Analysis
-
max time kernel
44s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-03-2023 12:48
Static task
static1
Behavioral task
behavioral1
Sample
Odeme22323.exe
Resource
win7-20230220-en
General
-
Target
Odeme22323.exe
-
Size
814KB
-
MD5
5cb296788614c0cbd3c912d8d2fdca36
-
SHA1
ff9d0762b965ac37faa9f4c3cf9faaa0d1ec57ae
-
SHA256
a68850f869d5a33aeedeb894e6ab9c743d35be9da971dea04361664fc00cca18
-
SHA512
5e4e918c13292f8bd4f349862a01e19dd03ae7e6f8a600c8a63b262c74584d1a1c4e2c4dd82402e4f0c4e8686ac110b217c2144af5df4709478b2960e177fe84
-
SSDEEP
24576:wNA3R5drX2D7hXzwX4acpkEFhVesL0P6NuxLHb:p5ETpLA6NcLHb
Malware Config
Extracted
asyncrat
0.5.7B
Mnock
mooroopecamroy.sytes.net:1452
mooroopecamroy.sytes.net:1432
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
crssi.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/280-102-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/280-105-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/280-107-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1868-127-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1868-129-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1868-130-0x0000000002190000-0x00000000021D0000-memory.dmp asyncrat behavioral1/memory/1868-148-0x0000000002190000-0x00000000021D0000-memory.dmp asyncrat -
Executes dropped EXE 5 IoCs
Processes:
wagfhdg.sfx.exewagfhdg.exewagfhdg.execrssi.execrssi.exepid process 1620 wagfhdg.sfx.exe 1104 wagfhdg.exe 280 wagfhdg.exe 1752 crssi.exe 1868 crssi.exe -
Loads dropped DLL 7 IoCs
Processes:
cmd.exewagfhdg.sfx.exewagfhdg.execmd.exepid process 1580 cmd.exe 1620 wagfhdg.sfx.exe 1620 wagfhdg.sfx.exe 1620 wagfhdg.sfx.exe 1620 wagfhdg.sfx.exe 1104 wagfhdg.exe 896 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
wagfhdg.execrssi.exedescription pid process target process PID 1104 set thread context of 280 1104 wagfhdg.exe wagfhdg.exe PID 1752 set thread context of 1868 1752 crssi.exe crssi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 792 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
wagfhdg.exepid process 280 wagfhdg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
wagfhdg.exewagfhdg.execrssi.execrssi.exedescription pid process Token: SeDebugPrivilege 1104 wagfhdg.exe Token: SeDebugPrivilege 280 wagfhdg.exe Token: SeDebugPrivilege 1752 crssi.exe Token: SeDebugPrivilege 1868 crssi.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 1820 DllHost.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
Odeme22323.execmd.exewagfhdg.sfx.exewagfhdg.exewagfhdg.execmd.execmd.execrssi.exedescription pid process target process PID 1624 wrote to memory of 1580 1624 Odeme22323.exe cmd.exe PID 1624 wrote to memory of 1580 1624 Odeme22323.exe cmd.exe PID 1624 wrote to memory of 1580 1624 Odeme22323.exe cmd.exe PID 1624 wrote to memory of 1580 1624 Odeme22323.exe cmd.exe PID 1580 wrote to memory of 1620 1580 cmd.exe wagfhdg.sfx.exe PID 1580 wrote to memory of 1620 1580 cmd.exe wagfhdg.sfx.exe PID 1580 wrote to memory of 1620 1580 cmd.exe wagfhdg.sfx.exe PID 1580 wrote to memory of 1620 1580 cmd.exe wagfhdg.sfx.exe PID 1620 wrote to memory of 1104 1620 wagfhdg.sfx.exe wagfhdg.exe PID 1620 wrote to memory of 1104 1620 wagfhdg.sfx.exe wagfhdg.exe PID 1620 wrote to memory of 1104 1620 wagfhdg.sfx.exe wagfhdg.exe PID 1620 wrote to memory of 1104 1620 wagfhdg.sfx.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 1104 wrote to memory of 280 1104 wagfhdg.exe wagfhdg.exe PID 280 wrote to memory of 1492 280 wagfhdg.exe cmd.exe PID 280 wrote to memory of 1492 280 wagfhdg.exe cmd.exe PID 280 wrote to memory of 1492 280 wagfhdg.exe cmd.exe PID 280 wrote to memory of 1492 280 wagfhdg.exe cmd.exe PID 280 wrote to memory of 896 280 wagfhdg.exe cmd.exe PID 280 wrote to memory of 896 280 wagfhdg.exe cmd.exe PID 280 wrote to memory of 896 280 wagfhdg.exe cmd.exe PID 280 wrote to memory of 896 280 wagfhdg.exe cmd.exe PID 1492 wrote to memory of 900 1492 cmd.exe schtasks.exe PID 1492 wrote to memory of 900 1492 cmd.exe schtasks.exe PID 1492 wrote to memory of 900 1492 cmd.exe schtasks.exe PID 1492 wrote to memory of 900 1492 cmd.exe schtasks.exe PID 896 wrote to memory of 792 896 cmd.exe timeout.exe PID 896 wrote to memory of 792 896 cmd.exe timeout.exe PID 896 wrote to memory of 792 896 cmd.exe timeout.exe PID 896 wrote to memory of 792 896 cmd.exe timeout.exe PID 896 wrote to memory of 1752 896 cmd.exe crssi.exe PID 896 wrote to memory of 1752 896 cmd.exe crssi.exe PID 896 wrote to memory of 1752 896 cmd.exe crssi.exe PID 896 wrote to memory of 1752 896 cmd.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe PID 1752 wrote to memory of 1868 1752 crssi.exe crssi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Odeme22323.exe"C:\Users\Admin\AppData\Local\Temp\Odeme22323.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hliychjo.cmd" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exewagfhdg.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pldqboofhafugBbsmheutdbtrfcaszjnhjfehfegddeoqxapofdgyayhhddfdtgxdkqekecVohobthtigdge3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exe"C:\Users\Admin\AppData\Local\Temp\wagfhdg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeC:\Users\Admin\AppData\Local\Temp\wagfhdg.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"' & exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "crssi" /tr '"C:\Users\Admin\AppData\Roaming\crssi.exe"'7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA90C.tmp.bat""6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\crssi.exe"C:\Users\Admin\AppData\Roaming\crssi.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\crssi.exeC:\Users\Admin\AppData\Roaming\crssi.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HeSwift.jpgFilesize
43KB
MD5b51bcf0e5efcacc7dab333e763658a02
SHA1d377643d36ad5638647b3c0b4e97c5568fd9cc59
SHA256dfae1100f8520dc16f56924a3415f5637d5899edcd937f69b78af51715db46a3
SHA512d26ef9314a87a1632f1c019b23882754bab39a4be125819c565d5938e7519122497ce679b7c9f3ed5f8eea69e4b66c3d3eae1212ea8de91a68dfed271f5a8da8
-
C:\Users\Admin\AppData\Local\Temp\hliychjo.cmdFilesize
10KB
MD5950e9f9672dd5df3d3c60a21936ab878
SHA1b0d10b65dc7d6bb309445b92ee00763aa72acc2a
SHA256ffd2a2c09552ae541d9cdc5c7d6d98b9aa443c26bfea83f658636cc000159fa8
SHA512058962e872d636341795af3a168b392c413b4e976d9a4b8af0c10b607e082acaa09a716d2bfa084b9f8822b240ac10520eda3369699098457e7d81e81b26e6ba
-
C:\Users\Admin\AppData\Local\Temp\hliychjo.cmdFilesize
10KB
MD5950e9f9672dd5df3d3c60a21936ab878
SHA1b0d10b65dc7d6bb309445b92ee00763aa72acc2a
SHA256ffd2a2c09552ae541d9cdc5c7d6d98b9aa443c26bfea83f658636cc000159fa8
SHA512058962e872d636341795af3a168b392c413b4e976d9a4b8af0c10b607e082acaa09a716d2bfa084b9f8822b240ac10520eda3369699098457e7d81e81b26e6ba
-
C:\Users\Admin\AppData\Local\Temp\tmpA90C.tmp.batFilesize
149B
MD574a6c991e9da9b2c522e22fa8e9387f3
SHA1050249515bc3236b664f519b0dcdbba58cc620e4
SHA256d98fe74f30884d8e64bf18252272ca1dee12be282384063de10662fd556736b7
SHA5121a32ca87cfbc1cca5c67fcbfbd1b9ad4680c8d52cb7680d1e227314b6d74d0df23dc3aba3b0bf2bdf2ff332d17ce2ecd920ba3613b8bc0d74b6f96858d3ba619
-
C:\Users\Admin\AppData\Local\Temp\tmpA90C.tmp.batFilesize
149B
MD574a6c991e9da9b2c522e22fa8e9387f3
SHA1050249515bc3236b664f519b0dcdbba58cc620e4
SHA256d98fe74f30884d8e64bf18252272ca1dee12be282384063de10662fd556736b7
SHA5121a32ca87cfbc1cca5c67fcbfbd1b9ad4680c8d52cb7680d1e227314b6d74d0df23dc3aba3b0bf2bdf2ff332d17ce2ecd920ba3613b8bc0d74b6f96858d3ba619
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exeFilesize
624KB
MD5745b22b339c45b4d0955f8e776dfd729
SHA15603f977b25900da600d4fb8dd2fc659afe6f7cd
SHA256fecdac4a0a26f13f4089497be9e56de44dd6ce4d2a645ef992bdc817e9546a1f
SHA5122ea4528adbdff20f4af51823d9e52714e79d5eb8fc4ea01889c398b920dfe1cf2edbb6479b1fc90f9f3477a9a9887a513db03b16013dab7fb78d493566307d64
-
C:\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exeFilesize
624KB
MD5745b22b339c45b4d0955f8e776dfd729
SHA15603f977b25900da600d4fb8dd2fc659afe6f7cd
SHA256fecdac4a0a26f13f4089497be9e56de44dd6ce4d2a645ef992bdc817e9546a1f
SHA5122ea4528adbdff20f4af51823d9e52714e79d5eb8fc4ea01889c398b920dfe1cf2edbb6479b1fc90f9f3477a9a9887a513db03b16013dab7fb78d493566307d64
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
C:\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
\Users\Admin\AppData\Local\Temp\wagfhdg.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
\Users\Admin\AppData\Local\Temp\wagfhdg.sfx.exeFilesize
624KB
MD5745b22b339c45b4d0955f8e776dfd729
SHA15603f977b25900da600d4fb8dd2fc659afe6f7cd
SHA256fecdac4a0a26f13f4089497be9e56de44dd6ce4d2a645ef992bdc817e9546a1f
SHA5122ea4528adbdff20f4af51823d9e52714e79d5eb8fc4ea01889c398b920dfe1cf2edbb6479b1fc90f9f3477a9a9887a513db03b16013dab7fb78d493566307d64
-
\Users\Admin\AppData\Roaming\crssi.exeFilesize
227KB
MD51de4ee1525ce376c03e493cd3ca566de
SHA146afa5761516c2e99833d7eb131ef403dc57ae1f
SHA2564c602cfc8d0fed8bf374f651358a3d3f9d99f84b2c333a2b516f6145b64a4f21
SHA51269c2eaa784e4036b673dded9bbf34cd6f47c23e074307341f7656ec91b1cf063aae5eeb3e0215e32869a56882684930dec50905f995e66cfce0a473abd31a71e
-
memory/280-105-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/280-102-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/280-107-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/280-108-0x00000000004C0000-0x0000000000500000-memory.dmpFilesize
256KB
-
memory/1104-96-0x0000000000270000-0x0000000000276000-memory.dmpFilesize
24KB
-
memory/1104-95-0x0000000000210000-0x000000000024E000-memory.dmpFilesize
248KB
-
memory/1104-98-0x0000000004750000-0x0000000004790000-memory.dmpFilesize
256KB
-
memory/1104-100-0x0000000000300000-0x0000000000306000-memory.dmpFilesize
24KB
-
memory/1104-99-0x0000000000280000-0x00000000002BC000-memory.dmpFilesize
240KB
-
memory/1624-93-0x0000000002600000-0x0000000002602000-memory.dmpFilesize
8KB
-
memory/1752-122-0x0000000000910000-0x000000000094E000-memory.dmpFilesize
248KB
-
memory/1820-94-0x0000000000160000-0x0000000000162000-memory.dmpFilesize
8KB
-
memory/1820-123-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1820-97-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1868-127-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1868-129-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1868-130-0x0000000002190000-0x00000000021D0000-memory.dmpFilesize
256KB
-
memory/1868-148-0x0000000002190000-0x00000000021D0000-memory.dmpFilesize
256KB