Analysis
-
max time kernel
195s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 14:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip
Resource
win10v2004-20230221-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Endermanch@AntivirusPro2017.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\Desktop\\Endermanch@AntivirusPro2017.exe" Endermanch@AntivirusPro2017.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run Endermanch@AntivirusPro2017.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Endermanch@AntivirusPro2017.exedescription ioc process File opened (read-only) \??\F: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\G: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\J: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\M: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\Q: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\V: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\X: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\Z: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\I: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\O: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\T: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\L: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\N: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\R: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\W: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\Y: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\E: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\H: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\K: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\P: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\S: Endermanch@AntivirusPro2017.exe File opened (read-only) \??\U: Endermanch@AntivirusPro2017.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Endermanch@AntivirusPro2017.exedescription ioc process File opened for modification \??\PhysicalDrive0 Endermanch@AntivirusPro2017.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\Antivirus Pro 2017.zip:Zone.Identifier firefox.exe -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 4604 regedit.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Endermanch@AntivirusPro2017.exeregedit.exepid process 2840 Endermanch@AntivirusPro2017.exe 4604 regedit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 368 firefox.exe Token: SeDebugPrivilege 368 firefox.exe Token: SeDebugPrivilege 368 firefox.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
Processes:
firefox.exeEndermanch@AntivirusPro2017.exepid process 368 firefox.exe 368 firefox.exe 368 firefox.exe 368 firefox.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
firefox.exeEndermanch@AntivirusPro2017.exepid process 368 firefox.exe 368 firefox.exe 368 firefox.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
firefox.exeEndermanch@AntivirusPro2017.exepid process 368 firefox.exe 368 firefox.exe 368 firefox.exe 368 firefox.exe 2840 Endermanch@AntivirusPro2017.exe 2840 Endermanch@AntivirusPro2017.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 3812 wrote to memory of 368 3812 firefox.exe firefox.exe PID 368 wrote to memory of 4120 368 firefox.exe firefox.exe PID 368 wrote to memory of 4120 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2904 368 firefox.exe firefox.exe PID 368 wrote to memory of 2756 368 firefox.exe firefox.exe PID 368 wrote to memory of 2756 368 firefox.exe firefox.exe PID 368 wrote to memory of 2756 368 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.0.1005555290\2027812643" -parentBuildID 20221007134813 -prefsHandle 1844 -prefMapHandle 1836 -prefsLen 20890 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {877dbd9a-35fa-4133-bdc5-b3bd5561ae12} 368 "\\.\pipe\gecko-crash-server-pipe.368" 1924 129eca18958 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.1.45598489\1420040847" -parentBuildID 20221007134813 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 21706 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce8f1a39-4d7f-4d8f-84eb-49f6f1e9301e} 368 "\\.\pipe\gecko-crash-server-pipe.368" 2424 129dea75258 socket3⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.2.1758957892\1615128812" -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3004 -prefsLen 21854 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4ac93e1-4c3e-4669-ada6-126c5e205bfb} 368 "\\.\pipe\gecko-crash-server-pipe.368" 3196 129ef70da58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.3.175406876\106776785" -childID 2 -isForBrowser -prefsHandle 4064 -prefMapHandle 4060 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5295be34-9deb-4c8a-a820-f7f4f3120737} 368 "\\.\pipe\gecko-crash-server-pipe.368" 4076 129dea65858 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.4.828652102\1364795552" -childID 3 -isForBrowser -prefsHandle 4604 -prefMapHandle 4420 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c77152b3-65bc-4663-af71-35643339f898} 368 "\\.\pipe\gecko-crash-server-pipe.368" 4572 129ee212458 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.6.1023979453\1941558358" -childID 5 -isForBrowser -prefsHandle 4748 -prefMapHandle 4744 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6aefb056-6986-46dc-9b39-afc8c57e4fe6} 368 "\\.\pipe\gecko-crash-server-pipe.368" 4804 129f1cef558 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.5.1552394041\560952441" -childID 4 -isForBrowser -prefsHandle 4616 -prefMapHandle 4504 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07e59506-d467-45a6-b1b4-8d47710b6b14} 368 "\\.\pipe\gecko-crash-server-pipe.368" 4196 129f1895558 tab3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Desktop\Endermanch@AntivirusPro2017.exe"C:\Users\Admin\Desktop\Endermanch@AntivirusPro2017.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bozzcyfh.default-release\activity-stream.discovery_stream.json.tmpFilesize
156KB
MD544b11c934414f5016babb9b3e72abba1
SHA17f0877708ba81422aac277829696a872f20d196e
SHA256cc4b15f6d3babc6391d53a579d64d8bcd06acd028e7e3525c36d27ef6251b3ce
SHA51293da5f3a2081ae60a7e77cc437e932d52f0091b7427474c72a4adf60d5f0bc70f6894a0271f4405d33790db9490ae0ae20dd361abd0cc4eaf288fb256e2bb3b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs-1.jsFilesize
6KB
MD5aacc32b09af415499a5276feb8bd5de3
SHA194357a3f9feb014c173f79e6db95e7e4a0ecee78
SHA256102d2e9670787dbf37abac2d77693d811e738a56a5b221dfb8083c09faa77497
SHA512e17741bb34e530bbe5fcc858fda8103d4e1cc964ef55b8cc603d19b43b4f9fdf08fc3c6437084e4d3b451c9fcff99a474582d4b000c45d0758cc576764997080
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs-1.jsFilesize
6KB
MD5bf2bd387075624245bfd4bc331129a58
SHA1310ba5117774c08e3717663c5a19bb56f17a88d5
SHA2561035230e01a9766ee72b0e22c2f94555c67f71020c04f5e9745810f0ff56af80
SHA512b10aad6e7a6b780f1deaad90ff23796de1c7053540844906bfb35572bc47e9dd769062528ff9fe9aa7d0a7854919f3a613038eb0b6c011062c1fd934ffb9a01d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs-1.jsFilesize
6KB
MD5ba5ba48da220f00d92cbd0f0fc45a09e
SHA1cb22d1ce86528b6ff67df7838b784b9a80de70cd
SHA256a12bdbfac8a72f9d99e052cb0931b210e8c5c2955239b0d37e578fdde207619a
SHA512816291d50fe319843ba00bfc50180a28b365de4ce1ba52894ef7b5fad1032c1985cfba294b36c83a488ecff6db2181a73673ff566fc23af5c057498ebc864d43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs.jsFilesize
6KB
MD5fcd5f37e5e4066f7cffe8eb106b6ce19
SHA1b0a1c4d3d5c96271429fb09cb71055d177c13402
SHA25638dbdb91f24f8e138803d71d0f7e4758fbb78e7f657208325fe30a501e225c67
SHA512afdf7697bc784c3c85f30a8a1e4caa32459cf7f19c1ffacde04f62f089218ff1899ffe69fc465677d719546c8f91bea0d04807b13d58096f79aeba8eef0a0a15
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\sessionstore.jsonlz4Filesize
633B
MD529e685999e5e999a28f25f1cc7ea7c10
SHA1d4b686fd73ba1d52f15e517dd792b8a60646f7a9
SHA256fef1ab4f06a6fc16eef265b3a5ccbd073148f93f8ffb81391e254293535fa3ed
SHA512d5a92f3680c901479bb64b64697a8213e262f1968bdd05db994a3f0b18ee10da6aa1e29fe39280e9e44371f6b8534b52a8842a68125a28f7bc27e4294497cbc8
-
C:\Users\Admin\Downloads\Antivirus Pro 2017.nXcY5l6E.zip.partFilesize
794KB
MD5ab1187f7c6ac5a5d9c45020c8b7492fe
SHA10d765ed785ac662ac13fb9428840911fb0cb3c8f
SHA2568203f1de1fa5ab346580681f6a4c405930d66e391fc8d2da665ac515fd9c430a
SHA512bbc6594001a2802ed654fe730211c75178b0910c2d1e657399de75a95e9ce28a87b38611e30642baeae6e110825599e182d40f8e940156607a40f4baa8aeddf2
-
memory/2840-380-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-384-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-377-0x0000000002D40000-0x0000000002D41000-memory.dmpFilesize
4KB
-
memory/2840-378-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-379-0x0000000002D40000-0x0000000002D41000-memory.dmpFilesize
4KB
-
memory/2840-375-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-381-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-382-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-383-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-376-0x0000000000AD0000-0x0000000000AD1000-memory.dmpFilesize
4KB
-
memory/2840-386-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-387-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-388-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-396-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-397-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-399-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-400-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB
-
memory/2840-401-0x0000000000400000-0x0000000000A06000-memory.dmpFilesize
6.0MB