Analysis
-
max time kernel
296s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2023 22:17
Static task
static1
Behavioral task
behavioral1
Sample
e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe
Resource
win7-20230220-en
General
-
Target
e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe
-
Size
3.4MB
-
MD5
15720b49943d91b0fc1c85a324f8a003
-
SHA1
29795b9b75c9684e3e06c01b91084125f4eb84d6
-
SHA256
e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf
-
SHA512
5ca50134799e2189f0c8d945dc22d12bac14c563a42141fbc8d6404d1d42b527bb7c643a481b8ffcd4ecea079ce6b532ab24272db9ee0c9983bf5734a725b13e
-
SSDEEP
98304:7JuR21C/yIq/dhl/O4i/TksjdFwvhzjMSwRVq:78D/yIqlhlW4i/QsnwZzjMSeVq
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe -
Executes dropped EXE 2 IoCs
Processes:
Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exepid process 832 Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe 956 Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe -
Loads dropped DLL 4 IoCs
Processes:
AppLaunch.exetaskeng.exepid process 1528 AppLaunch.exe 1528 AppLaunch.exe 1108 taskeng.exe 1108 taskeng.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 600 icacls.exe 320 icacls.exe 1684 icacls.exe -
Processes:
resource yara_rule \ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe upx C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe upx C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe upx \ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe upx C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe upx behavioral1/memory/832-77-0x000000013F9B0000-0x000000013FECF000-memory.dmp upx behavioral1/memory/832-76-0x000000013F9B0000-0x000000013FECF000-memory.dmp upx behavioral1/memory/832-79-0x000000013F9B0000-0x000000013FECF000-memory.dmp upx \ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe upx behavioral1/memory/956-85-0x000000013F090000-0x000000013F5AF000-memory.dmp upx behavioral1/memory/956-84-0x000000013F090000-0x000000013F5AF000-memory.dmp upx C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe upx \ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe upx behavioral1/memory/956-87-0x000000013F090000-0x000000013F5AF000-memory.dmp upx behavioral1/memory/956-88-0x000000013F090000-0x000000013F5AF000-memory.dmp upx -
Processes:
Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeMozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exedescription pid process target process PID 1408 set thread context of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 860 1408 WerFault.exe e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exeAppLaunch.exetaskeng.exedescription pid process target process PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 1528 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe AppLaunch.exe PID 1408 wrote to memory of 860 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe WerFault.exe PID 1408 wrote to memory of 860 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe WerFault.exe PID 1408 wrote to memory of 860 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe WerFault.exe PID 1408 wrote to memory of 860 1408 e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe WerFault.exe PID 1528 wrote to memory of 600 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 600 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 600 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 600 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 600 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 600 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 600 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 320 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 320 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 320 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 320 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 320 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 320 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 320 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 1684 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 1684 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 1684 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 1684 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 1684 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 1684 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 1684 1528 AppLaunch.exe icacls.exe PID 1528 wrote to memory of 1776 1528 AppLaunch.exe schtasks.exe PID 1528 wrote to memory of 1776 1528 AppLaunch.exe schtasks.exe PID 1528 wrote to memory of 1776 1528 AppLaunch.exe schtasks.exe PID 1528 wrote to memory of 1776 1528 AppLaunch.exe schtasks.exe PID 1528 wrote to memory of 1776 1528 AppLaunch.exe schtasks.exe PID 1528 wrote to memory of 1776 1528 AppLaunch.exe schtasks.exe PID 1528 wrote to memory of 1776 1528 AppLaunch.exe schtasks.exe PID 1528 wrote to memory of 832 1528 AppLaunch.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe PID 1528 wrote to memory of 832 1528 AppLaunch.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe PID 1528 wrote to memory of 832 1528 AppLaunch.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe PID 1528 wrote to memory of 832 1528 AppLaunch.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe PID 1108 wrote to memory of 956 1108 taskeng.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe PID 1108 wrote to memory of 956 1108 taskeng.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe PID 1108 wrote to memory of 956 1108 taskeng.exe Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe"C:\Users\Admin\AppData\Local\Temp\e1f816580b7bc165dece180f277b49972ee1937da5fbf8ad66301721421d58bf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2" /TR "C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe"C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 362⤵
