Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe
Resource
win7-20231129-en
General
-
Target
902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe
-
Size
2.3MB
-
MD5
a3063deffb695211eacaad97e9c38936
-
SHA1
22c0dcbff864ac7ab665dcaa40fa0e2f5a609d6b
-
SHA256
902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6
-
SHA512
c3365f69bcaf92b73449a58596ac9e37bc2a5eb11c048d336ff296439d9ec55f53f9f23a741305f565d64d449fc3ba508b03657ae73c3ed4108dd38aa8f10ed1
-
SSDEEP
49152:3LeY9/gdSz5eLeorkMy9UVfSpk2+GmC/KrluvCd:9sLeorNg8fcl+Gm8Na
Malware Config
Extracted
xworm
football-emily.gl.at.ply.gg:39625
-
Install_directory
%AppData%
-
install_file
Registry.exe
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2924-0-0x0000000000400000-0x0000000000656000-memory.dmp family_xworm \Users\Admin\AppData\Roaming\Bootstrapper.exe family_xworm behavioral1/memory/2660-30-0x0000000000400000-0x0000000000422000-memory.dmp family_xworm behavioral1/memory/2092-39-0x0000000000DD0000-0x0000000000DE6000-memory.dmp family_xworm behavioral1/memory/1060-87-0x0000000000B40000-0x0000000000B56000-memory.dmp family_xworm behavioral1/memory/2692-89-0x0000000001050000-0x0000000001066000-memory.dmp family_xworm -
Processes:
resource yara_rule behavioral1/memory/2924-0-0x0000000000400000-0x0000000000656000-memory.dmp dcrat C:\Users\Admin\AppData\Local\Temp\Boostraper.bat dcrat \Media\fontreview.exe dcrat behavioral1/memory/1136-56-0x00000000003F0000-0x0000000000502000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 888 powershell.exe 324 powershell.exe 1476 powershell.exe 852 powershell.exe -
Executes dropped EXE 9 IoCs
Processes:
Bootstrapper.exeSolaraBootstrapper.exeBootstrapper.exeBoostraper.batSolaraBootstrapper.exefontreview.exeRegistry.exeRegistry.exeRegistry.exepid process 2092 Bootstrapper.exe 2920 SolaraBootstrapper.exe 2660 Bootstrapper.exe 2624 Boostraper.bat 2840 SolaraBootstrapper.exe 1136 fontreview.exe 1060 Registry.exe 2692 Registry.exe 2172 Registry.exe -
Loads dropped DLL 8 IoCs
Processes:
902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exeBootstrapper.execmd.exepid process 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe 2660 Bootstrapper.exe 2900 cmd.exe 2900 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Bootstrapper.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry = "C:\\Users\\Admin\\AppData\\Roaming\\Registry.exe" Bootstrapper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 5 raw.githubusercontent.com 7 raw.githubusercontent.com 10 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
SolaraBootstrapper.exeSolaraBootstrapper.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2840 SolaraBootstrapper.exe 2920 SolaraBootstrapper.exe 2840 SolaraBootstrapper.exe 2920 SolaraBootstrapper.exe 888 powershell.exe 324 powershell.exe 1476 powershell.exe 852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
SolaraBootstrapper.exeSolaraBootstrapper.exeBootstrapper.exefontreview.exepowershell.exepowershell.exepowershell.exepowershell.exeRegistry.exeRegistry.exeRegistry.exedescription pid process Token: SeDebugPrivilege 2920 SolaraBootstrapper.exe Token: SeDebugPrivilege 2840 SolaraBootstrapper.exe Token: SeDebugPrivilege 2092 Bootstrapper.exe Token: SeDebugPrivilege 1136 fontreview.exe Token: SeDebugPrivilege 888 powershell.exe Token: SeDebugPrivilege 324 powershell.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeDebugPrivilege 852 powershell.exe Token: SeDebugPrivilege 2092 Bootstrapper.exe Token: SeDebugPrivilege 1060 Registry.exe Token: SeDebugPrivilege 2692 Registry.exe Token: SeDebugPrivilege 2172 Registry.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exeBootstrapper.exeBoostraper.batWScript.execmd.exeBootstrapper.exetaskeng.exedescription pid process target process PID 2924 wrote to memory of 2092 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Bootstrapper.exe PID 2924 wrote to memory of 2092 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Bootstrapper.exe PID 2924 wrote to memory of 2092 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Bootstrapper.exe PID 2924 wrote to memory of 2092 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Bootstrapper.exe PID 2924 wrote to memory of 2920 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe SolaraBootstrapper.exe PID 2924 wrote to memory of 2920 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe SolaraBootstrapper.exe PID 2924 wrote to memory of 2920 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe SolaraBootstrapper.exe PID 2924 wrote to memory of 2920 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe SolaraBootstrapper.exe PID 2924 wrote to memory of 2660 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Bootstrapper.exe PID 2924 wrote to memory of 2660 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Bootstrapper.exe PID 2924 wrote to memory of 2660 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Bootstrapper.exe PID 2924 wrote to memory of 2660 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Bootstrapper.exe PID 2924 wrote to memory of 2624 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Boostraper.bat PID 2924 wrote to memory of 2624 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Boostraper.bat PID 2924 wrote to memory of 2624 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Boostraper.bat PID 2924 wrote to memory of 2624 2924 902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe Boostraper.bat PID 2660 wrote to memory of 2840 2660 Bootstrapper.exe SolaraBootstrapper.exe PID 2660 wrote to memory of 2840 2660 Bootstrapper.exe SolaraBootstrapper.exe PID 2660 wrote to memory of 2840 2660 Bootstrapper.exe SolaraBootstrapper.exe PID 2660 wrote to memory of 2840 2660 Bootstrapper.exe SolaraBootstrapper.exe PID 2624 wrote to memory of 2520 2624 Boostraper.bat WScript.exe PID 2624 wrote to memory of 2520 2624 Boostraper.bat WScript.exe PID 2624 wrote to memory of 2520 2624 Boostraper.bat WScript.exe PID 2624 wrote to memory of 2520 2624 Boostraper.bat WScript.exe PID 2520 wrote to memory of 2900 2520 WScript.exe cmd.exe PID 2520 wrote to memory of 2900 2520 WScript.exe cmd.exe PID 2520 wrote to memory of 2900 2520 WScript.exe cmd.exe PID 2520 wrote to memory of 2900 2520 WScript.exe cmd.exe PID 2900 wrote to memory of 1136 2900 cmd.exe fontreview.exe PID 2900 wrote to memory of 1136 2900 cmd.exe fontreview.exe PID 2900 wrote to memory of 1136 2900 cmd.exe fontreview.exe PID 2900 wrote to memory of 1136 2900 cmd.exe fontreview.exe PID 2092 wrote to memory of 888 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 888 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 888 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 324 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 324 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 324 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 1476 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 1476 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 1476 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 852 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 852 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 852 2092 Bootstrapper.exe powershell.exe PID 2092 wrote to memory of 1844 2092 Bootstrapper.exe schtasks.exe PID 2092 wrote to memory of 1844 2092 Bootstrapper.exe schtasks.exe PID 2092 wrote to memory of 1844 2092 Bootstrapper.exe schtasks.exe PID 1436 wrote to memory of 1060 1436 taskeng.exe Registry.exe PID 1436 wrote to memory of 1060 1436 taskeng.exe Registry.exe PID 1436 wrote to memory of 1060 1436 taskeng.exe Registry.exe PID 1436 wrote to memory of 2692 1436 taskeng.exe Registry.exe PID 1436 wrote to memory of 2692 1436 taskeng.exe Registry.exe PID 1436 wrote to memory of 2692 1436 taskeng.exe Registry.exe PID 1436 wrote to memory of 2172 1436 taskeng.exe Registry.exe PID 1436 wrote to memory of 2172 1436 taskeng.exe Registry.exe PID 1436 wrote to memory of 2172 1436 taskeng.exe Registry.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe"C:\Users\Admin\AppData\Local\Temp\902f94aa7222739a873f8f2805428e89822fc34842a0d731828ca0d6fce69dd6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Bootstrapper.exe"C:\Users\Admin\AppData\Roaming\Bootstrapper.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Bootstrapper.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Bootstrapper.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Registry.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Registry.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Registry" /tr "C:\Users\Admin\AppData\Roaming\Registry.exe"3⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Bootstrapper.exe"C:\ProgramData\Bootstrapper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\SolaraBootstrapper.exe"C:\ProgramData\SolaraBootstrapper.