Analysis
-
max time kernel
157s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
Office365 Checker.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Office365 Checker.exe
Resource
win10v2004-20230220-en
General
-
Target
Office365 Checker.exe
-
Size
1015KB
-
MD5
13070b929870d933534ac2169adaffe7
-
SHA1
4c6a9dedc8b85335e40f67786d025b2005a054f7
-
SHA256
0bd0e4c5302be6496b439de8c8b86fed3e94eca9d803dce5b0d1ef8d08a14d35
-
SHA512
732796485f8853b24adfbc7b7d7b58e5d4d95cd92cc20be547ba19ff27f89ac233763f4f370a1719290daf3a94f90a043528ee5f52dbe0b3fba87049f48d4922
-
SSDEEP
12288:LDCmeZxmoAQhPmeZxmoYTmr4/YO2MoLOA0sU+nCpCBMutsN:fWJIWJbr4/YOroLyB+nCpQDts
Malware Config
Extracted
njrat
0.7d
HacKed
blog.hackcrack.io:8082
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explorer.exeOffice365 Checker.exeSetup.exesvchost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Office365 Checker.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 5 IoCs
Processes:
Setup.exeSetup.exeOffice365 Checker .exesvchost.exeexplorer.exepid process 3760 Setup.exe 2024 Setup.exe 3100 Office365 Checker .exe 848 svchost.exe 4584 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Setup.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Corporation Security = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svchost.exe" Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Explorer = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\explorer.exe" explorer.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
Setup.exeSetup.exedescription ioc process File created C:\Windows\assembly\Desktop.ini Setup.exe File opened for modification C:\Windows\assembly\Desktop.ini Setup.exe File opened for modification C:\Windows\assembly\Desktop.ini Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorer.exedescription pid process target process PID 4584 set thread context of 4952 4584 explorer.exe RegAsm.exe -
Drops file in Windows directory 5 IoCs
Processes:
Setup.exeSetup.exedescription ioc process File opened for modification C:\Windows\assembly Setup.exe File created C:\Windows\assembly\Desktop.ini Setup.exe File opened for modification C:\Windows\assembly\Desktop.ini Setup.exe File opened for modification C:\Windows\assembly Setup.exe File opened for modification C:\Windows\assembly\Desktop.ini Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4724 3100 WerFault.exe Office365 Checker .exe -
Modifies registry class 15 IoCs
Processes:
explorer.exefodhelper.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx\Shell\Open\command\ = "cmd /c PowerShell.exe -windowstyle hidden Set-MpPreference -ExclusionPath C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\" explorer.exe Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\CurVer explorer.exe Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx explorer.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx\Shell\Open\command explorer.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings fodhelper.exe Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx\Shell\Open explorer.exe Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\CurVer explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings\CurVer\ = "AppXc91f92cj77xo7mv5s5uxf762ecr7orpx" explorer.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx\Shell\Open explorer.exe Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\ms-settings explorer.exe Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\AppXc91f92cj77xo7mv5s5uxf762ecr7orpx\Shell\Open\command explorer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeexplorer.exepid process 1332 powershell.exe 1332 powershell.exe 4584 explorer.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
svchost.exepowershell.exeexplorer.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 848 svchost.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeDebugPrivilege 4584 explorer.exe Token: SeDebugPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe Token: 33 4952 RegAsm.exe Token: SeIncBasePriorityPrivilege 4952 RegAsm.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
