Overview
overview
10Static
static
3ChatGPT-4_Online.rar
windows7-x64
3ChatGPT-4_Online.rar
windows10-2004-x64
3ChatGPT-4 Online.exe
windows7-x64
10ChatGPT-4 Online.exe
windows10-2004-x64
10NL7Data0404.dll
windows7-x64
3NL7Data0404.dll
windows10-2004-x64
3NlsData004a.dll
windows7-x64
3NlsData004a.dll
windows10-2004-x64
3Analysis
-
max time kernel
57s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2023 21:14
Static task
static1
Behavioral task
behavioral1
Sample
ChatGPT-4_Online.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ChatGPT-4_Online.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
ChatGPT-4 Online.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
ChatGPT-4 Online.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
NL7Data0404.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
NL7Data0404.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
NlsData004a.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
NlsData004a.dll
Resource
win10v2004-20230221-en
General
-
Target
ChatGPT-4 Online.exe
-
Size
1.2MB
-
MD5
88f8bb1fa6bdda82ff9e4150e5084533
-
SHA1
daa56b740fde8da38580c1f053e4511d20a5b733
-
SHA256
8a6672b8b7165db85a63750a12a89f8c0d55f7f2a98042f25be8740324469ecc
-
SHA512
8add946ceee5e3b8440b1be7ce2eedb84c70fa72eaaecacfa00e214660743bebec22a72056313ea66c287ab5fe9b36a53593cc8d7567bafb11db40dfa2c1912b
-
SSDEEP
24576:lgZXoZUTVdt7KP1r0tNH7zaWHXw6uyRZ3gVb1s7qagNqT083VxMa:Q6CNb2W4hO7j083Vxv
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral3/memory/432-78-0x0000000000400000-0x00000000004C8000-memory.dmp dcrat behavioral3/memory/432-79-0x0000000000400000-0x00000000004C8000-memory.dmp dcrat behavioral3/memory/432-81-0x0000000000400000-0x00000000004C8000-memory.dmp dcrat behavioral3/memory/432-83-0x0000000000400000-0x00000000004C8000-memory.dmp dcrat behavioral3/memory/432-85-0x0000000000400000-0x00000000004C8000-memory.dmp dcrat -
.NET Reactor proctector 14 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor behavioral3/memory/1668-100-0x0000000001050000-0x000000000106C000-memory.dmp net_reactor behavioral3/memory/1668-101-0x0000000004B90000-0x0000000004BD0000-memory.dmp net_reactor behavioral3/memory/1668-111-0x0000000004B90000-0x0000000004BD0000-memory.dmp net_reactor \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe net_reactor -
Drops startup file 2 IoCs
Processes:
system32.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe system32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe system32.exe -
Executes dropped EXE 4 IoCs
Processes:
ChatGPT-4 Online.exesystem32.exesystem32.exesystem32.exepid process 1736 ChatGPT-4 Online.exe 1668 system32.exe 584 system32.exe 440 system32.exe -
Loads dropped DLL 10 IoCs
Processes:
ChatGPT-4 Online.exesystem32.exepid process 932 ChatGPT-4 Online.exe 932 ChatGPT-4 Online.exe 932 ChatGPT-4 Online.exe 932 ChatGPT-4 Online.exe 932 ChatGPT-4 Online.exe 932 ChatGPT-4 Online.exe 932 ChatGPT-4 Online.exe 932 ChatGPT-4 Online.exe 1668 system32.exe 1668 system32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
ChatGPT-4 Online.exesystem32.exedescription pid process target process PID 1736 set thread context of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1668 set thread context of 440 1668 system32.exe system32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
system32.exepid process 1668 system32.exe 1668 system32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RegAsm.exeAUDIODG.EXEsystem32.exedescription pid process Token: SeDebugPrivilege 432 RegAsm.exe Token: 33 1928 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1928 AUDIODG.EXE Token: 33 1928 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1928 AUDIODG.EXE Token: SeDebugPrivilege 1668 system32.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
ChatGPT-4 Online.exeChatGPT-4 Online.exeRegAsm.exew32tm.exesystem32.exedescription pid process target process PID 932 wrote to memory of 1736 932 ChatGPT-4 Online.exe ChatGPT-4 Online.exe PID 932 wrote to memory of 1736 932 ChatGPT-4 Online.exe ChatGPT-4 Online.exe PID 932 wrote to memory of 1736 932 ChatGPT-4 Online.exe ChatGPT-4 Online.exe PID 932 wrote to memory of 1736 932 ChatGPT-4 Online.exe ChatGPT-4 Online.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 1736 wrote to memory of 432 1736 ChatGPT-4 Online.exe RegAsm.exe PID 932 wrote to memory of 1668 932 ChatGPT-4 Online.exe system32.exe PID 932 wrote to memory of 1668 932 ChatGPT-4 Online.exe system32.exe PID 932 wrote to memory of 1668 932 ChatGPT-4 Online.exe system32.exe PID 932 wrote to memory of 1668 932 ChatGPT-4 Online.exe system32.exe PID 432 wrote to memory of 1188 432 RegAsm.exe cmd.exe PID 432 wrote to memory of 1188 432 RegAsm.exe cmd.exe PID 432 wrote to memory of 1188 432 RegAsm.exe cmd.exe PID 432 wrote to memory of 1188 432 RegAsm.exe cmd.exe PID 1352 wrote to memory of 476 1352 w32tm.exe w32tm.exe PID 1352 wrote to memory of 476 1352 w32tm.exe w32tm.exe PID 1352 wrote to memory of 476 1352 w32tm.exe w32tm.exe PID 1352 wrote to memory of 476 1352 w32tm.exe w32tm.exe PID 1668 wrote to memory of 584 1668 system32.exe system32.exe PID 1668 wrote to memory of 584 1668 system32.exe system32.exe PID 1668 wrote to memory of 584 1668 system32.exe system32.exe PID 1668 wrote to memory of 584 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe PID 1668 wrote to memory of 440 1668 system32.exe system32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChatGPT-4 Online.exe"C:\Users\Admin\AppData\Local\Temp\ChatGPT-4 Online.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JCnMdX7E06.bat"4⤵
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"3⤵
- Drops startup file
- Executes dropped EXE
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4781⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exeFilesize
793KB
MD53522d7d178bf7e584590a2e91b322c9b
SHA12300feb56b604e59b68089e08b58cb36a1e40049
SHA2567f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb
SHA512b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exeFilesize
793KB
MD53522d7d178bf7e584590a2e91b322c9b
SHA12300feb56b604e59b68089e08b58cb36a1e40049
SHA2567f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb
SHA512b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exeFilesize
793KB
MD53522d7d178bf7e584590a2e91b322c9b
SHA12300feb56b604e59b68089e08b58cb36a1e40049
SHA2567f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb
SHA512b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exeFilesize
793KB
MD53522d7d178bf7e584590a2e91b322c9b
SHA12300feb56b604e59b68089e08b58cb36a1e40049
SHA2567f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb
SHA512b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5
-
\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exeFilesize
793KB
MD53522d7d178bf7e584590a2e91b322c9b
SHA12300feb56b604e59b68089e08b58cb36a1e40049
SHA2567f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb
SHA512b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5
-
\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exeFilesize
793KB
MD53522d7d178bf7e584590a2e91b322c9b
SHA12300feb56b604e59b68089e08b58cb36a1e40049
SHA2567f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb
SHA512b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5
-
\Users\Admin\AppData\Local\Temp\RarSFX0\ChatGPT-4 Online.exeFilesize
793KB
MD53522d7d178bf7e584590a2e91b322c9b
SHA12300feb56b604e59b68089e08b58cb36a1e40049
SHA2567f1db40aeb5d489f740bfda8303d4be39d47269bd0b0b3b0a6bef847fda9cdeb
SHA512b7441e645f140ebb50c08f653a86446717c64c451711cd70595a6f57bfa4551cf329958d67e83c8da0bbe19958b353bde8bf79ca6f7eef8593360536eed344b5
-
\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exeFilesize
86KB
MD5e1e5c813becf6216ea98a713202b74fa
SHA120ede3dbbc8dddf85d4c260a8ca28e2cb02fc2e5
SHA2564ea4b2dece3813dd9755d8c6bb87f7f46c89a73ee7fbc79c0b2ab8014e156400
SHA5123a43b1e8c561be4a051de722bba1d58c793a4b0ee4475ae37e0ee3eb03f989e4828f29111e5ccc295bdbd82c57f5d20d7d654ae61fb5442862ede08278fbfca1
-
memory/432-103-0x0000000000520000-0x000000000053C000-memory.dmpFilesize
112KB
-
memory/432-76-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/432-78-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/432-83-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/432-81-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/432-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/432-77-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/432-79-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/432-85-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/432-106-0x00000000007D0000-0x00000000007DC000-memory.dmpFilesize
48KB
-
memory/432-102-0x0000000004D50000-0x0000000004D90000-memory.dmpFilesize
256KB
-
memory/432-105-0x0000000000540000-0x0000000000550000-memory.dmpFilesize
64KB
-
memory/432-104-0x0000000000740000-0x0000000000756000-memory.dmpFilesize
88KB
-
memory/440-121-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/440-128-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/440-125-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/440-123-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/440-124-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/440-122-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/440-130-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/440-120-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1092-115-0x0000000000CC0000-0x0000000000CD2000-memory.dmpFilesize
72KB
-
memory/1668-100-0x0000000001050000-0x000000000106C000-memory.dmpFilesize
112KB
-
memory/1668-116-0x00000000003D0000-0x00000000003DC000-memory.dmpFilesize
48KB
-
memory/1668-111-0x0000000004B90000-0x0000000004BD0000-memory.dmpFilesize
256KB
-
memory/1668-101-0x0000000004B90000-0x0000000004BD0000-memory.dmpFilesize
256KB
-
memory/1736-73-0x0000000004E30000-0x0000000004E70000-memory.dmpFilesize
256KB
-
memory/1736-74-0x0000000004E30000-0x0000000004E70000-memory.dmpFilesize
256KB
-
memory/1736-72-0x0000000001390000-0x000000000145C000-memory.dmpFilesize
816KB
-
memory/1736-75-0x0000000004860000-0x000000000492A000-memory.dmpFilesize
808KB