Analysis

  • max time kernel
    122s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2023 17:12

General

  • Target

    4F67BD027CBC6AE58D42777050C8F103.exe

  • Size

    100KB

  • MD5

    4f67bd027cbc6ae58d42777050c8f103

  • SHA1

    12c402049cb4a6f92d5c00cc5cc926a15763df88

  • SHA256

    a5b7a0f311693383814b25bbc0779e9a3fd4c56fb5d0aef6af3e4ff49926b6e2

  • SHA512

    6efcc23e9b6abb0943a513de153744fb97fc923d87c4b392d0a2514fb85190a38479c99a85cef00c38b4663984e0fcfee40bbacbffb72482f072cd0167c48a38

  • SSDEEP

    3072:hugTTcIb25skDy3bCinN90uHQbPRyZ2pPYjq:hugZK5O3bxzD8AZ2j

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

github

C2

trbe.mentality.cloud:6606

trbe.mentality.cloud:7707

trbe.mentality.cloud:8808

Mutex

KAtgcMRAwDz0

Attributes
  • delay

    3

  • install

    true

  • install_file

    Printer.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect ZGRat V1 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Async RAT payload 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Detects Pyinstaller 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4F67BD027CBC6AE58D42777050C8F103.exe
    "C:\Users\Admin\AppData\Local\Temp\4F67BD027CBC6AE58D42777050C8F103.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Printer" /tr '"C:\Users\Admin\AppData\Local\Temp\Printer.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "Printer" /tr '"C:\Users\Admin\AppData\Local\Temp\Printer.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:2676
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1AE0.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2996
      • C:\Users\Admin\AppData\Local\Temp\Printer.exe
        "C:\Users\Admin\AppData\Local\Temp\Printer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2968
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe"'
            5⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2036
            • C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe
              "C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1884
              • C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe
                "C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:3032

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab36EA.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Printer.exe
    Filesize

    100KB

    MD5

    4f67bd027cbc6ae58d42777050c8f103

    SHA1

    12c402049cb4a6f92d5c00cc5cc926a15763df88

    SHA256

    a5b7a0f311693383814b25bbc0779e9a3fd4c56fb5d0aef6af3e4ff49926b6e2

    SHA512

    6efcc23e9b6abb0943a513de153744fb97fc923d87c4b392d0a2514fb85190a38479c99a85cef00c38b4663984e0fcfee40bbacbffb72482f072cd0167c48a38

  • C:\Users\Admin\AppData\Local\Temp\Printer.exe
    Filesize

    100KB

    MD5

    4f67bd027cbc6ae58d42777050c8f103

    SHA1

    12c402049cb4a6f92d5c00cc5cc926a15763df88

    SHA256

    a5b7a0f311693383814b25bbc0779e9a3fd4c56fb5d0aef6af3e4ff49926b6e2

    SHA512

    6efcc23e9b6abb0943a513de153744fb97fc923d87c4b392d0a2514fb85190a38479c99a85cef00c38b4663984e0fcfee40bbacbffb72482f072cd0167c48a38

  • C:\Users\Admin\AppData\Local\Temp\TarCA56.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-file-l1-2-0.dll
    Filesize

    21KB

    MD5

    bcb8b9f6606d4094270b6d9b2ed92139

    SHA1

    bd55e985db649eadcb444857beed397362a2ba7b

    SHA256

    fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118

    SHA512

    869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

  • C:\Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-file-l2-1-0.dll
    Filesize

    18KB

    MD5

    bfffa7117fd9b1622c66d949bac3f1d7

    SHA1

    402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

    SHA256

    1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

    SHA512

    b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

  • C:\Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-localization-l1-2-0.dll
    Filesize

    21KB

    MD5

    20ddf543a1abe7aee845de1ec1d3aa8e

    SHA1

    0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf

    SHA256

    d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8

    SHA512

    96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

  • C:\Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-processthreads-l1-1-1.dll
    Filesize

