Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe
Resource
win7-20240508-en
General
-
Target
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe
-
Size
585KB
-
MD5
41d27d71597c9d1163fb58a816223962
-
SHA1
2ae197a2724967fb0ae77ee0c20d95d354b9e5cb
-
SHA256
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c
-
SHA512
555aa48eaa46f83933e34c6e8ecaf79c8f1756fb9de79181e4132bc2d02c5789abba90458ad347a374f34fc829f83b36d6666f64a657bf7e99ca5cb9aac2e1a0
-
SSDEEP
12288:2aYEnxStMSe+LQMNQ7ZQhIyOQSNSY2CNZ+TB29JvNgRh:J/nxSiSCMNQFwt3Jx8gB29Jv2
Malware Config
Extracted
nanocore
1.2.2.0
2023endofyear.duckdns.org:15170
127.0.0.1:15170
68e7ea47-3f3c-4af7-9707-6d09d0468009
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-12-29T09:19:37.611227236Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
15170
-
default_group
GLOBAL
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
68e7ea47-3f3c-4af7-9707-6d09d0468009
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
2023endofyear.duckdns.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 3604 powershell.exe 1644 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Subsystem = "C:\\Program Files (x86)\\DPI Subsystem\\dpiss.exe" b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe -
Processes:
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exedescription pid process target process PID 2476 set thread context of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe -
Drops file in Program Files directory 2 IoCs
Processes:
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exedescription ioc process File created C:\Program Files (x86)\DPI Subsystem\dpiss.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe File opened for modification C:\Program Files (x86)\DPI Subsystem\dpiss.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4720 schtasks.exe 4872 schtasks.exe 1040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepowershell.exeb4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exepid process 3604 powershell.exe 1644 powershell.exe 3604 powershell.exe 1644 powershell.exe 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exepid process 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exeb4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exedescription pid process Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exeb4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exedescription pid process target process PID 2476 wrote to memory of 3604 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe powershell.exe PID 2476 wrote to memory of 3604 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe powershell.exe PID 2476 wrote to memory of 3604 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe powershell.exe PID 2476 wrote to memory of 1644 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe powershell.exe PID 2476 wrote to memory of 1644 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe powershell.exe PID 2476 wrote to memory of 1644 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe powershell.exe PID 2476 wrote to memory of 1040 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe PID 2476 wrote to memory of 1040 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe PID 2476 wrote to memory of 1040 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe PID 2476 wrote to memory of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe PID 2476 wrote to memory of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe PID 2476 wrote to memory of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe PID 2476 wrote to memory of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe PID 2476 wrote to memory of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe PID 2476 wrote to memory of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe PID 2476 wrote to memory of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe PID 2476 wrote to memory of 2532 2476 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe PID 2532 wrote to memory of 4720 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe PID 2532 wrote to memory of 4720 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe PID 2532 wrote to memory of 4720 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe PID 2532 wrote to memory of 4872 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe PID 2532 wrote to memory of 4872 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe PID 2532 wrote to memory of 4872 2532 b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe"C:\Users\Admin\AppData\Local\Temp\b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dsiayzgxX.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dsiayzgxX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7EE4.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Local\Temp\b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe"C:\Users\Admin\AppData\Local\Temp\b4a76ec2287a65963ea978ae7911b8c42c3411a21c995463985599d975e9960c.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DPI Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp83E5.tmp"3⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DPI Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp852F.tmp"3⤵
