Overview
overview
10Static
static
5SlayerRAT ...il.dll
windows10-2004-x64
1SlayerRAT ...am.dll
windows10-2004-x64
1SlayerRAT ...ch.dll
windows10-2004-x64
1SlayerRAT ...fm.dll
windows10-2004-x64
1SlayerRAT ...oc.dll
windows10-2004-x64
1SlayerRAT ...pw.dll
windows10-2004-x64
1SlayerRAT ...c2.dll
windows10-2004-x64
1SlayerRAT ...2x.exe
windows10-2004-x64
10SlayerRAT ...ub.exe
windows10-2004-x64
4SlayerRAT ...ad.exe
windows10-2004-x64
4Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 21:38
Static task
static1
Behavioral task
behavioral1
Sample
SlayerRAT v0.7.2 By X-Slayer/Mono.Cecil.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
SlayerRAT v0.7.2 By X-Slayer/Plugin/cam.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
SlayerRAT v0.7.2 By X-Slayer/Plugin/ch.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
SlayerRAT v0.7.2 By X-Slayer/Plugin/fm.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
SlayerRAT v0.7.2 By X-Slayer/Plugin/proc.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
SlayerRAT v0.7.2 By X-Slayer/Plugin/pw.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
SlayerRAT v0.7.2 By X-Slayer/Plugin/sc2.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
SlayerRAT v0.7.2 By X-Slayer/SlayerRAT v 0.7.2x.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
SlayerRAT v0.7.2 By X-Slayer/Stub.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
SlayerRAT v0.7.2 By X-Slayer/Stubdownload.exe
Resource
win10v2004-20230220-en
General
-
Target
SlayerRAT v0.7.2 By X-Slayer/SlayerRAT v 0.7.2x.exe
-
Size
9.8MB
-
MD5
b214730ed4335d0311311760b13b449b
-
SHA1
f09083acc3e33e383ddd4c22f3d765143840de01
-
SHA256
f190342610f6f690d6c8fe5cd75fa60a3129a2aa55c42c47d016aa068dbd0427
-
SHA512
e68120b78b849794bd952fb24e9b9f7248523a9580977420fd707b45610de73bb51ed7fa09eb4441087e7926c06ff0f588c3d030a190529b2bc0548fb64d80a9
-
SSDEEP
196608:vJWQV/GQDd3JjPOVXRzPHGMy4AcV7jWlJeQJf/p/oLJlJQ+N:BWQVr5uX5PHGMV7kJfMJlPN
Malware Config
Signatures
-
XMRig Miner payload 18 IoCs
Processes:
resource yara_rule behavioral8/memory/3176-160-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-161-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-162-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-164-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-165-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-166-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-179-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-180-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-186-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-189-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-192-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-195-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-197-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-198-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-199-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-201-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-203-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig behavioral8/memory/3176-204-0x0000000000400000-0x0000000000DCB000-memory.dmp xmrig -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SlayerRAT v 0.7.2x.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation SlayerRAT v 0.7.2x.exe -
Executes dropped EXE 2 IoCs
Processes:
TiWorker.exeSlayerRAT v 0.7.2.exepid process 3176 TiWorker.exe 1028 SlayerRAT v 0.7.2.exe -
Drops file in System32 directory 6 IoCs
Processes:
SlayerRAT v 0.7.2x.exedescription ioc process File created C:\Windows\SysWOW64\TiWorker.exe SlayerRAT v 0.7.2x.exe File opened for modification C:\Windows\SysWOW64\TiWorker.exe SlayerRAT v 0.7.2x.exe File created C:\Windows\SysWOW64\config.json SlayerRAT v 0.7.2x.exe File opened for modification C:\Windows\SysWOW64\config.json SlayerRAT v 0.7.2x.exe File created C:\Windows\SysWOW64\MicrosoftWindows.xml SlayerRAT v 0.7.2x.exe File opened for modification C:\Windows\SysWOW64\MicrosoftWindows.xml SlayerRAT v 0.7.2x.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