    21KB

    MD5

    4380d56a3b83ca19ea269747c9b8302b

    SHA1

    0c4427f6f0f367d180d37fc10ecbe6534ef6469c

    SHA256

    a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a

    SHA512

    1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

  • C:\Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-timezone-l1-1-0.dll
    Filesize

    21KB

    MD5

    2554060f26e548a089cab427990aacdf

    SHA1

    8cc7a44a16d6b0a6b7ed444e68990ff296d712fe

    SHA256

    5ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044

    SHA512

    fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506

  • C:\Users\Admin\AppData\Local\Temp\_MEI18842\python312.dll
    Filesize

    1.7MB

    MD5

    552ef97cdbebf443304b7514bb50e950

    SHA1

    8d5f5286ee7d4d64ebefb99ea48a5d88ad2e38cc

    SHA256

    888b1eea6ffed7188cb3b82558267fc6fdd3930ea98c9f6801bcb728b02ed538

    SHA512

    c8f0e960831b0bb2bffd5f3d490086002b74499d863488e515d7b755e01e97bc967dce7b211f059ce6046dc6f8f694140456046ba2773903f4b32d7ab38fc325

  • C:\Users\Admin\AppData\Local\Temp\_MEI18842\ucrtbase.dll
    Filesize

    992KB

    MD5

    0e0bac3d1dcc1833eae4e3e4cf83c4ef

    SHA1

    4189f4459c54e69c6d3155a82524bda7549a75a6

    SHA256

    8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

    SHA512

    a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

  • C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe
    Filesize

    16.1MB

    MD5

    da65b400a9db36a83ccb6d34dda5dafd

    SHA1

    f54355017d58c6b1b5e7c5dd4348a4791ba4bc66

    SHA256

    a148f4f90791631814e5950c9b3fb954e5d466ee79f63cd4530b724b55f6e463

    SHA512

    a35e7b408b865083a24c843aae7a1e070936c6972930ababecb15eab1c47b414820f9219abdea897548304ea28092b30a5658b00b8197227d3db0a9786566ac7

  • C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe
    Filesize

    16.1MB

    MD5

    da65b400a9db36a83ccb6d34dda5dafd

    SHA1

    f54355017d58c6b1b5e7c5dd4348a4791ba4bc66

    SHA256

    a148f4f90791631814e5950c9b3fb954e5d466ee79f63cd4530b724b55f6e463

    SHA512

    a35e7b408b865083a24c843aae7a1e070936c6972930ababecb15eab1c47b414820f9219abdea897548304ea28092b30a5658b00b8197227d3db0a9786566ac7

  • C:\Users\Admin\AppData\Local\Temp\ifmjsl.exe
    Filesize

    16.1MB

    MD5

    da65b400a9db36a83ccb6d34dda5dafd

    SHA1

    f54355017d58c6b1b5e7c5dd4348a4791ba4bc66

    SHA256

    a148f4f90791631814e5950c9b3fb954e5d466ee79f63cd4530b724b55f6e463

    SHA512

    a35e7b408b865083a24c843aae7a1e070936c6972930ababecb15eab1c47b414820f9219abdea897548304ea28092b30a5658b00b8197227d3db0a9786566ac7

  • C:\Users\Admin\AppData\Local\Temp\tmp1AE0.tmp.bat
    Filesize

    154B

    MD5

    3ba13fe3d9fccf45d633f63bbf73141c

    SHA1

    662df0f3c0ed59766add5ab0256c1191a93f4f50

    SHA256

    6f05b41bb8dfb60b07f38388548b299bc3385d86acfe631e328a377007fafbee

    SHA512

    662a0b966d8f7c2012e198f2a2d717624f05b878817cea71e89cd2e2408cb1e85dc8ae83dc0133542c5dae6652e52f22fc10fa7fff377086217002108c603c64

  • C:\Users\Admin\AppData\Local\Temp\tmp1AE0.tmp.bat
    Filesize

    154B

    MD5

    3ba13fe3d9fccf45d633f63bbf73141c

    SHA1

    662df0f3c0ed59766add5ab0256c1191a93f4f50

    SHA256

    6f05b41bb8dfb60b07f38388548b299bc3385d86acfe631e328a377007fafbee

    SHA512

    662a0b966d8f7c2012e198f2a2d717624f05b878817cea71e89cd2e2408cb1e85dc8ae83dc0133542c5dae6652e52f22fc10fa7fff377086217002108c603c64

  • \Users\Admin\AppData\Local\Temp\Printer.exe
    Filesize

    100KB

    MD5

    4f67bd027cbc6ae58d42777050c8f103

    SHA1

    12c402049cb4a6f92d5c00cc5cc926a15763df88

    SHA256

    a5b7a0f311693383814b25bbc0779e9a3fd4c56fb5d0aef6af3e4ff49926b6e2

    SHA512

    6efcc23e9b6abb0943a513de153744fb97fc923d87c4b392d0a2514fb85190a38479c99a85cef00c38b4663984e0fcfee40bbacbffb72482f072cd0167c48a38

  • \Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-file-l1-2-0.dll
    Filesize

    21KB

    MD5

    bcb8b9f6606d4094270b6d9b2ed92139

    SHA1

    bd55e985db649eadcb444857beed397362a2ba7b

    SHA256

    fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118

    SHA512

    869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

  • \Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-file-l2-1-0.dll
    Filesize

    18KB

    MD5

    bfffa7117fd9b1622c66d949bac3f1d7

    SHA1

    402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

    SHA256

    1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

    SHA512

    b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

  • \Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-localization-l1-2-0.dll
    Filesize

    21KB

    MD5

    20ddf543a1abe7aee845de1ec1d3aa8e

    SHA1

    0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf

    SHA256

    d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8

    SHA512

    96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

  • \Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-processthreads-l1-1-1.dll
    Filesize

    21KB

    MD5

    4380d56a3b83ca19ea269747c9b8302b

    SHA1

    0c4427f6f0f367d180d37fc10ecbe6534ef6469c

    SHA256

    a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a

    SHA512

    1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

  • \Users\Admin\AppData\Local\Temp\_MEI18842\api-ms-win-core-timezone-l1-1-0.dll
    Filesize

    21KB

    MD5

    2554060f26e548a089cab427990aacdf

    SHA1

    8cc7a44a16d6b0a6b7ed444e68990ff296d712fe

    SHA256

    5ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044

    SHA512

    fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506

  • \Users\Admin\AppData\Local\Temp\_MEI18842\python312.dll
    Filesize

    1.7MB

    MD5

    552ef97cdbebf443304b7514bb50e950

    SHA1

    8d5f5286ee7d4d64ebefb99ea48a5d88ad2e38cc

    SHA256

    888b1eea6ffed7188cb3b82558267fc6fdd3930ea98c9f6801bcb728b02ed538

    SHA512

    c8f0e960831b0bb2bffd5f3d490086002b74499d863488e515d7b755e01e97bc967dce7b211f059ce6046dc6f8f694140456046ba2773903f4b32d7ab38fc325

  • \Users\Admin\AppData\Local\Temp\_MEI18842\ucrtbase.dll
    Filesize

    992KB

    MD5

    0e0bac3d1dcc1833eae4e3e4cf83c4ef

    SHA1

    4189f4459c54e69c6d3155a82524bda7549a75a6

    SHA256

    8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

    SHA512

    a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

  • \Users\Admin\AppData\Local\Temp\ifmjsl.exe
    Filesize

    16.1MB

    MD5

    da65b400a9db36a83ccb6d34dda5dafd

    SHA1

    f54355017d58c6b1b5e7c5dd4348a4791ba4bc66

    SHA256

    a148f4f90791631814e5950c9b3fb954e5d466ee79f63cd4530b724b55f6e463

    SHA512

    a35e7b408b865083a24c843aae7a1e070936c6972930ababecb15eab1c47b414820f9219abdea897548304ea28092b30a5658b00b8197227d3db0a9786566ac7

  • \Users\Admin\AppData\Local\Temp\ifmjsl.exe
    Filesize

    16.1MB

    MD5

    da65b400a9db36a83ccb6d34dda5dafd

    SHA1

    f54355017d58c6b1b5e7c5dd4348a4791ba4bc66

    SHA256

    a148f4f90791631814e5950c9b3fb954e5d466ee79f63cd4530b724b55f6e463

    SHA512

    a35e7b408b865083a24c843aae7a1e070936c6972930ababecb15eab1c47b414820f9219abdea897548304ea28092b30a5658b00b8197227d3db0a9786566ac7

  • \Users\Admin\AppData\Local\Temp\ifmjsl.exe
    Filesize

    16.1MB

    MD5

    da65b400a9db36a83ccb6d34dda5dafd

    SHA1

    f54355017d58c6b1b5e7c5dd4348a4791ba4bc66

    SHA256

    a148f4f90791631814e5950c9b3fb954e5d466ee79f63cd4530b724b55f6e463

    SHA512

    a35e7b408b865083a24c843aae7a1e070936c6972930ababecb15eab1c47b414820f9219abdea897548304ea28092b30a5658b00b8197227d3db0a9786566ac7

  • \Users\Admin\AppData\Local\Temp\ifmjsl.exe
    Filesize

    16.1MB

    MD5

    da65b400a9db36a83ccb6d34dda5dafd

    SHA1

    f54355017d58c6b1b5e7c5dd4348a4791ba4bc66

    SHA256

    a148f4f90791631814e5950c9b3fb954e5d466ee79f63cd4530b724b55f6e463

    SHA512

    a35e7b408b865083a24c843aae7a1e070936c6972930ababecb15eab1c47b414820f9219abdea897548304ea28092b30a5658b00b8197227d3db0a9786566ac7

  • memory/2008-58-0x00000000009B0000-0x00000000009BA000-memory.dmp
    Filesize

    40KB

  • memory/2008-38-0x0000000005C70000-0x0000000005CD2000-memory.dmp
    Filesize

    392KB

  • memory/2008-17-0x0000000073EF0000-0x00000000745DE000-memory.dmp
    Filesize

    6.9MB

  • memory/2008-18-0x0000000004AD0000-0x0000000004B10000-memory.dmp
    Filesize

    256KB

  • memory/2008-35-0x0000000073EF0000-0x00000000745DE000-memory.dmp
    Filesize

    6.9MB

  • memory/2008-36-0x0000000004AD0000-0x0000000004B10000-memory.dmp
    Filesize

    256KB

  • memory/2008-37-0x00000000004D0000-0x000000000056C000-memory.dmp
    Filesize

    624KB

  • memory/2008-16-0x0000000000CC0000-0x0000000000CE0000-memory.dmp
    Filesize

    128KB

  • memory/2008-57-0x00000000045D0000-0x0000000004610000-memory.dmp
    Filesize

    256KB

  • memory/2036-80-0x000000006E580000-0x000000006EB2B000-memory.dmp
    Filesize

    5.7MB

  • memory/2036-118-0x000000006E580000-0x000000006EB2B000-memory.dmp
    Filesize

    5.7MB

  • memory/2036-81-0x0000000001D20000-0x0000000001D60000-memory.dmp
    Filesize

    256KB

  • memory/2036-82-0x000000006E580000-0x000000006EB2B000-memory.dmp
    Filesize

    5.7MB

  • memory/2036-84-0x0000000001D20000-0x0000000001D60000-memory.dmp
    Filesize

    256KB

  • memory/2036-83-0x0000000001D20000-0x0000000001D60000-memory.dmp
    Filesize

    256KB

  • memory/2652-0-0x0000000000810000-0x0000000000830000-memory.dmp
    Filesize

    128KB

  • memory/2652-12-0x0000000073F40000-0x000000007462E000-memory.dmp
    Filesize

    6.9MB

  • memory/2652-2-0x0000000004440000-0x0000000004480000-memory.dmp
    Filesize

    256KB

  • memory/2652-1-0x0000000073F40000-0x000000007462E000-memory.dmp
    Filesize

    6.9MB

  • memory/3032-232-0x000007FEF4F60000-0x000007FEF5630000-memory.dmp
    Filesize

    6.8MB