Analysis

  • max time kernel
    165s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2023, 12:21

General

  • Target

    Ntprfgupx-2.exe

  • Size

    1.8MB

  • MD5

    1237a749cdfe8065f70beb76026fbf58

  • SHA1

    9e9febe7441cfaa52135c32ef1827af10bdc81bf

  • SHA256

    819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c

  • SHA512

    57217329975517c09c32c49be0da9c694a7492347c13024eef77203ee16d3caaba8e77235a991194bcab961071d7ff887a1e5501eafc234f52ee4f840d3e6166

  • SSDEEP

    49152:zGXOVDKuXtwIarveK9plB91K70myaigDmXI:ieVDx6IaaK9plBXO03xgDmXI

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Mutex

Aakn1515knAakn1515kn

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

smokeloader

Botnet

MovA

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Async RAT payload 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ntprfgupx-2.exe
    "C:\Users\Admin\AppData\Local\Temp\Ntprfgupx-2.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
        PID:540
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1464
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\hjlccd.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\hjlccd.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1592
            • C:\Users\Admin\AppData\Local\Temp\hjlccd.exe
              "C:\Users\Admin\AppData\Local\Temp\hjlccd.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1968
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1688
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:836
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                6⤵
                • Suspicious behavior: AddClipboardFormatListener
                PID:1988
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\yayvis.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1712
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\yayvis.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:432
            • C:\Users\Admin\AppData\Local\Temp\yayvis.exe
              "C:\Users\Admin\AppData\Local\Temp\yayvis.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1592
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                6⤵
                  PID:1484
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\agtxzb.exe"' & exit
            3⤵
              PID:1092
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\agtxzb.exe"'
                4⤵
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2024
                • C:\Users\Admin\AppData\Local\Temp\agtxzb.exe
                  "C:\Users\Admin\AppData\Local\Temp\agtxzb.exe"
                  5⤵
                  • Modifies WinLogon for persistence
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1892
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                    6⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1956
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    6⤵
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:1332

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab14B.tmp

          Filesize

          62KB

          MD5

          3ac860860707baaf32469fa7cc7c0192

          SHA1

          c33c2acdaba0e6fa41fd2f00f186804722477639

          SHA256

          d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

          SHA512

          d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

        • C:\Users\Admin\AppData\Local\Temp\Tar8FC.tmp

          Filesize

          164KB

          MD5

          4ff65ad929cd9a367680e0e5b1c08166

          SHA1

          c0af0d4396bd1f15c45f39d3b849ba444233b3a2

          SHA256

          c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

          SHA512

          f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

        • C:\Users\Admin\AppData\Local\Temp\agtxzb.exe

          Filesize

          2.3MB

          MD5

          a08e5952ddaaabe4b7deaf30e3e522d3

          SHA1

          d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

          SHA256

          52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

          SHA512

          2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

        • C:\Users\Admin\AppData\Local\Temp\agtxzb.exe

          Filesize

          2.3MB

          MD5

          a08e5952ddaaabe4b7deaf30e3e522d3

          SHA1

          d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

          SHA256

          52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

          SHA512

          2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

        • C:\Users\Admin\AppData\Local\Temp\hjlccd.exe

          Filesize

          1.3MB

          MD5

          7bf2898f75b3974d2c53999f8d3f40fb

          SHA1

          c406aeef85ed1ce026b98b858af4be62da421119

          SHA256

          c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

          SHA512

          20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

        • C:\Users\Admin\AppData\Local\Temp\hjlccd.exe

          Filesize

          1.3MB

          MD5

          7bf2898f75b3974d2c53999f8d3f40fb

          SHA1

          c406aeef85ed1ce026b98b858af4be62da421119

          SHA256

          c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

          SHA512

          20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

        • C:\Users\Admin\AppData\Local\Temp\yayvis.exe

          Filesize

          828KB

          MD5

          494969d84ee004227da4051403cbc098

          SHA1

          befd216439b68c83899476ea7bf5c7eff025bdc6

          SHA256

          c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

          SHA512

          ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

        • C:\Users\Admin\AppData\Local\Temp\yayvis.exe

          Filesize

          828KB

          MD5

          494969d84ee004227da4051403cbc098

          SHA1

          befd216439b68c83899476ea7bf5c7eff025bdc6

          SHA256

          c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

          SHA512

          ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2U6VBDE0AU5Q0TTDDO93.temp

          Filesize

          7KB

          MD5

          d48e3b8a9b0249123b1e7cce4ff015ea

          SHA1

          aef12f3856f2b1dc8ec9ecfc3298f0d205a83fda

          SHA256

          d0bd4abeae18b0f78e59ed232371b696d25b1ba232f970ca0d1aa95800bdc748

          SHA512

          9963c6a7dafaf39b1a27b2d1217a437b73e7750af3ec6f442711b01515701bf1f84b1c992b7b8ece7548ffd98038148f628dc1e7d47799756b1f4fa074872153

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          d48e3b8a9b0249123b1e7cce4ff015ea

          SHA1

          aef12f3856f2b1dc8ec9ecfc3298f0d205a83fda

          SHA256

          d0bd4abeae18b0f78e59ed232371b696d25b1ba232f970ca0d1aa95800bdc748

          SHA512

          9963c6a7dafaf39b1a27b2d1217a437b73e7750af3ec6f442711b01515701bf1f84b1c992b7b8ece7548ffd98038148f628dc1e7d47799756b1f4fa074872153

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          d48e3b8a9b0249123b1e7cce4ff015ea

          SHA1

          aef12f3856f2b1dc8ec9ecfc3298f0d205a83fda

          SHA256

          d0bd4abeae18b0f78e59ed232371b696d25b1ba232f970ca0d1aa95800bdc748

          SHA512

          9963c6a7dafaf39b1a27b2d1217a437b73e7750af3ec6f442711b01515701bf1f84b1c992b7b8ece7548ffd98038148f628dc1e7d47799756b1f4fa074872153

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          d48e3b8a9b0249123b1e7cce4ff015ea

          SHA1

          aef12f3856f2b1dc8ec9ecfc3298f0d205a83fda

          SHA256

          d0bd4abeae18b0f78e59ed232371b696d25b1ba232f970ca0d1aa95800bdc748

          SHA512

          9963c6a7dafaf39b1a27b2d1217a437b73e7750af3ec6f442711b01515701bf1f84b1c992b7b8ece7548ffd98038148f628dc1e7d47799756b1f4fa074872153

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          d48e3b8a9b0249123b1e7cce4ff015ea

          SHA1

          aef12f3856f2b1dc8ec9ecfc3298f0d205a83fda

          SHA256

          d0bd4abeae18b0f78e59ed232371b696d25b1ba232f970ca0d1aa95800bdc748

          SHA512

          9963c6a7dafaf39b1a27b2d1217a437b73e7750af3ec6f442711b01515701bf1f84b1c992b7b8ece7548ffd98038148f628dc1e7d47799756b1f4fa074872153

        • \Users\Admin\AppData\Local\Temp\agtxzb.exe

          Filesize

          2.3MB

          MD5

          a08e5952ddaaabe4b7deaf30e3e522d3

          SHA1

          d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

          SHA256

          52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

          SHA512

          2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

        • \Users\Admin\AppData\Local\Temp\hjlccd.exe

          Filesize

          1.3MB

          MD5

          7bf2898f75b3974d2c53999f8d3f40fb

          SHA1

          c406aeef85ed1ce026b98b858af4be62da421119

          SHA256

          c1a074fed48daff62eefa0cadc7e5f77186dd437acac684b379946c09cc6d208

          SHA512

          20ec8430d1b1695ca943b1c9c759339be2facec42ff0086703a9f90ed7c684c1097dfed2a0dec9820d8949c4216c33767f9ef147aa38ba30e01cf9b5fe6f0676

