Analysis

  • max time kernel
    122s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-03-2024 04:09

General

  • Target

    b04a7dfc482d9c482b4ad451981c4877.exe

  • Size

    966KB

  • MD5

    b04a7dfc482d9c482b4ad451981c4877

  • SHA1

    983214617489385f7cef88d5a31243f00ecfe956

  • SHA256

    f0672721757410417542f5e03ef7e7a61963e4dc65a1c6eaee0698d58ca858aa

  • SHA512

    97b735cc0b55418aee5dc172b8ccf7647b6385eb3394fcd6fe4ce6e98618034648069c85a30647ce45d40915df62d5f4f49d6c19afd8067b2a44651295010d9f

  • SSDEEP

    24576:FybH9902UaaqizC57mwRkz2MS9/+/nIBQL:F6dllOC5LRi2R2/nP

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

SYSTEM

C2

UpdateServicer.ignorelist.com:6969

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    10

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b04a7dfc482d9c482b4ad451981c4877.exe
    "C:\Users\Admin\AppData\Local\Temp\b04a7dfc482d9c482b4ad451981c4877.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\attrib.exe
      "C:\Windows\System32\attrib.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Views/modifies file attributes
      PID:1644
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=attrib.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2392

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C
    Filesize

    579B

    MD5

    f55da450a5fb287e1e0f0dcc965756ca

    SHA1

    7e04de896a3e666d00e687d33ffad93be83d349e

    SHA256

    31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

    SHA512

    19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
    Filesize

    252B

    MD5

    d16d317a7fc7d6f747111b7e29b85c2d

    SHA1

    9d70074521d78134fbc3866f379eb7a4ff939af0

    SHA256

    2f9570a8c7797737a64d980f3835f35e8589b96b6cf4a3cb0beab5fd00c61c3b

    SHA512

    396e311283da085b685a032077239431557ec436efa6bd6bd2e6ee0ef0aa193c55ac73f938ac4523689d6635078fd49e2aa53cee994fc3ce60d178b57cce1def

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c3bf751c32573c09b90a6448102c9417

    SHA1

    17625653d93ee3e16b1f96b647cf5fede4d267ec

    SHA256

    455af0d56d92777c337c3f753c8d9b9c363bd1c642baa2aee542c5611a42d446

    SHA512

    61daa8eb0d5021bd36b4fc656ac13ad42f640e5f36cbdfcf313f0b5fa029db56cc030bb666cd9d37833809ada2eb594d20900d26955d10726bd9ff4668872e52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    96d0f7f0408eaf0bdbb01e0aac0db16c

    SHA1

    171493b8dc6092fc836f57398177a025959810ee

    SHA256

    2a66f0f593437bec26838778e2c58be02334e704d1b60f4b4ac2366fefcc4852

    SHA512

    932796369eec8f6784369e8e5cb1c6e2db3566ea39abd7ff576902003448919a99410831b1b88195bde641152459543cf002c8aa9ad733d3a0d293bb0680f584

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    224eba9aa88b4f0e0315c5f9a14a4e0b

    SHA1

    6ea44c3132bcba5a9020e2b2eba1d1c7678e8d29

    SHA256

    0006c014ba68687a123d45823c339a715e81257deb963e73b4f5bf252a13bfef

    SHA512

    3b227d3e483e1268f705e27dd1291b0eeb6b30080b3c5b7fe67990af7475a968e3bbc443c2894d557a4d862faaadd0270700658f1f22183d5ae3acee82f6e42d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d39e3535ce2af63adaee5ad2732d9806

    SHA1

    e4453305b7b8b5128acb9b06bfee5704cda4c0c2

    SHA256

    36b2209824228c458a1fa2f26408a7794de251832c28d3509d62668c6b76d2ee

    SHA512

    473f59bdec1c1dbd5d7e208c1486b2dabc264d99e6fe0128290ca4947073b6a1db776e3e8f6a5fb40a8ae9636b2a759f86a83910423ad85c5e9aa1f0a35fdc76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    baa768d57c42e0ea8b9cd3b00c7fcbf5

