Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-03-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
aeca71a10078316edb5388060c90b3e17e77abd5e903beb6033f1cc0bfb84396.dll
Resource
win7-20240221-en
General
-
Target
aeca71a10078316edb5388060c90b3e17e77abd5e903beb6033f1cc0bfb84396.dll
-
Size
120KB
-
MD5
f82fc4d5bd9121b1968626ad93170e9f
-
SHA1
735922319758e5edd836e10cd5e8b27c703f5d47
-
SHA256
aeca71a10078316edb5388060c90b3e17e77abd5e903beb6033f1cc0bfb84396
-
SHA512
6f6fc9a6c602ca2a7c521b0c3b84919f37ce95a3a8f2ac58f4f5111cafff9b1bfd48f20e8f8838ac2c795b791ad062c76a90249aff0bd3de4c5be85c065d5711
-
SSDEEP
3072:DrLhOcs/XPkLLgZzYjkdlAZXk/BTZhxm5:DrLQcsfPm6HAZX4NLxm5
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
f762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f762146.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f762146.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f762146.exe -
Processes:
f762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762146.exe -
Processes:
f762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762146.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 27 IoCs
Processes:
resource yara_rule behavioral1/memory/2864-12-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-14-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-15-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-17-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-20-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-23-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-26-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-49-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-35-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-29-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-58-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-59-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-60-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-61-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-62-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-78-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-80-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-81-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-83-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-85-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-87-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-89-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-91-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-95-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-99-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-101-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/2864-103-0x00000000005B0000-0x000000000166A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 30 IoCs
Processes:
resource yara_rule behavioral1/memory/2864-11-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2864-12-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-14-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-15-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-17-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-20-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-23-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-26-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-49-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2528-50-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2864-35-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-29-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-58-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-59-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-60-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-61-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-62-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2444-79-0x0000000000400000-0x0000000000412000-memory.dmp UPX behavioral1/memory/2864-78-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-80-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-81-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-83-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-85-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-87-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-89-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-91-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-95-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-99-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-101-0x00000000005B0000-0x000000000166A000-memory.dmp UPX behavioral1/memory/2864-103-0x00000000005B0000-0x000000000166A000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
f762146.exef7626d2.exef763d4e.exepid process 2864 f762146.exe 2528 f7626d2.exe 2444 f763d4e.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2368 rundll32.exe 2368 rundll32.exe 2368 rundll32.exe 2368 rundll32.exe 2368 rundll32.exe 2368 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2864-12-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-14-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-15-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-17-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-20-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-23-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-26-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-49-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-35-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-29-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-58-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-59-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-60-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-61-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-62-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-78-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-80-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-81-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-83-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-85-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-87-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-89-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-91-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-95-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-99-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-101-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2864-103-0x00000000005B0000-0x000000000166A000-memory.dmp upx -
Processes:
f762146.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762146.exe -
Processes:
f762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762146.exe -
