Analysis
-
max time kernel
44s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 17:56
Behavioral task
behavioral1
Sample
Crunchyroll_p_.exe
Resource
win7-20230220-en
General
-
Target
Crunchyroll_p_.exe
-
Size
9.2MB
-
MD5
e7d1a006917f10e419f0e506a98e385b
-
SHA1
14b28ce35fbeafe10d629ffd7a12ac017876bfda
-
SHA256
c66f10a5fc23b02ad11b77786c17ea54f68912156cafb227bfef5aab69b38b91
-
SHA512
af34bcd208d9e3e2a1c1af2147bff2cc6a44e1008181410e4ba377e0d902cc7dc0a077d575c167dec059fa27af6123e3690512934b19d23618e51794b41af6b6
-
SSDEEP
98304:HD6asPKgZViQqyYiwdLTgmOSjr4Wz3Wch+jMnlL0jaDvLZsDawHm+tiyOweb8xI1:j6asPZ3LqjxFBz+uD19wG+tivwebr3n
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Crunchyroll_p_.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Crunchyroll_p_.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Crunchyroll_p_.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Crunchyroll_p_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Crunchyroll_p_.exe -
Loads dropped DLL 5 IoCs
Processes:
Crunchyroll_p_.exepid process 3048 Crunchyroll_p_.exe 3048 Crunchyroll_p_.exe 3048 Crunchyroll_p_.exe 3048 Crunchyroll_p_.exe 3048 Crunchyroll_p_.exe -
Obfuscated with Agile.Net obfuscator 4 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3048-133-0x0000000000400000-0x0000000000660000-memory.dmp agile_net behavioral2/memory/3048-134-0x0000000000400000-0x0000000000612000-memory.dmp agile_net behavioral2/memory/3048-166-0x0000000000400000-0x0000000000660000-memory.dmp agile_net behavioral2/memory/3048-238-0x0000000000400000-0x0000000000612000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral2/memory/3048-138-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-144-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-147-0x0000000005930000-0x0000000005F44000-memory.dmp themida behavioral2/memory/3048-148-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-149-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-150-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-153-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-154-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-155-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-180-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-183-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-220-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3048-235-0x0000000010000000-0x0000000010C35000-memory.dmp themida -
Processes:
Crunchyroll_p_.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Crunchyroll_p_.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Crunchyroll_p_.exepid process 3048 Crunchyroll_p_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 42 IoCs
Processes:
Crunchyroll_p_.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Crunchyroll_p_.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Crunchyroll_p_.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Crunchyroll_p_.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe110000007673eeb56645d901578731bb6645d901c0a9fdbc6645d90114000000 Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Crunchyroll_p_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Crunchyroll_p_.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Crunchyroll_p_.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff Crunchyroll_p_.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Crunchyroll_p_.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1220 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Crunchyroll_p_.exepid process 3048 Crunchyroll_p_.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
Crunchyroll_p_.exepid process 3048 Crunchyroll_p_.exe 3048 Crunchyroll_p_.exe 3048 Crunchyroll_p_.exe 3048 Crunchyroll_p_.exe 3048 Crunchyroll_p_.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crunchyroll_p_.exe"C:\Users\Admin\AppData\Local\Temp\Crunchyroll_p_.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\combo.txt1⤵
- Opens file in notepad (likely ransom note)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
28KB
MD5d6eeba7625fd24e5bd0c359a855d4eaf
SHA1956ee143785c4d0bb55872417a881505de041940
SHA2569a61e543dc85e24849ab711206c412d97fac99535872fc1d13ffef57adcdea88
SHA51251883392d9011c6088619ce5a92919b8d7a2fccae15d029c31e2a6e6bb74fdff739d3685013ff020433a3c9ff347f3f119613c00b8969b6f37fed7b97ae264f9
-
C:\Users\Admin\AppData\Local\Temp\evbDF88.tmpFilesize
1KB
MD592bfcb568bb0a74869f134d6ed8053c0
SHA145fb0817db5abdee31fef3289fa0c5bcf039ef9c
SHA256eb84e17ff1e3c68294a89e1786a8484ba3ce049b494973399438ef8339d3fc95
SHA512b82afc7bf48394cd1dce743220e007a82a3f8e0f9b689e81821b9058b3158e4c275d6f7c2816ba353b589b14bc6f7d05999d64b80ebff7e1e403e892690a1500
-
C:\Users\Admin\AppData\Local\Temp\evbF9D8.tmpFilesize
1KB
MD5e19f1ab63874138c99d0047c27d478d8
SHA192290bd4c5c76da2b9cd7eeddc1283e7334ac968
SHA2564dd8c4ac0e9b213fa9d160f893b170054934e43c9f9d58f5da5193355422bd6a