SlayerRAT v 0.7.2x.exepid process 5040 SlayerRAT v 0.7.2x.exe 5040 SlayerRAT v 0.7.2x.exe 5040 SlayerRAT v 0.7.2x.exe 5040 SlayerRAT v 0.7.2x.exe 5040 SlayerRAT v 0.7.2x.exe 5040 SlayerRAT v 0.7.2x.exe 5040 SlayerRAT v 0.7.2x.exe 5040 SlayerRAT v 0.7.2x.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
SlayerRAT v 0.7.2.exepid process 1028 SlayerRAT v 0.7.2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
TiWorker.exedescription pid process Token: SeLockMemoryPrivilege 3176 TiWorker.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
SlayerRAT v 0.7.2.exepid process 1028 SlayerRAT v 0.7.2.exe 1028 SlayerRAT v 0.7.2.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
SlayerRAT v 0.7.2.exepid process 1028 SlayerRAT v 0.7.2.exe 1028 SlayerRAT v 0.7.2.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
SlayerRAT v 0.7.2x.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 5040 wrote to memory of 4932 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 5040 wrote to memory of 4932 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 4932 wrote to memory of 1584 4932 cmd.exe schtasks.exe PID 4932 wrote to memory of 1584 4932 cmd.exe schtasks.exe PID 4932 wrote to memory of 1304 4932 cmd.exe schtasks.exe PID 4932 wrote to memory of 1304 4932 cmd.exe schtasks.exe PID 5040 wrote to memory of 4432 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 5040 wrote to memory of 4432 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 4432 wrote to memory of 3080 4432 cmd.exe schtasks.exe PID 4432 wrote to memory of 3080 4432 cmd.exe schtasks.exe PID 5040 wrote to memory of 640 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 5040 wrote to memory of 640 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 640 wrote to memory of 1696 640 cmd.exe netsh.exe PID 640 wrote to memory of 1696 640 cmd.exe netsh.exe PID 5040 wrote to memory of 3356 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 5040 wrote to memory of 3356 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 3356 wrote to memory of 1876 3356 cmd.exe netsh.exe PID 3356 wrote to memory of 1876 3356 cmd.exe netsh.exe PID 5040 wrote to memory of 2260 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 5040 wrote to memory of 2260 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 2260 wrote to memory of 4572 2260 cmd.exe schtasks.exe PID 2260 wrote to memory of 4572 2260 cmd.exe schtasks.exe PID 5040 wrote to memory of 2804 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 5040 wrote to memory of 2804 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 2804 wrote to memory of 1480 2804 cmd.exe schtasks.exe PID 2804 wrote to memory of 1480 2804 cmd.exe schtasks.exe PID 2804 wrote to memory of 3900 2804 cmd.exe schtasks.exe PID 2804 wrote to memory of 3900 2804 cmd.exe schtasks.exe PID 5040 wrote to memory of 2004 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 5040 wrote to memory of 2004 5040 SlayerRAT v 0.7.2x.exe cmd.exe PID 2004 wrote to memory of 3740 2004 cmd.exe certutil.exe PID 2004 wrote to memory of 3740 2004 cmd.exe certutil.exe PID 5040 wrote to memory of 1028 5040 SlayerRAT v 0.7.2x.exe SlayerRAT v 0.7.2.exe PID 5040 wrote to memory of 1028 5040 SlayerRAT v 0.7.2x.exe SlayerRAT v 0.7.2.exe PID 5040 wrote to memory of 1028 5040 SlayerRAT v 0.7.2x.exe SlayerRAT v 0.7.2.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SlayerRAT v0.7.2 By X-Slayer\SlayerRAT v 0.7.2x.exe"C:\Users\Admin\AppData\Local\Temp\SlayerRAT v0.7.2 By X-Slayer\SlayerRAT v 0.7.2x.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /End /TN "Microsoft\Windows\MUI\WindowsUpdate" & schtasks /End /TN "WindowsUpdate" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\system32\schtasks.exeschtasks /End /TN "Microsoft\Windows\MUI\WindowsUpdate"3⤵PID:1584
-
C:\Windows\system32\schtasks.exeschtasks /End /TN "WindowsUpdate"3⤵PID:1304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /Delete /TN "WindowsUpdate" /F & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "WindowsUpdate" /F3⤵PID:3080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System" dir=out action=allow program="%windir%\SysWOW64\TiWorker.exe" enable=yes & exit2⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="System" dir=out action=allow program="C:\Windows\SysWOW64\TiWorker.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1696 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System" dir=in action=allow program="%windir%\SysWOW64\TiWorker.exe" enable=yes & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="System" dir=in action=allow program="C:\Windows\SysWOW64\TiWorker.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1876 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /Create /XML "%windir%\SysWOW64\MicrosoftWindows.xml" /TN "Microsoft\Windows\MUI\WindowsUpdate" /F & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\schtasks.exeschtasks /Create /XML "C:\Windows\SysWOW64\MicrosoftWindows.xml" /TN "Microsoft\Windows\MUI\WindowsUpdate" /F3⤵
- Creates scheduled task(s)
PID:4572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /Change /TN "Microsoft\Windows\MUI\WindowsUpdate" /TR "%windir%\SysWOW64\TiWorker.exe" & schtasks /Run /TN "Microsoft\Windows\MUI\WindowsUpdate" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\MUI\WindowsUpdate" /TR "C:\Windows\SysWOW64\TiWorker.exe"3⤵PID:1480
-
C:\Windows\system32\schtasks.exeschtasks /Run /TN "Microsoft\Windows\MUI\WindowsUpdate"3⤵PID:3900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil –addstore –f root MicrosoftWindows.crt & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\certutil.execertutil –addstore –f root MicrosoftWindows.crt3⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\SlayerRAT v0.7.2 By X-Slayer\SlayerRAT v 0.7.2.exe"C:\Users\Admin\AppData\Local\Temp\SlayerRAT v0.7.2 By X-Slayer\SlayerRAT v 0.7.2.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1028
-
C:\Windows\SysWOW64\TiWorker.exeC:\Windows\SysWOW64\TiWorker.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MicrosoftWindows.crtFilesize
1KB
MD51bb617d3aab1dbe2ec2e4a90bf824846
SHA1bbe179f1bdc4466661da3638420e6ca862bd50ca
SHA2561bf4ce2aedc0cfb1365ab15c7e0c8c26b87890ad4008d56317b756b8745ff580
SHA512ed91750bec3aed806088c271e295550dac1c8cae91569f278d40fbd671b486e70cc9b28f7a9a70e9f340fbe8a038f1ed18f666de4246fc1d60e015e0dd3f1c52
-
C:\Users\Admin\AppData\Local\Temp\MicrosoftWindows.crtFilesize
1KB
MD51bb617d3aab1dbe2ec2e4a90bf824846
SHA1bbe179f1bdc4466661da3638420e6ca862bd50ca
SHA2561bf4ce2aedc0cfb1365ab15c7e0c8c26b87890ad4008d56317b756b8745ff580
SHA512ed91750bec3aed806088c271e295550dac1c8cae91569f278d40fbd671b486e70cc9b28f7a9a70e9f340fbe8a038f1ed18f666de4246fc1d60e015e0dd3f1c52
-
C:\Users\Admin\AppData\Local\Temp\SlayerRAT v0.7.2 By X-Slayer\SlayerRAT v 0.7.2.exeFilesize
7.7MB
MD57be1dc880dedcc5603b689f5e25b9793
SHA15a1a911d008b2890ffd12af8d4d54c0406664ff0
SHA256caadddddf63205db589f52d153f1abb0cb41c204115f0a8e7a1fcaf8530ffb0f
SHA5123b7fce8f7e21c9d953f946da9c774d233ed6455e3609114d4974c3c0695bb2290ce6dbfda5ea5c64d1756177e750968f1db9a1ac8fe1fb507ea282d0d503a0ea
-
C:\Users\Admin\AppData\Local\Temp\SlayerRAT v0.7.2 By X-Slayer\SlayerRAT v 0.7.2.exeFilesize
7.7MB
MD57be1dc880dedcc5603b689f5e25b9793
SHA15a1a911d008b2890ffd12af8d4d54c0406664ff0
SHA256caadddddf63205db589f52d153f1abb0cb41c204115f0a8e7a1fcaf8530ffb0f
SHA5123b7fce8f7e21c9d953f946da9c774d233ed6455e3609114d4974c3c0695bb2290ce6dbfda5ea5c64d1756177e750968f1db9a1ac8fe1fb507ea282d0d503a0ea
-
C:\Users\Admin\AppData\Local\Temp\aut8215.tmpFilesize
3.2MB
MD5ecede3c32ce83ff76ae584c938512c5a
SHA1090b15025e131cc03098f6f0d8fa5366bc5fa1f0
SHA256366f1e9f9c99aa81034bada3cc344f2fb5a74246e1d5851441244df1ecc9ae6d
SHA51261ca6075c8a2086d42b58698484afc0005645507474831cacafc10126f47c8f0cda10c1c215557f9391865b55b16ae881a593d7547cbad560b54369684b23d1d
-
C:\Windows\SysWOW64\MicrosoftWindows.xmlFilesize
4KB
MD5b1cbfcc7b7a5716a30b77f5dc5bb6135
SHA15c397ffd7a845b2fdf9e82ff73698784a91a2fb9
SHA25696f2ff4ddcadf6421071daa6cdda2ce866fb7b10d12cc1b20bd07cb131210430
SHA512d08516e7610e5a08d1c5c2d1cc5a22b1cd2d6b7c890f895caee0cf65577a1315d575d91a8f7f78ffc7bd0dd77b23ece46fadf58ba44257a115330a54a3ebfcf7
-
C:\Windows\SysWOW64\TiWorker.exeFilesize
3.2MB
MD5ecede3c32ce83ff76ae584c938512c5a
SHA1090b15025e131cc03098f6f0d8fa5366bc5fa1f0
SHA256366f1e9f9c99aa81034bada3cc344f2fb5a74246e1d5851441244df1ecc9ae6d
SHA51261ca6075c8a2086d42b58698484afc0005645507474831cacafc10126f47c8f0cda10c1c215557f9391865b55b16ae881a593d7547cbad560b54369684b23d1d
-
C:\Windows\SysWOW64\config.jsonFilesize
1011B
MD53da156f2d3307118a8e2c569be30bc87
SHA1335678ca235af3736677bd8039e25a6c1ee5efca
SHA256f86ab68eaddd22fbe679ea5ab9cc54775e74081beffd758b30776ba103f396eb
SHA51259748e02cc4b7f280471b411d6ca3c9986f4c12f84b039bae25269634fc825cde417fe46246f58538668c19cca91e698e31d9f32df69aad89e68423f86bb00c0
-
\??\c:\windows\syswow64\tiworker.exeFilesize
3.2MB
MD5ecede3c32ce83ff76ae584c938512c5a
SHA1090b15025e131cc03098f6f0d8fa5366bc5fa1f0
SHA256366f1e9f9c99aa81034bada3cc344f2fb5a74246e1d5851441244df1ecc9ae6d
SHA51261ca6075c8a2086d42b58698484afc0005645507474831cacafc10126f47c8f0cda10c1c215557f9391865b55b16ae881a593d7547cbad560b54369684b23d1d
-
memory/1028-193-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-194-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-202-0x0000000001CC0000-0x0000000001DC0000-memory.dmpFilesize
1024KB
-
memory/1028-200-0x0000000001CC0000-0x0000000001DC0000-memory.dmpFilesize
1024KB
-
memory/1028-196-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-191-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-190-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-176-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-177-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-178-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-188-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-187-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-181-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-182-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-183-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-184-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/1028-185-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/3176-164-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-204-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-186-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-189-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-160-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-161-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-192-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-158-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-179-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-180-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-197-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-162-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-198-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-199-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-166-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-201-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-165-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-203-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB
-
memory/3176-195-0x0000000000400000-0x0000000000DCB000-memory.dmpFilesize
9.8MB