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Boostraper.bat"C:\Users\Admin\AppData\Local\Temp\Boostraper.bat"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Media\TKlkLwYGTbrYwK.vbe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Media\3KNj5pJ.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Media\fontreview.exe"C:\Media\fontreview.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {86A08173-3891-49D6-952F-BC3AA07ED7B3} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Registry.exeC:\Users\Admin\AppData\Roaming\Registry.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Registry.exeC:\Users\Admin\AppData\Roaming\Registry.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Registry.exeC:\Users\Admin\AppData\Roaming\Registry.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Media\3KNj5pJ.batFilesize
25B
MD57e45908823780cf03744e36548ef778a
SHA10988bf98f3ec92139ba1695893ca2ac712ca6b77
SHA2561a6e5542fc446811c85925bf03ec7f495867d284232da339a23fc8c4b741df29
SHA512dfb4454bf825b4150e36d837e110d19510e11bcf6a1819b5e73dcb9920e6478368a57733c60f055c9ab83e0103cad1706a356b57233ce475c6361c49c4a3b2d8
-
C:\Media\TKlkLwYGTbrYwK.vbeFilesize
186B
MD5883d110d2a404e5aaaa8c4f25e8d0099
SHA10793c14c1237c6da5f4456e17b1e617f4660b041
SHA2560e4be77d728c9046e72857f46db53646cdbe1244490d5c0aa786efd2b5de5e71
SHA512ad244c4ffad1be4fa28290409ee735b5c50c41f9ba9b0876e068b3e16c016716d444d7984bab19df384d34bc5e5b178743765db2bc17e0a2e78b9b91fe37c934
-
C:\Users\Admin\AppData\Local\Temp\Boostraper.batFilesize
1.3MB
MD5820ca8ab4b7500ce29e8a1a79b7b8d95
SHA1cb5ad50cac3184af88bed5e22c5f83a981474c5f
SHA25613704b32bee03719d86744a997b75ae735d93e581b0a9b54e730808ad418d534
SHA512212bdce126d2172a6210d34542e7609986c585752575c46d88f9aabb35b61a820509908bab7d41fd0508716c66a79f5526209f0ccc92309d85d6c93d14ec98a7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD52a3a9cd9fb14778f32307583478f917b
SHA1e7c28a5b9c46cb32fc2bb8f5436ac1e83afdd823
SHA25630d71f9be16bbac54a7989cbb8d9fdc785ef520cfe0426468dcda18dc16f891b
SHA512fe5755cc92e9b2572ac7870967c2eb15d35d146691fb8a9617e286250eefc793aedb4df43a119e4207c1c110c5d836d767f3be44723fa7c557a8ee8f29e65beb
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Media\fontreview.exeFilesize
1.0MB
MD5d59145e6ddad7699d0c9c5e1416229f9
SHA1bda54641a52bb99147cf57bcbd6b8048bc3e2d2d
SHA2563d9b74a6bd97a5fa455737b72d8970898527a4478e912b68e9bf9459cccb7c87
SHA5127e1122c02ddab5bf333d7b1b89a596419e3d7fe31d30877b17f36ab1e5207127c6d757eee243dd1c38c51b993f1d2ab2ccc0f266d899ff0a9b7d3a61bf24994c
-
\ProgramData\Bootstrapper.exeFilesize
125KB
MD538abadb644a721c6526c13781f034f3c
SHA173d1c05be000e6dca09c3b0c68ccbd26ea8ba284
SHA256ba5dab0bab062cef4292800e49d1910e455a11628481782ef18b7a0a76d492c3
SHA512ff7ec8ba0692b0e7849f1342c6b9547e2677a7f96d7c7f53c10d4ef1b828f64437ab826ca0932bb1b86770815eabc72ad7d8c38edfcc4c3040e350bbaea4ddd3
-
\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exeFilesize
13KB
MD56557bd5240397f026e675afb78544a26
SHA1839e683bf68703d373b6eac246f19386bb181713
SHA256a7fecfc225dfdd4e14dcd4d1b4ba1b9f8e4d1984f1cdd8cda3a9987e5d53c239
SHA512f2399d34898a4c0c201372d2dd084ee66a66a1c3eae949e568421fe7edada697468ef81f4fcab2afd61eaf97bcb98d6ade2d97295e2f674e93116d142e892e97
-
\Users\Admin\AppData\Roaming\Bootstrapper.exeFilesize
64KB
MD50c88f913b456d4fc6b5836275f2a48ad
SHA11d58a200748571696f5fb8ec5c2abe40d36f021b
SHA25602b7e575969e1f23f76fdad703bf74241b6276f7551eb5f8996c098f87093417
SHA5128b42ee4d734179cd9a04c71d03b8cb41511d17f6e9a0d2c7022e1bac1c4801de758d5178d81ccd7acb5ac289268ea49c91f050f4129ba572389acd287537e802
-
memory/324-71-0x0000000002250000-0x0000000002258000-memory.dmpFilesize
32KB
-
memory/324-70-0x000000001B660000-0x000000001B942000-memory.dmpFilesize
2.9MB
-
memory/888-63-0x00000000027F0000-0x00000000027F8000-memory.dmpFilesize
32KB
-
memory/888-62-0x000000001B750000-0x000000001BA32000-memory.dmpFilesize
2.9MB
-
memory/1060-87-0x0000000000B40000-0x0000000000B56000-memory.dmpFilesize
88KB
-
memory/1136-56-0x00000000003F0000-0x0000000000502000-memory.dmpFilesize
1.1MB
-
memory/1136-57-0x00000000005A0000-0x00000000005AE000-memory.dmpFilesize
56KB
-
memory/2092-39-0x0000000000DD0000-0x0000000000DE6000-memory.dmpFilesize
88KB
-
memory/2660-30-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2692-89-0x0000000001050000-0x0000000001066000-memory.dmpFilesize
88KB
-
memory/2840-42-0x0000000001340000-0x000000000134A000-memory.dmpFilesize
40KB
-
memory/2920-38-0x0000000000360000-0x000000000036A000-memory.dmpFilesize
40KB
-
memory/2924-0-0x0000000000400000-0x0000000000656000-memory.dmpFilesize
2.3MB