Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 09:31
Static task
static1
Behavioral task
behavioral1
Sample
41d27d71597c9d1163fb58a816223962.exe
Resource
win7-20231129-en
General
-
Target
41d27d71597c9d1163fb58a816223962.exe
-
Size
585KB
-
MD5
41d27d71597c9d1163fb58a816223962
-
SHA1
2ae197a2724967fb0ae77ee0c20d95d354b9e5cb
-
SHA256
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c
-
SHA512
555aa48eaa46f83933e34c6e8ecaf79c8f1756fb9de79181e4132bc2d02c5789abba90458ad347a374f34fc829f83b36d6666f64a657bf7e99ca5cb9aac2e1a0
-
SSDEEP
12288:2aYEnxStMSe+LQMNQ7ZQhIyOQSNSY2CNZ+TB29JvNgRh:J/nxSiSCMNQFwt3Jx8gB29Jv2
Malware Config
Extracted
nanocore
1.2.2.0
2023endofyear.duckdns.org:15170
127.0.0.1:15170
68e7ea47-3f3c-4af7-9707-6d09d0468009
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-12-29T09:19:37.611227236Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
15170
-
default_group
GLOBAL
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
68e7ea47-3f3c-4af7-9707-6d09d0468009
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
2023endofyear.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 1708 powershell.exe 2244 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
41d27d71597c9d1163fb58a816223962.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 41d27d71597c9d1163fb58a816223962.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
41d27d71597c9d1163fb58a816223962.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PCI Service = "C:\\Program Files (x86)\\PCI Service\\pcisv.exe" 41d27d71597c9d1163fb58a816223962.exe -
Processes:
41d27d71597c9d1163fb58a816223962.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 41d27d71597c9d1163fb58a816223962.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41d27d71597c9d1163fb58a816223962.exedescription pid process target process PID 1696 set thread context of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe -
Drops file in Program Files directory 2 IoCs
Processes:
41d27d71597c9d1163fb58a816223962.exedescription ioc process File created C:\Program Files (x86)\PCI Service\pcisv.exe 41d27d71597c9d1163fb58a816223962.exe File opened for modification C:\Program Files (x86)\PCI Service\pcisv.exe 41d27d71597c9d1163fb58a816223962.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4796 schtasks.exe 3832 schtasks.exe 2188 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exepowershell.exe41d27d71597c9d1163fb58a816223962.exepid process 1708 powershell.exe 2244 powershell.exe 1708 powershell.exe 2244 powershell.exe 2604 41d27d71597c9d1163fb58a816223962.exe 2604 41d27d71597c9d1163fb58a816223962.exe 2604 41d27d71597c9d1163fb58a816223962.exe 2604 41d27d71597c9d1163fb58a816223962.exe 2604 41d27d71597c9d1163fb58a816223962.exe 2604 41d27d71597c9d1163fb58a816223962.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
41d27d71597c9d1163fb58a816223962.exepid process 2604 41d27d71597c9d1163fb58a816223962.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exe41d27d71597c9d1163fb58a816223962.exedescription pid process Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 2244 powershell.exe Token: SeDebugPrivilege 2604 41d27d71597c9d1163fb58a816223962.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
41d27d71597c9d1163fb58a816223962.exe41d27d71597c9d1163fb58a816223962.exedescription pid process target process PID 1696 wrote to memory of 1708 1696 41d27d71597c9d1163fb58a816223962.exe powershell.exe PID 1696 wrote to memory of 1708 1696 41d27d71597c9d1163fb58a816223962.exe powershell.exe PID 1696 wrote to memory of 1708 1696 41d27d71597c9d1163fb58a816223962.exe powershell.exe PID 1696 wrote to memory of 2244 1696 41d27d71597c9d1163fb58a816223962.exe powershell.exe PID 1696 wrote to memory of 2244 1696 41d27d71597c9d1163fb58a816223962.exe powershell.exe PID 1696 wrote to memory of 2244 1696 41d27d71597c9d1163fb58a816223962.exe powershell.exe PID 1696 wrote to memory of 2188 1696 41d27d71597c9d1163fb58a816223962.exe schtasks.exe PID 1696 wrote to memory of 2188 1696 41d27d71597c9d1163fb58a816223962.exe schtasks.exe