        • \Users\Admin\AppData\Local\Temp\yayvis.exe

          Filesize

          828KB

          MD5

          494969d84ee004227da4051403cbc098

          SHA1

          befd216439b68c83899476ea7bf5c7eff025bdc6

          SHA256

          c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

          SHA512

          ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

        • memory/432-2508-0x0000000001EF0000-0x0000000001F30000-memory.dmp

          Filesize

          256KB

        • memory/432-2506-0x0000000001EF0000-0x0000000001F30000-memory.dmp

          Filesize

          256KB

        • memory/432-2509-0x0000000001EF0000-0x0000000001F30000-memory.dmp

          Filesize

          256KB

        • memory/1332-2575-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/1332-2573-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/1464-2414-0x0000000000A10000-0x0000000000A50000-memory.dmp

          Filesize

          256KB

        • memory/1464-2413-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1464-2431-0x00000000006F0000-0x00000000006FC000-memory.dmp

          Filesize

          48KB

        • memory/1464-2461-0x0000000000A10000-0x0000000000A50000-memory.dmp

          Filesize

          256KB

        • memory/1484-2526-0x0000000140000000-0x00000001400D9000-memory.dmp

          Filesize

          868KB

        • memory/1592-2512-0x000000001B050000-0x000000001B0D0000-memory.dmp

          Filesize

          512KB

        • memory/1592-2513-0x000000001ABE0000-0x000000001AC72000-memory.dmp

          Filesize

          584KB

        • memory/1592-2511-0x000000001A730000-0x000000001A7F4000-memory.dmp

          Filesize

          784KB

        • memory/1592-2510-0x000000013F3E0000-0x000000013F4B2000-memory.dmp

          Filesize

          840KB

        • memory/1592-2454-0x0000000002290000-0x00000000022D0000-memory.dmp

          Filesize

          256KB

        • memory/1592-2453-0x0000000002290000-0x00000000022D0000-memory.dmp

          Filesize

          256KB

        • memory/1892-2556-0x0000000000300000-0x0000000000556000-memory.dmp

          Filesize

          2.3MB

        • memory/1892-2557-0x0000000002190000-0x0000000002238000-memory.dmp

          Filesize

          672KB

        • memory/1892-2564-0x0000000004AC0000-0x0000000004B00000-memory.dmp

          Filesize

          256KB

        • memory/1956-2566-0x0000000001EC0000-0x0000000001F00000-memory.dmp

          Filesize

          256KB

        • memory/1956-2565-0x0000000001EC0000-0x0000000001F00000-memory.dmp

          Filesize

          256KB

        • memory/1968-2460-0x0000000000330000-0x0000000000342000-memory.dmp

          Filesize

          72KB

        • memory/1968-2458-0x0000000000E10000-0x0000000000F60000-memory.dmp

          Filesize

          1.3MB

        • memory/1968-2459-0x0000000000B00000-0x0000000000BAA000-memory.dmp

          Filesize

          680KB

        • memory/1980-113-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-111-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-109-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-81-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-79-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-77-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-83-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-2401-0x0000000004390000-0x0000000004422000-memory.dmp

          Filesize

          584KB

        • memory/1980-85-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-117-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-75-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-73-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-89-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-91-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-71-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-69-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-67-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-115-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-65-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-54-0x0000000000310000-0x00000000004EA000-memory.dmp

          Filesize

          1.9MB

        • memory/1980-2400-0x0000000004C40000-0x0000000004C80000-memory.dmp

          Filesize

          256KB

        • memory/1980-87-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-119-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-107-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-103-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-93-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-105-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-63-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-95-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-97-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-61-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-59-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-57-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-101-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-99-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-56-0x00000000047F0000-0x00000000048BB000-memory.dmp

          Filesize

          812KB

        • memory/1980-55-0x00000000047F0000-0x00000000048C2000-memory.dmp

          Filesize

          840KB

        • memory/1988-2514-0x0000000004F20000-0x0000000004F60000-memory.dmp

          Filesize

          256KB

        • memory/1988-2479-0x0000000004F20000-0x0000000004F60000-memory.dmp

          Filesize

          256KB

        • memory/1988-2478-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2024-2551-0x00000000025F0000-0x0000000002630000-memory.dmp

          Filesize

          256KB

        • memory/2024-2552-0x00000000025F0000-0x0000000002630000-memory.dmp

          Filesize

          256KB