Office365 Checker.exeSetup.exesvchost.exeexplorer.exefodhelper.execmd.exeRegAsm.exedescription pid process target process PID 368 wrote to memory of 3760 368 Office365 Checker.exe Setup.exe PID 368 wrote to memory of 3760 368 Office365 Checker.exe Setup.exe PID 368 wrote to memory of 2024 368 Office365 Checker.exe Setup.exe PID 368 wrote to memory of 2024 368 Office365 Checker.exe Setup.exe PID 368 wrote to memory of 3100 368 Office365 Checker.exe Office365 Checker .exe PID 368 wrote to memory of 3100 368 Office365 Checker.exe Office365 Checker .exe PID 368 wrote to memory of 3100 368 Office365 Checker.exe Office365 Checker .exe PID 2024 wrote to memory of 848 2024 Setup.exe svchost.exe PID 2024 wrote to memory of 848 2024 Setup.exe svchost.exe PID 848 wrote to memory of 4584 848 svchost.exe explorer.exe PID 848 wrote to memory of 4584 848 svchost.exe explorer.exe PID 4584 wrote to memory of 1848 4584 explorer.exe fodhelper.exe PID 4584 wrote to memory of 1848 4584 explorer.exe fodhelper.exe PID 1848 wrote to memory of 3640 1848 fodhelper.exe cmd.exe PID 1848 wrote to memory of 3640 1848 fodhelper.exe cmd.exe PID 3640 wrote to memory of 1332 3640 cmd.exe powershell.exe PID 3640 wrote to memory of 1332 3640 cmd.exe powershell.exe PID 4584 wrote to memory of 4952 4584 explorer.exe RegAsm.exe PID 4584 wrote to memory of 4952 4584 explorer.exe RegAsm.exe PID 4584 wrote to memory of 4952 4584 explorer.exe RegAsm.exe PID 4584 wrote to memory of 4952 4584 explorer.exe RegAsm.exe PID 4584 wrote to memory of 4952 4584 explorer.exe RegAsm.exe PID 4584 wrote to memory of 4952 4584 explorer.exe RegAsm.exe PID 4584 wrote to memory of 4952 4584 explorer.exe RegAsm.exe PID 4584 wrote to memory of 4952 4584 explorer.exe RegAsm.exe PID 4952 wrote to memory of 4916 4952 RegAsm.exe netsh.exe PID 4952 wrote to memory of 4916 4952 RegAsm.exe netsh.exe PID 4952 wrote to memory of 4916 4952 RegAsm.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker.exe"C:\Users\Admin\AppData\Local\Temp\Office365 Checker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\windows\system32\fodhelper.exe"C:\windows\system32\fodhelper.exe"5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /c PowerShell.exe -windowstyle hidden Set-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -windowstyle hidden Set-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\Microsoft\Windows\7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe#cmd5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE6⤵
- Modifies Windows Firewall
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe"C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 8043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3100 -ip 31001⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.logFilesize
408B
MD570f08e6585ed9994d97a4c71472fccd8
SHA13f44494d4747c87fb8b94bb153c3a3d717f9fd63
SHA25687fbf339c47e259826080aa2dcbdf371ea47a50eec88222c6e64a92906cb37fa
SHA512d381aec2ea869f3b2d06497e934c7fe993df6deac719370bd74310a29e8e48b6497559922d2cb44ace97c4bd7ad00eae8fe92a31081f2119de3ddbb5988af388
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
451KB
MD58279b0e5326e13b048dc80d47ce7e86b
SHA1336ff5fbe4cae573d9a5f7092eb53ca879a9b456
SHA256d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6
SHA51271c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
451KB
MD58279b0e5326e13b048dc80d47ce7e86b
SHA1336ff5fbe4cae573d9a5f7092eb53ca879a9b456
SHA256d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6
SHA51271c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
451KB
MD58279b0e5326e13b048dc80d47ce7e86b
SHA1336ff5fbe4cae573d9a5f7092eb53ca879a9b456
SHA256d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6
SHA51271c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
