Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-06-2023 21:42
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
544KB
-
MD5
b845df3aaaad96d130c777e0f1fc8c6d
-
SHA1
9983a70ecaa59c2b971fce43d3536dcaef11a799
-
SHA256
2757622e10dfe3c86c4b32d6bb8af6745af1bc797a2a1761e7f0be08350b66c5
-
SHA512
7a77f43f7628714315b7c65fa719dcf736601fe028ff207e23316b3167f848030d8cbcbccff3e067713d6fe3a6310b72152a820f9c80841e6812f86be43f22c6
-
SSDEEP
12288:nG7TdJx/2aqY2V4s2nX7eFK3b/NtVJ6vgL4Xp9xqrTFpNDzTzXxNTZV6nkJoS:4TdJLRQkXoWVJ2gL4j43FzzTzBNTZV6n
Malware Config
Signatures
-
Detect Blackmoon payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/528-54-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral1/memory/528-55-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral1/memory/528-56-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral1/memory/528-57-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral1/memory/528-61-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral1/memory/2824-124-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon behavioral1/memory/2824-129-0x0000000000400000-0x000000000058A000-memory.dmp family_blackmoon -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
Chrome.xx×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exeChrome.xxpid process 108 Chrome.xx 2824 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 2928 Chrome.xx -
Loads dropped DLL 9 IoCs
Processes:
tmp.exeChrome.xx×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exeChrome.xxpid process 528 tmp.exe 528 tmp.exe 108 Chrome.xx 108 Chrome.xx 108 Chrome.xx 2824 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 2824 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 2928 Chrome.xx 2928 Chrome.xx -
Processes:
resource yara_rule behavioral1/memory/528-54-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/memory/528-55-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/memory/528-56-0x0000000000400000-0x000000000058A000-memory.dmp upx behavioral1/memory/528-57-0x0000000000400000-0x000000000058A000-memory.dmp upx \Users\Admin\AppData\Local\Temp\Chrome.xx upx \Users\Admin\AppData\Local\Temp\Chrome.xx upx behavioral1/memory/528-61-0x0000000000400000-0x000000000058A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\Chrome.xx upx behavioral1/memory/108-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-102-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-104-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-106-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-108-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-109-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/108-110-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral1/memory/108-111-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral1/memory/108-112-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral1/memory/108-113-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral1/memory/108-118-0x0000000000400000-0x0000000000A37000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe upx behavioral1/memory/108-122-0x000000001C6D0000-0x000000001C85A000-memory.dmp upx behavioral1/memory/2824-124-0x0000000000400000-0x000000000058A000-memory.dmp upx \Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe upx \Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe upx behavioral1/memory/108-125-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral1/memory/108-126-0x0000000010000000-0x000000001003E000-memory.dmp upx \Users\Admin\AppData\Local\Temp\Chrome.xx upx \Users\Admin\AppData\Local\Temp\Chrome.xx upx behavioral1/memory/2824-129-0x0000000000400000-0x000000000058A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\Chrome.xx upx behavioral1/memory/2928-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-140-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-142-0x0000000000400000-0x0000000000A37000-memory.dmp upx behavioral1/memory/2928-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-145-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-147-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-179-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2928-180-0x0000000000400000-0x0000000000A37000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Chrome.xxChrome.xxdescription ioc process File opened for modification \??\PhysicalDrive0 Chrome.xx File opened for modification \??\PhysicalDrive0 Chrome.xx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Chrome.xxChrome.xxpid process 108 Chrome.xx 2928 Chrome.xx -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
Chrome.xxChrome.xxpid process 108 Chrome.xx 108 Chrome.xx 108 Chrome.xx 2928 Chrome.xx 2928 Chrome.xx 2928 Chrome.xx -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Chrome.xxChrome.xxpid process 108 Chrome.xx 2928 Chrome.xx -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