- Program crash
-
C:\Windows\system32\taskeng.exetaskeng.exe {A629224D-1E5E-4846-B13B-7FD1A33E63DB} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeC:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeFilesize
591.3MB
MD54e4589c1b9755439518e06c0a39c6ebd
SHA16218cb8c3078db9ddefac0fb390df3aef6a97e28
SHA256e9f6017f26ee8b9a179fc6e108dab9277e44349506b271d5decd5d536959298a
SHA51266b33d37cee23047be8247bf0d7b35cc2e4ab57c9486fcafb5032fd00164f53420cddb94a8151820ee1c57e22cd661e04cfa768bfb7294fd455e136c2ee6e77e
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeFilesize
595.5MB
MD58dfb676cdd7db7b9254657fa6b68ec8b
SHA14aff01f4ae04a35aa2bd4bd38399eb876c452849
SHA25613c18e4ba1353ebdc8f9c76f650dbf6a8e0e84d0ae8408e482f2874d59299958
SHA5127992034e53e6bd64f4f62208ab2cc13d7fe72351018195c4e43ae352aae369c80b52af49af0d58f4787f2e2941ea4082da6354d7405868ab4a86ae74df6e0046
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeFilesize
582.6MB
MD5ac937929feb8a272c6f91d3830a90a44
SHA18e91bcf2265029e8f6c0ce289241bbbb7492e748
SHA256e570e703273e96c8511147c85eaddfd48967d76119fba02438905d4a2ae453ab
SHA512c778fefd6f2cca5483d3a8cd7c7b6672025522a5bc58d3154e939fe6beaab1a9c966a89d0dc16622969249a2281b721612b49a3dcc32e233e2e40d78ad4d1072
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeFilesize
410.7MB
MD5f9f93226262e599713a0c5b55b0f8793
SHA1ba4b5d7c1620b570deb582b4b32b14fd1a2b8186
SHA25614bc5d19f29a5890e3b46317ecdccb08d4a4a90568689b243271205e48c20dcb
SHA512a559f7f599cd7de75f8bba15fc333c233ab2b16c6f09a89de7602ead7a505fa29107f487d3e03f680f38c4cd97690d3c2591628107f7aa399b151a04130bda4f
-
\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeFilesize
588.1MB
MD52d80da9dced6785bd360ae7cf3e4a952
SHA13ab38ad054d47c5c3fc5ce684bb1da280b4d5989
SHA2565ce1b7b0fe4c29f421dfdb32c5eb1008297497ae9ae9a0f460cdb10a3237cc1f
SHA5120121a1c6f6e1721e78d4cd57e819f80e24a36824b4e10564e15ff22b35273cb0b0b0667a6e75cbdd85438f87c3d2c0a3b78f00644695b46e16348310606141f0
-
\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeFilesize
574.6MB
MD50400589c803104c0dd1c98a9c40b8f26
SHA1a71c2cd15c91ce40e68f1a3334966812e4470206
SHA25679498c4a25296299e437488bb6212786e3ad4f2605978ef8f02707c8395e9ec6
SHA512332483a74443e74d713b1bf8bc67285d654c4cef4c524da473ade583236de4176d8dc89542514286a92956ac90fea4f63e2fed1589e64c5500a03f2d8e8cbaf1
-
\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeFilesize
429.3MB
MD53856ec28c4243c5842358eaecb25d96f
SHA12fa1d922075020152fc7cbdef16e809465c33a22
SHA256a860ced281d84c2374d1ddc17091f1a0ae69d0a51b670adf5bf0040cabc834d8
SHA512f29fd21760986deee1d26f2de12d6d3722d827180515b20396542d79ea820cce2e7d5b0f10f97ffdcaccf1be47dc628529d14fc10c70935c7d3912f71b4f9ff6
-
\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38Documents-type6.7.1.2.exeFilesize
408.3MB
MD51aa89f20385a1fd1645a896ed4fa844d
SHA1cd94555983b710f21dec44ce1070b3f8dc40d375
SHA2569075f3b2789fcaa0c17f917351c027c2469ef025f1b7200a4bd1dfce570e6d3b
SHA51275150716bdcca06a564bc77fd644fbd08fb56c20a94fb46825e4c92d45e29628000c58656f563fcc8d8b16c1e9984bfe998cff5e0393ee18329d4cfa1933d768
-
memory/832-79-0x000000013F9B0000-0x000000013FECF000-memory.dmpFilesize
5.1MB
-
memory/832-77-0x000000013F9B0000-0x000000013FECF000-memory.dmpFilesize
5.1MB
-
memory/832-76-0x000000013F9B0000-0x000000013FECF000-memory.dmpFilesize
5.1MB
-
memory/956-85-0x000000013F090000-0x000000013F5AF000-memory.dmpFilesize
5.1MB
-
memory/956-84-0x000000013F090000-0x000000013F5AF000-memory.dmpFilesize
5.1MB
-
memory/956-87-0x000000013F090000-0x000000013F5AF000-memory.dmpFilesize
5.1MB
-
memory/956-88-0x000000013F090000-0x000000013F5AF000-memory.dmpFilesize
5.1MB
-
memory/1108-86-0x000000013F090000-0x000000013F5AF000-memory.dmpFilesize
5.1MB
-
memory/1528-64-0x0000000005190000-0x00000000051D0000-memory.dmpFilesize
256KB
-
memory/1528-80-0x0000000008310000-0x000000000882F000-memory.dmpFilesize
5.1MB
-
memory/1528-74-0x0000000008310000-0x000000000882F000-memory.dmpFilesize
5.1MB
-
memory/1528-65-0x0000000005190000-0x00000000051D0000-memory.dmpFilesize
256KB
-
memory/1528-54-0x0000000000400000-0x000000000075C000-memory.dmpFilesize
3.4MB
-
memory/1528-63-0x0000000005190000-0x00000000051D0000-memory.dmpFilesize
256KB
-
memory/1528-62-0x0000000000400000-0x000000000075C000-memory.dmpFilesize
3.4MB
-
memory/1528-61-0x0000000000400000-0x000000000075C000-memory.dmpFilesize
3.4MB
-
memory/1528-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1528-55-0x0000000000400000-0x000000000075C000-memory.dmpFilesize
3.4MB