451KB
MD58279b0e5326e13b048dc80d47ce7e86b
SHA1336ff5fbe4cae573d9a5f7092eb53ca879a9b456
SHA256d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6
SHA51271c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0zey3by1.ugp.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
208KB
MD5fdba80a556cada3d7e2b5df86d1948a5
SHA11b8aaafbebc63f0aa886169eedbead626498efe3
SHA256175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05
SHA512ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
208KB
MD5fdba80a556cada3d7e2b5df86d1948a5
SHA11b8aaafbebc63f0aa886169eedbead626498efe3
SHA256175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05
SHA512ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
208KB
MD5fdba80a556cada3d7e2b5df86d1948a5
SHA11b8aaafbebc63f0aa886169eedbead626498efe3
SHA256175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05
SHA512ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exeFilesize
318KB
MD523ce98b7618b4feb3c10bee606d171bd
SHA13e2359692f447a175610312be6f98f726d9defb3
SHA256520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881
SHA5126db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exeFilesize
318KB
MD523ce98b7618b4feb3c10bee606d171bd
SHA13e2359692f447a175610312be6f98f726d9defb3
SHA256520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881
SHA5126db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exeFilesize
318KB
MD523ce98b7618b4feb3c10bee606d171bd
SHA13e2359692f447a175610312be6f98f726d9defb3
SHA256520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881
SHA5126db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b
-
C:\Windows\assembly\Desktop.iniFilesize
227B
MD5f7f759a5cd40bc52172e83486b6de404
SHA1d74930f354a56cfd03dc91aa96d8ae9657b1ee54
SHA256a709c2551b8818d7849d31a65446dc2f8c4cca2dcbbc5385604286f49cfdaf1c
SHA512a50b7826bfe72506019e4b1148a214c71c6f4743c09e809ef15cd0e0223f3078b683d203200910b07b5e1e34b94f0fe516ac53527311e2943654bfceade53298
-
memory/368-133-0x0000000000750000-0x0000000000854000-memory.dmpFilesize
1.0MB
-
memory/368-137-0x0000000001200000-0x0000000001210000-memory.dmpFilesize
64KB
-
memory/368-136-0x000000001C390000-0x000000001C42C000-memory.dmpFilesize
624KB
-
memory/368-135-0x000000001BEC0000-0x000000001C38E000-memory.dmpFilesize
4.8MB
-
memory/368-134-0x0000000001310000-0x00000000013B6000-memory.dmpFilesize
664KB
-
memory/848-193-0x00000000009D0000-0x00000000009D8000-memory.dmpFilesize
32KB
-
memory/848-192-0x0000000000140000-0x0000000000196000-memory.dmpFilesize
344KB
-
memory/1332-233-0x000001417E5E0000-0x000001417F0A1000-memory.dmpFilesize
10.8MB
-
memory/1332-231-0x000001417F0F0000-0x000001417F100000-memory.dmpFilesize
64KB
-
memory/1332-232-0x000001417F0F0000-0x000001417F100000-memory.dmpFilesize
64KB
-
memory/1332-228-0x000001417F1C0000-0x000001417F1E2000-memory.dmpFilesize
136KB
-
memory/1332-218-0x000001417F0F0000-0x000001417F100000-memory.dmpFilesize
64KB
-
memory/1332-217-0x000001417F0F0000-0x000001417F100000-memory.dmpFilesize
64KB
-
memory/2024-171-0x0000000001640000-0x0000000001650000-memory.dmpFilesize
64KB
-
memory/2024-165-0x0000000001670000-0x000000000169A000-memory.dmpFilesize
168KB
-
memory/3100-172-0x0000000000120000-0x00000000001AE000-memory.dmpFilesize
568KB
-
memory/3760-151-0x0000000000800000-0x0000000000810000-memory.dmpFilesize
64KB
-
memory/3760-149-0x00000000002C0000-0x0000000000336000-memory.dmpFilesize
472KB
-
memory/4584-216-0x0000000000BC0000-0x0000000000BDA000-memory.dmpFilesize
104KB
-
memory/4584-215-0x0000000000960000-0x0000000000982000-memory.dmpFilesize
136KB
-
memory/4584-214-0x00000000009D0000-0x00000000009E0000-memory.dmpFilesize
64KB
-
memory/4584-213-0x00000000001D0000-0x000000000020A000-memory.dmpFilesize
232KB
-
memory/4952-236-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4952-238-0x0000000000FA0000-0x0000000000FB0000-memory.dmpFilesize
64KB
-
memory/4952-239-0x0000000000FA0000-0x0000000000FB0000-memory.dmpFilesize
64KB