PID 1696 wrote to memory of 2188 1696 41d27d71597c9d1163fb58a816223962.exe schtasks.exe PID 1696 wrote to memory of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe PID 1696 wrote to memory of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe PID 1696 wrote to memory of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe PID 1696 wrote to memory of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe PID 1696 wrote to memory of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe PID 1696 wrote to memory of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe PID 1696 wrote to memory of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe PID 1696 wrote to memory of 2604 1696 41d27d71597c9d1163fb58a816223962.exe 41d27d71597c9d1163fb58a816223962.exe PID 2604 wrote to memory of 4796 2604 41d27d71597c9d1163fb58a816223962.exe schtasks.exe PID 2604 wrote to memory of 4796 2604 41d27d71597c9d1163fb58a816223962.exe schtasks.exe PID 2604 wrote to memory of 4796 2604 41d27d71597c9d1163fb58a816223962.exe schtasks.exe PID 2604 wrote to memory of 3832 2604 41d27d71597c9d1163fb58a816223962.exe schtasks.exe PID 2604 wrote to memory of 3832 2604 41d27d71597c9d1163fb58a816223962.exe schtasks.exe PID 2604 wrote to memory of 3832 2604 41d27d71597c9d1163fb58a816223962.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d27d71597c9d1163fb58a816223962.exe"C:\Users\Admin\AppData\Local\Temp\41d27d71597c9d1163fb58a816223962.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\41d27d71597c9d1163fb58a816223962.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dsiayzgxX.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dsiayzgxX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7223.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\41d27d71597c9d1163fb58a816223962.exe"C:\Users\Admin\AppData\Local\Temp\41d27d71597c9d1163fb58a816223962.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "PCI Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7639.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "PCI Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp785D.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5fdc18685ffd5140a2e2fe5e2819c27d9
SHA1ecd8ddeace6b0d744a329becde68018cddbec9dd
SHA25663e6ca7f145af428d2538933ae1d03f93f3504615c1a166e96b7fd131184fbe9
SHA5122734cec8bc629c9f8fc8f7676c76c203473cdb957f0a237c2ceb3e93c08d4d6a7b45b8ab8423d2a4289b460ee92ac953f7a09562f7abea21777f7ae8093dca3a
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kte2e2me.wxl.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp7223.tmpFilesize
1KB
MD50fcb737f0a674e5f11567a7e3ab19375
SHA1dd11b9beae7758652a487505cb235955068568f2
SHA256b90e700e86cba0bfedb58b049ced41ba348164f3f5be093927667d3f46de8e56
SHA512c52879fbcf1a14b2266b493183dd719845042b167b69efe1712edd9d16d9f2cfc51426650c95ec47bba7dddb0aac987111a98a22c18c498ab029eb54e7bc553a
-
C:\Users\Admin\AppData\Local\Temp\tmp7639.tmpFilesize
1KB
MD505589205dc8e59621292cc8574379849
SHA1560d6d90ca08f886d81f591e737aa7e8e8dd0b78
SHA256183ea387a9a8ff41d986ee844f36508ff674eaf86e287ea81ee4725454dde0fd
SHA5120ec8548b36e548c395797d96777a935c2ab1824dd0327a5eec04c0c118e444aff735b76579940685b09bbf69469bea9fc08c07aef3b6b63f1b72da446ca3d394
-
C:\Users\Admin\AppData\Local\Temp\tmp785D.tmpFilesize
1KB
MD5bbb0d424bb7cb3b0e6aeb68cf82b8f5f
SHA17e95dcd21a27ee53e5c23ed5a163df56a43d572a
SHA25608d6bee474edf0151a0d8ff942ba9e6a1efe069585c63477abd1c7bd8046e130
SHA5120dc790a415f9717f6e7633c1d5f2749a2eca5582c5bbe114119c3ddba6d4e4d0df48029622e2fe07f94d8ae97c334b88691b7721da50ada261449769ae31d466
-
memory/1696-4-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/1696-7-0x00000000059B0000-0x00000000059B8000-memory.dmpFilesize
32KB
-
memory/1696-8-0x00000000060E0000-0x00000000060EC000-memory.dmpFilesize
48KB
-
memory/1696-9-0x00000000068E0000-0x000000000695C000-memory.dmpFilesize
496KB
-
memory/1696-10-0x0000000008F00000-0x0000000008F9C000-memory.dmpFilesize
624KB
-
memory/1696-6-0x0000000005680000-0x0000000005694000-memory.dmpFilesize
80KB
-
memory/1696-5-0x00000000055D0000-0x00000000055DA000-memory.dmpFilesize
40KB
-
memory/1696-0-0x0000000074BEE000-0x0000000074BEF000-memory.dmpFilesize
4KB
-
memory/1696-3-0x0000000005510000-0x00000000055A2000-memory.dmpFilesize
584KB
-
memory/1696-2-0x00000000059C0000-0x0000000005F64000-memory.dmpFilesize
5.6MB
-
memory/1696-48-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/1696-1-0x0000000000A90000-0x0000000000B28000-memory.dmpFilesize
608KB
-
memory/1708-92-0x0000000007AF0000-0x0000000007B0A000-memory.dmpFilesize
104KB
-
memory/1708-63-0x0000000075490000-0x00000000754DC000-memory.dmpFilesize
304KB
-
memory/1708-34-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/1708-101-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/1708-15-0x0000000002BB0000-0x0000000002BE6000-memory.dmpFilesize
216KB
-
memory/1708-21-0x00000000054B0000-0x00000000054D2000-memory.dmpFilesize
136KB
-
memory/1708-23-0x0000000005D10000-0x0000000005D76000-memory.dmpFilesize
408KB
-
memory/1708-16-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/1708-22-0x0000000005BA0000-0x0000000005C06000-memory.dmpFilesize
408KB
-
memory/1708-49-0x0000000006480000-0x000000000649E000-memory.dmpFilesize
120KB
-
memory/1708-50-0x0000000006A10000-0x0000000006A5C000-memory.dmpFilesize
304KB
-
memory/1708-18-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/1708-33-0x0000000005E40000-0x0000000006194000-memory.dmpFilesize
3.3MB
-
memory/1708-91-0x00000000079F0000-0x0000000007A04000-memory.dmpFilesize
80KB
-
memory/1708-89-0x00000000079B0000-0x00000000079C1000-memory.dmpFilesize
68KB
-
memory/1708-86-0x00000000075A0000-0x00000000075BA000-memory.dmpFilesize
104KB
-
memory/1708-84-0x0000000007460000-0x0000000007503000-memory.dmpFilesize
652KB
-
memory/1708-62-0x0000000006A60000-0x0000000006A92000-memory.dmpFilesize
200KB
-
memory/1708-82-0x00000000069E0000-0x00000000069FE000-memory.dmpFilesize
120KB
-
memory/2244-17-0x0000000004E80000-0x00000000054A8000-memory.dmpFilesize
6.2MB
-
memory/2244-93-0x0000000007420000-0x0000000007428000-memory.dmpFilesize
32KB
-
memory/2244-100-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/2244-85-0x0000000007750000-0x0000000007DCA000-memory.dmpFilesize
6.5MB
-
memory/2244-35-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/2244-87-0x0000000007180000-0x000000000718A000-memory.dmpFilesize
40KB
-
memory/2244-88-0x0000000007380000-0x0000000007416000-memory.dmpFilesize
600KB
-
memory/2244-73-0x0000000075490000-0x00000000754DC000-memory.dmpFilesize
304KB
-
memory/2244-90-0x0000000007330000-0x000000000733E000-memory.dmpFilesize
56KB
-
memory/2244-37-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/2244-19-0x0000000074BE0000-0x0000000075390000-memory.dmpFilesize
7.7MB
-
memory/2604-61-0x0000000006480000-0x000000000648A000-memory.dmpFilesize
40KB
-
memory/2604-108-0x0000000006D30000-0x0000000006D3E000-memory.dmpFilesize
56KB
-
memory/2604-60-0x0000000006430000-0x000000000644E000-memory.dmpFilesize
120KB
-
memory/2604-36-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2604-59-0x0000000005800000-0x000000000580C000-memory.dmpFilesize
48KB
-
memory/2604-104-0x0000000006CD0000-0x0000000006CE2000-memory.dmpFilesize
72KB
-
memory/2604-105-0x0000000006CE0000-0x0000000006CFA000-memory.dmpFilesize
104KB
-
memory/2604-106-0x0000000006D10000-0x0000000006D1E000-memory.dmpFilesize
56KB
-
memory/2604-107-0x0000000006D20000-0x0000000006D32000-memory.dmpFilesize
72KB
-
memory/2604-58-0x00000000057F0000-0x00000000057FA000-memory.dmpFilesize
40KB
-
memory/2604-115-0x0000000006DF0000-0x0000000006E04000-memory.dmpFilesize
80KB
-
memory/2604-114-0x0000000006DB0000-0x0000000006DDE000-memory.dmpFilesize
184KB
-
memory/2604-113-0x0000000006DA0000-0x0000000006DAE000-memory.dmpFilesize
56KB
-
memory/2604-112-0x0000000006D90000-0x0000000006DA4000-memory.dmpFilesize
80KB
-
memory/2604-111-0x0000000006D60000-0x0000000006D70000-memory.dmpFilesize
64KB
-
memory/2604-110-0x0000000006D50000-0x0000000006D64000-memory.dmpFilesize
80KB
-
memory/2604-109-0x0000000006D40000-0x0000000006D4C000-memory.dmpFilesize
48KB