Analysis
-
max time kernel
23s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 15:09
Behavioral task
behavioral1
Sample
2828c4977fdb872e14709b83894ed3ca.exe
Resource
win7-20231129-en
General
-
Target
2828c4977fdb872e14709b83894ed3ca.exe
-
Size
584KB
-
MD5
2828c4977fdb872e14709b83894ed3ca
-
SHA1
2cac8e1a02f141238a5270f8d3ed77fe6acb8ea2
-
SHA256
5f0bed1e14ba2e7d3f54162f1ad5c9d4145e7fb55b9b26466627a3068652fb0e
-
SHA512
890dd4ab7af1131fc5839c5a1a5fa43937aded7abf6d5067aac346910bfe9a302c49da3c2c4a8d88a62f7533ee81700ce067f1258eb321fb548520368e355740
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLOjev3wR/oBWGd0ZczIvnvLVx:tthEVaPqLOLRBWIbVx
Malware Config
Extracted
cybergate
2.6
Bot
pablohacker.no-ip.org:83
m809u80932uj890d
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
MSvchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
-
message_box_title
Error
-
password
abcd1234
-
regkey_hkcu
Windows
-
regkey_hklm
Microsoft
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
2828c4977fdb872e14709b83894ed3ca.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 2828c4977fdb872e14709b83894ed3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Microsoft\\MSvchost.exe" 2828c4977fdb872e14709b83894ed3ca.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 2828c4977fdb872e14709b83894ed3ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Microsoft\\MSvchost.exe" 2828c4977fdb872e14709b83894ed3ca.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
explorer.exe2828c4977fdb872e14709b83894ed3ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2CMR1473-VEXC-5507-YL42-EPVUX11GJC15}\StubPath = "C:\\Windows\\Microsoft\\MSvchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2CMR1473-VEXC-5507-YL42-EPVUX11GJC15} 2828c4977fdb872e14709b83894ed3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2CMR1473-VEXC-5507-YL42-EPVUX11GJC15}\StubPath = "C:\\Windows\\Microsoft\\MSvchost.exe Restart" 2828c4977fdb872e14709b83894ed3ca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2CMR1473-VEXC-5507-YL42-EPVUX11GJC15} explorer.exe -
Executes dropped EXE 2 IoCs
Processes:
MSvchost.exeMSvchost.exepid process 2336 MSvchost.exe 2372 MSvchost.exe -
Loads dropped DLL 1 IoCs
Processes:
explorer.exepid process 1708 explorer.exe -
Processes:
resource yara_rule behavioral1/memory/2368-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2368-1-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/324-539-0x0000000024080000-0x00000000240E2000-memory.dmp upx C:\Windows\Microsoft\MSvchost.exe upx behavioral1/memory/1708-844-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral1/memory/2336-868-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1708-867-0x00000000060B0000-0x0000000006172000-memory.dmp upx behavioral1/memory/2336-873-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/324-897-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1708-1742-0x00000000240F0000-0x0000000024152000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2828c4977fdb872e14709b83894ed3ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Windows\\Microsoft\\MSvchost.exe" 2828c4977fdb872e14709b83894ed3ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Windows\\Microsoft\\MSvchost.exe" 2828c4977fdb872e14709b83894ed3ca.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2368-1-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/2336-873-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 4 IoCs
Processes:
2828c4977fdb872e14709b83894ed3ca.exeexplorer.exedescription ioc process File created C:\Windows\Microsoft\MSvchost.exe 2828c4977fdb872e14709b83894ed3ca.exe File opened for modification C:\Windows\Microsoft\MSvchost.exe 2828c4977fdb872e14709b83894ed3ca.exe File opened for modification C:\Windows\Microsoft\MSvchost.exe explorer.exe File opened for modification C:\Windows\Microsoft\ explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1708 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 1708 explorer.exe Token: SeDebugPrivilege 1708 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2828c4977fdb872e14709b83894ed3ca.exepid process 2876 2828c4977fdb872e14709b83894ed3ca.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2828c4977fdb872e14709b83894ed3ca.exe2828c4977fdb872e14709b83894ed3ca.exedescription pid process target process PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2368 wrote to memory of 2876 2368 2828c4977fdb872e14709b83894ed3ca.exe 2828c4977fdb872e14709b83894ed3ca.exe PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE PID 2876 wrote to memory of 1360 2876 2828c4977fdb872e14709b83894ed3ca.exe Explorer.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2828c4977fdb872e14709b83894ed3ca.exe"C:\Users\Admin\AppData\Local\Temp\2828c4977fdb872e14709b83894ed3ca.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2828c4977fdb872e14709b83894ed3ca.exe"C:\Users\Admin\AppData\Local\Temp\2828c4977fdb872e14709b83894ed3ca.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Modifies Installed Components in the registry
