Analysis
-
max time kernel
130s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 12:24
Behavioral task
behavioral1
Sample
1a1b268d10ffcdc3200a42370ce7ac99_JaffaCakes118.dll
Resource
win7-20240220-en
General
-
Target
1a1b268d10ffcdc3200a42370ce7ac99_JaffaCakes118.dll
-
Size
787KB
-
MD5
1a1b268d10ffcdc3200a42370ce7ac99
-
SHA1
ddcf5b4e5350f6af84f1f35072e887909c538157
-
SHA256
fddd8a1155040392de6207873bb353228237ae61f0026a35dba6efd5fdf3329e
-
SHA512
82558bbc7f48de0a8a3c5f1eb7d70acb5a06957bc35cda2632c0b22e5503fc21f7e22eab9c5e9d5b7fbef40adf9341209f5eae41a533f6fdfd5ba61e5ef10498
-
SSDEEP
12288:Q7Cx0aLl21dgY5Ax5q09jpZ4AAf4jB5th6ZgvkoSVRDFLJ+3Y4:Q7Cx7Ll21+g+j1Bd6ZgvwhG3
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\rundll32.exe = "C:\\Windows\\SysWOW64\\rundll32.exe:*:enabled:@shell32.dll,-1" rundll32.exe -
Drops file in Drivers directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\system32\DRIVERS\ETC\HOSTS rundll32.exe -
Executes dropped EXE 1 IoCs
Processes:
rundll32mgr.exepid process 3440 rundll32mgr.exe -
Processes:
resource yara_rule behavioral2/memory/2656-2-0x0000000010000000-0x0000000010381000-memory.dmp upx C:\Windows\SysWOW64\rundll32mgr.exe upx behavioral2/memory/3440-5-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3440-16-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2656-20-0x0000000010000000-0x0000000010381000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1116 3440 WerFault.exe rundll32mgr.exe 892 2656 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32mgr.exepid process 3440 rundll32mgr.exe 3440 rundll32mgr.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
rundll32mgr.exepid process 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe 3440 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32mgr.exedescription pid process Token: SeDebugPrivilege 3440 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exerundll32mgr.exedescription pid process target process PID 940 wrote to memory of 2656 940 rundll32.exe rundll32.exe PID 940 wrote to memory of 2656 940 rundll32.exe rundll32.exe PID 940 wrote to memory of 2656 940 rundll32.exe rundll32.exe PID 2656 wrote to memory of 3440 2656 rundll32.exe rundll32mgr.exe PID 2656 wrote to memory of 3440 2656 rundll32.exe rundll32mgr.exe PID 2656 wrote to memory of 3440 2656 rundll32.exe rundll32mgr.exe PID 3440 wrote to memory of 624 3440 rundll32mgr.exe winlogon.exe PID 3440 wrote to memory of 624 3440 rundll32mgr.exe winlogon.exe PID 3440 wrote to memory of 624 3440 rundll32mgr.exe winlogon.exe PID 3440 wrote to memory of 624 3440 rundll32mgr.exe winlogon.exe PID 3440 wrote to memory of 624 3440 rundll32mgr.exe winlogon.exe PID 3440 wrote to memory of 624 3440 rundll32mgr.exe winlogon.exe PID 3440 wrote to memory of 680 3440 rundll32mgr.exe lsass.exe PID 3440 wrote to memory of 680 3440 rundll32mgr.exe lsass.exe PID 3440 wrote to memory of 680 3440 rundll32mgr.exe lsass.exe PID 3440 wrote to memory of 680 3440 rundll32mgr.exe lsass.exe PID 3440 wrote to memory of 680 3440 rundll32mgr.exe lsass.exe PID 3440 wrote to memory of 680 3440 rundll32mgr.exe lsass.exe PID 3440 wrote to memory of 804 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 804 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 804 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 804 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 804 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 804 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 812 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 812 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 812 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 812 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 812 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 812 3440 rundll32mgr.exe fontdrvhost.exe PID 3440 wrote to memory of 820 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 820 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 820 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 820 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 820 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 820 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 920 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 920 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 920 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 920 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 920 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 920 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 980 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 980 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 980 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 980 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 980 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 980 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 396 3440 rundll32mgr.exe dwm.exe PID 3440 wrote to memory of 396 3440 rundll32mgr.exe dwm.exe PID 3440 wrote to memory of 396 3440 rundll32mgr.exe dwm.exe PID 3440 wrote to memory of 396 3440 rundll32mgr.exe dwm.exe PID 3440 wrote to memory of 396 3440 rundll32mgr.exe dwm.exe PID 3440 wrote to memory of 396 3440 rundll32mgr.exe dwm.exe PID 3440 wrote to memory of 408 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 408 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 408 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 408 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 408 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 408 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 1056 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 1056 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 1056 3440 rundll32mgr.exe svchost.exe PID 3440 wrote to memory of 1056 3440 rundll32mgr.exe svchost.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\sihost.exesihost.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a1b268d10ffcdc3200a42370ce7ac99_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a1b268d10ffcdc3200a42370ce7ac99_JaffaCakes118.dll,#13⤵
- Modifies firewall policy service
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 2645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 6404⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2656 -ip 26562⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3440 -ip 34402⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\rundll32mgr.exeFilesize
127KB
MD50ef920d7712d21dda563cab92b29b216
SHA1643c7ae3eb3e8b89cdeba3bbb15604e7f210040c
SHA2567cfaf531184febc33eb4c3de5f9bbeb4d946020ed1ad6b7e3fccefd121dd8e86
SHA512948d74f9b9997354b256fe2b3545a564d5a3683bf274900e92e32d374e2e708685ac1f85d710cf09514cfd9cec4323509fd9598a8620078f074182b384e33bfe
-
memory/2656-10-0x0000000076FE3000-0x0000000076FE4000-memory.dmpFilesize
4KB
-
memory/2656-6-0x000000007F1E0000-0x000000007F1EC000-memory.dmpFilesize
48KB
-
memory/2656-9-0x000000007F1E0000-0x000000007F1EC000-memory.dmpFilesize
48KB
-
memory/2656-8-0x0000000076FE2000-0x0000000076FE3000-memory.dmpFilesize
4KB
-
memory/2656-2-0x0000000010000000-0x0000000010381000-memory.dmpFilesize
3.5MB
-
memory/2656-11-0x000000007F1E0000-0x000000007F1EC000-memory.dmpFilesize
48KB
-
memory/2656-17-0x000000007F1E0000-0x000000007F1EC000-memory.dmpFilesize
48KB
-
memory/2656-20-0x0000000010000000-0x0000000010381000-memory.dmpFilesize
3.5MB
-
memory/3440-5-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/3440-12-0x0000000076FE2000-0x0000000076FE3000-memory.dmpFilesize
4KB
-
memory/3440-14-0x0000000076FE3000-0x0000000076FE4000-memory.dmpFilesize
4KB
-
memory/3440-13-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/3440-16-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB