Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08-09-2023 20:47
Behavioral task
behavioral1
Sample
1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe
Resource
win10v2004-20230831-en
General
-
Target
1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe
-
Size
96KB
-
MD5
c00262699ae0facbf297badd09233876
-
SHA1
305a02a7c0623004c6b9fa2c91a883f840d751bc
-
SHA256
00b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
-
SHA512
845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
SSDEEP
1536:qExAU0oN36tuQviFw15GHyBnvb3fLteF3nLrB9z3nOaF9bhS9vM:bxAU0oN36tuQviFCYSBnDfWl9zeaF9bV
Malware Config
Extracted
njrat
Platinum
Cheats
127.0.0.1:1
smss.exe
-
reg_key
smss.exe
-
splitter
|Ghost|
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1768 cmd.exe -
Drops startup file 3 IoCs
Processes:
smss.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smss.exe smss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smss.exe smss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smss.url smss.exe -
Executes dropped EXE 5 IoCs
Processes:
smss.exed23da00ec512413b847bf704a62d143c.exesmss.exe2eba04e31f4e4237baeeaa953fdde00c.exesmss.exepid process 1752 smss.exe 2044 d23da00ec512413b847bf704a62d143c.exe 1108 smss.exe 1324 2eba04e31f4e4237baeeaa953fdde00c.exe 1888 smss.exe -
Loads dropped DLL 4 IoCs
Processes:
1916-1-0x00000000009A0000-0x00000000009B8000-memory.exesmss.exepid process 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe 1752 smss.exe 1752 smss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
smss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\smss.exe\" .." smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\smss.exe\" .." smss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2380 schtasks.exe 2560 schtasks.exe 1396 schtasks.exe 2992 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
smss.exedescription pid process Token: SeDebugPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe Token: 33 1752 smss.exe Token: SeIncBasePriorityPrivilege 1752 smss.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
1916-1-0x00000000009A0000-0x00000000009B8000-memory.execmd.exesmss.exetaskeng.exedescription pid process target process PID 2924 wrote to memory of 1752 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe smss.exe PID 2924 wrote to memory of 1752 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe smss.exe PID 2924 wrote to memory of 1752 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe smss.exe PID 2924 wrote to memory of 1752 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe smss.exe PID 2924 wrote to memory of 1768 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe cmd.exe PID 2924 wrote to memory of 1768 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe cmd.exe PID 2924 wrote to memory of 1768 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe cmd.exe PID 2924 wrote to memory of 1768 2924 1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe cmd.exe PID 1768 wrote to memory of 2728 1768 cmd.exe choice.exe PID 1768 wrote to memory of 2728 1768 cmd.exe choice.exe PID 1768 wrote to memory of 2728 1768 cmd.exe choice.exe PID 1768 wrote to memory of 2728 1768 cmd.exe choice.exe PID 1752 wrote to memory of 2588 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2588 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2588 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2588 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2380 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2380 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2380 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2380 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2484 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2484 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2484 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2484 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2560 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2560 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2560 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2560 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2044 1752 smss.exe d23da00ec512413b847bf704a62d143c.exe PID 1752 wrote to memory of 2044 1752 smss.exe d23da00ec512413b847bf704a62d143c.exe PID 1752 wrote to memory of 2044 1752 smss.exe d23da00ec512413b847bf704a62d143c.exe PID 1752 wrote to memory of 2044 1752 smss.exe d23da00ec512413b847bf704a62d143c.exe PID 756 wrote to memory of 1108 756 taskeng.exe smss.exe PID 756 wrote to memory of 1108 756 taskeng.exe smss.exe PID 756 wrote to memory of 1108 756 taskeng.exe smss.exe PID 756 wrote to memory of 1108 756 taskeng.exe smss.exe PID 1752 wrote to memory of 1324 1752 smss.exe 2eba04e31f4e4237baeeaa953fdde00c.exe PID 1752 wrote to memory of 1324 1752 smss.exe 2eba04e31f4e4237baeeaa953fdde00c.exe PID 1752 wrote to memory of 1324 1752 smss.exe 2eba04e31f4e4237baeeaa953fdde00c.exe PID 1752 wrote to memory of 1324 1752 smss.exe 2eba04e31f4e4237baeeaa953fdde00c.exe PID 1752 wrote to memory of 2248 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2248 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2248 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2248 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 1396 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 1396 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 1396 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 1396 1752 smss.exe schtasks.exe PID 756 wrote to memory of 1888 756 taskeng.exe smss.exe PID 756 wrote to memory of 1888 756 taskeng.exe smss.exe PID 756 wrote to memory of 1888 756 taskeng.exe smss.exe PID 756 wrote to memory of 1888 756 taskeng.exe smss.exe PID 1752 wrote to memory of 2228 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2228 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2228 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2228 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2992 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2992 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2992 1752 smss.exe schtasks.exe PID 1752 wrote to memory of 2992 1752 smss.