Analysis
-
max time kernel
152s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20220715-en -
resource tags
arch:x64arch:x86image:win10v2004-20220715-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2022 23:49
Static task
static1
Behavioral task
behavioral1
Sample
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe
Resource
win7-20220715-en
General
-
Target
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe
-
Size
2.1MB
-
MD5
e4ea85000f7e19cd745aaebca5309b58
-
SHA1
562370dcc59955b44bbf5509c7467c70e8256d11
-
SHA256
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b
-
SHA512
4126a75fb73aafe6cc4d09bcbe601c9238ee6ecd044f342c65e659c7b5abb8a28e9f69d891975d68175edc0777c2c39ce11e7ae354257a58e3d25b2f3e23ae47
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exeMicrosoftCare.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftCare.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftCare.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftCare.exe -
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/2392-133-0x0000000000AA0000-0x0000000000FEF000-memory.dmp xmrig behavioral2/memory/4312-135-0x0000000000400000-0x00000000004B5000-memory.dmp xmrig behavioral2/memory/4312-136-0x0000000000400000-0x00000000004B5000-memory.dmp xmrig behavioral2/memory/4312-137-0x0000000000400000-0x00000000004B5000-memory.dmp xmrig behavioral2/memory/2392-138-0x0000000000AA0000-0x0000000000FEF000-memory.dmp xmrig behavioral2/memory/4312-139-0x0000000000400000-0x00000000004B5000-memory.dmp xmrig behavioral2/memory/4312-140-0x0000000000400000-0x00000000004B5000-memory.dmp xmrig behavioral2/memory/2392-142-0x0000000000AA0000-0x0000000000FEF000-memory.dmp xmrig behavioral2/memory/624-147-0x0000000000AA0000-0x0000000000FEF000-memory.dmp xmrig behavioral2/memory/624-148-0x0000000000AA0000-0x0000000000FEF000-memory.dmp xmrig behavioral2/memory/1684-152-0x0000000000AA0000-0x0000000000FEF000-memory.dmp xmrig behavioral2/memory/1684-154-0x0000000000AA0000-0x0000000000FEF000-memory.dmp xmrig -
Executes dropped EXE 3 IoCs
Processes:
MicrosoftCare.exeMicrosoftCare.exeMicrosoftCare.exepid process 624 MicrosoftCare.exe 1684 MicrosoftCare.exe 1348 MicrosoftCare.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
MicrosoftCare.exe537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftCare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftCare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftCare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftCare.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exeMicrosoftCare.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Software\Wine 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe Key opened \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Software\Wine MicrosoftCare.exe Key opened \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Software\Wine MicrosoftCare.exe Key opened \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Software\Wine MicrosoftCare.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exepid process 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 624 MicrosoftCare.exe 1684 MicrosoftCare.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exedescription pid process target process PID 2392 set thread context of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 64 schtasks.exe 680 schtasks.exe 1424 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exepid process 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe -
Suspicious behavior: RenamesItself 3 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exepid process 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 624 MicrosoftCare.exe 1684 MicrosoftCare.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exedescription pid process target process PID 2392 wrote to memory of 64 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe schtasks.exe PID 2392 wrote to memory of 64 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe schtasks.exe PID 2392 wrote to memory of 64 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe schtasks.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 2392 wrote to memory of 4312 2392 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 624 wrote to memory of 680 624 MicrosoftCare.exe schtasks.exe PID 624 wrote to memory of 680 624 MicrosoftCare.exe schtasks.exe PID 624 wrote to memory of 680 624 MicrosoftCare.exe schtasks.exe PID 1684 wrote to memory of 1424 1684 MicrosoftCare.exe schtasks.exe PID 1684 wrote to memory of 1424 1684 MicrosoftCare.exe schtasks.exe PID 1684 wrote to memory of 1424 1684 MicrosoftCare.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe"C:\Users\Admin\AppData\Local\Temp\537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \Windows\SystemCare\Microsoft /tr "C:\ProgramData\MicrosoftCare.exe" /st 00:00 /sc daily /du 9999:59 /ri 1 /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\tasklist.exe"C:\Windows\System32\tasklist.exe"2⤵
- Enumerates processes with tasklist
-
C:\ProgramData\MicrosoftCare.exeC:\ProgramData\MicrosoftCare.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \Windows\SystemCare\Microsoft /tr "C:\ProgramData\MicrosoftCare.exe" /st 00:00 /sc daily /du 9999:59 /ri 1 /f2⤵
- Creates scheduled task(s)
-
C:\ProgramData\MicrosoftCare.exeC:\ProgramData\MicrosoftCare.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \Windows\SystemCare\Microsoft /tr "C:\ProgramData\MicrosoftCare.exe" /st 00:00 /sc daily /du 9999:59 /ri 1 /f2⤵
- Creates scheduled task(s)
-
C:\ProgramData\MicrosoftCare.exeC:\ProgramData\MicrosoftCare.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\MicrosoftCare.exeFilesize
2.1MB
MD5e4ea85000f7e19cd745aaebca5309b58
SHA1562370dcc59955b44bbf5509c7467c70e8256d11
SHA256537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b
SHA5124126a75fb73aafe6cc4d09bcbe601c9238ee6ecd044f342c65e659c7b5abb8a28e9f69d891975d68175edc0777c2c39ce11e7ae354257a58e3d25b2f3e23ae47
-
C:\ProgramData\MicrosoftCare.exeFilesize
2.1MB
MD5e4ea85000f7e19cd745aaebca5309b58
SHA1562370dcc59955b44bbf5509c7467c70e8256d11
SHA256537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b
SHA5124126a75fb73aafe6cc4d09bcbe601c9238ee6ecd044f342c65e659c7b5abb8a28e9f69d891975d68175edc0777c2c39ce11e7ae354257a58e3d25b2f3e23ae47
-
C:\ProgramData\MicrosoftCare.exeFilesize
2.1MB
MD5e4ea85000f7e19cd745aaebca5309b58
SHA1562370dcc59955b44bbf5509c7467c70e8256d11
SHA256537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b
SHA5124126a75fb73aafe6cc4d09bcbe601c9238ee6ecd044f342c65e659c7b5abb8a28e9f69d891975d68175edc0777c2c39ce11e7ae354257a58e3d25b2f3e23ae47
-
memory/64-131-0x0000000000000000-mapping.dmp
-
memory/624-149-0x0000000077650000-0x00000000777F3000-memory.dmpFilesize
1.6MB
-
memory/624-145-0x0000000077650000-0x00000000777F3000-memory.dmpFilesize
1.6MB
-
memory/624-148-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/624-147-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/624-144-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/680-146-0x0000000000000000-mapping.dmp
-
memory/1348-156-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/1424-151-0x0000000000000000-mapping.dmp
-
memory/1684-153-0x0000000077650000-0x00000000777F3000-memory.dmpFilesize
1.6MB
-
memory/1684-152-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/1684-154-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/2392-142-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/2392-130-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/2392-141-0x0000000077650000-0x00000000777F3000-memory.dmpFilesize
1.6MB
-
memory/2392-138-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/2392-133-0x0000000000AA0000-0x0000000000FEF000-memory.dmpFilesize
5.3MB
-
memory/2392-132-0x0000000077650000-0x00000000777F3000-memory.dmpFilesize
1.6MB
-
memory/4312-140-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4312-139-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4312-137-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4312-136-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4312-135-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4312-134-0x0000000000000000-mapping.dmp