dec842c29eec7e78870b96d96bc712a39684be7a2cff1decabb6e447a477ddf8b92a1b22a12fe6ca07b1fd762540452f2

        • C:\Users\Admin\AppData\Local\Temp\nfadyz.exe

          Filesize

          2.3MB

          MD5

          a08e5952ddaaabe4b7deaf30e3e522d3

          SHA1

          d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

          SHA256

          52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

          SHA512

          2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

        • C:\Users\Admin\AppData\Local\Temp\nfadyz.exe

          Filesize

          2.3MB

          MD5

          a08e5952ddaaabe4b7deaf30e3e522d3

          SHA1

          d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

          SHA256

          52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

          SHA512

          2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

        • C:\Users\Admin\AppData\Local\Temp\pcvvgq.exe

          Filesize

          828KB

          MD5

          494969d84ee004227da4051403cbc098

          SHA1

          befd216439b68c83899476ea7bf5c7eff025bdc6

          SHA256

          c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

          SHA512

          ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

        • C:\Users\Admin\AppData\Local\Temp\pcvvgq.exe

          Filesize

          828KB

          MD5

          494969d84ee004227da4051403cbc098

          SHA1

          befd216439b68c83899476ea7bf5c7eff025bdc6

          SHA256

          c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

          SHA512

          ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

        • C:\Users\Admin\AppData\Local\Temp\wstfjq.exe

          Filesize

          1.3MB

          MD5

          7bf2898f75b3974d2c53999f8d3f40fb

          SHA1

          c406aeef85ed1ce026b98b858af4be62da421119

          SHA256

          c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

          SHA512

          20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

        • C:\Users\Admin\AppData\Local\Temp\wstfjq.exe

          Filesize

          1.3MB

          MD5

          7bf2898f75b3974d2c53999f8d3f40fb

          SHA1

          c406aeef85ed1ce026b98b858af4be62da421119

          SHA256

          c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

          SHA512

          20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

        • memory/464-137-0x0000000005490000-0x000000000549A000-memory.dmp

          Filesize

          40KB

        • memory/464-138-0x0000000038780000-0x00000000387E6000-memory.dmp

          Filesize

          408KB

        • memory/464-134-0x0000000005AB0000-0x0000000006054000-memory.dmp

          Filesize

          5.6MB

        • memory/464-135-0x00000000053F0000-0x0000000005482000-memory.dmp

          Filesize

          584KB

        • memory/464-133-0x00000000009A0000-0x0000000000A3C000-memory.dmp

          Filesize

          624KB

        • memory/464-136-0x00000000055F0000-0x0000000005600000-memory.dmp

          Filesize

          64KB

        • memory/772-323-0x0000000001180000-0x0000000001196000-memory.dmp

          Filesize

          88KB

        • memory/916-230-0x0000000007E10000-0x0000000007E2A000-memory.dmp

          Filesize

          104KB

        • memory/916-227-0x00000000052D0000-0x00000000052E0000-memory.dmp

          Filesize

          64KB

        • memory/916-225-0x0000000008180000-0x00000000087FA000-memory.dmp

          Filesize

          6.5MB

        • memory/916-224-0x0000000006D70000-0x0000000006D8E000-memory.dmp

          Filesize

          120KB

        • memory/916-214-0x000000006EFC0000-0x000000006F00C000-memory.dmp

          Filesize

          304KB

        • memory/916-213-0x0000000006D90000-0x0000000006DC2000-memory.dmp

          Filesize

          200KB

        • memory/916-212-0x00000000052D0000-0x00000000052E0000-memory.dmp

          Filesize

          64KB

        • memory/916-228-0x0000000007B40000-0x0000000007B4A000-memory.dmp

          Filesize

          40KB

        • memory/916-229-0x0000000007D00000-0x0000000007D0E000-memory.dmp

          Filesize

          56KB

        • memory/916-231-0x0000000007DF0000-0x0000000007DF8000-memory.dmp

          Filesize

          32KB

        • memory/1412-226-0x00000000050F0000-0x0000000005100000-memory.dmp

          Filesize

          64KB

        • memory/1412-210-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1412-233-0x00000000050F0000-0x0000000005100000-memory.dmp

          Filesize

          64KB

        • memory/1492-305-0x000000001D650000-0x000000001D660000-memory.dmp

          Filesize

          64KB

        • memory/1492-340-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-308-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-312-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-460-0x000000001D650000-0x000000001D660000-memory.dmp

          Filesize

          64KB

        • memory/1492-316-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-318-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-320-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-360-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-306-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-358-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-356-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-354-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-352-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-350-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-348-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-346-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-344-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-342-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-314-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-338-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-336-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-334-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-332-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-330-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-310-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-303-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-325-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-322-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-302-0x000000001DA60000-0x000000001E162000-memory.dmp

          Filesize

          7.0MB

        • memory/1492-301-0x0000000000920000-0x0000000000EFA000-memory.dmp

          Filesize

          5.9MB

        • memory/1496-327-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/1496-282-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/1496-296-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/1744-176-0x0000000140000000-0x00000001400D9000-memory.dmp

          Filesize

          868KB

        • memory/1744-177-0x0000000140000000-0x00000001400D9000-memory.dmp

          Filesize

          868KB

        • memory/1744-178-0x0000000140000000-0x00000001400D9000-memory.dmp

          Filesize

          868KB

        • memory/1744-180-0x0000000140000000-0x00000001400D9000-memory.dmp

          Filesize

          868KB

        • memory/2112-251-0x0000000000180000-0x00000000003D6000-memory.dmp

          Filesize

          2.3MB

        • memory/2112-265-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/2112-252-0x0000000004E30000-0x0000000004E40000-memory.dmp

          Filesize

          64KB

        • memory/2544-194-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

          Filesize

          64KB

        • memory/2544-193-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

          Filesize

          64KB

        • memory/3384-144-0x0000000006D90000-0x0000000006E06000-memory.dmp

          Filesize

          472KB

        • memory/3384-143-0x0000000005B90000-0x0000000005C2C000-memory.dmp

          Filesize

          624KB

        • memory/3384-145-0x0000000006D60000-0x0000000006D7E000-memory.dmp

          Filesize

          120KB

        • memory/3384-140-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3384-142-0x0000000005220000-0x0000000005230000-memory.dmp

          Filesize

          64KB

        • memory/3384-173-0x0000000005220000-0x0000000005230000-memory.dmp

          Filesize

          64KB

        • memory/3388-295-0x0000000000FF0000-0x0000000001000000-memory.dmp

          Filesize

          64KB

        • memory/3388-300-0x0000000000FF0000-0x0000000001000000-memory.dmp

          Filesize

          64KB

        • memory/3388-294-0x0000000000FF0000-0x0000000001000000-memory.dmp

          Filesize

          64KB

        • memory/3712-162-0x0000000006620000-0x000000000663E000-memory.dmp

          Filesize

          120KB

        • memory/3712-165-0x0000000006B60000-0x0000000006B82000-memory.dmp

          Filesize

          136KB

        • memory/3712-164-0x0000000006B10000-0x0000000006B2A000-memory.dmp

          Filesize

          104KB

        • memory/3712-163-0x0000000006B90000-0x0000000006C26000-memory.dmp

          Filesize

          600KB

        • memory/3712-155-0x0000000005F30000-0x0000000005F96000-memory.dmp

          Filesize

          408KB

        • memory/3712-161-0x00000000051F0000-0x0000000005200000-memory.dmp

          Filesize

          64KB

        • memory/3712-147-0x0000000002CE0000-0x0000000002D16000-memory.dmp

          Filesize

          216KB

        • memory/3712-148-0x0000000005830000-0x0000000005E58000-memory.dmp

          Filesize

          6.2MB

        • memory/3712-149-0x0000000005E90000-0x0000000005EB2000-memory.dmp

          Filesize

          136KB

        • memory/3712-160-0x00000000051F0000-0x0000000005200000-memory.dmp

          Filesize

          64KB

        • memory/3712-166-0x00000000051F0000-0x0000000005200000-memory.dmp

          Filesize

          64KB

        • memory/4488-246-0x0000000005420000-0x0000000005430000-memory.dmp

          Filesize

          64KB

        • memory/4488-245-0x0000000005420000-0x0000000005430000-memory.dmp

          Filesize

          64KB

        • memory/4488-247-0x0000000005420000-0x0000000005430000-memory.dmp

          Filesize

          64KB

        • memory/4720-198-0x00000000008E0000-0x0000000000A30000-memory.dmp

          Filesize

          1.3MB

        • memory/4884-171-0x0000000000600000-0x00000000006D2000-memory.dmp

          Filesize

          840KB

        • memory/4884-172-0x0000000001000000-0x0000000001022000-memory.dmp

          Filesize

          136KB

        • memory/4884-174-0x000000001C2F0000-0x000000001C300000-memory.dmp

          Filesize

          64KB

        • memory/5044-263-0x00000000028C0000-0x00000000028D0000-memory.dmp

          Filesize

          64KB

        • memory/5044-264-0x00000000028C0000-0x00000000028D0000-memory.dmp

          Filesize

          64KB

        • memory/5044-266-0x00000000028C0000-0x00000000028D0000-memory.dmp

          Filesize

          64KB

        • memory/5044-267-0x00000000028C0000-0x00000000028D0000-memory.dmp

          Filesize

          64KB

        • memory/5044-268-0x000000006EB50000-0x000000006EB9C000-memory.dmp

          Filesize

          304KB

        • memory/5044-278-0x000000007F920000-0x000000007F930000-memory.dmp

          Filesize

          64KB