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\smss.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\smss.exe3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\d23da00ec512413b847bf704a62d143c.exe"C:\Users\Admin\AppData\Local\Temp\d23da00ec512413b847bf704a62d143c.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2eba04e31f4e4237baeeaa953fdde00c.exe"C:\Users\Admin\AppData\Local\Temp\2eba04e31f4e4237baeeaa953fdde00c.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\smss.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Local\Temp\smss.exe3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\1916-1-0x00000000009A0000-0x00000000009B8000-memory.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 53⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {E4264C33-5675-43F6-86E9-DDB70F221080} S-1-5-21-2180306848-1874213455-4093218721-1000:XEBBURHY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\smss.exeC:\Users\Admin\AppData\Local\Temp\smss.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\smss.exeC:\Users\Admin\AppData\Local\Temp\smss.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2eba04e31f4e4237baeeaa953fdde00c.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\2eba04e31f4e4237baeeaa953fdde00c.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\2eba04e31f4e4237baeeaa953fdde00c.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\d23da00ec512413b847bf704a62d143c.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\d23da00ec512413b847bf704a62d143c.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
C:\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
\Users\Admin\AppData\Local\Temp\2eba04e31f4e4237baeeaa953fdde00c.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
\Users\Admin\AppData\Local\Temp\d23da00ec512413b847bf704a62d143c.exeFilesize
4.7MB
MD51d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA25605569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA5123137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d
-
\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
\Users\Admin\AppData\Local\Temp\smss.exeFilesize
96KB
MD5c00262699ae0facbf297badd09233876
SHA1305a02a7c0623004c6b9fa2c91a883f840d751bc
SHA25600b3837b4417d77fce4803de069ccd1c7c453542067e52601947b744f9bf5239
SHA512845e7df25e8e4db1203b5f4abeef885c556f9a453ae99333cd0e2ff081f740245fdc1fc6311e1e83349d06895affa640808c67dd93e176fc8fd463c8ceb6ea65
-
memory/1108-37-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/1108-36-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/1108-35-0x0000000000B40000-0x0000000000B80000-memory.dmpFilesize
256KB
-
memory/1108-34-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/1324-46-0x000007FEF5920000-0x000007FEF630C000-memory.dmpFilesize
9.9MB
-
memory/1324-50-0x000000001C0B0000-0x000000001C130000-memory.dmpFilesize
512KB
-
memory/1324-49-0x000007FEF5920000-0x000007FEF630C000-memory.dmpFilesize
9.9MB
-
memory/1324-48-0x000000001C0B0000-0x000000001C130000-memory.dmpFilesize
512KB
-
memory/1324-47-0x000000013F300000-0x000000013F7BA000-memory.dmpFilesize
4.7MB
-
memory/1752-14-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/1752-23-0x0000000000CC0000-0x0000000000D00000-memory.dmpFilesize
256KB
-
memory/1752-22-0x0000000000CC0000-0x0000000000D00000-memory.dmpFilesize
256KB
-
memory/1752-21-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/1752-56-0x0000000000CC0000-0x0000000000D00000-memory.dmpFilesize
256KB
-
memory/1752-15-0x0000000000CC0000-0x0000000000D00000-memory.dmpFilesize
256KB
-
memory/1888-55-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/1888-52-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/1888-54-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/1888-53-0x00000000003C0000-0x0000000000400000-memory.dmpFilesize
256KB
-
memory/2044-39-0x000000001BF50000-0x000000001BFD0000-memory.dmpFilesize
512KB
-
memory/2044-38-0x000007FEF5920000-0x000007FEF630C000-memory.dmpFilesize
9.9MB
-
memory/2044-30-0x000000013FB80000-0x000000014003A000-memory.dmpFilesize
4.7MB
-
memory/2044-32-0x000000001BF50000-0x000000001BFD0000-memory.dmpFilesize
512KB
-
memory/2044-31-0x000007FEF5920000-0x000007FEF630C000-memory.dmpFilesize
9.9MB
-
memory/2924-16-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/2924-1-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/2924-0-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/2924-2-0x0000000001FC0000-0x0000000002000000-memory.dmpFilesize
256KB
-
memory/2924-13-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB
-
memory/2924-17-0x00000000745B0000-0x0000000074B5B000-memory.dmpFilesize
5.7MB