tmp.exeChrome.xx×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exeChrome.xxpid process 528 tmp.exe 108 Chrome.xx 108 Chrome.xx 108 Chrome.xx 2824 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe 2928 Chrome.xx 2928 Chrome.xx 2928 Chrome.xx -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
tmp.exeChrome.xx×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exedescription pid process target process PID 528 wrote to memory of 108 528 tmp.exe Chrome.xx PID 528 wrote to memory of 108 528 tmp.exe Chrome.xx PID 528 wrote to memory of 108 528 tmp.exe Chrome.xx PID 528 wrote to memory of 108 528 tmp.exe Chrome.xx PID 108 wrote to memory of 2824 108 Chrome.xx ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe PID 108 wrote to memory of 2824 108 Chrome.xx ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe PID 108 wrote to memory of 2824 108 Chrome.xx ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe PID 108 wrote to memory of 2824 108 Chrome.xx ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe PID 2824 wrote to memory of 2928 2824 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe Chrome.xx PID 2824 wrote to memory of 2928 2824 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe Chrome.xx PID 2824 wrote to memory of 2928 2824 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe Chrome.xx PID 2824 wrote to memory of 2928 2824 ×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe Chrome.xx
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Chrome.xxC:\Users\Admin\AppData\Local\Temp\Chrome.xx2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exeC:\Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Chrome.xxC:\Users\Admin\AppData\Local\Temp\Chrome.xx4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Chrome.xxFilesize
3.5MB
MD5c98f169c204562fab20fffb2417e037a
SHA1e8fa26609efe1eac8022cf3264dba0b0a6016f58
SHA256022607c07e9fa8c9140025038d0e2942451be2f03fa509c7fe4d9c787d2d0dc9
SHA512ab5186a1e5d9b201a7cc8602ec67184a3a1ba713950bc95e81e72129aff315a5baa0f07da061c53dda85282091d36aea69efbd6747b87c1aca190cb3191da88b
-
C:\Users\Admin\AppData\Local\Temp\Chrome.xxFilesize
3.5MB
MD5c98f169c204562fab20fffb2417e037a
SHA1e8fa26609efe1eac8022cf3264dba0b0a6016f58
SHA256022607c07e9fa8c9140025038d0e2942451be2f03fa509c7fe4d9c787d2d0dc9
SHA512ab5186a1e5d9b201a7cc8602ec67184a3a1ba713950bc95e81e72129aff315a5baa0f07da061c53dda85282091d36aea69efbd6747b87c1aca190cb3191da88b
-
C:\Users\Admin\AppData\Local\Temp\HPSocket4C.dllFilesize
2.1MB
MD504869ada712c189caba4822be0e81ea5
SHA19c45486b30e6d3ccf0737c5766796baaf58232ab
SHA25623078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b
SHA51216f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c
-
C:\Users\Admin\AppData\Local\Temp\RapidJSON.dllFilesize
126KB
MD506567999fb99885b06c69740eaf13430
SHA10411b572e70b44fecb694f9930d5c8bc6db51d3c
SHA2564ab513e6b4d0e72981c2b2ce91c13f183704bb067d21713cd6c2f9b53a545728
SHA512170d99cf5f6bae1c4ef8165a7e75033e2050e49aa5f65a094bb9cec646e72321cb121f3fb0c2b9ad1e9aa8155c67699ba7c03e6b703f2531d9cd185423dabf0f
-
C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exeFilesize
544KB
MD5b845df3aaaad96d130c777e0f1fc8c6d
SHA19983a70ecaa59c2b971fce43d3536dcaef11a799
SHA2562757622e10dfe3c86c4b32d6bb8af6745af1bc797a2a1761e7f0be08350b66c5
SHA5127a77f43f7628714315b7c65fa719dcf736601fe028ff207e23316b3167f848030d8cbcbccff3e067713d6fe3a6310b72152a820f9c80841e6812f86be43f22c6
-
\Users\Admin\AppData\Local\Temp\Chrome.xxFilesize
3.5MB
MD5c98f169c204562fab20fffb2417e037a
SHA1e8fa26609efe1eac8022cf3264dba0b0a6016f58
SHA256022607c07e9fa8c9140025038d0e2942451be2f03fa509c7fe4d9c787d2d0dc9
SHA512ab5186a1e5d9b201a7cc8602ec67184a3a1ba713950bc95e81e72129aff315a5baa0f07da061c53dda85282091d36aea69efbd6747b87c1aca190cb3191da88b
-
\Users\Admin\AppData\Local\Temp\Chrome.xxFilesize
3.5MB
MD5c98f169c204562fab20fffb2417e037a
SHA1e8fa26609efe1eac8022cf3264dba0b0a6016f58
SHA256022607c07e9fa8c9140025038d0e2942451be2f03fa509c7fe4d9c787d2d0dc9
SHA512ab5186a1e5d9b201a7cc8602ec67184a3a1ba713950bc95e81e72129aff315a5baa0f07da061c53dda85282091d36aea69efbd6747b87c1aca190cb3191da88b
-
\Users\Admin\AppData\Local\Temp\Chrome.xxFilesize
3.5MB
MD5c98f169c204562fab20fffb2417e037a
SHA1e8fa26609efe1eac8022cf3264dba0b0a6016f58
SHA256022607c07e9fa8c9140025038d0e2942451be2f03fa509c7fe4d9c787d2d0dc9
SHA512ab5186a1e5d9b201a7cc8602ec67184a3a1ba713950bc95e81e72129aff315a5baa0f07da061c53dda85282091d36aea69efbd6747b87c1aca190cb3191da88b
-
\Users\Admin\AppData\Local\Temp\Chrome.xxFilesize
3.5MB
MD5c98f169c204562fab20fffb2417e037a
SHA1e8fa26609efe1eac8022cf3264dba0b0a6016f58
SHA256022607c07e9fa8c9140025038d0e2942451be2f03fa509c7fe4d9c787d2d0dc9
SHA512ab5186a1e5d9b201a7cc8602ec67184a3a1ba713950bc95e81e72129aff315a5baa0f07da061c53dda85282091d36aea69efbd6747b87c1aca190cb3191da88b
-
