Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 19:47
Static task
static1
Behavioral task
behavioral1
Sample
b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe
Resource
win10v2004-20230220-en
General
-
Target
b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe
-
Size
181KB
-
MD5
e4af76b8468bdda40759b9dba353158a
-
SHA1
1be63fb5990422544cc5291c44ac3b244e03a33f
-
SHA256
b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543
-
SHA512
d6bb952dec307c763d392312fc028728b77cce53d8bb96a8d7594ccc02bacf9bda39e4e1c2b574db7621a972bfa75747db33d4234ca424ff791581fc91859d73
-
SSDEEP
3072:viFx+MrcRKO6ZWpY+38pa6XZNkPNfBACgg7gy0umoF8G:viFI7RKOj5gbXZNkO4gZVob
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\1.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe -
Executes dropped EXE 13 IoCs
Processes:
1.exe1.exe1.exe1.exe1.exe1.exe1.exe1.exe1.exe1.exe1.exe1.exe1.exepid process 2972 1.exe 3216 1.exe 2128 1.exe 3804 1.exe 3232 1.exe 4672 1.exe 2924 1.exe 924 1.exe 4148 1.exe 3652 1.exe 3968 1.exe 4736 1.exe 1740 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.execmd.exedescription pid process target process PID 2680 wrote to memory of 1620 2680 b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe cmd.exe PID 2680 wrote to memory of 1620 2680 b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe cmd.exe PID 2680 wrote to memory of 1620 2680 b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe cmd.exe PID 1620 wrote to memory of 1420 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 1420 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 1420 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 2972 1620 cmd.exe 1.exe PID 1620 wrote to memory of 2972 1620 cmd.exe 1.exe PID 1620 wrote to memory of 2972 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3216 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3216 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3216 1620 cmd.exe 1.exe PID 1620 wrote to memory of 2128 1620 cmd.exe 1.exe PID 1620 wrote to memory of 2128 1620 cmd.exe 1.exe PID 1620 wrote to memory of 2128 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3804 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3804 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3804 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3232 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3232 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3232 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4672 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4672 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4672 1620 cmd.exe 1.exe PID 1620 wrote to memory of 2924 1620 cmd.exe 1.exe PID 1620 wrote to memory of 2924 1620 cmd.exe 1.exe PID 1620 wrote to memory of 2924 1620 cmd.exe 1.exe PID 1620 wrote to memory of 924 1620 cmd.exe 1.exe PID 1620 wrote to memory of 924 1620 cmd.exe 1.exe PID 1620 wrote to memory of 924 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4148 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4148 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4148 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3652 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3652 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3652 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3968 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3968 1620 cmd.exe 1.exe PID 1620 wrote to memory of 3968 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4736 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4736 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4736 1620 cmd.exe 1.exe PID 1620 wrote to memory of 1740 1620 cmd.exe 1.exe PID 1620 wrote to memory of 1740 1620 cmd.exe 1.exe PID 1620 wrote to memory of 1740 1620 cmd.exe 1.exe PID 1620 wrote to memory of 4284 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 4284 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 4284 1620 cmd.exe cmd.exe PID 1620 wrote to memory of 1160 1620 cmd.exe PING.EXE PID 1620 wrote to memory of 1160 1620 cmd.exe PING.EXE PID 1620 wrote to memory of 1160 1620 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe"C:\Users\Admin\AppData\Local\Temp\b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /s /b "*.doc" "*.xls" "*.txt" "*.ppt" "*.docx" "*.xlsx" "*.pptx" "*.pdf" "*.mlf" "*.jpg" "*.png" "*.bmp" "*.rtf"3⤵
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\BroadcastMsg_1676924548.txt"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI1657.txt"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI168B.txt"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI1657.txt"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI168B.txt"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\icon_128.png"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\icon_16.png"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button.png"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button_close.png"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button_hover.png"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button_maximize.png"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button_pressed.png"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /s /b "*_*.doc" "*.xls" "*_*.txt" "*_*.ppt" "*_*.docx" "*_*.xlsx" "*_*.pptx" "*_*.pdf" "*_*.mlf" "*_*.jpg" "*_*.png" "*_*.bmp" "*_*.rtf"3⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0.batFilesize
939B
MD50d2ebfa607fbe73bf76ac43706f19290
SHA12b7cf161e158aaaeb32ad3b0e4ec1e166cdacc70
SHA2564a2c767aa5231a1fb18e7c260572abf2692f311fd9c20955de12c45512b71870
SHA5124d3a6bd525332114654ce86ffa5b837949fe77ed12ce9abfb5760eae839a5a3ed884bc9b95c572b6f2e1c14800a54e7a6be6ad21a585af67316ad28526948f6c
-
C:\Users\Admin\AppData\Local\Temp\0.batFilesize
939B
MD50d2ebfa607fbe73bf76ac43706f19290
SHA12b7cf161e158aaaeb32ad3b0e4ec1e166cdacc70
SHA2564a2c767aa5231a1fb18e7c260572abf2692f311fd9c20955de12c45512b71870
SHA5124d3a6bd525332114654ce86ffa5b837949fe77ed12ce9abfb5760eae839a5a3ed884bc9b95c572b6f2e1c14800a54e7a6be6ad21a585af67316ad28526948f6c
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
C:\Users\Admin\AppData\Local\Temp\1.exeFilesize
41KB
MD51b9f50b972ba520df3a5883e94058b2f
SHA1303471507dc565f6588e7b89b0e95b55daae94ed
SHA256855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68
SHA5124fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6
-
memory/924-177-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/924-176-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/924-178-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/1740-198-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/1740-197-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/1740-196-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2128-156-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2128-155-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2128-154-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2680-158-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2680-133-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2924-172-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2924-173-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2924-174-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2972-148-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2972-147-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/2972-146-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3216-152-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3216-151-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3216-150-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3232-166-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3232-164-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3232-165-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3652-184-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3652-186-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3652-185-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3804-159-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3804-160-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3804-161-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3804-162-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3968-188-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3968-190-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/3968-189-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/4148-180-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/4148-182-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/4148-181-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/4672-170-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB
-
memory/4736-194-0x0000000000C60000-0x0000000000C8F000-memory.dmpFilesize
188KB