Malware Analysis Report

2025-06-16 06:19

Sample ID 240106-x3snnaffb3
Target 470009d741e322fe3c1325400818adb1
SHA256 3037bc78a5195bafc18d9b77704137680db76d2261895e96d876753bb2598b43
Tags
zgrat rat agenttesla nanocore keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3037bc78a5195bafc18d9b77704137680db76d2261895e96d876753bb2598b43

Threat Level: Known bad

The file 470009d741e322fe3c1325400818adb1 was found to be: Known bad.

Malicious Activity Summary

zgrat rat agenttesla nanocore keylogger persistence spyware stealer trojan

Modifies WinLogon for persistence

AgentTesla

NanoCore

Detect ZGRat V1

ZGRat

AgentTesla payload

Executes dropped EXE

Checks computer location settings

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-06 19:23

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-06 19:23

Reported

2024-01-06 19:25

Platform

win7-20231215-en

Max time kernel

0s

Max time network

151s

Command Line

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\470009d741e322fe3c1325400818adb1.vbs"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2996 wrote to memory of 2380 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\file.exe
PID 2996 wrote to memory of 2380 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\file.exe
PID 2996 wrote to memory of 2380 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\file.exe
PID 2996 wrote to memory of 2380 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\file.exe

Processes

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\470009d741e322fe3c1325400818adb1.vbs"

C:\Users\Admin\AppData\Local\Temp\name.exe

"C:\Users\Admin\AppData\Local\Temp\name.exe"

C:\Users\Admin\AppData\Local\Temp\file.exe

"C:\Users\Admin\AppData\Local\Temp\file.exe"

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 sys2021.linkpc.net udp
SG 139.99.66.103:11940 sys2021.linkpc.net tcp

Files

memory/2744-13-0x00000000001A0000-0x0000000000266000-memory.dmp

memory/2380-12-0x0000000000980000-0x0000000000A40000-memory.dmp

memory/2380-14-0x0000000074B90000-0x000000007527E000-memory.dmp

memory/2744-15-0x0000000074B90000-0x000000007527E000-memory.dmp

memory/2744-17-0x0000000004A20000-0x0000000004A60000-memory.dmp

memory/2380-16-0x00000000049A0000-0x00000000049E0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\file.exe

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2744-19-0x0000000004E60000-0x0000000004EC8000-memory.dmp

memory/2380-18-0x0000000005120000-0x0000000005180000-memory.dmp

memory/2380-21-0x0000000008290000-0x000000000830C000-memory.dmp

memory/2744-20-0x0000000006720000-0x000000000678C000-memory.dmp

memory/2380-25-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-24-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-23-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-29-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-28-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-33-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-32-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-37-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2744-41-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-44-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-45-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-40-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-49-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-48-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-53-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-52-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-57-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2744-61-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-60-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-65-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-64-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-69-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2744-73-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-77-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2380-82-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2380-87-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-86-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2744-85-0x0000000074B90000-0x000000007527E000-memory.dmp

memory/2744-81-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-80-0x0000000074B90000-0x000000007527E000-memory.dmp

memory/2744-76-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2380-72-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2380-68-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2380-56-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2380-36-0x0000000008290000-0x0000000008306000-memory.dmp

memory/2744-22-0x0000000006720000-0x0000000006787000-memory.dmp

memory/2744-389-0x0000000004A20000-0x0000000004A60000-memory.dmp

memory/2380-384-0x00000000049A0000-0x00000000049E0000-memory.dmp

memory/2744-2439-0x0000000074B90000-0x000000007527E000-memory.dmp

memory/2036-2440-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2036-2441-0x0000000074B90000-0x000000007527E000-memory.dmp

memory/2036-2446-0x0000000000620000-0x000000000063E000-memory.dmp

memory/2036-2447-0x0000000000640000-0x000000000064A000-memory.dmp

memory/2036-2445-0x0000000000610000-0x000000000061A000-memory.dmp

memory/2036-2442-0x0000000004FA0000-0x0000000004FE0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-06 19:23

Reported

2024-01-06 19:25

Platform

win10v2004-20231215-en

Max time kernel

138s

Max time network

143s

Command Line

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\470009d741e322fe3c1325400818adb1.vbs"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Chromes64\\Explorer64.exe\"," C:\Users\Admin\AppData\Local\Temp\name.exe N/A

NanoCore

keylogger trojan stealer spyware nanocore

ZGRat

rat zgrat

AgentTesla payload

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation C:\Windows\System32\WScript.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\file.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\name.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\name.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 384 set thread context of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\name.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\name.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\name.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2808 wrote to memory of 4152 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\file.exe
PID 2808 wrote to memory of 4152 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\file.exe
PID 2808 wrote to memory of 4152 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\file.exe
PID 2808 wrote to memory of 384 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 2808 wrote to memory of 384 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 2808 wrote to memory of 384 N/A C:\Windows\System32\WScript.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 384 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 384 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 384 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 384 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 384 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 384 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 384 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe
PID 384 wrote to memory of 4476 N/A C:\Users\Admin\AppData\Local\Temp\name.exe C:\Users\Admin\AppData\Local\Temp\name.exe

Processes

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\470009d741e322fe3c1325400818adb1.vbs"

C:\Users\Admin\AppData\Local\Temp\file.exe

"C:\Users\Admin\AppData\Local\Temp\file.exe"

C:\Users\Admin\AppData\Local\Temp\name.exe

"C:\Users\Admin\AppData\Local\Temp\name.exe"

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\name.exe

C:\Users\Admin\AppData\Local\Temp\file.exe

C:\Users\Admin\AppData\Local\Temp\file.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 21.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 48.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 178.113.50.184.in-addr.arpa udp
US 8.8.8.8:53 205.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 183.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 196.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 28.160.77.104.in-addr.arpa udp
US 8.8.8.8:53 68.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 sys2021.linkpc.net udp

Files

memory/4152-24-0x0000000000270000-0x0000000000330000-memory.dmp

memory/4152-26-0x0000000074AB0000-0x0000000075260000-memory.dmp

memory/384-27-0x0000000005980000-0x0000000005A12000-memory.dmp

memory/384-25-0x0000000005F30000-0x00000000064D4000-memory.dmp

memory/4152-28-0x0000000004F30000-0x0000000004F40000-memory.dmp

memory/384-30-0x0000000005960000-0x000000000596A000-memory.dmp

memory/384-29-0x0000000005AB0000-0x0000000005AC0000-memory.dmp

memory/384-23-0x0000000074AB0000-0x0000000075260000-memory.dmp

memory/384-22-0x0000000000FE0000-0x00000000010A6000-memory.dmp

memory/384-32-0x0000000006C60000-0x0000000006CC8000-memory.dmp

memory/4152-34-0x0000000007670000-0x00000000076EC000-memory.dmp

memory/4152-35-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/4152-37-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-42-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-41-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/4152-45-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-50-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-49-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-53-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/384-57-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-58-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-62-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-66-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-65-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-70-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-69-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-74-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-73-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-78-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/4152-82-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-86-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-85-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/4152-91-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-96-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/384-100-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-99-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/4152-95-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/4152-93-0x0000000074AB0000-0x0000000075260000-memory.dmp

memory/384-90-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/384-89-0x0000000074AB0000-0x0000000075260000-memory.dmp

memory/384-81-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/384-77-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/4152-61-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/4152-54-0x0000000007670000-0x00000000076E6000-memory.dmp

memory/384-46-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/384-38-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/384-36-0x00000000082D0000-0x0000000008337000-memory.dmp

memory/384-33-0x00000000082D0000-0x000000000833C000-memory.dmp

memory/4152-31-0x0000000005F90000-0x0000000005FF0000-memory.dmp

memory/4152-397-0x0000000004F30000-0x0000000004F40000-memory.dmp

memory/384-400-0x0000000005AB0000-0x0000000005AC0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\name.exe.log

MD5 7ebe314bf617dc3e48b995a6c352740c
SHA1 538f643b7b30f9231a3035c448607f767527a870
SHA256 48178f884b8a4dd96e330b210b0530667d9473a7629fc6b4ad12b614bf438ee8
SHA512 0ba9d8f4244c15285e254d27b4bff7c49344ff845c48bc0bf0d8563072fab4d6f7a6abe6b6742e8375a08e9a3b3e5d5dc4937ab428dbe2dd8e62892fda04507e

memory/4476-4243-0x0000000074AB0000-0x0000000075260000-memory.dmp

memory/384-4245-0x0000000074AB0000-0x0000000075260000-memory.dmp

memory/4476-4246-0x00000000058E0000-0x000000000597C000-memory.dmp

memory/4476-4247-0x0000000005AC0000-0x0000000005AD0000-memory.dmp

memory/4476-4244-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\name.exe

MD5 843b05b31229171651f06a8e6c92a2de
SHA1 25ff3a13a7766197486cf50b9e659b73baa4fced
SHA256 e5636d46ceb380625fb6b1a22cad3877efc8af5e030c48e31ea73a8942f44705
SHA512 740b50424e64a1c77f01b41f1a7686d674d9326b238fcf10cfb163f1b12854bf864d6ff96b07133699650129f47ef7ce74f41fb0f0a4f03c751d3c10dd29196c

memory/4476-4251-0x00000000065B0000-0x00000000065CE000-memory.dmp

memory/4476-4252-0x00000000066E0000-0x00000000066EA000-memory.dmp

memory/4476-4250-0x0000000005C20000-0x0000000005C2A000-memory.dmp

memory/4152-4259-0x0000000074AB0000-0x0000000075260000-memory.dmp

memory/2456-4261-0x0000000000400000-0x000000000043C000-memory.dmp

memory/2456-4262-0x0000000005430000-0x0000000005440000-memory.dmp

memory/2456-4260-0x0000000074AB0000-0x0000000075260000-memory.dmp

memory/2456-4263-0x00000000056A0000-0x00000000056B8000-memory.dmp

memory/2456-4264-0x0000000006420000-0x0000000006486000-memory.dmp