Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 13:20
Static task
static1
Behavioral task
behavioral1
Sample
payment_invoice.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
payment_invoice.exe
Resource
win10v2004-20240412-en
General
-
Target
payment_invoice.exe
-
Size
3.0MB
-
MD5
af9695cf3142c1fe17e398bf452c290c
-
SHA1
295d6df899de93ff4835b067c31c502ce894d92e
-
SHA256
566a2a768b83757d7c2398bf9f1f84deef8bb4b238da9431fff343b262227c6b
-
SHA512
104579b73feecf2f7349fad6c0b13f04831192f1466a64ab6c9c5f7003a07923ca49ba22f6d2ab1ee894c2718c64a3c959091443573ed40045a1a013a09967e2
-
SSDEEP
49152:eE73wg9RmvKdLKXFxeLjwGh9riL9uoebQJ/aldMW62ZrqrGyIEpK:eEzb9RyXF8wc9WxAbQqB5Zur9s
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2188-2-0x0000000004D60000-0x000000000504C000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-3-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-4-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-6-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-8-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-10-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-12-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-14-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-16-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-18-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-20-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-22-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-24-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-26-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-28-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-30-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-32-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-34-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-36-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-38-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-40-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-42-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-44-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-46-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-48-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-50-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-52-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-54-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-56-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-58-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-60-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-62-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-64-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2188-66-0x0000000004D60000-0x0000000005046000-memory.dmp family_zgrat_v1 behavioral1/memory/2112-7195-0x0000000005BD0000-0x0000000005C40000-memory.dmp family_zgrat_v1 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
payment_invoice.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook payment_invoice.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook payment_invoice.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook payment_invoice.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
payment_invoice.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\notepad = "C:\\Users\\Admin\\AppData\\Local\\notepad.exe" payment_invoice.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\payment_invoice = "C:\\Users\\Admin\\AppData\\Local\\Temp\\payment_invoice.exe" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
payment_invoice.exedescription pid process target process PID 2188 set thread context of 2112 2188 payment_invoice.exe payment_invoice.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
payment_invoice.exepowershell.exepid process 2112 payment_invoice.exe 2112 payment_invoice.exe 2112 payment_invoice.exe 1284 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
payment_invoice.exepayment_invoice.exepowershell.exedescription pid process Token: SeDebugPrivilege 2188 payment_invoice.exe Token: SeDebugPrivilege 2188 payment_invoice.exe Token: SeDebugPrivilege 2112 payment_invoice.exe Token: SeDebugPrivilege 1284 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
payment_invoice.exepayment_invoice.exedescription pid process target process PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2188 wrote to memory of 2112 2188 payment_invoice.exe payment_invoice.exe PID 2112 wrote to memory of 1284 2112 payment_invoice.exe powershell.exe PID 2112 wrote to memory of 1284 2112 payment_invoice.exe powershell.exe PID 2112 wrote to memory of 1284 2112 payment_invoice.exe powershell.exe PID 2112 wrote to memory of 1284 2112 payment_invoice.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
payment_invoice.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe -
outlook_win_path 1 IoCs
Processes:
payment_invoice.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment_invoice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\payment_invoice.exe"C:\Users\Admin\AppData\Local\Temp\payment_invoice.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\payment_invoice.exe"C:\Users\Admin\AppData\Local\Temp\payment_invoice.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'payment_invoice';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'payment_invoice' -Value '"C:\Users\Admin\AppData\Local\Temp\payment_invoice.exe"' -PropertyType 'String'3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Erpbew.tmpdbFilesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
memory/1284-7234-0x000000006F3C0000-0x000000006F96B000-memory.dmpFilesize
5.7MB
-
memory/1284-7231-0x000000006F3C0000-0x000000006F96B000-memory.dmpFilesize
5.7MB
-
memory/1284-7232-0x000000006F3C0000-0x000000006F96B000-memory.dmpFilesize
5.7MB
-
memory/1284-7233-0x0000000002C80000-0x0000000002CC0000-memory.dmpFilesize
256KB
-
memory/2112-4912-0x00000000024A0000-0x00000000024E0000-memory.dmpFilesize
256KB
-
memory/2112-7194-0x00000000024E0000-0x000000000257E000-memory.dmpFilesize
632KB
-
memory/2112-4909-0x0000000000130000-0x0000000000208000-memory.dmpFilesize
864KB
-
memory/2112-4913-0x0000000004AB0000-0x0000000004BC6000-memory.dmpFilesize
1.1MB
-
memory/2112-7228-0x00000000024A0000-0x00000000024E0000-memory.dmpFilesize
256KB
-
memory/2112-7227-0x0000000074690000-0x0000000074D7E000-memory.dmpFilesize
6.9MB
-
memory/2112-4911-0x0000000074690000-0x0000000074D7E000-memory.dmpFilesize
6.9MB
-
memory/2112-7197-0x00000000063A0000-0x000000000641A000-memory.dmpFilesize
488KB
-
memory/2112-7196-0x0000000000C90000-0x0000000000C9A000-memory.dmpFilesize
40KB
-
memory/2112-7195-0x0000000005BD0000-0x0000000005C40000-memory.dmpFilesize
448KB
-
memory/2188-42-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-58-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-20-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-22-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-24-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-26-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-28-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-30-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-32-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-34-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-36-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-38-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-40-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-16-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-44-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-46-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-48-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-50-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-52-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-54-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-56-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-18-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-60-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-62-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-64-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-66-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-4883-0x0000000074690000-0x0000000074D7E000-memory.dmpFilesize
6.9MB
-
memory/2188-4884-0x0000000004D20000-0x0000000004D60000-memory.dmpFilesize
256KB
-
memory/2188-4885-0x0000000000A90000-0x0000000000A91000-memory.dmpFilesize
4KB
-
memory/2188-14-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-12-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-10-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-8-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-6-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-4-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-3-0x0000000004D60000-0x0000000005046000-memory.dmpFilesize
2.9MB
-
memory/2188-2-0x0000000004D60000-0x000000000504C000-memory.dmpFilesize
2.9MB
-
memory/2188-0-0x0000000000CC0000-0x0000000000FBA000-memory.dmpFilesize
3.0MB
-
memory/2188-1-0x0000000074690000-0x0000000074D7E000-memory.dmpFilesize
6.9MB
-
memory/2188-4886-0x0000000005C00000-0x0000000005D28000-memory.dmpFilesize
1.2MB
-
memory/2188-4887-0x0000000000B90000-0x0000000000BDC000-memory.dmpFilesize
304KB
-
memory/2188-4888-0x0000000004D20000-0x0000000004D60000-memory.dmpFilesize
256KB
-
memory/2188-4889-0x0000000004500000-0x0000000004554000-memory.dmpFilesize
336KB
-
memory/2188-4910-0x0000000074690000-0x0000000074D7E000-memory.dmpFilesize
6.9MB