- Scheduled Task/Job: Scheduled Task
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD53d5d77b27751abd217735d7b930d22dd
SHA19ed8f43d9e338dc3dda5e6b9cc169bf7986b7e84
SHA256398ade8b8491995d66a569bf10ef32a69cc0a386aecd9c1d261f41430c3b053c
SHA512c1dcc91ffa64c56c6d2915d4da0a28960da1971198f60f4597c293a56b39fc9cb47458a862344da850caebb5efd05b45e4a7e79f2e3d8d04a8c4a2915f0badb9
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dkv1vrqj.sja.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp7EE4.tmpFilesize
1KB
MD567f3841530a444959642da8346e17c6a
SHA14a0f70a8050d4f3c0f1c06b0513e47d110653605
SHA2564a923b1b51b4477d9c93e804046eb974c4b160a9a257e85bc5835a2b56c9a73c
SHA512f882f3b48ca210c5bbf15d8bcc3a43dfd40834850bd92e681249784022d75ca29368613695504702eb4840832a06e3560a277c08583431d1c275c1bb0cca098b
-
C:\Users\Admin\AppData\Local\Temp\tmp83E5.tmpFilesize
1KB
MD5cabdc89a33b52830601190421a4838a9
SHA194fc2d24b510c8f19ad2cda8f391e5893666ae68
SHA256273dd05dea08a08008bbcc67b4fc726817a87c270fdccb97319a990869905b99
SHA512b3273af6953c6e01a327faa305478f54c3a0528c1853d8e7c517ba6d616f8850ee9d9ecaaaa5896ce8584d63e911a59af5e24df94e0b2f4ee100b12f3b2de965
-
C:\Users\Admin\AppData\Local\Temp\tmp852F.tmpFilesize
1KB
MD55fea24e883e06e4df6d240dc72abf2c5
SHA1d778bf0f436141e02df4b421e8188abdcc9a84a4
SHA256e858982f4ab3c74f7a8903eea18c0f73501a77273ae38b54d5c9dec997e79a66
SHA51215afc2ffbbee14d28a5ff8dc8285d01c942147aada36fb33e31045a4e998769b51738bebe199bcad3462f918b535845a893aa2f80c84b9c795cd1fee4a327924
-
memory/1644-44-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB
-
memory/1644-34-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB
-
memory/1644-62-0x00000000752E0000-0x000000007532C000-memory.dmpFilesize
304KB
-
memory/1644-23-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB
-
memory/1644-72-0x0000000006190000-0x00000000061AE000-memory.dmpFilesize
120KB
-
memory/1644-33-0x0000000005660000-0x00000000059B4000-memory.dmpFilesize
3.3MB
-
memory/1644-61-0x0000000006C90000-0x0000000006CC2000-memory.dmpFilesize
200KB
-
memory/1644-95-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB
-
memory/1644-89-0x00000000071C0000-0x00000000071CE000-memory.dmpFilesize
56KB
-
memory/1644-87-0x0000000007210000-0x00000000072A6000-memory.dmpFilesize
600KB
-
memory/1644-85-0x0000000007600000-0x0000000007C7A000-memory.dmpFilesize
6.5MB
-
memory/2476-8-0x0000000005FD0000-0x0000000005FDC000-memory.dmpFilesize
48KB
-
memory/2476-0-0x0000000074A5E000-0x0000000074A5F000-memory.dmpFilesize
4KB
-
memory/2476-9-0x0000000006030000-0x00000000060AC000-memory.dmpFilesize
496KB
-
memory/2476-7-0x0000000005FC0000-0x0000000005FC8000-memory.dmpFilesize
32KB
-
memory/2476-6-0x0000000004FE0000-0x0000000004FF4000-memory.dmpFilesize
80KB
-
memory/2476-4-0x0000000004DF0000-0x0000000004DFA000-memory.dmpFilesize
40KB
-
memory/2476-5-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB
-
memory/2476-1-0x0000000000490000-0x0000000000528000-memory.dmpFilesize
608KB
-
memory/2476-47-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB
-
memory/2476-10-0x00000000087E0000-0x000000000887C000-memory.dmpFilesize
624KB
-
memory/2476-3-0x0000000004E50000-0x0000000004EE2000-memory.dmpFilesize
584KB
-
memory/2476-2-0x0000000005400000-0x00000000059A4000-memory.dmpFilesize
5.6MB
-
memory/2532-45-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2532-60-0x00000000066A0000-0x00000000066AA000-memory.dmpFilesize
40KB
-
memory/2532-57-0x0000000006470000-0x000000000647A000-memory.dmpFilesize
40KB
-
memory/2532-59-0x0000000006650000-0x000000000666E000-memory.dmpFilesize
120KB
-
memory/2532-58-0x0000000006640000-0x000000000664C000-memory.dmpFilesize
48KB
-
memory/3604-48-0x0000000005D80000-0x0000000005D9E000-memory.dmpFilesize
120KB
-
memory/3604-49-0x0000000005E60000-0x0000000005EAC000-memory.dmpFilesize
304KB
-
memory/3604-20-0x0000000004EE0000-0x0000000004F46000-memory.dmpFilesize
408KB
-
memory/3604-73-0x00000000752E0000-0x000000007532C000-memory.dmpFilesize
304KB
-
memory/3604-83-0x0000000006FA0000-0x0000000007043000-memory.dmpFilesize
652KB
-
memory/3604-19-0x0000000004DC0000-0x0000000004DE2000-memory.dmpFilesize
136KB
-
memory/3604-84-0x00000000070B0000-0x00000000070CA000-memory.dmpFilesize
104KB
-
memory/3604-86-0x0000000007120000-0x000000000712A000-memory.dmpFilesize
40KB
-
memory/3604-21-0x0000000004F50000-0x0000000004FB6000-memory.dmpFilesize
408KB
-
memory/3604-88-0x00000000072B0000-0x00000000072C1000-memory.dmpFilesize
68KB
-
memory/3604-18-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB
-
memory/3604-90-0x00000000072F0000-0x0000000007304000-memory.dmpFilesize
80KB
-
memory/3604-91-0x00000000073F0000-0x000000000740A000-memory.dmpFilesize
104KB
-
memory/3604-92-0x00000000073D0000-0x00000000073D8000-memory.dmpFilesize
32KB
-
memory/3604-17-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB
-
memory/3604-16-0x0000000004FE0000-0x0000000005608000-memory.dmpFilesize
6.2MB
-
memory/3604-15-0x00000000024A0000-0x00000000024D6000-memory.dmpFilesize
216KB
-
memory/3604-99-0x0000000074A50000-0x0000000075200000-memory.dmpFilesize
7.7MB