Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 11:06
Behavioral task
behavioral1
Sample
a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe
Resource
win11-20240508-en
General
-
Target
a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe
-
Size
63KB
-
MD5
b8d455465260a845db35492fda5a8888
-
SHA1
287b0ba049ad8f3be802d2224efb86dba72d3221
-
SHA256
a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282
-
SHA512
5dba43ae31420de362593752e8ff491afbe8d20f183f6b95e6962ea1e637c7bf3bd50b5213e4d928a96b85d9b54841ee697798b0089624b13ef7eded826cd86a
-
SSDEEP
768:CuY6LVcsTPq781wC8A+XjuazcBRL5JTk1+T4KSBGHmDbD/ph0oX9rAW6dEYSuEdP:reQPckdSJYUbdh9O8uEdpqKmY7
Malware Config
Extracted
asyncrat
Default
66.235.168.242:3232
-
delay
1
-
install
true
-
install_file
Loaader.exe
-
install_folder
%AppData%
Signatures
-
Processes:
Loaader.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Loaader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Loaader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Loaader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Loaader.exe -
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Processes:
Loaader.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" Loaader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" Loaader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" Loaader.exe -
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Loaader.exe family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exeLoaader.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Loaader.exe -
Executes dropped EXE 1 IoCs
Processes:
Loaader.exepid process 528 Loaader.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
Loaader.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" Loaader.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Loaader.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Loaader.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Loaader.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Loaader.exe -
Processes:
Loaader.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua Loaader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" Loaader.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 56 icanhazip.com 58 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Loaader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Loaader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Loaader.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 696 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exepowershell.exepowershell.exeLoaader.exepid process 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe 5108 powershell.exe 5108 powershell.exe 904 powershell.exe 904 powershell.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe 528 Loaader.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exeLoaader.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe Token: SeDebugPrivilege 528 Loaader.exe Token: SeDebugPrivilege 5108 powershell.exe Token: SeDebugPrivilege 904 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.execmd.execmd.exeLoaader.execmd.execmd.exedescription pid process target process PID 4888 wrote to memory of 832 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe cmd.exe PID 4888 wrote to memory of 832 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe cmd.exe PID 4888 wrote to memory of 2572 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe cmd.exe PID 4888 wrote to memory of 2572 4888 a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe cmd.exe PID 2572 wrote to memory of 696 2572 cmd.exe timeout.exe PID 2572 wrote to memory of 696 2572 cmd.exe timeout.exe PID 832 wrote to memory of 3720 832 cmd.exe schtasks.exe PID 832 wrote to memory of 3720 832 cmd.exe schtasks.exe PID 2572 wrote to memory of 528 2572 cmd.exe Loaader.exe PID 2572 wrote to memory of 528 2572 cmd.exe Loaader.exe PID 528 wrote to memory of 5108 528 Loaader.exe powershell.exe PID 528 wrote to memory of 5108 528 Loaader.exe powershell.exe PID 528 wrote to memory of 904 528 Loaader.exe powershell.exe PID 528 wrote to memory of 904 528 Loaader.exe powershell.exe PID 528 wrote to memory of 1884 528 Loaader.exe cmd.exe PID 528 wrote to memory of 1884 528 Loaader.exe cmd.exe PID 1884 wrote to memory of 4088 1884 cmd.exe chcp.com PID 1884 wrote to memory of 4088 1884 cmd.exe chcp.com PID 1884 wrote to memory of 3548 1884 cmd.exe netsh.exe PID 1884 wrote to memory of 3548 1884 cmd.exe netsh.exe PID 1884 wrote to memory of 1684 1884 cmd.exe findstr.exe PID 1884 wrote to memory of 1684 1884 cmd.exe findstr.exe PID 528 wrote to memory of 2312 528 Loaader.exe cmd.exe PID 528 wrote to memory of 2312 528 Loaader.exe cmd.exe PID 2312 wrote to memory of 1956 2312 cmd.exe chcp.com PID 2312 wrote to memory of 1956 2312 cmd.exe chcp.com PID 2312 wrote to memory of 3872 2312 cmd.exe netsh.exe PID 2312 wrote to memory of 3872 2312 cmd.exe netsh.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
Loaader.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" Loaader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" Loaader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" Loaader.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
Loaader.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Loaader.exe -
outlook_win_path 1 IoCs
Processes:
Loaader.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Loaader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe"C:\Users\Admin\AppData\Local\Temp\a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Loaader" /tr '"C:\Users\Admin\AppData\Roaming\Loaader.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Loaader" /tr '"C:\Users\Admin\AppData\Roaming\Loaader.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5285.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\Loaader.exe"C:\Users\Admin\AppData\Roaming\Loaader.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Accesses Microsoft Outlook profiles
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
- outlook_office_path
- outlook_win_path
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650015⤵
-
C:\Windows\system32\netsh.exenetsh wlan show profile5⤵
-
C:\Windows\system32\findstr.exefindstr All5⤵
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650015⤵
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vrb5vc0a.od5.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp5285.tmp.batFilesize
151B
MD5fc3951f8e84d41ffe6ffa9125dd9ec0a
SHA15721dae2ef28e9c3d0e1766d4e78a469a645b378
SHA2569dcf50c00b5b7ce0c3ca4327588ef114e3909147034f2f044271b5b8cefb0926
SHA512f433a9e5740982f61ad45edcc3927bc32b4e9c6c27dfec1efb0ae46e143e5befe01110e0eca9cb2e2a742a3b38841ce626e303f1cd229103659b566fc054e541
-
C:\Users\Admin\AppData\Local\dec13f7648136b013950c313650eaf39\Admin@BVRKIPTS_en-US\System\Process.txtFilesize
1KB
MD5f4e0cd362bb2a44d6037766556887d1c
SHA1d39acebfc335ba3777a7bf2fbc5cbb37f1298de2
SHA256289400d731b513ad9eb0dacb5cbad7ec3d7632294fe8fd4b6acf688424d19b9e
SHA512f189227f7c8521415ebebe525abe0536ed17a3e27dbf18f3c60dfc0b9d6afe81ff6990e4355aec003016b185d929de724b3e316d765482bb9e312ff5186ab76f
-
C:\Users\Admin\AppData\Local\dec13f7648136b013950c313650eaf39\Admin@BVRKIPTS_en-US\System\Process.txtFilesize
2KB
MD5241bc9c3cd73370441c67ee521f6c435
SHA104737f7bbd441a3cc70c8c110ed2dd27a3b168a3
SHA25649165f22e7c4e5d0cb520486708c4c25db9d0c210b66b227fd62ca4fe1dd5f74
SHA512437580357dee5940468aebe59dbdca90538276e70c03ad98ff9ca27eb9211186728f710d87b5985022245c34ddf6c60bdde425e1ec941147ad441291c45947cf
-
C:\Users\Admin\AppData\Local\dec13f7648136b013950c313650eaf39\Admin@BVRKIPTS_en-US\System\Process.txtFilesize
4KB
MD5055cb94fd91e56f0ebd52625fe8c6650
SHA1df65d5c10889baf49616035800d5a864501b2588
SHA2566fe06e61f037260946d3ac5789cb6fa08e7dc8488addaa6f048d852ad5f19ed6
SHA51201039af9095f0ee17d2dbc077de4c7bff235cc6a9356ec238dca3c9c2ec7202d7e66d57b339f4532edba46bf9622f3a6b0860468c7b91950740515f90a8eeb7f
-
C:\Users\Admin\AppData\Roaming\Loaader.exeFilesize
63KB
MD5b8d455465260a845db35492fda5a8888
SHA1287b0ba049ad8f3be802d2224efb86dba72d3221
SHA256a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282
SHA5125dba43ae31420de362593752e8ff491afbe8d20f183f6b95e6962ea1e637c7bf3bd50b5213e4d928a96b85d9b54841ee697798b0089624b13ef7eded826cd86a
-
memory/528-49-0x00000000024F0000-0x00000000024FA000-memory.dmpFilesize
40KB
-
memory/528-17-0x000000001D0A0000-0x000000001D0BE000-memory.dmpFilesize
120KB
-
memory/528-42-0x000000001D2A0000-0x000000001D352000-memory.dmpFilesize
712KB
-
memory/528-44-0x000000001D8E0000-0x000000001DA68000-memory.dmpFilesize
1.5MB
-
memory/528-16-0x000000001D070000-0x000000001D0A4000-memory.dmpFilesize
208KB
-
memory/528-15-0x000000001D0F0000-0x000000001D166000-memory.dmpFilesize
472KB
-
memory/528-200-0x000000001CC70000-0x000000001CCEA000-memory.dmpFilesize
488KB
-
memory/4888-7-0x00007FFE80DA0000-0x00007FFE81861000-memory.dmpFilesize
10.8MB
-
memory/4888-2-0x00007FFE80DA0000-0x00007FFE81861000-memory.dmpFilesize
10.8MB
-
memory/4888-1-0x00007FFE80DA3000-0x00007FFE80DA5000-memory.dmpFilesize
8KB
-
memory/4888-8-0x00007FFE80DA0000-0x00007FFE81861000-memory.dmpFilesize
10.8MB
-
memory/4888-0-0x00000000009F0000-0x0000000000A06000-memory.dmpFilesize
88KB
-
memory/5108-23-0x000002C2E73D0000-0x000002C2E73F2000-memory.dmpFilesize
136KB