Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-01-2025 23:01

General

  • Target

    Bootstrapper.exe

  • Size

    83KB

  • MD5

    1732093855fdafe29c14a28f411be7ed

  • SHA1

    9c744c332431a9eee6fe2ec5154ceda07dd5cbcd

  • SHA256

    04833ad505decf0d5ab951e582f7d00c82f28bb11fc70285ec36e150689fd28d

  • SHA512

    a971219fd158c5c41f15de6e0fb2c0c59076b792302f111b8f7b9b36fb5428b1d2f9a74f2f614d1248ea62f59277ee9e397bb0c61e2dd1396b4681430ff72aab

  • SSDEEP

    1536:9Oo70l34r+Ik26UFKuXUYFAdPztEbDOPGauZrmTGN4Eqwr2hG2a+sbx:9OI0ar+Ik2vKuXUYFAdztEbDGjaE+4SZ

Malware Config

Extracted

Family

asyncrat

Version

| Edit by Vinom Rat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:7000

127.0.0.1:2510

oil-frequently.gl.at.ply.gg:6606

oil-frequently.gl.at.ply.gg:7707

oil-frequently.gl.at.ply.gg:8808

oil-frequently.gl.at.ply.gg:7000

oil-frequently.gl.at.ply.gg:2510

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    updatemanager.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5600
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "updatemanager" /tr '"C:\Users\Admin\AppData\Roaming\updatemanager.exe"' & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:6124
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "updatemanager" /tr '"C:\Users\Admin\AppData\Roaming\updatemanager.exe"'
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:5772
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA568.tmp.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5224
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:5052
      • C:\Users\Admin\AppData\Roaming\updatemanager.exe
        "C:\Users\Admin\AppData\Roaming\updatemanager.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5864
        • C:\Windows\SysWOW64\taskkill.exe
          "C:\Windows\System32\taskkill.exe" /im cmstp.exe /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4932
        • C:\Windows\SysWOW64\cmstp.exe
          "C:\Windows\system32\cmstp.exe" /au C:\Windows\temp\jipgjvcs.inf
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5276
        • C:\Users\Admin\AppData\Roaming\AnyDesk.exe
          "C:\Users\Admin\AppData\Roaming\AnyDesk.exe" --get-id
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2808
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1124
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\SysWOW64\mshta.exe
      mshta vbscript:Execute("CreateObject(""WScript.Shell"").Run ""cmd.exe /c start """""""" """"C:\Users\Admin\AppData\Roaming\AnyDesk.exe"""""",0:close")
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\AnyDesk.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Users\Admin\AppData\Roaming\AnyDesk.exe
          "C:\Users\Admin\AppData\Roaming\AnyDesk.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious use of WriteProcessMemory
          PID:5292
          • C:\Users\Admin\AppData\Roaming\AnyDesk.exe
            "C:\Users\Admin\AppData\Roaming\AnyDesk.exe" --local-service
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1816
          • C:\Users\Admin\AppData\Roaming\AnyDesk.exe
            "C:\Users\Admin\AppData\Roaming\AnyDesk.exe" --local-control
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:5340
    • C:\Windows\SysWOW64\mshta.exe
      mshta vbscript:Execute("CreateObject(ChrW(87) + ChrW(83) + ChrW(99) + ChrW(114) + ChrW(105) + ChrW(112) + ChrW(116) + ChrW(46) + ChrW(83) + ChrW(104) + ChrW(101) + ChrW(108) + ChrW(108)).Run ""powershell.exe Stop-Process -Name 'cmstp'"", 0, true:close")
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Stop-Process -Name 'cmstp'
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5420
  • C:\Users\Admin\AppData\Roaming\AnyDesk.exe
    "C:\Users\Admin\AppData\Roaming\AnyDesk.exe" --crash-handler
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    d6d3499e5dfe058db4af5745e6885661

    SHA1

    ef47b148302484d5ab98320962d62565f88fcc18

    SHA256

    7ec1b67f891fb646b49853d91170fafc67ff2918befd877dcc8515212be560f6

    SHA512

    ad1646c13f98e6915e51bfba9207b81f6d1d174a1437f9c1e1c935b7676451ff73a694323ff61fa72ec87b7824ce9380423533599e30d889b689e2e13887045f

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    fbbd10b5151e4365bceb3190d826c524

    SHA1

    45a77c1d88151d54383047d84019bc9e84cfa0c8

    SHA256

    4400d61bcd5543a3123ae53baff8863336555d96350ec33ce9a3f8242917cbb3

    SHA512

    32404e11daf2116efd194a65a96c24d83c8b0f1eed80ae63d6077d26e8b51f636db993e98474257fb2aa262d87b6ce6219fdf8f2162b4fd179a3e95c9dbee7f9

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4q1wqvt1.lxl.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmpA568.tmp.bat

    Filesize

    157B

    MD5

    bdd7f1f7b10e1564b0f908b9a1cff658

    SHA1

    77423fb4daf44444a993d09c78e41952b926f7fe

    SHA256

    688749004f00f63530e9a6ca43c8037856fe6e848da081a36093aa77907ec618

    SHA512

    1405a020422492cae08532832b7686b99388e1697f57e5b569cfa8f72a3405c2396d724ba944e5988ad8a85403604ef2ca6272040403058d76d8b70c209af3bd

  • C:\Users\Admin\AppData\Roaming\AnyDesk.exe

    Filesize

    1.7MB

    MD5

    f6ecfdb9df91b5880019ee27ef7e64d1

    SHA1

    a8301304199740c68d2679049baa0672c209d256

    SHA256

    146dabe901f44610e47daedad7eb43bc90e5fe983bd3665c0800d2dae12a73a3

    SHA512

    f52ad2c636e77d1b223fa071af8b66e58237ee8592e2f19a76c34c345dc745d8b29e377cb508b2bd3052e4dc9dbb4de9d90aca3adb1973d1682fe9cf4dfdb39f

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    21KB

    MD5

    6d9a1e0dad42571906fe2f69eb126ca0

    SHA1

    4bbbe84cf066bb887af349e62cde4326e1dd034a

    SHA256

    b2821965c78077b2e14cc2a256cd1cc3a2eb1deb58150c6e4711b1611666e92d

    SHA512

    7f451283801c8ca944e2067c83310b5d97b9112f9f27c368107329af030b2403ab59d9f97a363efece9473b439aaaf4e7a70df8f112d673a6e9bd1e0720aef3e

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    26KB

    MD5

    23c0bc7c4a507cb1598e9c46a23b6d99

    SHA1

    84e8499692ec5b3d5fcce0a7ee93496c956f3ab5

    SHA256

    56280cc128630bba1a2748fc6672306ef9ef6abdebfc081d42610f9ad7aeedb2

    SHA512

    ee7f29046f0ba7bed8e9ad91dc4b670e09bd01c7e71864fb3d0cb342ad7daed9a6ce59f5554f0c8dd8030d72abe68e6b658607e5fe56e4f12abcfb11fd9228ce

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    5KB

    MD5

    68ca3a49516fa9371c3681c7831355e9

    SHA1

    a92a2106e0bd0c38e941f430c527d8c66f76bc32

    SHA256

    249f92fdae0049f4f0d0f5af0ced01c0d4e4ab027ac4b1849606911514cfa18c

    SHA512

    33607feb4df4294cc93c1abdf6b421b85594e3ead24d3a30c535590a26478d1da4f0d07078721dbcda550b9caf4364320a56354b88556285fa68ea5cb922b848

  • C:\Users\Admin\AppData\Roaming\AnyDesk\service.conf

    Filesize

    2KB

    MD5

    c29e15e3b5445a98c537cadd90ee91f7

    SHA1

    dc8adde6cfcc605726beb84aeb43df986cfd4db7

    SHA256

    5fe1906bf11f111c35a973f081044b7d36a9e6db8fc3199a454f96a8d23299e6

    SHA512

    e4bb5ddf0ad8a118743dc54e721d47fafcb077e9a4102491fef6aa60b103ed30402c638ddda4130b8dae25e1e04755de729668ad039315beb70c9128eb7817fa

  • C:\Users\Admin\AppData\Roaming\AnyDesk\system.conf

    Filesize

    241B

    MD5

    6b03dd6bc15224ff29ce1bc00dbef6aa

    SHA1

    a9db9c8d0cd06c398ae543a63501a9552fe6f86a

    SHA256

    705f1214fde29ff820f80060c38e3fd57db0aa575d6727f1a2bab9f0774ee01d

    SHA512

    d695b0b0fb05d77639308abba1b2709941949d9fab34be536472c868a98223c73b60c5ac88b3923ead5fb47d75f08830ca7149b696ec4caefccc18760e094801

  • C:\Users\Admin\AppData\Roaming\AnyDesk\system.conf

    Filesize

    249B

    MD5

    51afe4b31db6f74964e0356435efe6cf

    SHA1

    a87b44bacfe4c66d35455cd92c43a3537801fa3e

    SHA256

    2f055fb5f54de96185a1fe189ad2ff32615ec8fccf5b273e2a12a134b35ee7a5

    SHA512

    b1471c6e39f3438e6e766c1f7004a3d9f3f2adb278f1e0bb6db4be655be1ed77b57dd834bee338e71f37623eaa17905bed3d8086c2600df19c9843c403ae6927

  • C:\Users\Admin\AppData\Roaming\AnyDesk\system.conf

    Filesize

    138B

    MD5

    144e60b6c0f2373e592a1617bfa2c079

    SHA1

    030c014e28c4249987b3276c4cad534fe4a93bec

    SHA256

    eebfbd18906f2be28b8614db80a6f23ee7cff30fab758e0097e06cba07e1fcc2

    SHA512

    0e10a817cfec540802244e18b8171214c12ebc0810b7ffb26cc03281caf5ace981e4f5740227a17ac3885e7b42fde422b3ace10418d201d911dfebfe65783fa8

  • C:\Users\Admin\AppData\Roaming\AnyDesk\user.conf

    Filesize

    107B

    MD5

    740e80262dae1f77c48dffc32aa315fb

    SHA1

    32a27773d8c60f77fb2447f6056fdec7562e1e2e

    SHA256

    5fbf6ee5c89740ab875ff904227555ada4a540236af6d0b25f5e5e51344f979c

    SHA512

    ada66cccc4d61518f685611c8e98880e9067b4e22b43160052dbd13acf3fa312d2b35d50da36d21673c4e7aefa971882876a1f0cd4504d788cfa9b14ee739fc3

  • C:\Users\Admin\AppData\Roaming\AnyDesk\user.conf

    Filesize

    132B

    MD5

    5697183b114c4386f23f4663c92aaab4

    SHA1

    c78c966bc67663ef19f72344cd204240809cecb0

    SHA256

    b3ed469184269a922e3f3cdc53081ab18e05e65ba312a68ceacd04ea3dd9ed5d

    SHA512

    05135e2f5ceecf64110211d67d359463b0bb62e06e758da27bcb8ffafa800d6067787c48fb0bf9ee0810e65f7f6702d9f5bee42ebbf3951c4922fef07491d532

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    3KB

    MD5

    300f1eada4887d3b022017fc975f3bbc

    SHA1

    55bbfdd4585a05496c90d0929a151bf4349b336d

    SHA256

    d1e13a6eed980d7e2e65a9c6889ba767694db2553ea03e5192355cc84d0e2181

    SHA512

    4eac4a6cdf2a54e97015045702b2e70e8771cb0b99e1f5e0ed9cb59442303dd63d2f3754742dd603fad6f6524c88045c85f7886e10bfde47e08c3cff625c1836

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    3KB

    MD5

    fd2e67fb02ec8e174069cc244d784801

    SHA1

    bdeb18ce0c4b30ad6e5500349439c01e0db71a11

    SHA256

    62f8ee34f8062869076f87e1b3bc1008bbdda9fd56a768c5c990b622674a3d80

    SHA512

    e62decc1e5e9244311e7ef348f7a81b2e861b71d941c31a375a68622a46a71070f1c29da5a3007ae77cc445571104a6a6ff184c8d4f27ee5614a42fbe75c3b16

  • C:\Users\Admin\AppData\Roaming\updatemanager.exe

    Filesize

    83KB

    MD5

    1732093855fdafe29c14a28f411be7ed

    SHA1

    9c744c332431a9eee6fe2ec5154ceda07dd5cbcd

    SHA256

    04833ad505decf0d5ab951e582f7d00c82f28bb11fc70285ec36e150689fd28d

    SHA512

    a971219fd158c5c41f15de6e0fb2c0c59076b792302f111b8f7b9b36fb5428b1d2f9a74f2f614d1248ea62f59277ee9e397bb0c61e2dd1396b4681430ff72aab

  • C:\Windows\temp\jipgjvcs.inf

    Filesize

    12KB

    MD5

    142d2154d999561de683e715358859b8

    SHA1

    192872f0af85fbd4c09ea9de65ee6d17a3f428c5

    SHA256

    024e6cc0ac318b0d40b90f4deea1fc32ba7f4782333715988f9deeb9d93931d6

    SHA512

    a4b0599f4d23cc77cfbcd70fbaa94ee342ff3717f10a14caf0bfd28b684bb2f3fb49c64e02612058a43ce6ea16748d4ee532e8823067e7cd95ab6e075d44c8c8

  • memory/1816-119-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/1816-139-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/1816-128-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/1816-146-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/1816-153-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/1816-159-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/1816-132-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/1816-86-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/2260-123-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/2260-130-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/2808-122-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/2808-115-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/5292-118-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/5292-46-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/5340-120-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/5340-88-0x0000000000800000-0x0000000000F1C000-memory.dmp

    Filesize

    7.1MB

  • memory/5420-94-0x0000000006DE0000-0x0000000006E2C000-memory.dmp

    Filesize

    304KB

  • memory/5420-49-0x0000000003070000-0x00000000030A6000-memory.dmp

    Filesize

    216KB

  • memory/5420-93-0x0000000006890000-0x00000000068AE000-memory.dmp

    Filesize

    120KB

  • memory/5420-109-0x0000000007840000-0x00000000078D6000-memory.dmp

    Filesize

    600KB

  • memory/5420-110-0x0000000006D10000-0x0000000006D2A000-memory.dmp

    Filesize

    104KB

  • memory/5420-111-0x0000000006D60000-0x0000000006D82000-memory.dmp

    Filesize

    136KB

  • memory/5420-60-0x0000000005C20000-0x000000000624A000-memory.dmp

    Filesize

    6.2MB

  • memory/5420-62-0x0000000005B00000-0x0000000005B22000-memory.dmp

    Filesize

    136KB

  • memory/5420-63-0x00000000062C0000-0x0000000006326000-memory.dmp

    Filesize

    408KB

  • memory/5420-77-0x00000000063D0000-0x0000000006727000-memory.dmp

    Filesize

    3.3MB

  • memory/5600-0-0x00000000752BE000-0x00000000752BF000-memory.dmp

    Filesize

    4KB

  • memory/5600-8-0x00000000752B0000-0x0000000075A61000-memory.dmp

    Filesize

    7.7MB

  • memory/5600-1-0x0000000000D20000-0x0000000000D3A000-memory.dmp

    Filesize

    104KB

  • memory/5600-2-0x00000000752B0000-0x0000000075A61000-memory.dmp

    Filesize

    7.7MB

  • memory/5600-3-0x00000000057C0000-0x000000000585C000-memory.dmp

    Filesize

    624KB

  • memory/5864-15-0x00000000752B0000-0x0000000075A61000-memory.dmp

    Filesize

    7.7MB

  • memory/5864-14-0x00000000752B0000-0x0000000075A61000-memory.dmp

    Filesize

    7.7MB

  • memory/5864-13-0x00000000752B0000-0x0000000075A61000-memory.dmp

    Filesize

    7.7MB

  • memory/5864-39-0x0000000006A70000-0x0000000006C42000-memory.dmp

    Filesize

    1.8MB

  • memory/5864-141-0x00000000071A0000-0x0000000007216000-memory.dmp

    Filesize

    472KB

  • memory/5864-142-0x0000000006DF0000-0x0000000006E20000-memory.dmp

    Filesize

    192KB

  • memory/5864-143-0x0000000007120000-0x000000000713E000-memory.dmp

    Filesize

    120KB

  • memory/5864-16-0x00000000752B0000-0x0000000075A61000-memory.dmp

    Filesize

    7.7MB

  • memory/5864-37-0x00000000061C0000-0x0000000006766000-memory.dmp

    Filesize

    5.6MB

  • memory/5864-156-0x0000000006DB0000-0x0000000006DD4000-memory.dmp

    Filesize

    144KB

  • memory/5864-157-0x0000000007720000-0x00000000077B2000-memory.dmp

    Filesize

    584KB

  • memory/5864-38-0x0000000005C10000-0x0000000005C76000-memory.dmp

    Filesize

    408KB