Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-01-2022 08:36
Static task
static1
Behavioral task
behavioral1
Sample
Faktura ref. # IRQ-21-07778.exe
Resource
win7-en-20211208
General
-
Target
Faktura ref. # IRQ-21-07778.exe
-
Size
697KB
-
MD5
d2c4ad3484a598f0848a7947fc45175f
-
SHA1
2c7807352b5ece76d1e0364acdcfce3bc2cd9b72
-
SHA256
1b662d7015e25e2eba4e7b535732df5310c28ddd80797c260eebadfed1a1197d
-
SHA512
366f15e329de3e504cc2a91e17129377b07815f19cd849e30d776eadac0ad3d57f5b8b5182bfc2bd80ba99839903f794649310c21f46c3447662d762b1288b5e
Malware Config
Extracted
asyncrat
0.5.7B
Default
89.238.150.43:57095
AsyncMutex_6SI8OkPnk
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
true
-
install_file
chromeex.exe
-
install_folder
%Temp%
-
pastebin_config
null
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4504-130-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/856-618-0x0000000007110000-0x0000000007132000-memory.dmp asyncrat -
Executes dropped EXE 3 IoCs
Processes:
chromeex.exechromeex.exechromeex.exepid process 1720 chromeex.exe 1312 chromeex.exe 856 chromeex.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
Faktura ref. # IRQ-21-07778.exechromeex.exedescription pid process target process PID 3676 set thread context of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 1720 set thread context of 856 1720 chromeex.exe chromeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4304 schtasks.exe 1428 schtasks.exe 1668 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1496 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
powershell.exeFaktura ref. # IRQ-21-07778.exechromeex.exepowershell.exechromeex.exepid process 4420 powershell.exe 4420 powershell.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4504 Faktura ref. # IRQ-21-07778.exe 4420 powershell.exe 1720 chromeex.exe 1720 chromeex.exe 2608 powershell.exe 2608 powershell.exe 2608 powershell.exe 856 chromeex.exe 856 chromeex.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exeFaktura ref. # IRQ-21-07778.exechromeex.exepowershell.exechromeex.exedescription pid process Token: SeDebugPrivilege 4420 powershell.exe Token: SeDebugPrivilege 4504 Faktura ref. # IRQ-21-07778.exe Token: SeDebugPrivilege 1720 chromeex.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 856 chromeex.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
Faktura ref. # IRQ-21-07778.exeFaktura ref. # IRQ-21-07778.execmd.execmd.exechromeex.exechromeex.execmd.execmd.exedescription pid process target process PID 3676 wrote to memory of 4420 3676 Faktura ref. # IRQ-21-07778.exe powershell.exe PID 3676 wrote to memory of 4420 3676 Faktura ref. # IRQ-21-07778.exe powershell.exe PID 3676 wrote to memory of 4420 3676 Faktura ref. # IRQ-21-07778.exe powershell.exe PID 3676 wrote to memory of 4304 3676 Faktura ref. # IRQ-21-07778.exe schtasks.exe PID 3676 wrote to memory of 4304 3676 Faktura ref. # IRQ-21-07778.exe schtasks.exe PID 3676 wrote to memory of 4304 3676 Faktura ref. # IRQ-21-07778.exe schtasks.exe PID 3676 wrote to memory of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 3676 wrote to memory of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 3676 wrote to memory of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 3676 wrote to memory of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 3676 wrote to memory of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 3676 wrote to memory of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 3676 wrote to memory of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 3676 wrote to memory of 4504 3676 Faktura ref. # IRQ-21-07778.exe