Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
300KB
-
MD5
6d018cc2ba2f59f2e1e214a13530df70
-
SHA1
c903fe5d835882bdcb1498d42b942a52d52b7f0d
-
SHA256
97cdc8291c3e88742b152e68d8521cffdf47faedd1aad2fadd353837d398d47e
-
SHA512
26f482d44d757a314153a59bf8491ac609e3a0af18852fabb74dba43c8c30982c0484af412c6292f1c883330b07868d2a060800cbd7ef8861aa6178f0debef82
-
SSDEEP
96:45SJtr5iduUg8urAFQn1b+cDuQQCrTl7rCgVkfgNRPzNtF:4sJJ5irev+NQRp7rCgVkfg7Z
Malware Config
Extracted
redline
Nigh
80.66.87.20:80
-
auth_value
dab8506635d1dc134af4ebaedf4404eb
Signatures
-
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1776-165-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/1776-167-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/1776-168-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3872-150-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
Processes:
Khnmtuwhomapplication.exeKhnmtuwhomapplication.exe7579.exe7914.exepid process 1284 Khnmtuwhomapplication.exe 1776 Khnmtuwhomapplication.exe 4468 7579.exe 1044 7914.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Khnmtuwhomapplication.exe7579.exe7914.exefile.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Khnmtuwhomapplication.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7579.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7914.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation file.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
file.exeKhnmtuwhomapplication.exedescription pid process target process PID 2444 set thread context of 3872 2444 file.exe file.exe PID 1284 set thread context of 1776 1284 Khnmtuwhomapplication.exe Khnmtuwhomapplication.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Khnmtuwhomapplication.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Khnmtuwhomapplication.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Khnmtuwhomapplication.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Khnmtuwhomapplication.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exefile.exeKhnmtuwhomapplication.exepid process 2212 powershell.exe 2212 powershell.exe 4084 powershell.exe 4084 powershell.exe 3872 file.exe 3872 file.exe 1776 Khnmtuwhomapplication.exe 1776 Khnmtuwhomapplication.exe 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 1076 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1076 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Khnmtuwhomapplication.exepid process 1776 Khnmtuwhomapplication.exe 1076 1076 1076 1076 -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
file.exepowershell.exeKhnmtuwhomapplication.exepowershell.exefile.exe7914.exepowershell.exepowershell.exe7579.exedescription pid process Token: SeDebugPrivilege 2444 file.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 1284 Khnmtuwhomapplication.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 3872 file.exe Token: SeDebugPrivilege 1044 7914.exe Token: SeDebugPrivilege 4988 powershell.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeShutdownPrivilege 1076 Token: SeCreatePagefilePrivilege 1076 Token: SeDebugPrivilege 4468 7579.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
file.exeKhnmtuwhomapplication.exe7579.exe7914.exedescription pid process target process PID 2444 wrote to memory of 2212 2444 file.exe powershell.exe PID 2444 wrote to memory of 2212 2444 file.exe powershell.exe PID 2444 wrote to memory of 2212 2444 file.exe powershell.exe PID 2444 wrote to memory of 1284 2444 file.exe Khnmtuwhomapplication.exe PID 2444 wrote to memory of 1284 2444 file.exe Khnmtuwhomapplication.exe PID 2444 wrote to memory of 1284 2444 file.exe Khnmtuwhomapplication.exe PID 2444 wrote to memory of 3872 2444 file.exe file.exe PID 2444 wrote to memory of 3872 2444 file.exe file.exe PID 2444 wrote to memory of 3872 2444 file.exe file.exe PID 2444 wrote to memory of 3872 2444 file.exe file.exe PID 2444 wrote to memory of 3872 2444 file.exe file.exe PID 2444 wrote to memory of 3872 2444 file.exe file.exe PID 2444 wrote to memory of 3872 2444 file.exe file.exe PID 2444 wrote to memory of 3872 2444 file.exe file.exe PID 1284 wrote to memory of 4084 1284 Khnmtuwhomapplication.exe powershell.exe PID 1284 wrote to memory of 4084 1284 Khnmtuwhomapplication.exe powershell.exe PID 1284 wrote to memory of 4084 1284 Khnmtuwhomapplication.exe powershell.exe PID 1284 wrote to memory of 1776 1284 Khnmtuwhomapplication.exe Khnmtuwhomapplication.exe PID 1284 wrote to memory of 1776 1284 Khnmtuwhomapplication.exe Khnmtuwhomapplication.exe PID 1284 wrote to memory of 1776 1284 Khnmtuwhomapplication.exe Khnmtuwhomapplication.exe PID 1284 wrote to memory of 1776 1284 Khnmtuwhomapplication.exe Khnmtuwhomapplication.exe PID 1284 wrote to memory of 1776 1284 Khnmtuwhomapplication.exe Khnmtuwhomapplication.exe PID 1284 wrote to memory of 1776 1284 Khnmtuwhomapplication.exe Khnmtuwhomapplication.exe PID 1076 wrote to memory of 4468 1076 7579.exe PID 1076 wrote to memory of 4468 1076 7579.exe PID 1076 wrote to memory of 1044 1076 7914.exe PID 1076 wrote to memory of 1044 1076 7914.exe PID 1076 wrote to memory of 4640 1076 explorer.exe PID 1076 wrote to memory of 4640 1076 explorer.exe PID 1076 wrote to memory of 4640 1076 explorer.exe PID 1076 wrote to memory of 4640 1076 explorer.exe PID 1076 wrote to memory of 4360 1076 explorer.exe PID 1076 wrote to memory of 4360 1076 explorer.exe PID 1076 wrote to memory of 4360 1076 explorer.exe PID 4468 wrote to memory of 4988 4468 7579.exe powershell.exe PID 4468 wrote to memory of 4988 4468 7579.exe powershell.exe PID 1044 wrote to memory of 1936 1044 7914.exe powershell.exe PID 1044 wrote to memory of 1936 1044 7914.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe"C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exeC:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\file.exeC:\Users\Admin\AppData\Local\Temp\file.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7579.exeC:\Users\Admin\AppData\Local\Temp\7579.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7579.exeC:\Users\Admin\AppData\Local\Temp\7579.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\7914.exeC:\Users\Admin\AppData\Local\Temp\7914.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logFilesize
1KB
MD54f3fab3e5f44399e7f4162fd367eca2d
SHA1adada0591db5f53bcc0565942047156de3464e6e
SHA2565db52f2a6a0fbfaa29e27418a1b72b660298dfa58a12ac0f12897a06e557caef
SHA512d8c3fe3a91e572627e31a44d88a71fc3072786b074d04484ff6aacfeab43e0d29ec88bf6ad2af2a5f8e70f0c0eea95dcea59a8159adf4c642e5f8fd5fc632db7
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5687ff3bb8a8b15736d686119a681097c
SHA118f43aa14e56d4fb158a8804f79fc3c604903991
SHA25651fd45579a0bee4beabbf7aa825ccc646f907dfdf27b2fc1791fa47dc90d5aa2
SHA512047b21b92e74c93f264e2547900decd295f3089b22165372c4060b76bb813ffa6f2af924974936e25a2db551ea1eec722329ae78e1fff08f6f104d041090094a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5e7d78e1adae107af100b79c906a258d1
SHA1bffc914f51a0b05bd9242ef35d2142ba48558a99
SHA256af8b06d73bfbd069a38270a6f13c246a89e85796e086d0d32b0aa31be7348a07
SHA5127ada8a1dca20b7894912cdc608530619bcb7c524f267170efb059154439634b4b5f79446917a89ceeee9c38840e67df9ae34f054a00cb035de76aac3d59a13fe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD533566c9bdf50677750f4b21f5e2653e7
SHA19cc182fd05f266d87c503f6648ade6b68c3e899a
SHA256c7dbd82bfd7344b9dbafe9089849746333d56032ae3b6e563aaa129158e0d468
SHA512c18a437bf873f958bff25ef90c48da599f8f72d515b969b84dbf9530bb8af969be0e38ab31fa737dc4f8c0b70dfc73c280f67b9c1ea586fbc678f721e02c0e5d
-
C:\Users\Admin\AppData\Local\Temp\7579.exeFilesize
2.4MB
MD5989cb0bfa4cc0bd8e8302f47add8e368
SHA1515b82386397ec822edbce6f24a6c4b9d13b0344
SHA256932380926bc6bffcdf0bc446af37d140ce22426f651679e3b7d1c8fea83d14ef
SHA5129211bb8622c7dee790db4847a9095bfd8dc48d324a400f374ab42ce65c1e2295cc6392a16e031282f6b3fa29a1881487016c9b817e05d65420d7db41f4548583
-
C:\Users\Admin\AppData\Local\Temp\7579.exeFilesize
2.4MB
MD5989cb0bfa4cc0bd8e8302f47add8e368
SHA1515b82386397ec822edbce6f24a6c4b9d13b0344
SHA256932380926bc6bffcdf0bc446af37d140ce22426f651679e3b7d1c8fea83d14ef
SHA5129211bb8622c7dee790db4847a9095bfd8dc48d324a400f374ab42ce65c1e2295cc6392a16e031282f6b3fa29a1881487016c9b817e05d65420d7db41f4548583
-
C:\Users\Admin\AppData\Local\Temp\7579.exeFilesize
64KB
MD592165f5632f04d17157e3e242718e79a
SHA16b6b3e1f7f26e519413df601fa50b52da7e51267
SHA256b6a2b47df5dd12c81a0091968297a2dda0d787ed769bad2655ba7e9114abeb08
SHA512f914ae79e2bdf1e84a9c6cebe909e27bb693d79a7b2ba97b040d7d1dbe84fc76ef468d62b413f32d3a146137b96a0c12be02e47c281fef1d1e584218a60a2cff
-
C:\Users\Admin\AppData\Local\Temp\7914.exeFilesize
8KB
MD5fd1489c65b0d75f4cdc7b1f2634b5359
SHA1f8431629d627f8dc13ca486e8b5d0a46f47d46fd
SHA256463d0b090396ffa05d579521256e421080a955415554feebe490482551eb08ea
SHA512e4fc02e1567e188caaf67ccd3a068e6b9db1c20b22a6949ec9ffd9d1a037afe36d744ac8c94a0fd5df55c7e2a51c10a9bcf05c3274175c8296cf16be718a99a2
-
C:\Users\Admin\AppData\Local\Temp\7914.exeFilesize
8KB
MD5fd1489c65b0d75f4cdc7b1f2634b5359
SHA1f8431629d627f8dc13ca486e8b5d0a46f47d46fd
SHA256463d0b090396ffa05d579521256e421080a955415554feebe490482551eb08ea
SHA512e4fc02e1567e188caaf67ccd3a068e6b9db1c20b22a6949ec9ffd9d1a037afe36d744ac8c94a0fd5df55c7e2a51c10a9bcf05c3274175c8296cf16be718a99a2
-
C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exeFilesize
8KB
MD554edd17fd9fd91adaf2eabf6154e9069
SHA13d42a84759a73de16cb5462b57a528137f1cf3dc
SHA2562394807c5ab534916b8d1a7b5ee63958363432093a55e0361849d8bf47839530
SHA512aef537d09f91b1be9dfd105e7e823c7c5fe9d2bdddcbf5fe10ff4c37951645235fcd6a58a58f2c328813f0af1006b78f4dd4c21e29759b52b362a45cbef46d2f
-
C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exeFilesize
8KB
MD554edd17fd9fd91adaf2eabf6154e9069
SHA13d42a84759a73de16cb5462b57a528137f1cf3dc
SHA2562394807c5ab534916b8d1a7b5ee63958363432093a55e0361849d8bf47839530
SHA512aef537d09f91b1be9dfd105e7e823c7c5fe9d2bdddcbf5fe10ff4c37951645235fcd6a58a58f2c328813f0af1006b78f4dd4c21e29759b52b362a45cbef46d2f
-
C:\Users\Admin\AppData\Local\Temp\Khnmtuwhomapplication.exeFilesize
8KB
MD554edd17fd9fd91adaf2eabf6154e9069
SHA13d42a84759a73de16cb5462b57a528137f1cf3dc
SHA2562394807c5ab534916b8d1a7b5ee63958363432093a55e0361849d8bf47839530
SHA512aef537d09f91b1be9dfd105e7e823c7c5fe9d2bdddcbf5fe10ff4c37951645235fcd6a58a58f2c328813f0af1006b78f4dd4c21e29759b52b362a45cbef46d2f
-
memory/1044-174-0x0000000000000000-mapping.dmp
-
memory/1044-177-0x0000000000130000-0x0000000000136000-memory.dmpFilesize
24KB
-
memory/1044-180-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB
-
memory/1044-191-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB
-
memory/1052-196-0x0000000140000000-0x0000000140078000-memory.dmpFilesize
480KB
-
memory/1284-145-0x0000000000000000-mapping.dmp
-
memory/1284-148-0x00000000002F0000-0x00000000002F8000-memory.dmpFilesize
32KB
-
memory/1776-164-0x0000000000000000-mapping.dmp
-
memory/1776-165-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1776-168-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1776-167-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1936-193-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB
-
memory/1936-189-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB
-
memory/1936-188-0x0000000000000000-mapping.dmp
-
memory/2212-140-0x00000000050C0000-0x0000000005126000-memory.dmpFilesize
408KB
-
memory/2212-142-0x0000000005E00000-0x0000000005E1E000-memory.dmpFilesize
120KB
-
memory/2212-137-0x0000000000000000-mapping.dmp
-
memory/2212-138-0x00000000024E0000-0x0000000002516000-memory.dmpFilesize
216KB
-
memory/2212-139-0x0000000005320000-0x0000000005948000-memory.dmpFilesize
6.2MB
-
memory/2212-144-0x0000000006310000-0x000000000632A000-memory.dmpFilesize
104KB
-
memory/2212-143-0x0000000007480000-0x0000000007AFA000-memory.dmpFilesize
6.5MB
-
memory/2212-141-0x00000000051A0000-0x0000000005206000-memory.dmpFilesize
408KB
-
memory/2444-133-0x00000000053E0000-0x0000000005984000-memory.dmpFilesize
5.6MB
-
memory/2444-134-0x0000000004E30000-0x0000000004EC2000-memory.dmpFilesize
584KB
-
memory/2444-132-0x0000000000580000-0x0000000000588000-memory.dmpFilesize
32KB
-
memory/2444-135-0x0000000004DF0000-0x0000000004DFA000-memory.dmpFilesize
40KB
-
memory/2444-136-0x0000000007EE0000-0x0000000007F02000-memory.dmpFilesize
136KB
-
memory/3872-152-0x00000000053E0000-0x00000000054EA000-memory.dmpFilesize
1.0MB
-
memory/3872-159-0x0000000006C20000-0x0000000006C96000-memory.dmpFilesize
472KB
-
memory/3872-162-0x0000000007C90000-0x00000000081BC000-memory.dmpFilesize
5.2MB
-
memory/3872-154-0x0000000005380000-0x00000000053BC000-memory.dmpFilesize
240KB
-
memory/3872-150-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3872-160-0x0000000006CA0000-0x0000000006CF0000-memory.dmpFilesize
320KB
-
memory/3872-149-0x0000000000000000-mapping.dmp
-
memory/3872-151-0x0000000005860000-0x0000000005E78000-memory.dmpFilesize
6.1MB
-
memory/3872-153-0x0000000005320000-0x0000000005332000-memory.dmpFilesize
72KB
-
memory/3872-161-0x0000000007590000-0x0000000007752000-memory.dmpFilesize
1.8MB
-
memory/4084-155-0x0000000000000000-mapping.dmp
-
memory/4360-181-0x0000000000000000-mapping.dmp
-
memory/4360-184-0x0000000000810000-0x000000000081C000-memory.dmpFilesize
48KB
-
memory/4468-173-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB
-
memory/4468-190-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB
-
memory/4468-179-0x000001F9D3210000-0x000001F9D3232000-memory.dmpFilesize
136KB
-
memory/4468-169-0x0000000000000000-mapping.dmp
-
memory/4468-172-0x000001F9B8B00000-0x000001F9B8D66000-memory.dmpFilesize
2.4MB
-
memory/4640-183-0x0000000000D00000-0x0000000000D6B000-memory.dmpFilesize
428KB
-
memory/4640-182-0x0000000000D70000-0x0000000000DE5000-memory.dmpFilesize
468KB
-
memory/4640-178-0x0000000000000000-mapping.dmp
-
memory/4988-187-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB
-
memory/4988-185-0x0000000000000000-mapping.dmp
-
memory/4988-192-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB
-
memory/4988-195-0x00007FFC2D690000-0x00007FFC2E151000-memory.dmpFilesize
10.8MB