Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2024 21:16

General

  • Target

    lMG_MlaKhlfa1111HD_14546.vbs

  • Size

    255KB

  • MD5

    b921e66031316c979fac97b7012990ce

  • SHA1

    01c4d314a23b6bd8b571b302c3483b7be904309f

  • SHA256

    82d21f05aa27eb85e5244cd11a3e60b39093942d19ac86e20b96a280e9579544

  • SHA512

    c0085dd5bc5595ff00a091361def95d92c3260a66e2c84c2aa2d54d2a48b3c5249d071e1db240d1ba2a5c26fc7b9d79122d9b0df55a1a4008025813d0839986f

  • SSDEEP

    3072:Q03pA03pp03pmAk79DqcPKrB5jzeTMJNHEPenFkCum03pvfpp03pp03pp03pA:wk79DqcyrBJeQJhEPeQr5

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

ADFLYYYY

C2

139.99.133.66:6666

Mutex

acwwcawwacwvasasa

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

remcos

Botnet

ADFLY

C2

139.99.133.66:4444

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    asasasas-SEG6JT

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

xenorat

C2

139.99.133.66

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    9999

  • startup_name

    nothingset

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 15 IoCs
  • Registers COM server for autorun 1 TTPs 24 IoCs
  • Suspicious use of SetThreadContext 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Modifies registry class 54 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lMG_MlaKhlfa1111HD_14546.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Windows\SYSWOW64\WSCRIPT.EXE
      "C:\Windows\SYSWOW64\WSCRIPT.EXE" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\lMG_MlaKhlfa1111HD_14546.vbs"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        PID:4176
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:4584
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
          3⤵
          • Loads dropped DLL
          • Registers COM server for autorun
          • Modifies registry class
          PID:2020
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2276
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\remc1.vbs"' & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\remc1.vbs"'
              5⤵
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1884
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\remc1.vbs"
                6⤵
                • Checks computer location settings
                • Drops startup file
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:5020
                • C:\Windows\SysWOW64\regsvr32.exe
                  "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                  7⤵
                  • Loads dropped DLL
                  • Registers COM server for autorun
                  • Modifies registry class
                  PID:1308
                • C:\Windows\winhlp32.exe
                  "C:\Windows\winhlp32.exe"
                  7⤵
                    PID:2880
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                    7⤵
                    • Loads dropped DLL
                    • Registers COM server for autorun
                    • Modifies registry class
                    PID:4868
                  • C:\Windows\winhlp32.exe
                    "C:\Windows\winhlp32.exe"
                    7⤵
                      PID:4688
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 80
                        8⤵
                        • Program crash
                        PID:1480
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                      7⤵
                      • Loads dropped DLL
                      • Registers COM server for autorun
                      • Modifies registry class
                      PID:4520
                    • C:\Windows\winhlp32.exe
                      "C:\Windows\winhlp32.exe"
                      7⤵
                        PID:1520
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 72
                          8⤵
                          • Program crash
                          PID:1540
                      • C:\Windows\SysWOW64\regsvr32.exe
                        "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                        7⤵
                        • Loads dropped DLL
                        • Registers COM server for autorun
                        • Modifies registry class
                        PID:1124
                      • C:\Windows\winhlp32.exe
                        "C:\Windows\winhlp32.exe"
                        7⤵
                          PID:1228
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\xeno.vbs"' & exit
                    4⤵
                      PID:2524
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\xeno.vbs"'
                        5⤵
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2420
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\xeno.vbs"
                          6⤵
                          • Checks computer location settings
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          PID:3832
                          • C:\Windows\SysWOW64\regsvr32.exe
                            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                            7⤵
                            • Loads dropped DLL
                            • Registers COM server for autorun
                            • Modifies registry class
                            PID:4360
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                            7⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1924
                          • C:\Windows\SysWOW64\regsvr32.exe
                            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                            7⤵
                            • Loads dropped DLL
                            • Registers COM server for autorun
                            • Modifies registry class
                            PID:3556
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                            7⤵
                              PID:116
                            • C:\Windows\SysWOW64\regsvr32.exe
                              "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                              7⤵
                              • Loads dropped DLL
                              • Registers COM server for autorun
                              • Modifies registry class
                              PID:3856
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                              7⤵
                                PID:4588
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 80
                                  8⤵
                                  • Program crash
                                  PID:2768
                              • C:\Windows\SysWOW64\regsvr32.exe
                                "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                                7⤵
                                • Loads dropped DLL
                                • Registers COM server for autorun
                                • Modifies registry class
                                PID:4260
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                7⤵
                                  PID:4868
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 80
                                    8⤵
                                    • Program crash
                                    PID:3732
                        • C:\Windows\SysWOW64\regsvr32.exe
                          "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                          3⤵
                          • Loads dropped DLL
                          • Registers COM server for autorun
                          • Modifies registry class
                          PID:4060
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          3⤵
                            PID:3956
                          • C:\Windows\SysWOW64\regsvr32.exe
                            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                            3⤵
                            • Loads dropped DLL
                            • Registers COM server for autorun
                            • Modifies registry class
                            PID:4016
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            3⤵
                              PID:3156
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4688 -ip 4688
                          1⤵
                            PID:3292
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1520 -ip 1520
                            1⤵
                              PID:1692
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4588 -ip 4588
                              1⤵
                                PID:1608
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4868 -ip 4868
                                1⤵
                                  PID:4380

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                                  Filesize

                                  425B

                                  MD5

                                  4eaca4566b22b01cd3bc115b9b0b2196

                                  SHA1

                                  e743e0792c19f71740416e7b3c061d9f1336bf94

                                  SHA256

                                  34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                                  SHA512

                                  bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                  Filesize

                                  1KB

                                  MD5

                                  5315900105942deb090a358a315b06fe

                                  SHA1

                                  22fe5d2e1617c31afbafb91c117508d41ef0ce44

                                  SHA256

                                  e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

                                  SHA512

                                  77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  15KB

                                  MD5

                                  2f30c17153324e5b95a8fb9a2136467f

                                  SHA1

                                  53eaba9255ba3e35c232ee8085fa7a0b077666fa

                                  SHA256

                                  be90e3f85ede06ef33b207a95db4075b33c93e50b52a6099d8cc826ddc308d8f

                                  SHA512

                                  c89a1cd78eb7a2fd759e61ffbf96d1921f504c45f6c5f6b3dbd2fccc8741ad4cc283f73bbc50030afd79ad4c99ab887a7f07323dbcb076b584a5b1a2301ebad9

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tmljmaed.urn.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                                  Filesize

                                  13KB

                                  MD5

                                  e0b8dfd17b8e7de760b273d18e58b142

                                  SHA1

                                  801509fb6783c9e57edc67a72dde3c62080ffbaf

                                  SHA256

                                  4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                                  SHA512

                                  443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                                • C:\Users\Admin\AppData\Local\Temp\remc1.vbs

                                  Filesize

                                  1.1MB

                                  MD5

                                  996ce58a48e655f549f5713f0e611f39

                                  SHA1

                                  ecec7979eb9d83600ea972ccfd2bb140209e2bbc

                                  SHA256

                                  f9dea360c36d495e10a397ae78412f08de99609916592275b73045b7df096dd2

                                  SHA512

                                  f992b04057b3e99439c08c249b73ba2afaf6880a6dcf7e6d08413f23d7ce122f087ffd236b75dd2c1f1750123e974ab45569019231a3577d2be227336b6b7eef

                                • C:\Users\Admin\AppData\Local\Temp\xeno.vbs

                                  Filesize

                                  251KB

                                  MD5

                                  ec80082e5d40e6c94a4682fd840870c4

                                  SHA1

                                  1904a6688379fd732ec76932e8fc1eec7896cbac

                                  SHA256

                                  74451d6bcb1565ab921e98a30b8bb8f2450d286cba1766ebd204efe3d96a78c9

                                  SHA512

                                  d3f6a9e44c0608d41cc6dd9dd17ef31a394c3dae099f0c592ef9763590445e072866c23618c6dfb39843a108321e972b5fa49e6377f6a2e4887df35be2075bc5

                                • memory/116-132-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/116-122-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/1228-89-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/1228-88-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/1228-91-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/1884-55-0x0000000006180000-0x00000000061CC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/1884-53-0x0000000005CB0000-0x0000000006004000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/1884-52-0x0000000005B60000-0x0000000005BC6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/1884-62-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/1884-44-0x00000000058D0000-0x00000000058F2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/1884-58-0x0000000006620000-0x0000000006642000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/1884-57-0x00000000065D0000-0x00000000065EA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/1884-56-0x00000000072C0000-0x0000000007356000-memory.dmp

                                  Filesize

                                  600KB

                                • memory/1884-41-0x0000000005290000-0x00000000058B8000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/1884-40-0x0000000002890000-0x00000000028A0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1884-54-0x00000000060C0000-0x00000000060DE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/1884-37-0x0000000002730000-0x0000000002766000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/1884-38-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/1884-39-0x0000000002890000-0x00000000028A0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1924-114-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1924-130-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/1924-131-0x00000000052F0000-0x0000000005300000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1924-117-0x00000000052F0000-0x0000000005300000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1924-115-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/2276-33-0x0000000006E00000-0x0000000006E76000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/2276-10-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/2276-34-0x0000000006040000-0x000000000604C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/2276-32-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/2276-31-0x0000000005E90000-0x0000000005EF6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/2276-30-0x00000000063D0000-0x0000000006974000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/2276-29-0x0000000005D80000-0x0000000005E1C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/2276-20-0x0000000005500000-0x0000000005510000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2276-35-0x0000000006DD0000-0x0000000006DEE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/2276-72-0x0000000005500000-0x0000000005510000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2420-96-0x0000000005650000-0x00000000059A4000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/2420-94-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/2420-107-0x00000000062B0000-0x00000000062FC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/2420-110-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/2420-95-0x0000000002410000-0x0000000002420000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2880-71-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-129-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-80-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-81-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-138-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-137-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-135-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-134-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-133-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-116-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-74-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-70-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-128-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-79-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-69-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/2880-67-0x0000000000400000-0x0000000000482000-memory.dmp

                                  Filesize

                                  520KB

                                • memory/3156-26-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3156-18-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3832-113-0x0000000003EE0000-0x0000000003EE1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3832-120-0x00000000040C0000-0x00000000040C1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3832-125-0x0000000004200000-0x0000000004201000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3956-25-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3956-14-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4584-7-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4584-23-0x0000000073650000-0x0000000073E00000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4584-4-0x0000000000400000-0x0000000000412000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4584-19-0x0000000004D10000-0x0000000004D20000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4856-8-0x0000000004580000-0x0000000004581000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4856-5-0x00000000043B0000-0x00000000043B1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4856-17-0x0000000004820000-0x0000000004821000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4856-13-0x0000000004630000-0x0000000004631000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5020-68-0x0000000004B80000-0x0000000004B81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5020-76-0x0000000004C20000-0x0000000004C21000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5020-90-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5020-83-0x0000000004CA0000-0x0000000004CA1000-memory.dmp

                                  Filesize

                                  4KB