SHA512cc30d9bfadec6050e4ab2e866b60fb67ce48968d1ae5de8f2fcbe40b048a418cc9cd00282878282744dd14150303d173a65e782c0ad314afd53c3ef76025d206
-
C:\Users\Admin\AppData\Local\Temp\evbF9F8.tmpFilesize
1KB
MD5e19f1ab63874138c99d0047c27d478d8
SHA192290bd4c5c76da2b9cd7eeddc1283e7334ac968
SHA2564dd8c4ac0e9b213fa9d160f893b170054934e43c9f9d58f5da5193355422bd6a
SHA512cc30d9bfadec6050e4ab2e866b60fb67ce48968d1ae5de8f2fcbe40b048a418cc9cd00282878282744dd14150303d173a65e782c0ad314afd53c3ef76025d206
-
C:\Users\Admin\AppData\Local\Temp\evbFB03.tmpFilesize
1KB
MD526fc5802d3da1539a5b4a4e9d1c0be94
SHA14451ad10ddd3a9910f3706e957ce32ae142fbf58
SHA256d1781882a8f4ed09d0f0237271a72522b7679aca3112755c75f9b60e5db18840
SHA5125dd81590049e6574e3e1325b637a4f2fb62bfc77635f8ad86b6125ff2a91f04a88182cc896e855b3054ed281545c6985e0db05c36ed55f0819ed5260ab27b44c
-
C:\Users\Admin\AppData\Local\Temp\evbFB13.tmpFilesize
1KB
MD526fc5802d3da1539a5b4a4e9d1c0be94
SHA14451ad10ddd3a9910f3706e957ce32ae142fbf58
SHA256d1781882a8f4ed09d0f0237271a72522b7679aca3112755c75f9b60e5db18840
SHA5125dd81590049e6574e3e1325b637a4f2fb62bfc77635f8ad86b6125ff2a91f04a88182cc896e855b3054ed281545c6985e0db05c36ed55f0819ed5260ab27b44c
-
memory/3048-186-0x0000000003150000-0x000000000316C000-memory.dmpFilesize
112KB
-
memory/3048-154-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-148-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-149-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-150-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-153-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-196-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-155-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-156-0x0000000072F60000-0x0000000072FE9000-memory.dmpFilesize
548KB
-
memory/3048-146-0x0000000005640000-0x0000000005721000-memory.dmpFilesize
900KB
-
memory/3048-161-0x0000000003150000-0x000000000316C000-memory.dmpFilesize
112KB
-
memory/3048-145-0x00000000FFC50000-0x00000000FFE3F000-memory.dmpFilesize
1.9MB
-
memory/3048-167-0x0000000003150000-0x000000000316C000-memory.dmpFilesize
112KB
-
memory/3048-166-0x0000000000400000-0x0000000000660000-memory.dmpFilesize
2.4MB
-
memory/3048-168-0x0000000006330000-0x00000000063C2000-memory.dmpFilesize
584KB
-
memory/3048-144-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-172-0x00000000059B0000-0x00000000059D6000-memory.dmpFilesize
152KB
-
memory/3048-138-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-177-0x00000000059B0000-0x00000000059D6000-memory.dmpFilesize
152KB
-
memory/3048-197-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-179-0x00000000063D0000-0x0000000006974000-memory.dmpFilesize
5.6MB
-
memory/3048-180-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-181-0x0000000005640000-0x0000000005721000-memory.dmpFilesize
900KB
-
memory/3048-183-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-133-0x0000000000400000-0x0000000000660000-memory.dmpFilesize
2.4MB
-
memory/3048-187-0x00000000059B0000-0x00000000059D6000-memory.dmpFilesize
152KB
-
memory/3048-188-0x0000000005630000-0x0000000005640000-memory.dmpFilesize
64KB
-
memory/3048-194-0x000000000C910000-0x000000000C920000-memory.dmpFilesize
64KB
-
memory/3048-195-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-147-0x0000000005930000-0x0000000005F44000-memory.dmpFilesize
6.1MB
-
memory/3048-178-0x0000000005630000-0x0000000005640000-memory.dmpFilesize
64KB
-
memory/3048-198-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-199-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-200-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-201-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-202-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-203-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-204-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-205-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-206-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-207-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-208-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-209-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-210-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-211-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-212-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-213-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-214-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-215-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-216-0x000000000D040000-0x000000000D050000-memory.dmpFilesize
64KB
-
memory/3048-217-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-218-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-220-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-223-0x000000000D050000-0x000000000D060000-memory.dmpFilesize
64KB
-
memory/3048-134-0x0000000000400000-0x0000000000612000-memory.dmpFilesize
2.1MB
-
memory/3048-235-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3048-238-0x0000000000400000-0x0000000000612000-memory.dmpFilesize
2.1MB