\Users\Admin\AppData\Local\Temp\HPSocket4C.dllFilesize
2.1MB
MD504869ada712c189caba4822be0e81ea5
SHA19c45486b30e6d3ccf0737c5766796baaf58232ab
SHA25623078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b
SHA51216f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c
-
\Users\Admin\AppData\Local\Temp\HPSocket4C.dllFilesize
2.1MB
MD504869ada712c189caba4822be0e81ea5
SHA19c45486b30e6d3ccf0737c5766796baaf58232ab
SHA25623078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b
SHA51216f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c
-
\Users\Admin\AppData\Local\Temp\RapidJSON.dllFilesize
126KB
MD506567999fb99885b06c69740eaf13430
SHA10411b572e70b44fecb694f9930d5c8bc6db51d3c
SHA2564ab513e6b4d0e72981c2b2ce91c13f183704bb067d21713cd6c2f9b53a545728
SHA512170d99cf5f6bae1c4ef8165a7e75033e2050e49aa5f65a094bb9cec646e72321cb121f3fb0c2b9ad1e9aa8155c67699ba7c03e6b703f2531d9cd185423dabf0f
-
\Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exeFilesize
544KB
MD5b845df3aaaad96d130c777e0f1fc8c6d
SHA19983a70ecaa59c2b971fce43d3536dcaef11a799
SHA2562757622e10dfe3c86c4b32d6bb8af6745af1bc797a2a1761e7f0be08350b66c5
SHA5127a77f43f7628714315b7c65fa719dcf736601fe028ff207e23316b3167f848030d8cbcbccff3e067713d6fe3a6310b72152a820f9c80841e6812f86be43f22c6
-
\Users\Admin\AppData\Local\Temp\×Ô¶¯Ñ§Ï°(Íⲿ¹È¸è°æ).exeFilesize
544KB
MD5b845df3aaaad96d130c777e0f1fc8c6d
SHA19983a70ecaa59c2b971fce43d3536dcaef11a799
SHA2562757622e10dfe3c86c4b32d6bb8af6745af1bc797a2a1761e7f0be08350b66c5
SHA5127a77f43f7628714315b7c65fa719dcf736601fe028ff207e23316b3167f848030d8cbcbccff3e067713d6fe3a6310b72152a820f9c80841e6812f86be43f22c6
-
memory/108-80-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-122-0x000000001C6D0000-0x000000001C85A000-memory.dmpFilesize
1.5MB
-
memory/108-66-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-82-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-84-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-86-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-88-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-90-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-92-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-94-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-96-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-98-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-100-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-102-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-104-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-106-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-108-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-109-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-110-0x0000000000400000-0x0000000000A37000-memory.dmpFilesize
6.2MB
-
memory/108-111-0x0000000000400000-0x0000000000A37000-memory.dmpFilesize
6.2MB
-
memory/108-112-0x0000000000400000-0x0000000000A37000-memory.dmpFilesize
6.2MB
-
memory/108-113-0x0000000000400000-0x0000000000A37000-memory.dmpFilesize
6.2MB
-
memory/108-76-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-118-0x0000000000400000-0x0000000000A37000-memory.dmpFilesize
6.2MB
-
memory/108-74-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-78-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-123-0x000000001C6D0000-0x000000001C85A000-memory.dmpFilesize
1.5MB
-
memory/108-67-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-72-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-70-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-125-0x0000000000400000-0x0000000000A37000-memory.dmpFilesize
6.2MB
-
memory/108-126-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/108-68-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/528-57-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/528-54-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/528-61-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/528-55-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/528-56-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/2824-129-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/2824-124-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/2928-138-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-133-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-140-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-142-0x0000000000400000-0x0000000000A37000-memory.dmpFilesize
6.2MB
-
memory/2928-143-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-145-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-147-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-179-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-180-0x0000000000400000-0x0000000000A37000-memory.dmpFilesize
6.2MB
-
memory/2928-135-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2928-134-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB