Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    20-10-2021 03:59

General

  • Target

    B3A5EDD96F0E9D42DA79564D4F9B8764CC52D07896A843F03FDC34C7CC23F338.exe

  • Size

    46.0MB

  • MD5

    0821c3d4dee7db77d2b4fe56f242143f

  • SHA1

    5238e22879987f3ed2d524eb147d1859f184957b

  • SHA256

    b3a5edd96f0e9d42da79564d4f9b8764cc52d07896a843f03fdc34c7cc23f338

  • SHA512

    567035148517e9feffe094e1bccb5a8d2561051249a81cb5cbc250440c5e42a079fb6dd896853794168e49cd1fead9e1067930367bd572dfc6f56a9ec7fb5ad6

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

pettbull.ddns.net:6606

pettbull.ddns.net:7707

pettbull.ddns.net:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Extracted

Family

quasar

Version

1.4.0

Botnet

PRO21

C2

pettbull.ddns.net:4782

Mutex

23e7ca58-8298-4c9f-b276-3466dcf2cfc0

Attributes
  • encryption_key

    DAE9E02E5E04D59D9AF2AA1D5E82248D5919AC6A

  • install_name

    Windows Update.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft Windows

  • subdirectory

    System32

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Quasar Payload 5 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Async RAT payload 5 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops startup file 3 IoCs
  • Loads dropped DLL 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\B3A5EDD96F0E9D42DA79564D4F9B8764CC52D07896A843F03FDC34C7CC23F338.exe
    "C:\Users\Admin\AppData\Local\Temp\B3A5EDD96F0E9D42DA79564D4F9B8764CC52D07896A843F03FDC34C7CC23F338.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:376
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell" copy-item 'C:\Users\Admin\AppData\Roaming\svchost.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:580
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        PID:1100
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1144
    • C:\Users\Admin\AppData\Roaming\Host.exe
      "C:\Users\Admin\AppData\Roaming\Host.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell" copy-item 'C:\Users\Admin\AppData\Roaming\Host.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1948
      • C:\Users\Admin\AppData\Roaming\Host.exe
        "C:\Users\Admin\AppData\Roaming\Host.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1516
    • C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
      "C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Users\Admin\AppData\Local\Temp\is-3Q68T.tmp\epm_setup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-3Q68T.tmp\epm_setup.tmp" /SL5="$101BC,46887390,159744,C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1880

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • C:\Users\Admin\AppData\Local\Temp\is-3Q68T.tmp\epm_setup.tmp
    MD5

    5c89dfa61730475598227eb55d61346a

    SHA1

    ace61af8fbfb290e636871f4b8566dfa3d000e36

    SHA256

    c75e56e754bbcdd7b27aca038ce2b0628708381bf83262b184e9fecb7d0b1307

    SHA512

    be12398aa2d6b770c5fbeb99c8f9ee396a50f0e0539466af7e520885505c1bcf7f0ef75e0d297df20a6f9958cf76662b2930d70420d916974cd8644b6140409e

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    MD5

    c70239d4fadce99cb07482ff26e26453

    SHA1

    702cc09e7685e06a8feab0674c4aaa29ddf95c1c

    SHA256

    9517e4427cea5bdc1685ac00bc186db9f04f02cdd807ecd81560c0a34d281e9c

    SHA512

    017a54dd1ea24738e495543411ae352f9dcc32dd4927b299d7b080e710b9eeb646f38f7cd2dd914b3be02b1938ad2409d592b801f61297fb0240d2d78f862af0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • \Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • \Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • \Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • \Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • \Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • \Users\Admin\AppData\Local\Temp\is-3Q68T.tmp\epm_setup.tmp
    MD5

    5c89dfa61730475598227eb55d61346a

    SHA1

    ace61af8fbfb290e636871f4b8566dfa3d000e36

    SHA256

    c75e56e754bbcdd7b27aca038ce2b0628708381bf83262b184e9fecb7d0b1307

    SHA512

    be12398aa2d6b770c5fbeb99c8f9ee396a50f0e0539466af7e520885505c1bcf7f0ef75e0d297df20a6f9958cf76662b2930d70420d916974cd8644b6140409e

  • \Users\Admin\AppData\Local\Temp\is-59HHM.tmp\EuActiveOnline.dll
    MD5

    08832f527ddc56fdfddb06e5b936e8ba

    SHA1

    5fc51d2d5e1e1d9460e1926cad5a540233b08993

    SHA256

    602ea813c7aae972ce0643429a1bdcfa5a9807eac0188b11a54936a30f32edb6

    SHA512

    9f9c748288e8eda9bd18c07551cf34c4f34240ab4cc1c46fac6449798325c97d6b466b76c317477d2c8b76701cf194e201beb15e938057d888eb2487e0092762

  • \Users\Admin\AppData\Local\Temp\is-59HHM.tmp\_isetup\_shfoldr.dll
    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-59HHM.tmp\_isetup\_shfoldr.dll
    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • \Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • \Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • \Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • memory/376-69-0x00000000005F0000-0x0000000000605000-memory.dmp
    Filesize

    84KB

  • memory/376-61-0x00000000000C0000-0x00000000000C1000-memory.dmp
    Filesize

    4KB

  • memory/376-58-0x0000000000000000-mapping.dmp
  • memory/376-71-0x0000000000650000-0x0000000000651000-memory.dmp
    Filesize

    4KB

  • memory/376-70-0x00000000005B0000-0x00000000005B1000-memory.dmp
    Filesize

    4KB

  • memory/580-66-0x0000000002300000-0x0000000002301000-memory.dmp
    Filesize

    4KB

  • memory/580-67-0x0000000002301000-0x0000000002302000-memory.dmp
    Filesize

    4KB

  • memory/580-64-0x0000000000000000-mapping.dmp
  • memory/580-68-0x0000000002302000-0x0000000002304000-memory.dmp
    Filesize

    8KB

  • memory/1144-100-0x0000000004140000-0x0000000004141000-memory.dmp
    Filesize

    4KB

  • memory/1144-77-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1144-78-0x000000000040C73E-mapping.dmp
  • memory/1144-76-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1144-80-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1144-75-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1144-74-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1144-73-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1380-53-0x0000000074C71000-0x0000000074C73000-memory.dmp
    Filesize

    8KB

  • memory/1516-102-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1516-125-0x0000000004CF0000-0x0000000004CF1000-memory.dmp
    Filesize

    4KB

  • memory/1516-107-0x000000000047E7CE-mapping.dmp
  • memory/1516-106-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1516-105-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1516-109-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1516-103-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1516-104-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1564-86-0x0000000000000000-mapping.dmp
  • memory/1564-123-0x00000000004E0000-0x00000000004E1000-memory.dmp
    Filesize

    4KB

  • memory/1564-121-0x00000000021B0000-0x00000000021B1000-memory.dmp
    Filesize

    4KB

  • memory/1564-89-0x00000000009C0000-0x00000000009C1000-memory.dmp
    Filesize

    4KB

  • memory/1880-124-0x0000000000000000-mapping.dmp
  • memory/1880-129-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/1920-127-0x0000000000400000-0x0000000000431000-memory.dmp
    Filesize

    196KB

  • memory/1920-115-0x0000000000000000-mapping.dmp
  • memory/1948-98-0x0000000002432000-0x0000000002434000-memory.dmp
    Filesize

    8KB

  • memory/1948-97-0x0000000002431000-0x0000000002432000-memory.dmp
    Filesize

    4KB

  • memory/1948-96-0x0000000002430000-0x0000000002431000-memory.dmp
    Filesize

    4KB

  • memory/1948-92-0x0000000000000000-mapping.dmp