Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
26-08-2022 19:38
Static task
static1
General
-
Target
SYNAPSE X CRACKED/SYNAPSE X CRACKED/RobloxSynapse.exe
-
Size
700.0MB
-
MD5
99709192d1df7d5f7d8e583472818007
-
SHA1
2914457c90f0a89c1ccbbdd96157907214e4b1fb
-
SHA256
e6120b4444738b23157d1476615c68a719cb22017e3e48ee794003d162a4ed20
-
SHA512
a416d828c81726a0842f85410c4bc3e0d516671c2284a30c82dc68fbe9375fab7d23cca6efcb4cd4077af910ae3843fe0b08ad31b0a87e0e6c9753fb1903257b
-
SSDEEP
49152:C7G9SRPCkd/OJLDPXissDMRT6FacYKfQWNpGW78O+siqTDpQ:C7G0Nt42DCT6HYKSZqTG
Malware Config
Extracted
redline
185.200.191.18:80
-
auth_value
81be690af280fd9c9e7c951600742654
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/184756-550-0x000000000041A7CE-mapping.dmp family_redline behavioral1/memory/184756-588-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/4124-499-0x0000000000860000-0x0000000001674000-memory.dmp family_ytstealer behavioral1/memory/4124-618-0x0000000000860000-0x0000000001674000-memory.dmp family_ytstealer behavioral1/memory/4124-654-0x0000000000860000-0x0000000001674000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
47067633334107397402.exe@yuki4onna_crypted.exe1055716893.exeStarter.exepid process 4812 47067633334107397402.exe 4716 @yuki4onna_crypted.exe 4124 1055716893.exe 1820 Starter.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\1055716893.exe upx C:\Users\Admin\AppData\Roaming\1055716893.exe upx behavioral1/memory/4124-499-0x0000000000860000-0x0000000001674000-memory.dmp upx behavioral1/memory/4124-618-0x0000000000860000-0x0000000001674000-memory.dmp upx behavioral1/memory/4124-654-0x0000000000860000-0x0000000001674000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
RobloxSynapse.exe@yuki4onna_crypted.exedescription pid process target process PID 2524 set thread context of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 4716 set thread context of 184756 4716 @yuki4onna_crypted.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
aspnet_compiler.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aspnet_compiler.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString aspnet_compiler.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 55248 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4632 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
powershell.exeRobloxSynapse.exeaspnet_compiler.exepowershell.exeAppLaunch.exepid process 2288 powershell.exe 2288 powershell.exe 2288 powershell.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 2524 RobloxSynapse.exe 4644 aspnet_compiler.exe 4644 aspnet_compiler.exe 185100 powershell.exe 185100 powershell.exe 185100 powershell.exe 184756 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RobloxSynapse.exepowershell.exetaskkill.exepowershell.exeAppLaunch.exeStarter.exedescription pid process Token: SeDebugPrivilege 2524 RobloxSynapse.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 4632 taskkill.exe Token: SeDebugPrivilege 185100 powershell.exe Token: SeDebugPrivilege 184756 AppLaunch.exe Token: SeDebugPrivilege 1820 Starter.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
RobloxSynapse.exeaspnet_compiler.execmd.exe47067633334107397402.exe@yuki4onna_crypted.exe1055716893.exeAppLaunch.exedescription pid process target process PID 2524 wrote to memory of 2288 2524 RobloxSynapse.exe powershell.exe PID 2524 wrote to memory of 2288 2524 RobloxSynapse.exe powershell.exe PID 2524 wrote to memory of 2288 2524 RobloxSynapse.exe powershell.exe PID 2524 wrote to memory of 4708 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4708 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4708 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4444 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4444 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4444 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 2524 wrote to memory of 4644 2524 RobloxSynapse.exe aspnet_compiler.exe PID 4644 wrote to memory of 4812 4644 aspnet_compiler.exe 47067633334107397402.exe PID 4644 wrote to memory of 4812 4644 aspnet_compiler.exe 47067633334107397402.exe PID 4644 wrote to memory of 4812 4644 aspnet_compiler.exe 47067633334107397402.exe PID 4644 wrote to memory of 2800 4644 aspnet_compiler.exe cmd.exe PID 4644 wrote to memory of 2800 4644 aspnet_compiler.exe cmd.exe PID 4644 wrote to memory of 2800 4644 aspnet_compiler.exe cmd.exe PID 2800 wrote to memory of 4632 2800 cmd.exe taskkill.exe PID 2800 wrote to memory of 4632 2800 cmd.exe taskkill.exe PID 2800 wrote to memory of 4632 2800 cmd.exe taskkill.exe PID 4812 wrote to memory of 4716 4812 47067633334107397402.exe @yuki4onna_crypted.exe PID 4812 wrote to memory of 4716 4812 47067633334107397402.exe @yuki4onna_crypted.exe PID 4812 wrote to memory of 4716 4812 47067633334107397402.exe @yuki4onna_crypted.exe PID 4812 wrote to memory of 4124 4812 47067633334107397402.exe 1055716893.exe PID 4812 wrote to memory of 4124 4812 47067633334107397402.exe 1055716893.exe PID 2800 wrote to memory of 55248 2800 cmd.exe timeout.exe PID 2800 wrote to memory of 55248 2800 cmd.exe timeout.exe PID 2800 wrote to memory of 55248 2800 cmd.exe timeout.exe PID 4716 wrote to memory of 184756 4716 @yuki4onna_crypted.exe AppLaunch.exe PID 4716 wrote to memory of 184756 4716 @yuki4onna_crypted.exe AppLaunch.exe PID 4716 wrote to memory of 184756 4716 @yuki4onna_crypted.exe AppLaunch.exe PID 4716 wrote to memory of 184756 4716 @yuki4onna_crypted.exe AppLaunch.exe PID 4716 wrote to memory of 184756 4716 @yuki4onna_crypted.exe AppLaunch.exe PID 4124 wrote to memory of 185100 4124 1055716893.exe powershell.exe PID 4124 wrote to memory of 185100 4124 1055716893.exe powershell.exe PID 184756 wrote to memory of 1820 184756 AppLaunch.exe Starter.exe PID 184756 wrote to memory of 1820 184756 AppLaunch.exe Starter.exe PID 184756 wrote to memory of 1820 184756 AppLaunch.exe Starter.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SYNAPSE X CRACKED\SYNAPSE X CRACKED\RobloxSynapse.exe"C:\Users\Admin\AppData\Local\Temp\SYNAPSE X CRACKED\SYNAPSE X CRACKED\RobloxSynapse.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\47067633334107397402.exe"C:\ProgramData\47067633334107397402.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\@yuki4onna_crypted.exeC:\Users\Admin\AppData\Roaming\@yuki4onna_crypted.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Starter.exe"C:\Users\Admin\AppData\Local\Temp\Starter.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\1055716893.exeC:\Users\Admin\AppData\Roaming\1055716893.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im aspnet_compiler.exe /f & timeout /t 6 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe" & del C:\PrograData\*.dll & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im aspnet_compiler.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\47067633334107397402.exeFilesize
4.5MB
MD542b6ddf282a3cafbd3b9938b9242ca2f
SHA11dc9c7b02cae370032b04aff89f87880e09130dc
SHA256e2b835bdb5ab7558876936d5334028654507afd40176244ccd367d56b5c2d45d
SHA512b87b81d2e7e44031a68740aa391dfca93121adfdb2a9bad055c5f7f0e9bc615e4814f6efea011c9b04a7d15952a42a082c62be2ba02f582af8831cfbab5c552a
-
C:\ProgramData\47067633334107397402.exeFilesize
4.5MB
MD542b6ddf282a3cafbd3b9938b9242ca2f
SHA11dc9c7b02cae370032b04aff89f87880e09130dc
SHA256e2b835bdb5ab7558876936d5334028654507afd40176244ccd367d56b5c2d45d
SHA512b87b81d2e7e44031a68740aa391dfca93121adfdb2a9bad055c5f7f0e9bc615e4814f6efea011c9b04a7d15952a42a082c62be2ba02f582af8831cfbab5c552a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
45KB
MD55f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD535bd968b998012684e812c4d3ece1795
SHA11b65d8d4ffcdca8e5986d8b5ed29c28e24c10ed6
SHA25660685116213ed1048bca8543b333d9f6ee54861af81fa0f0a082cee89e23cf71
SHA512ae2aa756a6ee1b6b987225a8ab5511d74920f3d0f7d8cf14681cfb2f8f3d8a23a61982d0abddcdb7722a9dd4a85a3c3324493ded01e81cde0314e5b9a85fa905
-
C:\Users\Admin\AppData\Local\Temp\Starter.exeFilesize
18KB
MD5f67f9188455a685c402e44748a9f47b1
SHA10ed55d3d1227ff4048672ed93df3ad6e096f8031
SHA256f192fa45cf887a5cdfb904df31238c3201879e8c0a0764f18efad1ce3b6ed713
SHA5127b8e7faaba35f25ea9fc85845002d5dbeea5380b54a1c65c8462e6f2ea64ac45290926072acaf89a754c3fe8fe5e013bc7e0a08b8c6adce1d5c626e199e6913b
-
C:\Users\Admin\AppData\Local\Temp\Starter.exeFilesize
18KB
MD5f67f9188455a685c402e44748a9f47b1
SHA10ed55d3d1227ff4048672ed93df3ad6e096f8031
SHA256f192fa45cf887a5cdfb904df31238c3201879e8c0a0764f18efad1ce3b6ed713
SHA5127b8e7faaba35f25ea9fc85845002d5dbeea5380b54a1c65c8462e6f2ea64ac45290926072acaf89a754c3fe8fe5e013bc7e0a08b8c6adce1d5c626e199e6913b
-
C:\Users\Admin\AppData\Roaming\1055716893.exeFilesize
4.0MB
MD56111addf72040542825c35d671cce5b7
SHA1c18a06e73418f6b6e7c24fd472218cc345cb8262
SHA256ad324bc60320dd8a5d9865acfd60b93aa26b2398e41183d7203ae525ea639f26
SHA5125f10eb726aa22c2cf9c5d3b0e98e908aed81389adf4139265139e1fd7811b788c40108ef99aeed8e3a42a9c0d78ab6e38d8b64e8597f8f8385dc31cae94d4aed
-
C:\Users\Admin\AppData\Roaming\1055716893.exeFilesize
4.0MB
MD56111addf72040542825c35d671cce5b7
SHA1c18a06e73418f6b6e7c24fd472218cc345cb8262
SHA256ad324bc60320dd8a5d9865acfd60b93aa26b2398e41183d7203ae525ea639f26
SHA5125f10eb726aa22c2cf9c5d3b0e98e908aed81389adf4139265139e1fd7811b788c40108ef99aeed8e3a42a9c0d78ab6e38d8b64e8597f8f8385dc31cae94d4aed
-
C:\Users\Admin\AppData\Roaming\@yuki4onna_crypted.exeFilesize
1.1MB
MD5c89ba4b3553ee2c55aca91875a09c8d3
SHA16b432dfe72639ce84431b6453c84e027f0235881
SHA25671cf8db83d88f6689347e9fc14ba81256ceedd09d8e915340f304cc098d03e25
SHA512c7cce485b998fce015d1012bd69b89b820366c3b3db085b62553014dc9ca5bf60c976db0b1b8e56ec149f3da6e1401643b9318e61c96d8d823d35538ac79087c
-
C:\Users\Admin\AppData\Roaming\@yuki4onna_crypted.exeFilesize
1.1MB
MD5c89ba4b3553ee2c55aca91875a09c8d3
SHA16b432dfe72639ce84431b6453c84e027f0235881
SHA25671cf8db83d88f6689347e9fc14ba81256ceedd09d8e915340f304cc098d03e25
SHA512c7cce485b998fce015d1012bd69b89b820366c3b3db085b62553014dc9ca5bf60c976db0b1b8e56ec149f3da6e1401643b9318e61c96d8d823d35538ac79087c
-
memory/1820-981-0x0000000000000000-mapping.dmp
-
memory/1820-1019-0x0000000000A90000-0x0000000000A9A000-memory.dmpFilesize
40KB
-
memory/1820-1038-0x0000000002E70000-0x0000000002E7A000-memory.dmpFilesize
40KB
-
memory/2288-203-0x0000000000000000-mapping.dmp
-
memory/2288-284-0x00000000089D0000-0x00000000089EA000-memory.dmpFilesize
104KB
-
memory/2288-283-0x0000000009480000-0x0000000009AF8000-memory.dmpFilesize
6.5MB
-
memory/2288-272-0x0000000007C00000-0x0000000007C76000-memory.dmpFilesize
472KB
-
memory/2288-268-0x0000000007E10000-0x0000000007E5B000-memory.dmpFilesize
300KB
-
memory/2288-267-0x00000000074A0000-0x00000000074BC000-memory.dmpFilesize
112KB
-
memory/2288-264-0x0000000006C20000-0x0000000006C86000-memory.dmpFilesize
408KB
-
memory/2288-263-0x0000000007430000-0x0000000007496000-memory.dmpFilesize
408KB
-
memory/2288-244-0x0000000006D00000-0x0000000007328000-memory.dmpFilesize
6.2MB
-
memory/2288-239-0x0000000006550000-0x0000000006586000-memory.dmpFilesize
216KB
-
memory/2524-180-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-141-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-145-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-146-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-147-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-148-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-149-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-150-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-151-0x0000000000950000-0x0000000000B66000-memory.dmpFilesize
2.1MB
-
memory/2524-152-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-153-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-154-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-155-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-156-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-157-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-158-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-159-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-160-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-161-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-162-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-163-0x00000000054F0000-0x00000000056F8000-memory.dmpFilesize
2.0MB
-
memory/2524-164-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-165-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-166-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-167-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-168-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-169-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-170-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-171-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-172-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-173-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-174-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-175-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-176-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-177-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-178-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-179-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-120-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-181-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-182-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-183-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-184-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-185-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-188-0x0000000005CB0000-0x0000000005D6C000-memory.dmpFilesize
752KB
-
memory/2524-189-0x0000000006F40000-0x0000000006F62000-memory.dmpFilesize
136KB
-
memory/2524-191-0x0000000006F70000-0x00000000072C0000-memory.dmpFilesize
3.3MB
-
memory/2524-143-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-142-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-140-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-144-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-139-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-138-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-137-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-136-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-135-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-134-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-295-0x000000001A830000-0x000000001A8C2000-memory.dmpFilesize
584KB
-
memory/2524-296-0x000000001B340000-0x000000001B83E000-memory.dmpFilesize
5.0MB
-
memory/2524-121-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-122-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-123-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-133-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-124-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-125-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-132-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-126-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-127-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-131-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-128-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-130-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2524-129-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2800-452-0x0000000000000000-mapping.dmp
-
memory/4124-499-0x0000000000860000-0x0000000001674000-memory.dmpFilesize
14.1MB
-
memory/4124-473-0x0000000000000000-mapping.dmp
-
memory/4124-654-0x0000000000860000-0x0000000001674000-memory.dmpFilesize
14.1MB
-
memory/4124-618-0x0000000000860000-0x0000000001674000-memory.dmpFilesize
14.1MB
-
memory/4632-464-0x0000000000000000-mapping.dmp
-
memory/4644-298-0x000000000042023D-mapping.dmp
-
memory/4644-310-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/4644-455-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/4716-466-0x0000000000000000-mapping.dmp
-
memory/4812-408-0x0000000000000000-mapping.dmp
-
memory/55248-522-0x0000000000000000-mapping.dmp
-
memory/184756-863-0x000000000AC10000-0x000000000AC60000-memory.dmpFilesize
320KB
-
memory/184756-877-0x000000000C090000-0x000000000C252000-memory.dmpFilesize
1.8MB
-
memory/184756-550-0x000000000041A7CE-mapping.dmp
-
memory/184756-588-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/184756-616-0x00000000093E0000-0x000000000942B000-memory.dmpFilesize
300KB
-
memory/184756-680-0x000000000AA10000-0x000000000AA2E000-memory.dmpFilesize
120KB
-
memory/184756-614-0x00000000093A0000-0x00000000093DE000-memory.dmpFilesize
248KB
-
memory/184756-609-0x00000000098F0000-0x0000000009EF6000-memory.dmpFilesize
6.0MB
-
memory/184756-878-0x000000000C790000-0x000000000CCBC000-memory.dmpFilesize
5.2MB
-
memory/184756-611-0x0000000009470000-0x000000000957A000-memory.dmpFilesize
1.0MB
-
memory/184756-610-0x0000000009340000-0x0000000009352000-memory.dmpFilesize
72KB
-
memory/185100-632-0x0000027BB0910000-0x0000027BB0932000-memory.dmpFilesize
136KB
-
memory/185100-625-0x0000000000000000-mapping.dmp
-
memory/185100-635-0x0000027BB0C30000-0x0000027BB0CA6000-memory.dmpFilesize
472KB