    SHA1

    ccb7f0038b3a14d3868bd018fa78a7023b831484

    SHA256

    a5108c76bd0b2942418b0dc43d80b561628d1e8aea5f185a5e0a20620323a0dc

    SHA512

    e809ca1e4b61fea98611f95179827d3eba3d6f903130d47f4bba1f4c161c865c4ee48e4a9a8e5f4d8f48aca5c36e5baf55624663561a15ca950bd96e76f57ba2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ef2acc9ddd114779e9d182eeeab09770

    SHA1

    fdb7884fb20fda7f7e03a1f26910587766a356f1

    SHA256

    9f7b6b43a82f652ed9e8b73e03c10911fc9afc7ac00dfe33d8b7d1979f5ff969

    SHA512

    aef15b8fda13c81f84012bb595dc92a5a560d23618b8892742490ccb2f5e9d8e4f63da29017b73b045c099391c7cdd979bcc77186230535027a5af6c0e2ca6f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    815ce5eb5fe6f1eabc94b1c491308eda

    SHA1

    f69e8ea41cb9a1114f7ebb927e51097e006ac851

    SHA256

    477775b66a4b3c018dae25f98463723150f9cf99b7a0a3751547970e6b7a7a52

    SHA512

    4271f99f66b0adeff54e1c4f9cf292ae0ba129710bd35e572cafbae6c07341381a8c0e00387fed0225e6d0ab935deedd3f229ca4e45566998a7467af906f4f66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    38932437fe5599e2cce8192bc9e851c5

    SHA1

    9c92b40cb80e2e7c7c0665b17aa9ffaa184e0e36

    SHA256

    7129d682a2931c81a926dc0370a10586e3a5d805fda69eb4bc1705cf3be99423

    SHA512

    ecfff14121daca2890dd6418e3d7d0796bdc52d6ae3712f602ed6a2864466d34eea3ab97cf27c6d95bb846942c9cb5d668e527d6d44a6e9952ca430935b3557c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    87fe770c58dba3f5a3588b66cbf1bf9d

    SHA1

    ea4e009812545b2fce17bc29d660fb338d879ac2

    SHA256

    ef961d52f82b466954202e680d59fa47db10321c928809ccde11d113816716b8

    SHA512

    f8b1ea5ecf31ec89a3f81959ddacd5770517dd962b56712df8b452dc54b94001704457e63b2c1d4dc5cf3625d050687b51e5b29592a6d30d70e47d090c29209b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0f6a591d853b83ef88a3f9e644e99c6d

    SHA1

    a0d140330fc996a024d1cca191752c2ad6c03a50

    SHA256

    35ac6795524a96625ed8c38d23dd1fbb8754114ac6e18eef3c01fd86897c3b16

    SHA512

    72b18b3c10e3b57d6e523127d73f96f355b6a523f1f5659ea27034a4b16ddad2d69c2fe81ed7edb002571225788527983f0ba0f0c93f7b2a5ff2e3e41bc1a1a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    057ed769b9392d76f1715dc786ec9466

    SHA1

    dc2c90286ad77fa674c5d5316f7f15dacf894f17

    SHA256

    607deff6a4881631cb06c66e0f65378ceab617997fe7757d4e22eb5c8bda9788

    SHA512

    614bb802d38d648a29d69e000a7137cb83ae5d7c9736d647a27696898a8ea02c42b576caa23d65ac71c8623aa62676f28f22ad31449b2ff113c8fed5afa13870

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6bc302df7902914b69455d9f53a65587

    SHA1

    668b564bf28365b56138b639d0631bc51cfbda5c

    SHA256

    5a996d4c71017e08ffd64e8e750887118b1d80dc0d806e4982add3fb6a3516b7

    SHA512

    ea990c9fb22f9e4f56193dae96d580d97acbc4e8bcae6a178b3bf77d98849cbd829c8438d3fd836cc9bc21d9a23eb20cdadc97170af8206611639ecde9a46380

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8817b75d8f38019a7ea4e66866a46855

    SHA1

    a43e210e6fb8b5dae666d9dda422262489c83a2d

    SHA256

    cd8e1dff7c504af90475aadca974a711a491a65078458080f4c93e6db21550b4

    SHA512

    02b34e923e862de43c7f8362b84f05cebf53017b29190ad053f71007061b43a06c3eb51853776b3f1f2791df678ad5030040694f775e9ee12cc5d820a4f10bbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f627660a00a5b611106f2b5a3e802a37

    SHA1

    059c786f66071c6c21a7b3fc19c3bedfeff23a74

    SHA256

    0579007649410c4c530f8a89f5fadb7e6ec0e5d06f2f174a0b2f3c2c6ced02f3

    SHA512

    c753bdc9a58aff61fec7c8e37a24d334f37f935dee522942c9018709b79048659719013a90ce349657f462efb420b7e862fc6be893b0fbc4f2042f6efd9c7ebb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    abba4ae5b2c07448887dcb209b424776

    SHA1

    de46a575b6f9c49240a06c9d4b50b0009820e6ff

    SHA256

    f0cd95a43cb2d5714dbd2c821c639be7026e69b0af25f1215832330c84bcd7a0

    SHA512

    251dfd09d8b5ecffae95f381b6439864d1a7d7f89f9f80fd9cd08825b4f6163f865d1a6c5ee38bb4c86d68f7d815b5af0d769c0f2ea7b526af220b98d18133e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6ce1d69931bf6bb44190706828cbaebd

    SHA1

    86b4093b3200df7a4c377dd7bb871cb00a16926c

    SHA256

    f2f957b5046ac4a294d56e61ed062d6d0b67248d57e717a9ae232aba2daf838f

    SHA512

    f8d0329858bf90589d0c4391b8c4fa5e67066565505ce1f4cebec4a1408806ae27c8a2024a0bb567f3906a5c9598b24d6d115232de303b1f21d8d183691308c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    265bd236c12b54dca8d17d1257b8620a

    SHA1

    11f3fb544414e17db9cf9abd420a55ef2df27180

    SHA256

    b041af00d5c282ff85346adde5c5e0d07db5aaac14e5ea22127f9a2965604b6b

    SHA512

    ae5096a680651e90a2e7b07ed499c9c1eb8fa9fbffca5b5edb38b7df6a3b56bb86531a62c267f14445a33d836d588d5f7d67c837ad9e64219f113ad3692d82b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3b85bc5fdfb53ca97d9f27e33438c294

    SHA1

    05c6f6f79617a52557a322187422053b81e17d92

    SHA256

    d0c3791210e69b68cdf5f978408fac3d21dbf1b4110f3b086fc39b83bb222f16

    SHA512

    7213c84adc0f15e5b7a855b7517fea4e3a615b312d5183b2fc879be278c7cbc5da935215d0110855bd808c37a45141603a0c9c5ced0c022798f213d7c40a04f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1a8663081852c4bd840296404406f2b9

    SHA1

    670005cddf2bd934f4ac887c0d2c0e1ab7dc973d

    SHA256

    3ca73f25fb853f391cd01dac4b449741c51bc73d626a2132a388399b65cf0635

    SHA512

    8d220180de5ecae0423036974915d584da14d69cbfbba56a6b7c9e8838cb0393275b8dbba8b8a5ed553609d98113a77eefa01c577e9e18c135a4ba45abbca510

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c3a6396ed16fa1225f2da85e41300d16

    SHA1

    cbd33bd93c9e2ab0cc790f5804cb2da0b6491c99

    SHA256

    c8cc82c5b3b4fd86ac533cbcc07f321d6f38c71c5ae880d771ac52d4b7c6acc5

    SHA512

    aedb51791c179972338adac2800115d456d0f880da31c06a5cf5c02b413a7e4fbbcdf0c22eb01dc7ce398197e837c24a463f2016344b21ba5e5295ba19003a95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d1d00429ad623c7de854883350e457b2

    SHA1

    9ace0f77e7f1952f17d11d83b321760999851a90

    SHA256

    cef63c47010ee1321cd280cb2a193891dac3b6f6b00f5b7706e0d4c3a6fe06c8

    SHA512

    c574d7ba1a26b3d755ebeae3cc3267930466a19a11ea11d42f892bda04ab2d0d8bfd4780dbcd9cc5944e706a647237ab5fa3bfec270d404dd9f2e452c8cc92b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    99ec16e265733e1359accb120c6929fc

    SHA1

    dff6d5fb130d2a2949b78c331b7409ae7fe3a754

    SHA256

    5bb92ee18a5fde2cff3742bbbbb0be721c89997e563115a1575e7dc1fa654cc6

    SHA512

    d87ce49be4dc6889eafdcb3ee8ba7177fd7543429e9846c9858c69608de19701e68d86da3f80ae80824af9016d4f4265e21f640c66a42515f9af322d94187743

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6cb352251b5ed25820ea7ef36d7a9bbc

    SHA1

    09c2f0c92b53628e9abc028deda16c9509bb89ac

    SHA256

    dec6073d97ddd172bb07513c2b22a207682f27a0e8baab4fc50580d113963f1f

    SHA512

    358f94775ec25ab2b5d64ec24fc8da736d09fc2e4b0badf4cd978677c3c7c66c4ddb1c00e7db8919d89f16515d26888aeb2b7ea506e9a3dafd431bdf32d64933

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d64aa287b660ea59a6c2f21b3e679087

    SHA1

    36c363938760832105f48555cf3c930690d0409a

    SHA256

    b13c2b5add5a61e8c668d18c3b965195321a1977b118384253c5f48aed0fb4e9

    SHA512

    c5394abb41fdf2caf92b66b6171816f0289643dd84d4100e68bf5d7dd0839596ce9194f50413bf877e121887809e4568b352ad2dac8356647ca7e8602288bc4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    554104650631b2f3405b07c7955bb8d9

    SHA1

    62c9b7c760163c9c885758544aa8c1fb96e0a923

    SHA256

    3d3264ba809b7d7607f94ffae14761a0f27ae2f9dc0d381ee92b1ae9078aec21

    SHA512

    37d06be72166ca4a8dfffafea7ce9e652dd6c8f2233bf673482b0d1dfc7ab2bec011c3638e1e4305e2f3b6235229d9529c442c779e0f256f7f412c316f4c94ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d0ff3c9784a4482a44012afc020b84c4

    SHA1

    8263d2e4b5f5d95dc5b382ff71b21cac9a5c8307

    SHA256

    51f50d8a8f145054706467fe65fc3b581fb2974f2b93e8ff87e9d69383bef0f2

    SHA512

    f0c1bb8a94c44ea48f86877cc97143dee7f80ebf4ffe385947c01c0f4d9a37c5533d12bf142c661e7af52b1370effec57707616a0af26dbaab9a3214c40e23b9

  • C:\Users\Admin\AppData\Local\Temp\Cab9F4D.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA0CB.tmp
    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/1644-13-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-9-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/1644-14-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-12-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-17-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-11-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/1644-10-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2880-16-0x0000000074630000-0x0000000074D1E000-memory.dmp
    Filesize

    6.9MB

  • memory/2880-0-0x0000000000170000-0x000000000026A000-memory.dmp
    Filesize

    1000KB

  • memory/2880-5-0x00000000003A0000-0x00000000003A6000-memory.dmp
    Filesize

    24KB

  • memory/2880-4-0x0000000009F60000-0x000000000A04C000-memory.dmp
    Filesize

    944KB

  • memory/2880-3-0x0000000004B40000-0x0000000004B80000-memory.dmp
    Filesize

    256KB

  • memory/2880-2-0x0000000000370000-0x0000000000376000-memory.dmp
    Filesize

    24KB

  • memory/2880-1-0x0000000074630000-0x0000000074D1E000-memory.dmp
    Filesize

    6.9MB