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft\MSvchost.exe"C:\Windows\Microsoft\MSvchost.exe"4⤵
- Executes dropped EXE
-
C:\Windows\Microsoft\MSvchost.exe"C:\Windows\Microsoft\MSvchost.exe"5⤵
- Executes dropped EXE
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txtFilesize
230KB
MD5429a73da0359e92d7094dc8f573a00fa
SHA1ef3816a798f9e43d3e9d1b004a8713354c4ccafc
SHA2562046ca8227d6f0b63fbe8153327b498a88021d1ca911b17365eb0e4c0a13993b
SHA51247d2d52706508c1bb90e3d6f2c6a1cb0e74d591a50e55e049b3a8537cd5c6392f2493b8cfb7afc86e092d2ea34abf36ad0175c6ed7ec5bb00b52c153342876f3
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD522510a1666765ebe53f4f22e2aa5585d
SHA1352baf07570096eef53ef05a712226b91f59a8e2
SHA256a793120ce0e30f0445e2fd0dbbd8fcaa58f291f47e53e141c7f0251dc8628c77
SHA5126df00f1ee3fa943768f5ac2e345c9df5299476fd1e18ee2a0a72b1fc6cd36bf35972e98aaaf50a09de0d7219877e584837e677f7c270646cdba99d0ed134fdd2
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD59636224f67537c5ea2a44a5abd993aa0
SHA181424eb7336afb44b1ca120fdd5b8c994f3c42e3
SHA2565777220b529796f3346ac677a16d968c9504a30e800a05a5137a358527dfe088
SHA512de61fda872e43bd7dd3d78e0df28f3f99f5654f22f1c630bd70afdc374035c482e10771745dcd95f28327308d302190e2b7998cfe34614483361d4b7776aa05a
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD598b78cf44f8f678844790d8ffc6b39cc
SHA14a9218e5d44b67d9a4c95a7526ef048a37a3f828
SHA256a42ed6d7b9f9cabe2e1a17a790f3dad3d76b1273b2c4380645e7cbdd5a7ac3d6
SHA51229f6ccd8f1ab46c65e7fb9b388193011eefddbe1724a938a2ea873f75ffb6cd12dd8f7ec92b9608ecc204bcaa4b82cfabe64d1606440c0b6427498c433784e7c
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD56db11159248bf130d66381509916e0f6
SHA10cfdd91237cfaf0204b35839bd29a7e8c6f656f3
SHA256effcda772f4ddd51080462fdb749cdb9102ca6a5779b576e65912a13da4597f0
SHA512284cff43f31c8cd39cd6ba64f63a46309f92d1f9a0be65ee8f506cd8a02f163691a81b992b27a20c71af521f730de1215b85fcd7bf7a59c6d47dfa35cc866c6c
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5ce82c60b139486aaef794e206181d248
SHA13220d5933cf8d1f34e132ac7012c2c9cab7a2457
SHA256762f80661074f6e2199875d4b9f7595515b707fa771f2a84450d9d98a7313de3
SHA512c5376f4670789850db838253ccd5163acf9beaa441378787e2fdb7bf76f7207617404aac0c33c72822c4460cbeec8da9bf987c8029504206b37a59ea4a26def9
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD58e483cd76c2e159254f7a7430ec53b24
SHA1c859824a39b04e69e4a9b1a4099eb78365124fb3
SHA25633954285bb127b1f28e83a52186d92cd4cd8a2e2d5148c8897e83df5a5916964
SHA51217f39e9b54ab05581dbe12b38bbfab75c18a5c066fe380adf334b571c587509696444f2b2fe8ce0d52ae4c52ba7512d5261ed0b1f39748bf423f735dc7ebd137
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5c62b3844c0fbecfb754aca1cf488f1fc
SHA1831e7bf91f203564a4a440187c7774d43b013a32
SHA2565cbbdfc5fc90a0b209dc68e45b37e95ede9046eb10283fc2e9ce102ca8929ebe
SHA512b25335516867e81f8c048a1bbc0908788f803cddc1e5fcdf50a077c09a74c6aa1eb102663ab7b570eeb7c464d58e3f24ff14fed2b477fb0e21279c2ec23458bf
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\logs.datFilesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
C:\Windows\Microsoft\MSvchost.exeFilesize
584KB
MD52828c4977fdb872e14709b83894ed3ca
SHA12cac8e1a02f141238a5270f8d3ed77fe6acb8ea2
SHA2565f0bed1e14ba2e7d3f54162f1ad5c9d4145e7fb55b9b26466627a3068652fb0e
SHA512890dd4ab7af1131fc5839c5a1a5fa43937aded7abf6d5067aac346910bfe9a302c49da3c2c4a8d88a62f7533ee81700ce067f1258eb321fb548520368e355740
-
memory/324-308-0x00000000000E0000-0x00000000000E1000-memory.dmpFilesize
4KB
-
memory/324-539-0x0000000024080000-0x00000000240E2000-memory.dmpFilesize
392KB
-
memory/324-897-0x0000000024080000-0x00000000240E2000-memory.dmpFilesize
392KB
-
memory/324-257-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/1360-8-0x0000000002B00000-0x0000000002B01000-memory.dmpFilesize
4KB
-
memory/1708-1956-0x00000000060B0000-0x0000000006172000-memory.dmpFilesize
776KB
-
memory/1708-867-0x00000000060B0000-0x0000000006172000-memory.dmpFilesize
776KB
-
memory/1708-844-0x00000000240F0000-0x0000000024152000-memory.dmpFilesize
392KB
-
memory/1708-1742-0x00000000240F0000-0x0000000024152000-memory.dmpFilesize
392KB
-
memory/2336-868-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2336-873-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2368-1-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2368-0-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2372-874-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2372-879-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2876-3-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2876-2-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2876-4-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2876-845-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB