Analysis
-
max time kernel
12s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
3caabee1b1684e6780e7655c561913b6.exe
Resource
win7-20231215-en
General
-
Target
3caabee1b1684e6780e7655c561913b6.exe
-
Size
326KB
-
MD5
3caabee1b1684e6780e7655c561913b6
-
SHA1
ba359eb3f7de6c8c548025c98ddd53dc32514dae
-
SHA256
e6bf950b873e20d8cd98393cc78d78cba077b0bae5caca44be9aeec126d57805
-
SHA512
a129aaf275c9d7fcd21b058cde174d78ff2fbc508d7d7b49338c429b3660a920ce26593f49326ff5363b8a0904292861dc150bc98e5d0b980f02c4aafc349eec
-
SSDEEP
6144:+V8reMf7THSdiDOzHnoj/j4S5ubqWak1Hwnuz7zdLa:9S7diDOzHoLrSqJk12uzlLa
Malware Config
Extracted
cybergate
v1.02.1
Lammer
127.0.0.1:81
PlugUN
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Plun.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
VOCÊ FOI HACKEADO ...SEU SISTEMA SERÁ FORMATADO.
-
message_box_title
LAMMER
-
password
spycronic
-
regkey_hkcu
AvirnTT
-
regkey_hklm
AvgnTT
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
3caabee1b1684e6780e7655c561913b6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\directory\\Microsoft\\PluN\\Microsoft\\Plun.exe" 3caabee1b1684e6780e7655c561913b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3caabee1b1684e6780e7655c561913b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\directory\\Microsoft\\PluN\\Microsoft\\Plun.exe" 3caabee1b1684e6780e7655c561913b6.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3caabee1b1684e6780e7655c561913b6.exe -
Executes dropped EXE 2 IoCs
Processes:
Plun.exePlun.exepid process 2516 Plun.exe 1084 Plun.exe -
Loads dropped DLL 6 IoCs
Processes:
3caabee1b1684e6780e7655c561913b6.exeWerFault.exepid process 2896 3caabee1b1684e6780e7655c561913b6.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe -
Processes:
resource yara_rule behavioral1/memory/2896-318-0x0000000024010000-0x0000000024070000-memory.dmp upx behavioral1/memory/2896-1400-0x0000000024010000-0x0000000024070000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3caabee1b1684e6780e7655c561913b6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AvgnTT = "c:\\directory\\Microsoft\\PluN\\Microsoft\\Plun.exe" 3caabee1b1684e6780e7655c561913b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\AvirnTT = "c:\\directory\\Microsoft\\PluN\\Microsoft\\Plun.exe" 3caabee1b1684e6780e7655c561913b6.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3caabee1b1684e6780e7655c561913b6.exePlun.exedescription pid process target process PID 2512 set thread context of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2516 set thread context of 1084 2516 Plun.exe Plun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2720 2512 WerFault.exe 3caabee1b1684e6780e7655c561913b6.exe 2880 2516 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
3caabee1b1684e6780e7655c561913b6.exepid process 2896 3caabee1b1684e6780e7655c561913b6.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3caabee1b1684e6780e7655c561913b6.exedescription pid process Token: SeDebugPrivilege 2896 3caabee1b1684e6780e7655c561913b6.exe Token: SeDebugPrivilege 2896 3caabee1b1684e6780e7655c561913b6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3caabee1b1684e6780e7655c561913b6.exePlun.exepid process 2512 3caabee1b1684e6780e7655c561913b6.exe 2516 Plun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3caabee1b1684e6780e7655c561913b6.exe3caabee1b1684e6780e7655c561913b6.exedescription pid process target process PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 1864 2512 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 2512 wrote to memory of 2720 2512 3caabee1b1684e6780e7655c561913b6.exe WerFault.exe PID 2512 wrote to memory of 2720 2512 3caabee1b1684e6780e7655c561913b6.exe WerFault.exe PID 2512 wrote to memory of 2720 2512 3caabee1b1684e6780e7655c561913b6.exe WerFault.exe PID 2512 wrote to memory of 2720 2512 3caabee1b1684e6780e7655c561913b6.exe WerFault.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe PID 1864 wrote to memory of 2896 1864 3caabee1b1684e6780e7655c561913b6.exe 3caabee1b1684e6780e7655c561913b6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3caabee1b1684e6780e7655c561913b6.exe"C:\Users\Admin\AppData\Local\Temp\3caabee1b1684e6780e7655c561913b6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 1922⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\3caabee1b1684e6780e7655c561913b6.exe
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3caabee1b1684e6780e7655c561913b6.exe"C:\Users\Admin\AppData\Local\Temp\3caabee1b1684e6780e7655c561913b6.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 1921⤵
- Loads dropped DLL
- Program crash
-
C:\directory\Microsoft\PluN\Microsoft\Plun.exe
- Executes dropped EXE
-
C:\directory\Microsoft\PluN\Microsoft\Plun.exe"C:\directory\Microsoft\PluN\Microsoft\Plun.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5d5ad8493763526f952f3838117413419
SHA1327d03ba742ce8173835aa93c6e798c9026d5885
SHA2566a780a703e25eb76f18c8207a3e3669dd9bdf0401973b05d73320c9f52e5e7ca
SHA512c53c59b8fc54101bc5c23829ffa29e846f2322e34c81594e229e4b39d405382dba04233f5d7f5f4d4d427a2ee10e34847cc96ed041ab0b5bf61a46eeb9650fcc
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD50404899e91f30eaa535b5b07ec286c1d
SHA1db65ac40b418c219ef19f4716db8fed8990e635a
SHA256b96df356a2bfec91454dce6848741edd0aa0f1b4a4f595e52e1e1e16529e8084
SHA512ecff2bbac73b99b72d4a948ce36afd469bdad17dfea8063924ed6b418312f0affe02526291f36d3ca0412493393f3355afff5744cb33ddc4c684cf830e18d0a5
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5647a4b475e01d3f75b1ec098c4d160eb
SHA18bff570ed041ec2145f53f1d11066ba441e2cabc
SHA256f7642b0196bca4047a8373ba9bdfd3def3a2b55acd341b934ccd54183f5760f4
SHA512dbc8d50617d1ae958e3d52d72181e3c4195a36c6e7c11501c04c492a6b43e7bb5a5b970bef50860110f94b0f23f3a9c1a1fcae028f3468817cfbbd7f79ee7dc1
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5b88bd39de2f7cf03356b6d62fe24cd03
SHA1957f1b0064342e348fb5ca9c67a35884e25ada58
SHA25613a9cb7ce89bb62af40f50e4dde963d0f52935220c7231a2f5bbb279143ad824
SHA512b1525e3592a661d92cbc39d44c905889ca0c029490037a156a1d2a9c002d86cec30944a11423072f367fb59589840af88e76ce62d80cdac33f21cfcb7c97230e
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD54f20bba4725165bfe87cf9fa13b05bfa
SHA109505cc1b068627453b3c0c6183db1fc9f072ddd
SHA256671251a31eff7b8b9ecc299a0e9e51651ea4621eadc1f93cdae21f7ab1dc1f5a
SHA512839dc0c5b95c68827cdee1ecc95b34a526c79a08a3bdf7a0dea4874e5a652ad9781f1b07c1ad24b6aafa35ce1810fd4035d58ff9c97a25232be37b6b54de4b8a
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD59ec3750db29297eb5e5f839911d73cdd
SHA19cd607437550c9a2b5f25bacfd294d4645b142d6
SHA25670f0b9898aced0bef5ade1ab4eb0bec738c2ba05c6cc634fc2461b0920492089
SHA5128bd4d59e945ec08bd68a59a4605f820f670bb2093442151d5b52a700274ca69fe8193374fd3a845ab46349887713d38f9f3f163905bd83a7365ff669a9e96f92
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5e1675510ccae7af4c934560b2c97c4a7
SHA1449fe741ec1e46c9168b376a58c5de4f84b62a63
SHA256a4d6f3bce96068ce586e5b79d47bae9a7abe0d7d6cf41d5350a410d1e5f13256
SHA512be9cf1c037a1f4ad3d9b18c906ff949f46fe1d5663014d9bbd2f689e948546da5303a80b6b942e28eafcea8909deadd43f736b97070dd5ba5126de402fcc457f
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD51b5f073374f458c2649f7c43666e771e
SHA1edc7a8d3625545c3900bb0f7d5ddf04c40e95822
SHA2563517f8dc10dd3cb07eee6c13d55f5c8502e0cc2e20cd61b3ca79c05f59de5b70
SHA51249f9b84e67d74cf39cb4b3139bce64188fd5d3268a3d71751d63ac10b59e44821e9feb815df5cc392de9a943bdaa7bcf8c645ab83bdd7f16f1b0c52554072126
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5af996251656785cbefd265d20e69407b
SHA11aac63bb63eb9489536b5a99a29355c09d0bd7a2
SHA256550572ed67368cfeb782ab9b3668344ac7a31b7950faafa6310b453a91c1ad0c
SHA512252b461b96db51a2920deec98f9fe709d7767ae97db3afb3ef04bca9d45abca73c330ba7c0253de62a5e62fb252ec82fdf2429161bbf913ba36822e6ca1c43e8
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5c6a5262533e4e084b6c88d20e8aab4c0
SHA13b366cdf7f62351efc71f280b4d77904510a770b
SHA25681f490204d0d7bb0a0782cfa2de2b86f79ce7e00fd867288bdd8e279f6da48a3
SHA512f83acaed8a57fdf6d8031b043445b835ee5b0e7849857a274222d5233a67a96c7a1277ae48acb1231301749e2d657160b3fe8bccd1441a06239c11da69fd6cb4
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD55f8c7070bf3183eafe92d5957be4f332
SHA16626dc85eb6a3307bc5a2c0cd940bd23b492b1cb
SHA256bba658c5f81107d0c49e1046a1ff82fc5e441a218c6fc5638abd325bc96ac21e
SHA51222c149b3696a641d4a3e310448e60d6e8f2415b2850a094df24d230a36ceea4e1d99ebadb242b116d4053c7bdbe07ce50b795bc7312bb1e94636ecf840b886cb
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD53ddf8c4c548ea5ece76c7a0b899a49b6
SHA1ecaf7d3a5c04b610233dd8d52fb196de4950eebb
SHA256701762d7efcf9ffa4b1a676ce38614d6cc504d7039ca134efd3b406541013bdb
SHA5129eab6459df3c2302253680733ed6d2991a5959e4b08362ae1af779be614e33503a68f60585486ef5b14ba5a57eb6bfbb96912c51acd47d50fcd693ed5d6169a0
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5991e7c5c7929d3628f8289df20395b97
SHA1328dc54385422156aa1d1c0534763a5a020c1492
SHA25670b30154fd1c4fb061bdce2046f3103019d90730971a0fe500988a8edcd2f715
SHA512184756ebead34d3390f4e38619257756275348a6416abd45c42a33a51b992582d19e9eec713ee7125e5fa2cf6dd1d07e29ea009b429897404378f7a58ad492a1
-
memory/1084-369-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1084-373-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-2-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-13-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-6-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-7-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-4-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-18-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-19-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-17-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-20-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1864-320-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-9-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1864-11-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2896-33-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2896-318-0x0000000024010000-0x0000000024070000-memory.dmpFilesize
384KB
-
memory/2896-24-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2896-27-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2896-1400-0x0000000024010000-0x0000000024070000-memory.dmpFilesize
384KB