Analysis
-
max time kernel
104s -
max time network
108s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 07:05
Static task
static1
Behavioral task
behavioral1
Sample
b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe
Resource
win10-20230915-en
General
-
Target
b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe
-
Size
1.4MB
-
MD5
7b3f9e2b1568b23496a3536e7cb1749d
-
SHA1
47e2caa7f62a2ce95193aee0b4b0b0c9b9bc973c
-
SHA256
b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9
-
SHA512
e7ff30c52733441691caaacf7c939e9a5802b1bc018ca553c03ce608e4306e9cf63e0df6344cda4efa600a91f12706c7c7c4d8b85c848e64721bd19a2effa3c6
-
SSDEEP
24576:jiyM5edpbbLZ8gSNiKsFiNDh8h3xaf+Uhnc41B1lCjxHiQghxVB1XQWus:A5+vWoq8h3xI+cc04H4T31XQWus
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1876-41-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 7 IoCs
Processes:
z2488715.exez3505875.exez3229346.exez6307251.exeq6665607.exer0958118.exes5010576.exepid process 4488 z2488715.exe 4132 z3505875.exe 4400 z3229346.exe 1852 z6307251.exe 4644 q6665607.exe 4140 r0958118.exe 4452 s5010576.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z6307251.exeAppLaunch.exez2488715.exez3505875.exez3229346.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6307251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2488715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3505875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z3229346.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exeq6665607.exer0958118.exedescription pid process target process PID 1804 set thread context of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 4644 set thread context of 1876 4644 q6665607.exe AppLaunch.exe PID 4140 set thread context of 2156 4140 r0958118.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3692 2156 WerFault.exe AppLaunch.exe 2904 4452 WerFault.exe s5010576.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1876 AppLaunch.exe 1876 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1876 AppLaunch.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exeAppLaunch.exez2488715.exez3505875.exez3229346.exez6307251.exeq6665607.exer0958118.exedescription pid process target process PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 1804 wrote to memory of 3052 1804 b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe AppLaunch.exe PID 3052 wrote to memory of 4488 3052 AppLaunch.exe z2488715.exe PID 3052 wrote to memory of 4488 3052 AppLaunch.exe z2488715.exe PID 3052 wrote to memory of 4488 3052 AppLaunch.exe z2488715.exe PID 4488 wrote to memory of 4132 4488 z2488715.exe z3505875.exe PID 4488 wrote to memory of 4132 4488 z2488715.exe z3505875.exe PID 4488 wrote to memory of 4132 4488 z2488715.exe z3505875.exe PID 4132 wrote to memory of 4400 4132 z3505875.exe z3229346.exe PID 4132 wrote to memory of 4400 4132 z3505875.exe z3229346.exe PID 4132 wrote to memory of 4400 4132 z3505875.exe z3229346.exe PID 4400 wrote to memory of 1852 4400 z3229346.exe z6307251.exe PID 4400 wrote to memory of 1852 4400 z3229346.exe z6307251.exe PID 4400 wrote to memory of 1852 4400 z3229346.exe z6307251.exe PID 1852 wrote to memory of 4644 1852 z6307251.exe q6665607.exe PID 1852 wrote to memory of 4644 1852 z6307251.exe q6665607.exe PID 1852 wrote to memory of 4644 1852 z6307251.exe q6665607.exe PID 4644 wrote to memory of 1876 4644 q6665607.exe AppLaunch.exe PID 4644 wrote to memory of 1876 4644 q6665607.exe AppLaunch.exe PID 4644 wrote to memory of 1876 4644 q6665607.exe AppLaunch.exe PID 4644 wrote to memory of 1876 4644 q6665607.exe AppLaunch.exe PID 4644 wrote to memory of 1876 4644 q6665607.exe AppLaunch.exe PID 4644 wrote to memory of 1876 4644 q6665607.exe AppLaunch.exe PID 4644 wrote to memory of 1876 4644 q6665607.exe AppLaunch.exe PID 4644 wrote to memory of 1876 4644 q6665607.exe AppLaunch.exe PID 1852 wrote to memory of 4140 1852 z6307251.exe r0958118.exe PID 1852 wrote to memory of 4140 1852 z6307251.exe r0958118.exe PID 1852 wrote to memory of 4140 1852 z6307251.exe r0958118.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4140 wrote to memory of 2156 4140 r0958118.exe AppLaunch.exe PID 4400 wrote to memory of 4452 4400 z3229346.exe s5010576.exe PID 4400 wrote to memory of 4452 4400 z3229346.exe s5010576.exe PID 4400 wrote to memory of 4452 4400 z3229346.exe s5010576.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe"C:\Users\Admin\AppData\Local\Temp\b2e9f1961068c7fa8e41dd3ae72f8cad15d68078a268f275cc634530c08f25a9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2488715.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2488715.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3505875.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3505875.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3229346.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3229346.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6307251.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6307251.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6665607.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6665607.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0958118.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0958118.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 5689⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5010576.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5010576.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 5687⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2488715.exeFilesize
1.0MB
MD595f8ad1275328580783701181d20e1f5
SHA12b46feae019eef0c449b69e2c87e98a2bedae26e
SHA256506b67e7c5d1d0ea4c361140599b2e4aaaa3be4071699d38c055fac442ff444f
SHA5129aea33c98a6f1b8f901e54b9eeb2fdc43b71a80ffc767ee2b328a8f353daf5d71d75b3724c08b48a56210d25673dc2ff31d36acd5596f842ba02b46cdc31be71
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2488715.exeFilesize
1.0MB
MD595f8ad1275328580783701181d20e1f5
SHA12b46feae019eef0c449b69e2c87e98a2bedae26e
SHA256506b67e7c5d1d0ea4c361140599b2e4aaaa3be4071699d38c055fac442ff444f
SHA5129aea33c98a6f1b8f901e54b9eeb2fdc43b71a80ffc767ee2b328a8f353daf5d71d75b3724c08b48a56210d25673dc2ff31d36acd5596f842ba02b46cdc31be71
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3505875.exeFilesize
792KB
MD50fd5fe48ecab0b6082154fd55dc0ddbf
SHA169718249d2130bbd92048817f899574d1faca8e3
SHA25663ab3f8758f7d8b746cce0a2fdb93ddeae4593115fb25779c60763ff8c350ace
SHA51242d944835eff314bc8418dc201abf1b742eafb79c23117e366bee6c6904433d74cdd76e469b6d3164231c5343320023502d272f8a7daa72e65f3c4bd762ed10f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3505875.exeFilesize
792KB
MD50fd5fe48ecab0b6082154fd55dc0ddbf
SHA169718249d2130bbd92048817f899574d1faca8e3
SHA25663ab3f8758f7d8b746cce0a2fdb93ddeae4593115fb25779c60763ff8c350ace
SHA51242d944835eff314bc8418dc201abf1b742eafb79c23117e366bee6c6904433d74cdd76e469b6d3164231c5343320023502d272f8a7daa72e65f3c4bd762ed10f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3229346.exeFilesize
609KB
MD5fc5e2339d9eeb199859053a8339e3631
SHA194f4595221507c9ef5f36a977acc907bd0fd1f23
SHA256df9440f40f9befa5361765058718e958320c2d37572ef39a8fbd31b41caa7f70
SHA5124315479e082f3c3dba88a2fefbdca58df2df5a4c61813e842bcc533129ea32871ed0a4ec53945da84f5b3f77ab672ada45fbf4aa323ffd4a40771c4255f6f622
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3229346.exeFilesize
609KB
MD5fc5e2339d9eeb199859053a8339e3631
SHA194f4595221507c9ef5f36a977acc907bd0fd1f23
SHA256df9440f40f9befa5361765058718e958320c2d37572ef39a8fbd31b41caa7f70
SHA5124315479e082f3c3dba88a2fefbdca58df2df5a4c61813e842bcc533129ea32871ed0a4ec53945da84f5b3f77ab672ada45fbf4aa323ffd4a40771c4255f6f622
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5010576.exeFilesize
255KB
MD5bf68f162e4af637b0fdd1952c3dd3c50
SHA11fa8d606b928ee225b57c7768526ee72595a4cc5
SHA25662d4860303c4d7be6805b069da68826f435e61721e94a48eeec426fd167ad51e
SHA512d373ad4b331dc05b3da9101da0950742ce47722f7e68924f5b94d644746c5b89c99c0c68b3f7891efbb46f5d22644d7326d21dc3acc4f0726b04eb7a032ba6d9
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5010576.exeFilesize
255KB
MD5bf68f162e4af637b0fdd1952c3dd3c50
SHA11fa8d606b928ee225b57c7768526ee72595a4cc5
SHA25662d4860303c4d7be6805b069da68826f435e61721e94a48eeec426fd167ad51e
SHA512d373ad4b331dc05b3da9101da0950742ce47722f7e68924f5b94d644746c5b89c99c0c68b3f7891efbb46f5d22644d7326d21dc3acc4f0726b04eb7a032ba6d9
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6307251.exeFilesize
370KB
MD5e13e70153715727e71d4de74fd7490f6
SHA1b1708669c25dd1f93602a0b135c1a25cc5bce8c6
SHA256aa53f826e850fc5e63a5465b33b676c06fdd7b87de7f16037ae6d3449ab0a34e
SHA512e6e827f1cb51106f9829460ffd411b0e57fbf8164a4427443c5410a75fb06047aad43167cbfcd6aae6c4cc3f523567e75bbb95ed663e595688e7e2b1df46830a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6307251.exeFilesize
370KB
MD5e13e70153715727e71d4de74fd7490f6
SHA1b1708669c25dd1f93602a0b135c1a25cc5bce8c6
SHA256aa53f826e850fc5e63a5465b33b676c06fdd7b87de7f16037ae6d3449ab0a34e
SHA512e6e827f1cb51106f9829460ffd411b0e57fbf8164a4427443c5410a75fb06047aad43167cbfcd6aae6c4cc3f523567e75bbb95ed663e595688e7e2b1df46830a
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6665607.exeFilesize
236KB
MD5b64ae11bc5fa9c865208a436d95ce740
SHA14277db6258c24d8b56eef4783c6595908255ec4d
SHA256e2e2de3520bdd60f8d05c74737aa2569536797e0caf96d27e353d1d24ca05ccb
SHA512964d359355301e560569a88f7de89e1142c615ee1954c05f6c8c16625384972ea3f11ae1689f4ce7f5b520b5d395a1fcb3692585cd9c91774eb687828ec0568e
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6665607.exeFilesize
236KB
MD5b64ae11bc5fa9c865208a436d95ce740
SHA14277db6258c24d8b56eef4783c6595908255ec4d
SHA256e2e2de3520bdd60f8d05c74737aa2569536797e0caf96d27e353d1d24ca05ccb
SHA512964d359355301e560569a88f7de89e1142c615ee1954c05f6c8c16625384972ea3f11ae1689f4ce7f5b520b5d395a1fcb3692585cd9c91774eb687828ec0568e
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0958118.exeFilesize
393KB
MD56aaaae134cb6780b5f88c036ef9a7058
SHA1b73d8b31baeef8d99659b745b7d0082786c05325
SHA256a98c6f2264bd7f666afbd0ed16076f58c884bb5e3b5aff9c5567c38192ab7e7a
SHA5123827aa47525091ba75e5c2309e5475bb3601f0fa4054c9394ce189825b0a609c90662c80d8070990bca92a29eb29123c88124cb0f1d8087ae36f903234e1fb48
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0958118.exeFilesize
393KB
MD56aaaae134cb6780b5f88c036ef9a7058
SHA1b73d8b31baeef8d99659b745b7d0082786c05325
SHA256a98c6f2264bd7f666afbd0ed16076f58c884bb5e3b5aff9c5567c38192ab7e7a
SHA5123827aa47525091ba75e5c2309e5475bb3601f0fa4054c9394ce189825b0a609c90662c80d8070990bca92a29eb29123c88124cb0f1d8087ae36f903234e1fb48
-
memory/1876-83-0x0000000073980000-0x000000007406E000-memory.dmpFilesize
6.9MB
-
memory/1876-68-0x0000000073980000-0x000000007406E000-memory.dmpFilesize
6.9MB
-
memory/1876-41-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1876-48-0x0000000073980000-0x000000007406E000-memory.dmpFilesize
6.9MB
-
memory/2156-55-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2156-49-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2156-57-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2156-54-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3052-2-0x0000000000400000-0x000000000053C000-memory.dmpFilesize
1.2MB
-
memory/3052-9-0x0000000000400000-0x000000000053C000-memory.dmpFilesize
1.2MB
-
memory/3052-1-0x0000000000400000-0x000000000053C000-memory.dmpFilesize
1.2MB
-
memory/3052-67-0x0000000000400000-0x000000000053C000-memory.dmpFilesize
1.2MB
-
memory/3052-0-0x0000000000400000-0x000000000053C000-memory.dmpFilesize
1.2MB
-
memory/3052-4-0x0000000000400000-0x000000000053C000-memory.dmpFilesize
1.2MB