Enumerates connected drives 3 TTPs 11 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f762146.exedescription ioc process File opened (read-only) \??\E: f762146.exe File opened (read-only) \??\H: f762146.exe File opened (read-only) \??\L: f762146.exe File opened (read-only) \??\N: f762146.exe File opened (read-only) \??\P: f762146.exe File opened (read-only) \??\G: f762146.exe File opened (read-only) \??\I: f762146.exe File opened (read-only) \??\J: f762146.exe File opened (read-only) \??\K: f762146.exe File opened (read-only) \??\M: f762146.exe File opened (read-only) \??\O: f762146.exe -
Drops file in Windows directory 2 IoCs
Processes:
f762146.exedescription ioc process File created C:\Windows\f7621c3 f762146.exe File opened for modification C:\Windows\SYSTEM.INI f762146.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f762146.exepid process 2864 f762146.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
f762146.exedescription pid process Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe Token: SeDebugPrivilege 2864 f762146.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
rundll32.exerundll32.exef762146.exedescription pid process target process PID 2320 wrote to memory of 2368 2320 rundll32.exe rundll32.exe PID 2320 wrote to memory of 2368 2320 rundll32.exe rundll32.exe PID 2320 wrote to memory of 2368 2320 rundll32.exe rundll32.exe PID 2320 wrote to memory of 2368 2320 rundll32.exe rundll32.exe PID 2320 wrote to memory of 2368 2320 rundll32.exe rundll32.exe PID 2320 wrote to memory of 2368 2320 rundll32.exe rundll32.exe PID 2320 wrote to memory of 2368 2320 rundll32.exe rundll32.exe PID 2368 wrote to memory of 2864 2368 rundll32.exe f762146.exe PID 2368 wrote to memory of 2864 2368 rundll32.exe f762146.exe PID 2368 wrote to memory of 2864 2368 rundll32.exe f762146.exe PID 2368 wrote to memory of 2864 2368 rundll32.exe f762146.exe PID 2864 wrote to memory of 1108 2864 f762146.exe taskhost.exe PID 2864 wrote to memory of 1160 2864 f762146.exe Dwm.exe PID 2864 wrote to memory of 1256 2864 f762146.exe Explorer.EXE PID 2864 wrote to memory of 1600 2864 f762146.exe DllHost.exe PID 2864 wrote to memory of 2320 2864 f762146.exe rundll32.exe PID 2864 wrote to memory of 2368 2864 f762146.exe rundll32.exe PID 2864 wrote to memory of 2368 2864 f762146.exe rundll32.exe PID 2368 wrote to memory of 2528 2368 rundll32.exe f7626d2.exe PID 2368 wrote to memory of 2528 2368 rundll32.exe f7626d2.exe PID 2368 wrote to memory of 2528 2368 rundll32.exe f7626d2.exe PID 2368 wrote to memory of 2528 2368 rundll32.exe f7626d2.exe PID 2368 wrote to memory of 2444 2368 rundll32.exe f763d4e.exe PID 2368 wrote to memory of 2444 2368 rundll32.exe f763d4e.exe PID 2368 wrote to memory of 2444 2368 rundll32.exe f763d4e.exe PID 2368 wrote to memory of 2444 2368 rundll32.exe f763d4e.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
f762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762146.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aeca71a10078316edb5388060c90b3e17e77abd5e903beb6033f1cc0bfb84396.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aeca71a10078316edb5388060c90b3e17e77abd5e903beb6033f1cc0bfb84396.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\f762146.exeC:\Users\Admin\AppData\Local\Temp\f762146.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\f7626d2.exeC:\Users\Admin\AppData\Local\Temp\f7626d2.exe4⤵
- Executes dropped EXE
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\f763d4e.exeC:\Users\Admin\AppData\Local\Temp\f763d4e.exe4⤵
- Executes dropped EXE
PID:2444
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\f762146.exeFilesize
97KB
MD54fb052a8bd0fd48ea0e46487925846ab
SHA14ceb211328b88215792e6fc2e2bb5bccafe2b616
SHA256d2d7d835e41e537e4f771c0a78446651e45afd8282bfcf85906ad3a65249b027
SHA5122a4e0fb199bdc3a7f42c0bfaa67b5655e310f83dbcca87963cf154512476013dbcd322bd2d4b39242f7a048eb08da76e11ba6f5ea9c56212b3432a77d0946afc
-
memory/1108-16-0x00000000001D0000-0x00000000001D2000-memory.dmpFilesize
8KB
-
memory/2368-77-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2368-71-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2368-10-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2368-45-0x0000000000300000-0x0000000000312000-memory.dmpFilesize
72KB
-
memory/2368-76-0x0000000000300000-0x0000000000312000-memory.dmpFilesize
72KB
-
memory/2368-4-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2368-47-0x0000000000300000-0x0000000000312000-memory.dmpFilesize
72KB
-
memory/2368-73-0x0000000000300000-0x0000000000312000-memory.dmpFilesize
72KB
-
memory/2368-30-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2368-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2368-28-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2368-36-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2368-33-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2444-79-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2528-50-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2864-29-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-12-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-26-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-35-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-57-0x0000000003F60000-0x0000000003F62000-memory.dmpFilesize
8KB
-
memory/2864-23-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-20-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-58-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-59-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-60-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-61-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-62-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-17-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-15-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-14-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-49-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-78-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2864-80-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-81-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-83-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-85-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-87-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-89-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-91-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-95-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-99-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-101-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-103-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2864-110-0x0000000003F60000-0x0000000003F62000-memory.dmpFilesize
8KB