Analysis
-
max time kernel
510s -
max time network
513s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
24-06-2022 15:06
Static task
static1
Behavioral task
behavioral1
Sample
2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884.dll
Resource
win10-20220414-en
General
-
Target
2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884.dll
-
Size
5.0MB
-
MD5
5d446ad3d84db7a2acad9b403129e072
-
SHA1
38bb2766c0bf3f1a06ef60f4ec9d1cf35c878964
-
SHA256
2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884
-
SHA512
3d376e294269ffdf5c18972512ca2e89d6735705318d51dd1d8d3ea12d0b301be052b979243cb1e9e546693d3f762083fcf58817a8b91b6555ffc97ff5758452
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (12096) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 4760 mssecsvc.exe 4264 mssecsvc.exe 3604 tasksche.exe -
Drops file in System32 directory 5 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 mssecsvc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE mssecsvc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies mssecsvc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 mssecsvc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies data under HKEY_USERS 8 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4236190499-842014725-259441995-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 4248 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 4248 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 4164 firefox.exe Token: SeDebugPrivilege 4164 firefox.exe Token: SeDebugPrivilege 4164 firefox.exe Token: SeDebugPrivilege 4164 firefox.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
Processes:
firefox.exevlc.exepid process 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe -
Suspicious use of SendNotifyMessage 13 IoCs
Processes:
firefox.exevlc.exepid process 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4164 firefox.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe 4248 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
firefox.exevlc.exepid process 4164 firefox.exe 4248 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exefirefox.exefirefox.exedescription pid process target process PID 3720 wrote to memory of 4680 3720 rundll32.exe rundll32.exe PID 3720 wrote to memory of 4680 3720 rundll32.exe rundll32.exe PID 3720 wrote to memory of 4680 3720 rundll32.exe rundll32.exe PID 4680 wrote to memory of 4760 4680 rundll32.exe mssecsvc.exe PID 4680 wrote to memory of 4760 4680 rundll32.exe mssecsvc.exe PID 4680 wrote to memory of 4760 4680 rundll32.exe mssecsvc.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 1676 wrote to memory of 4164 1676 firefox.exe firefox.exe PID 4164 wrote to memory of 2960 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 2960 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 4328 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 3488 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 3488 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 3488 4164 firefox.exe firefox.exe PID 4164 wrote to memory of 3488 4164 firefox.exe firefox.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2e67865b954436c36f6233e1cd7337e643f4369639a7c8f7175721e884981884.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4164.0.1340959341\649392795" -parentBuildID 20200403170909 -prefsHandle 1540 -prefMapHandle 1532 -prefsLen 1 -prefMapSize 219876 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4164 "\\.\pipe\gecko-crash-server-pipe.4164" 1624 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4164.3.395993487\1860206558" -childID 1 -isForBrowser -prefsHandle 2240 -prefMapHandle 2236 -prefsLen 156 -prefMapSize 219876 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4164 "\\.\pipe\gecko-crash-server-pipe.4164" 2252 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4164.13.1475982280\243836777" -childID 2 -isForBrowser -prefsHandle 3428 -prefMapHandle 3424 -prefsLen 6932 -prefMapSize 219876 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4164 "\\.\pipe\gecko-crash-server-pipe.4164" 3436 tab3⤵
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ResizeConnect.m4a"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ResizeConnect.m4a"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvc.exeFilesize
3.6MB
MD57275da38bdca671dbe9bfc01ebc859dd
SHA199c470e374415fcee801bdc52d711bec3e36f926
SHA256fd2dd2b09c2723552d39994294ae5d95b6184ef0f4a3287b88f5c69680b2f71d
SHA512f23043fb423bb6112ca7e7f4846acb610f62326f71153b9378c72823deabb1cc1b8b994b41c2744b73e9819ab4bb98e4cba2a58a97762d4ac735d576e1d7cc52
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD57275da38bdca671dbe9bfc01ebc859dd
SHA199c470e374415fcee801bdc52d711bec3e36f926
SHA256fd2dd2b09c2723552d39994294ae5d95b6184ef0f4a3287b88f5c69680b2f71d
SHA512f23043fb423bb6112ca7e7f4846acb610f62326f71153b9378c72823deabb1cc1b8b994b41c2744b73e9819ab4bb98e4cba2a58a97762d4ac735d576e1d7cc52
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD57275da38bdca671dbe9bfc01ebc859dd
SHA199c470e374415fcee801bdc52d711bec3e36f926
SHA256fd2dd2b09c2723552d39994294ae5d95b6184ef0f4a3287b88f5c69680b2f71d
SHA512f23043fb423bb6112ca7e7f4846acb610f62326f71153b9378c72823deabb1cc1b8b994b41c2744b73e9819ab4bb98e4cba2a58a97762d4ac735d576e1d7cc52
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD58f5fc431c3e7219a043634ac346c814d
SHA189d4d0a4da512a53da3f356019683624e5655e8f
SHA256cb621e6a785b36e330ff614d850eebc76e50ff3380b23fbd6fa414791ce78f8c
SHA512e1a688e5410e9feffd1a5d6394e548f5bd3b1fdfc3d94bf5b2de31b7159605c2aaf95fa07a11d9dd2939bba21e5e74beaa5bb56ff56f60e100a280cc6accaf4c
-
memory/4680-145-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-127-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-116-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-117-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-118-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-119-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-120-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-121-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-122-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-123-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-124-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-125-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-126-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-144-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-128-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-129-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-131-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-130-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-132-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-133-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-134-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-135-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-136-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-138-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-139-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-140-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-141-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-137-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-142-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-143-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-148-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-146-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-152-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-115-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-114-0x0000000000000000-mapping.dmp
-
memory/4680-150-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-151-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-147-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-149-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-153-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-154-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-155-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-156-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-157-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4680-160-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-162-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-165-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-158-0x0000000000000000-mapping.dmp
-
memory/4760-173-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-167-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-161-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-166-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-172-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-169-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-181-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-163-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-171-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-164-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-174-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-175-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-176-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-177-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-178-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-179-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-180-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/4760-170-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB