Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-03-2023 20:46
Behavioral task
behavioral1
Sample
9781aaa439fcf85da08d40c5c3e3909f.exe
Resource
win7-20230220-en
General
-
Target
9781aaa439fcf85da08d40c5c3e3909f.exe
-
Size
2.9MB
-
MD5
9781aaa439fcf85da08d40c5c3e3909f
-
SHA1
edd84aae94017cdde7dd564d2791c6389f98c01f
-
SHA256
413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
-
SHA512
27be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
SSDEEP
49152:VVqaWggE8cLbTM0Qpx80y5tq4JyiK+RzzO/twfoLFAq4JNpFLP7:zqLggl0QpC0qt/JyV+hz5foLB4Jn
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 608 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1400 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1580 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 632 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 340 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1476 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1536 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 1804 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 1804 schtasks.exe -
Processes:
9781aaa439fcf85da08d40c5c3e3909f.execsrss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe -
Processes:
resource yara_rule behavioral1/memory/928-54-0x00000000010C0000-0x00000000013A6000-memory.dmp dcrat C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WMIADAP.exe dcrat C:\Windows\DigitalLocker\en-US\csrss.exe dcrat C:\Windows\DigitalLocker\en-US\csrss.exe dcrat behavioral1/memory/1808-99-0x0000000000E80000-0x0000000001166000-memory.dmp dcrat behavioral1/memory/1808-100-0x0000000000410000-0x0000000000490000-memory.dmp dcrat behavioral1/memory/1808-112-0x0000000000410000-0x0000000000490000-memory.dmp dcrat -
Executes dropped EXE 1 IoCs
Processes:
csrss.exepid process 1808 csrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
9781aaa439fcf85da08d40c5c3e3909f.execsrss.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Drops file in Program Files directory 2 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exedescription ioc process File created C:\Program Files\Microsoft Office\Office14\wininit.exe 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Program Files\Microsoft Office\Office14\56085415360792 9781aaa439fcf85da08d40c5c3e3909f.exe -
Drops file in Windows directory 4 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.exedescription ioc process File created C:\Windows\schemas\WCN\wininit.exe 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Windows\schemas\WCN\56085415360792 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Windows\DigitalLocker\en-US\csrss.exe 9781aaa439fcf85da08d40c5c3e3909f.exe File created C:\Windows\DigitalLocker\en-US\886983d96e3d3e 9781aaa439fcf85da08d40c5c3e3909f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1396 1808 WerFault.exe csrss.exe -
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1796 schtasks.exe 1012 schtasks.exe 1476 schtasks.exe 1508 schtasks.exe 316 schtasks.exe 608 schtasks.exe 1732 schtasks.exe 340 schtasks.exe 1624 schtasks.exe 1704 schtasks.exe 1400 schtasks.exe 1580 schtasks.exe 632 schtasks.exe 1600 schtasks.exe 1972 schtasks.exe 1788 schtasks.exe 1680 schtasks.exe 1536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.execsrss.exepid process 928 9781aaa439fcf85da08d40c5c3e3909f.exe 928 9781aaa439fcf85da08d40c5c3e3909f.exe 928 9781aaa439fcf85da08d40c5c3e3909f.exe 928 9781aaa439fcf85da08d40c5c3e3909f.exe 928 9781aaa439fcf85da08d40c5c3e3909f.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe 1808 csrss.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.execsrss.exevssvc.exedescription pid process Token: SeDebugPrivilege 928 9781aaa439fcf85da08d40c5c3e3909f.exe Token: SeDebugPrivilege 1808 csrss.exe Token: SeBackupPrivilege 872 vssvc.exe Token: SeRestorePrivilege 872 vssvc.exe Token: SeAuditPrivilege 872 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.execsrss.exedescription pid process target process PID 928 wrote to memory of 1808 928 9781aaa439fcf85da08d40c5c3e3909f.exe csrss.exe PID 928 wrote to memory of 1808 928 9781aaa439fcf85da08d40c5c3e3909f.exe csrss.exe PID 928 wrote to memory of 1808 928 9781aaa439fcf85da08d40c5c3e3909f.exe csrss.exe PID 1808 wrote to memory of 1992 1808 csrss.exe WScript.exe PID 1808 wrote to memory of 1992 1808 csrss.exe WScript.exe PID 1808 wrote to memory of 1992 1808 csrss.exe WScript.exe PID 1808 wrote to memory of 1860 1808 csrss.exe WScript.exe PID 1808 wrote to memory of 1860 1808 csrss.exe WScript.exe PID 1808 wrote to memory of 1860 1808 csrss.exe WScript.exe PID 1808 wrote to memory of 1396 1808 csrss.exe WerFault.exe PID 1808 wrote to memory of 1396 1808 csrss.exe WerFault.exe PID 1808 wrote to memory of 1396 1808 csrss.exe WerFault.exe -
System policy modification 1 TTPs 6 IoCs
Processes:
9781aaa439fcf85da08d40c5c3e3909f.execsrss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9781aaa439fcf85da08d40c5c3e3909f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" csrss.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9781aaa439fcf85da08d40c5c3e3909f.exe"C:\Users\Admin\AppData\Local\Temp\9781aaa439fcf85da08d40c5c3e3909f.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\DigitalLocker\en-US\csrss.exe"C:\Windows\DigitalLocker\en-US\csrss.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\35f10857-d0d7-4190-b39c-c724a616977e.vbs"3⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\442c095f-b395-4c21-9640-ca3e028ae66b.vbs"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1808 -s 19363⤵
- Program crash
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Local Settings\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Local Settings\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\Office14\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office\Office14\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Windows\schemas\WCN\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\schemas\WCN\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Windows\schemas\WCN\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Documents\My Music\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Documents\My Music\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Documents\My Music\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\DigitalLocker\en-US\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\WMIADAP.exeFilesize
2.9MB
MD59781aaa439fcf85da08d40c5c3e3909f
SHA1edd84aae94017cdde7dd564d2791c6389f98c01f
SHA256413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
SHA51227be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
C:\Users\Admin\AppData\Local\Temp\35f10857-d0d7-4190-b39c-c724a616977e.vbsFilesize
716B
MD5c5f99bcab3c5cec7db40c675e0a18b49
SHA1bbd9bb193d4ec1851cdac38a58f269068ce5dd67
SHA2567941943383c7eedc1da1bd1f8627eab078d363cd6c6c5de007457310be1f3e1d
SHA5120a5d0847d195b62d78440f2474c59d5593fc1195ee6a5890d30e3d904ebf8fe38e1de78334d6ddf8c19294102642e4e7e47f22c3510e940b6a3930c466f282f7
-
C:\Users\Admin\AppData\Local\Temp\442c095f-b395-4c21-9640-ca3e028ae66b.vbsFilesize
492B
MD5e2c404bc9cf04aec6318d9eebcce65fb
SHA165f0bdac062d6ab7a633487eceab4d6b43335bc7
SHA2569ddc872dc450898f690962d18a62463c743c94ed45097d9567a75d584170fde1
SHA512933f53f4e8d263d3d31552ae2f29a8e2b2f0489595e7608d3ec2ac957eba323754b2ee8477d46e209f1cec2d697a2eeea6243b07004ec3ae308d6ae10acda215
-
C:\Windows\DigitalLocker\en-US\csrss.exeFilesize
2.9MB
MD59781aaa439fcf85da08d40c5c3e3909f
SHA1edd84aae94017cdde7dd564d2791c6389f98c01f
SHA256413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
SHA51227be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
C:\Windows\DigitalLocker\en-US\csrss.exeFilesize
2.9MB
MD59781aaa439fcf85da08d40c5c3e3909f
SHA1edd84aae94017cdde7dd564d2791c6389f98c01f
SHA256413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35
SHA51227be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02
-
memory/928-63-0x0000000000A90000-0x0000000000A9C000-memory.dmpFilesize
48KB
-
memory/928-74-0x0000000000D20000-0x0000000000D2C000-memory.dmpFilesize
48KB
-
memory/928-62-0x0000000000A80000-0x0000000000A88000-memory.dmpFilesize
32KB
-
memory/928-61-0x0000000000A60000-0x0000000000A76000-memory.dmpFilesize
88KB
-
memory/928-54-0x00000000010C0000-0x00000000013A6000-memory.dmpFilesize
2.9MB
-
memory/928-64-0x0000000000AA0000-0x0000000000AAA000-memory.dmpFilesize
40KB
-
memory/928-65-0x0000000000AB0000-0x0000000000B06000-memory.dmpFilesize
344KB
-
memory/928-66-0x0000000000B00000-0x0000000000B0C000-memory.dmpFilesize
48KB
-
memory/928-67-0x0000000000B10000-0x0000000000B18000-memory.dmpFilesize
32KB
-
memory/928-68-0x0000000000BA0000-0x0000000000BB2000-memory.dmpFilesize
72KB
-
memory/928-69-0x0000000000BD0000-0x0000000000BDC000-memory.dmpFilesize
48KB
-
memory/928-70-0x0000000000BE0000-0x0000000000BE8000-memory.dmpFilesize
32KB
-
memory/928-71-0x0000000000CF0000-0x0000000000CFC000-memory.dmpFilesize
48KB
-
memory/928-72-0x0000000000D00000-0x0000000000D0C000-memory.dmpFilesize
48KB
-
memory/928-73-0x0000000000D10000-0x0000000000D18000-memory.dmpFilesize
32KB
-
memory/928-60-0x0000000000420000-0x0000000000428000-memory.dmpFilesize
32KB
-
memory/928-75-0x0000000000D30000-0x0000000000D3A000-memory.dmpFilesize
40KB
-
memory/928-76-0x0000000000D40000-0x0000000000D4E000-memory.dmpFilesize
56KB
-
memory/928-77-0x0000000000D50000-0x0000000000D58000-memory.dmpFilesize
32KB
-
memory/928-78-0x0000000000D60000-0x0000000000D68000-memory.dmpFilesize
32KB
-
memory/928-79-0x0000000000D70000-0x0000000000D78000-memory.dmpFilesize
32KB
-
memory/928-80-0x0000000000F00000-0x0000000000F0A000-memory.dmpFilesize
40KB
-
memory/928-59-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/928-58-0x00000000003F0000-0x00000000003F8000-memory.dmpFilesize
32KB
-
memory/928-57-0x00000000001E0000-0x00000000001EE000-memory.dmpFilesize
56KB
-
memory/928-55-0x000000001B3A0000-0x000000001B420000-memory.dmpFilesize
512KB
-
memory/928-56-0x0000000000150000-0x000000000015E000-memory.dmpFilesize
56KB
-
memory/1808-101-0x0000000000C30000-0x0000000000C86000-memory.dmpFilesize
344KB
-
memory/1808-102-0x0000000000610000-0x0000000000622000-memory.dmpFilesize
72KB
-
memory/1808-100-0x0000000000410000-0x0000000000490000-memory.dmpFilesize
512KB
-
memory/1808-99-0x0000000000E80000-0x0000000001166000-memory.dmpFilesize
2.9MB
-
memory/1808-112-0x0000000000410000-0x0000000000490000-memory.dmpFilesize
512KB