Faktura ref. # IRQ-21-07778.exe PID 4504 wrote to memory of 820 4504 Faktura ref. # IRQ-21-07778.exe cmd.exe PID 4504 wrote to memory of 820 4504 Faktura ref. # IRQ-21-07778.exe cmd.exe PID 4504 wrote to memory of 820 4504 Faktura ref. # IRQ-21-07778.exe cmd.exe PID 4504 wrote to memory of 1060 4504 Faktura ref. # IRQ-21-07778.exe cmd.exe PID 4504 wrote to memory of 1060 4504 Faktura ref. # IRQ-21-07778.exe cmd.exe PID 4504 wrote to memory of 1060 4504 Faktura ref. # IRQ-21-07778.exe cmd.exe PID 820 wrote to memory of 1428 820 cmd.exe schtasks.exe PID 820 wrote to memory of 1428 820 cmd.exe schtasks.exe PID 820 wrote to memory of 1428 820 cmd.exe schtasks.exe PID 1060 wrote to memory of 1496 1060 cmd.exe timeout.exe PID 1060 wrote to memory of 1496 1060 cmd.exe timeout.exe PID 1060 wrote to memory of 1496 1060 cmd.exe timeout.exe PID 1060 wrote to memory of 1720 1060 cmd.exe chromeex.exe PID 1060 wrote to memory of 1720 1060 cmd.exe chromeex.exe PID 1060 wrote to memory of 1720 1060 cmd.exe chromeex.exe PID 1720 wrote to memory of 2608 1720 chromeex.exe powershell.exe PID 1720 wrote to memory of 2608 1720 chromeex.exe powershell.exe PID 1720 wrote to memory of 2608 1720 chromeex.exe powershell.exe PID 1720 wrote to memory of 1668 1720 chromeex.exe schtasks.exe PID 1720 wrote to memory of 1668 1720 chromeex.exe schtasks.exe PID 1720 wrote to memory of 1668 1720 chromeex.exe schtasks.exe PID 1720 wrote to memory of 1312 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 1312 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 1312 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 856 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 856 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 856 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 856 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 856 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 856 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 856 1720 chromeex.exe chromeex.exe PID 1720 wrote to memory of 856 1720 chromeex.exe chromeex.exe PID 856 wrote to memory of 4596 856 chromeex.exe cmd.exe PID 856 wrote to memory of 4596 856 chromeex.exe cmd.exe PID 856 wrote to memory of 4596 856 chromeex.exe cmd.exe PID 4596 wrote to memory of 4888 4596 cmd.exe powershell.exe PID 4596 wrote to memory of 4888 4596 cmd.exe powershell.exe PID 4596 wrote to memory of 4888 4596 cmd.exe powershell.exe PID 856 wrote to memory of 4472 856 chromeex.exe cmd.exe PID 856 wrote to memory of 4472 856 chromeex.exe cmd.exe PID 856 wrote to memory of 4472 856 chromeex.exe cmd.exe PID 4472 wrote to memory of 968 4472 cmd.exe powershell.exe PID 4472 wrote to memory of 968 4472 cmd.exe powershell.exe PID 4472 wrote to memory of 968 4472 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Faktura ref. # IRQ-21-07778.exe"C:\Users\Admin\AppData\Local\Temp\Faktura ref. # IRQ-21-07778.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uSbiuPFvZX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uSbiuPFvZX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp80D4.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Faktura ref. # IRQ-21-07778.exe"C:\Users\Admin\AppData\Local\Temp\Faktura ref. # IRQ-21-07778.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "chromeex" /tr '"C:\Users\Admin\AppData\Local\Temp\chromeex.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "chromeex" /tr '"C:\Users\Admin\AppData\Local\Temp\chromeex.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9E7E.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\chromeex.exe"C:\Users\Admin\AppData\Local\Temp\chromeex.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uSbiuPFvZX.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uSbiuPFvZX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp453E.tmp"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\chromeex.exe"C:\Users\Admin\AppData\Local\Temp\chromeex.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\chromeex.exe"C:\Users\Admin\AppData\Local\Temp\chromeex.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\iiqsap.exe"' & exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\iiqsap.exe"'7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\wnfhrq.exe"' & exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\wnfhrq.exe"'7⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Faktura ref. # IRQ-21-07778.exe.logMD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
925b53c7bd4fa8024aeefb5f78a4f124
SHA1c1c1f0ce89ba5a33e21c94877cba23d47ae8510f
SHA2561c73837e41ee1c13e613d8b00df835ab4988d95413480a90a576d3935da2b971
SHA5126cb813c7af451fcd6d1f520baadb9d4c7a29ff3ef933ae5c8eea6e6eb19f13706a89f78a0db11dff71743e06ccc07fc19bdcbc7ce2cdecf8e43a66cc492b9a1a
-
C:\Users\Admin\AppData\Local\Temp\chromeex.exeMD5
d2c4ad3484a598f0848a7947fc45175f
SHA12c7807352b5ece76d1e0364acdcfce3bc2cd9b72
SHA2561b662d7015e25e2eba4e7b535732df5310c28ddd80797c260eebadfed1a1197d
SHA512366f15e329de3e504cc2a91e17129377b07815f19cd849e30d776eadac0ad3d57f5b8b5182bfc2bd80ba99839903f794649310c21f46c3447662d762b1288b5e
-
C:\Users\Admin\AppData\Local\Temp\chromeex.exeMD5
d2c4ad3484a598f0848a7947fc45175f
SHA12c7807352b5ece76d1e0364acdcfce3bc2cd9b72
SHA2561b662d7015e25e2eba4e7b535732df5310c28ddd80797c260eebadfed1a1197d
SHA512366f15e329de3e504cc2a91e17129377b07815f19cd849e30d776eadac0ad3d57f5b8b5182bfc2bd80ba99839903f794649310c21f46c3447662d762b1288b5e
-
C:\Users\Admin\AppData\Local\Temp\chromeex.exeMD5
d2c4ad3484a598f0848a7947fc45175f
SHA12c7807352b5ece76d1e0364acdcfce3bc2cd9b72
SHA2561b662d7015e25e2eba4e7b535732df5310c28ddd80797c260eebadfed1a1197d
SHA512366f15e329de3e504cc2a91e17129377b07815f19cd849e30d776eadac0ad3d57f5b8b5182bfc2bd80ba99839903f794649310c21f46c3447662d762b1288b5e
-
C:\Users\Admin\AppData\Local\Temp\chromeex.exeMD5
d2c4ad3484a598f0848a7947fc45175f
SHA12c7807352b5ece76d1e0364acdcfce3bc2cd9b72
SHA2561b662d7015e25e2eba4e7b535732df5310c28ddd80797c260eebadfed1a1197d
SHA512366f15e329de3e504cc2a91e17129377b07815f19cd849e30d776eadac0ad3d57f5b8b5182bfc2bd80ba99839903f794649310c21f46c3447662d762b1288b5e
-
C:\Users\Admin\AppData\Local\Temp\tmp453E.tmpMD5
0cefb57387f65bda3ee6d0034cfe569e
SHA1afb981ce16bb7884a4fe7067bab9805124ab495a
SHA256eac6f8c6c3f888ae5dfc9758b28798b92679194eb87a69f284e3bb36627481aa
SHA512de17d68c1d157cbca34db601e55280e6bd167857c3da0f1ae419ae484589a1fa7dc886ec42c0b09eadb195482af52b7d77e6d33df5cd8b85c7ec899eeb79644a
-
C:\Users\Admin\AppData\Local\Temp\tmp80D4.tmpMD5
0cefb57387f65bda3ee6d0034cfe569e
SHA1afb981ce16bb7884a4fe7067bab9805124ab495a
SHA256eac6f8c6c3f888ae5dfc9758b28798b92679194eb87a69f284e3bb36627481aa
SHA512de17d68c1d157cbca34db601e55280e6bd167857c3da0f1ae419ae484589a1fa7dc886ec42c0b09eadb195482af52b7d77e6d33df5cd8b85c7ec899eeb79644a
-
C:\Users\Admin\AppData\Local\Temp\tmp9E7E.tmp.batMD5
c036fe3298879b04e0a0054e51e13df6
SHA172d4aae9043a37c7d39c5db47548a175a8439fe9
SHA25656a5a1d5d7eba76c91bdac7dc2d34efa8e8b579681f00ca2ed5c60bc4275b9b8
SHA5121880dd365c479eb9b3585e913378e461e9f3cdf0fa0402118e5b53294cfe33fbe7b5b5a3ce754c7974894b48f12b34e8ae40380436caed61f6270267cd0eb0b1
-
memory/856-605-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/856-611-0x0000000006F00000-0x0000000006F7E000-memory.dmpFilesize
504KB
-
memory/856-612-0x0000000007060000-0x000000000707E000-memory.dmpFilesize
120KB
-
memory/856-613-0x0000000007160000-0x00000000074B0000-memory.dmpFilesize
3.3MB
-
memory/856-614-0x00000000070D0000-0x00000000070DA000-memory.dmpFilesize
40KB
-
memory/856-615-0x0000000007520000-0x00000000075B0000-memory.dmpFilesize
576KB
-
memory/856-616-0x00000000076C0000-0x0000000007720000-memory.dmpFilesize
384KB
-
memory/856-617-0x0000000007720000-0x000000000776B000-memory.dmpFilesize
300KB
-
memory/856-618-0x0000000007110000-0x0000000007132000-memory.dmpFilesize
136KB
-
memory/1720-149-0x000000007F020000-0x000000007F021000-memory.dmpFilesize
4KB
-
memory/1720-148-0x0000000005910000-0x0000000005E0E000-memory.dmpFilesize
5.0MB
-
memory/2608-383-0x0000000008440000-0x000000000848B000-memory.dmpFilesize
300KB
-
memory/2608-470-0x0000000007153000-0x0000000007154000-memory.dmpFilesize
4KB
-
memory/2608-384-0x0000000007150000-0x0000000007151000-memory.dmpFilesize
4KB
-
memory/2608-385-0x0000000007152000-0x0000000007153000-memory.dmpFilesize
4KB
-
memory/2608-398-0x0000000009960000-0x0000000009A05000-memory.dmpFilesize
660KB
-
memory/2608-469-0x000000007EB30000-0x000000007EB31000-memory.dmpFilesize
4KB
-
memory/3676-118-0x0000000005690000-0x0000000005691000-memory.dmpFilesize
4KB
-
memory/3676-121-0x0000000005BD0000-0x0000000005BDE000-memory.dmpFilesize
56KB
-
memory/3676-122-0x000000007EC20000-0x000000007EC21000-memory.dmpFilesize
4KB
-
memory/3676-123-0x0000000006690000-0x0000000006710000-memory.dmpFilesize
512KB
-
memory/3676-120-0x0000000005A20000-0x0000000005ABC000-memory.dmpFilesize
624KB
-
memory/3676-119-0x00000000056E0000-0x00000000056EA000-memory.dmpFilesize
40KB
-
memory/3676-115-0x0000000000DE0000-0x0000000000E94000-memory.dmpFilesize
720KB
-
memory/3676-117-0x0000000005780000-0x0000000005812000-memory.dmpFilesize
584KB
-
memory/3676-116-0x0000000005BE0000-0x00000000060DE000-memory.dmpFilesize
5.0MB
-
memory/4420-155-0x0000000009820000-0x000000000983E000-memory.dmpFilesize
120KB
-
memory/4420-160-0x0000000009BB0000-0x0000000009C55000-memory.dmpFilesize
660KB
-
memory/4420-132-0x0000000007910000-0x0000000007F38000-memory.dmpFilesize
6.2MB
-
memory/4420-138-0x00000000078F0000-0x000000000790C000-memory.dmpFilesize
112KB
-
memory/4420-128-0x00000000072D0000-0x00000000072D1000-memory.dmpFilesize
4KB
-
memory/4420-129-0x00000000072D2000-0x00000000072D3000-memory.dmpFilesize
4KB
-
memory/4420-361-0x0000000009750000-0x0000000009758000-memory.dmpFilesize
32KB
-
memory/4420-356-0x0000000009760000-0x000000000977A000-memory.dmpFilesize
104KB
-
memory/4420-163-0x00000000072D3000-0x00000000072D4000-memory.dmpFilesize
4KB
-
memory/4420-162-0x000000007F8E0000-0x000000007F8E1000-memory.dmpFilesize
4KB
-
memory/4420-161-0x0000000009D50000-0x0000000009DE4000-memory.dmpFilesize
592KB
-
memory/4420-133-0x00000000076E0000-0x0000000007702000-memory.dmpFilesize
136KB
-
memory/4420-126-0x00000000071B0000-0x00000000071E6000-memory.dmpFilesize
216KB
-
memory/4420-139-0x0000000008050000-0x000000000809B000-memory.dmpFilesize
300KB
-
memory/4420-154-0x0000000009A80000-0x0000000009AB3000-memory.dmpFilesize
204KB
-
memory/4420-134-0x0000000007880000-0x00000000078E6000-memory.dmpFilesize
408KB
-
memory/4420-135-0x0000000008220000-0x0000000008286000-memory.dmpFilesize
408KB
-
memory/4420-136-0x0000000008290000-0x00000000085E0000-memory.dmpFilesize
3.3MB
-
memory/4420-141-0x00000000089D0000-0x0000000008A46000-memory.dmpFilesize
472KB
-
memory/4504-137-0x0000000005250000-0x0000000005251000-memory.dmpFilesize
4KB
-
memory/4504-130-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB