Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
17-10-2022 18:15
Static task
static1
Behavioral task
behavioral1
Sample
6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe
Resource
win10-20220812-en
General
-
Target
6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe
-
Size
543KB
-
MD5
86be1fd07bcfd80a12c0bb77b8e6f45d
-
SHA1
41e7de66d97cda087f4c3ef8920095367c4f9080
-
SHA256
6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4
-
SHA512
52550fad0f487c5ab4407bdf659dcb53cb7d1d91a89a4adb8899c67d449417e08053853af1c8d0a2f6147478092f5aebcb3316844dddc71d4e94e5ba8af4e840
-
SSDEEP
1536:jrae78zjORCDGwfdCSog01313/s5g0VclU+jxeTjs7d59QRr32+P8yYiN:JahKyd2n31E5FOxeTwd0RrXUyY0
Malware Config
Extracted
redline
Nigh
80.66.87.20:80
-
auth_value
dab8506635d1dc134af4ebaedf4404eb
Signatures
-
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3880-587-0x0000000000402E87-mapping.dmp family_smokeloader behavioral1/memory/3880-600-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/3880-620-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3932-309-0x000000000042210E-mapping.dmp family_redline behavioral1/memory/3932-376-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
Processes:
perfofov.exeEkechvvajumessagecompetitive_1.exeperfofov.exeperfofov.exeperfofov.exeEkechvvajumessagecompetitive_1.exepid process 2424 perfofov.exe 4304 Ekechvvajumessagecompetitive_1.exe 4356 perfofov.exe 4136 perfofov.exe 3932 perfofov.exe 3880 Ekechvvajumessagecompetitive_1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
perfofov.exeEkechvvajumessagecompetitive_1.exedescription pid process target process PID 2424 set thread context of 3932 2424 perfofov.exe perfofov.exe PID 4304 set thread context of 3880 4304 Ekechvvajumessagecompetitive_1.exe Ekechvvajumessagecompetitive_1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Ekechvvajumessagecompetitive_1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ekechvvajumessagecompetitive_1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ekechvvajumessagecompetitive_1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Ekechvvajumessagecompetitive_1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeperfofov.exepowershell.exeperfofov.exeEkechvvajumessagecompetitive_1.exepid process 2412 powershell.exe 2412 powershell.exe 2412 powershell.exe 2424 perfofov.exe 2424 perfofov.exe 2424 perfofov.exe 2424 perfofov.exe 804 powershell.exe 804 powershell.exe 804 powershell.exe 3932 perfofov.exe 3932 perfofov.exe 3880 Ekechvvajumessagecompetitive_1.exe 3880 Ekechvvajumessagecompetitive_1.exe 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 1736 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Ekechvvajumessagecompetitive_1.exepid process 3880 Ekechvvajumessagecompetitive_1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
perfofov.exepowershell.exeEkechvvajumessagecompetitive_1.exepowershell.exeperfofov.exedescription pid process Token: SeDebugPrivilege 2424 perfofov.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 4304 Ekechvvajumessagecompetitive_1.exe Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 3932 perfofov.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exeperfofov.exeEkechvvajumessagecompetitive_1.exedescription pid process target process PID 2716 wrote to memory of 2424 2716 6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe perfofov.exe PID 2716 wrote to memory of 2424 2716 6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe perfofov.exe PID 2716 wrote to memory of 2424 2716 6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe perfofov.exe PID 2424 wrote to memory of 2412 2424 perfofov.exe powershell.exe PID 2424 wrote to memory of 2412 2424 perfofov.exe powershell.exe PID 2424 wrote to memory of 2412 2424 perfofov.exe powershell.exe PID 2424 wrote to memory of 4304 2424 perfofov.exe Ekechvvajumessagecompetitive_1.exe PID 2424 wrote to memory of 4304 2424 perfofov.exe Ekechvvajumessagecompetitive_1.exe PID 2424 wrote to memory of 4304 2424 perfofov.exe Ekechvvajumessagecompetitive_1.exe PID 2424 wrote to memory of 4356 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 4356 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 4356 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 4136 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 4136 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 4136 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 3932 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 3932 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 3932 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 3932 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 3932 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 3932 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 3932 2424 perfofov.exe perfofov.exe PID 2424 wrote to memory of 3932 2424 perfofov.exe perfofov.exe PID 4304 wrote to memory of 804 4304 Ekechvvajumessagecompetitive_1.exe powershell.exe PID 4304 wrote to memory of 804 4304 Ekechvvajumessagecompetitive_1.exe powershell.exe PID 4304 wrote to memory of 804 4304 Ekechvvajumessagecompetitive_1.exe powershell.exe PID 4304 wrote to memory of 3880 4304 Ekechvvajumessagecompetitive_1.exe Ekechvvajumessagecompetitive_1.exe PID 4304 wrote to memory of 3880 4304 Ekechvvajumessagecompetitive_1.exe Ekechvvajumessagecompetitive_1.exe PID 4304 wrote to memory of 3880 4304 Ekechvvajumessagecompetitive_1.exe Ekechvvajumessagecompetitive_1.exe PID 4304 wrote to memory of 3880 4304 Ekechvvajumessagecompetitive_1.exe Ekechvvajumessagecompetitive_1.exe PID 4304 wrote to memory of 3880 4304 Ekechvvajumessagecompetitive_1.exe Ekechvvajumessagecompetitive_1.exe PID 4304 wrote to memory of 3880 4304 Ekechvvajumessagecompetitive_1.exe Ekechvvajumessagecompetitive_1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe"C:\Users\Admin\AppData\Local\Temp\6023d2e3d6ae4901fe997e9133c488dfbd50736e47034a6ee45d4c5952f26ee4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe"C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exeC:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\perfofov.exe.logFilesize
1KB
MD594783fcf58c98f5ea0b416f441ad15eb
SHA1979a7c39c6a5dbed314bc41a22c4ccdca6db206b
SHA256117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905
SHA5129301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD566382a4ca6c4dcf75ce41417d44be93e
SHA18132cbef1c12f8a89a68a6153ade4286bf130812
SHA256a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56
SHA5122bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
45KB
MD55f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5cd25dff8cd9b3027f43667c0393bc4ce
SHA1e49d49fd707f3d49848e6e7c670b747e589833bf
SHA256d463a461e37355a8c042583d1c92c2995bcb4915338a5c831675c53d6ef85be1
SHA512e9ec3ccb5d267e9e84432a0fee7f35db0cf08d487b966371c1ce229e712471ef7ab371f72aa800e805d828f2a1a3f7c32aa4d131519cda76a6bc45544d6adb89
-
C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exeFilesize
12KB
MD58204d86f385e7648f7f3e4858aedb950
SHA182f837ad3dcde3f91d9ab7c3d6932b9dd0e3b1b2
SHA256ca2ba3661add947970864563544c38b2a1248ed28e29cfd52a78fec54ca7e5ef
SHA5124852fb6e36c8f603745d11675e2990d27f92840d0d854548829940112d284e823ba924c56b7d85008ef90c6b3e90ebe981622b8f8f1754abc91ce535658f6bdd
-
C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exeFilesize
12KB
MD58204d86f385e7648f7f3e4858aedb950
SHA182f837ad3dcde3f91d9ab7c3d6932b9dd0e3b1b2
SHA256ca2ba3661add947970864563544c38b2a1248ed28e29cfd52a78fec54ca7e5ef
SHA5124852fb6e36c8f603745d11675e2990d27f92840d0d854548829940112d284e823ba924c56b7d85008ef90c6b3e90ebe981622b8f8f1754abc91ce535658f6bdd
-
C:\Users\Admin\AppData\Local\Temp\Ekechvvajumessagecompetitive_1.exeFilesize
12KB
MD58204d86f385e7648f7f3e4858aedb950
SHA182f837ad3dcde3f91d9ab7c3d6932b9dd0e3b1b2
SHA256ca2ba3661add947970864563544c38b2a1248ed28e29cfd52a78fec54ca7e5ef
SHA5124852fb6e36c8f603745d11675e2990d27f92840d0d854548829940112d284e823ba924c56b7d85008ef90c6b3e90ebe981622b8f8f1754abc91ce535658f6bdd
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeFilesize
333.8MB
MD56b8a6884f6a5d48e27b7606839ab2043
SHA1a736eb7309ef918e7f6eed05cf6f1e460756c8bc
SHA2563c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087
SHA5124108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeFilesize
333.8MB
MD56b8a6884f6a5d48e27b7606839ab2043
SHA1a736eb7309ef918e7f6eed05cf6f1e460756c8bc
SHA2563c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087
SHA5124108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeFilesize
333.8MB
MD56b8a6884f6a5d48e27b7606839ab2043
SHA1a736eb7309ef918e7f6eed05cf6f1e460756c8bc
SHA2563c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087
SHA5124108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeFilesize
333.8MB
MD56b8a6884f6a5d48e27b7606839ab2043
SHA1a736eb7309ef918e7f6eed05cf6f1e460756c8bc
SHA2563c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087
SHA5124108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\perfofov.exeFilesize
333.8MB
MD56b8a6884f6a5d48e27b7606839ab2043
SHA1a736eb7309ef918e7f6eed05cf6f1e460756c8bc
SHA2563c54e4d2985f2ae91573359ac969ffa32a5cf989b6b6648d279cc96e97ae1087
SHA5124108d1e23833b72816afd7aec6e526c585a08f6e32dfa7904d126476091feafefffbc0406f32ba7d28f07ce10b8a237fc2ae13490f024cdd4d3798a1a5e5a309
-
memory/804-464-0x0000000000000000-mapping.dmp
-
memory/2412-293-0x00000000096C0000-0x0000000009D38000-memory.dmpFilesize
6.5MB
-
memory/2412-294-0x0000000008C70000-0x0000000008C8A000-memory.dmpFilesize
104KB
-
memory/2412-213-0x0000000000000000-mapping.dmp
-
memory/2412-282-0x0000000007E40000-0x0000000007EB6000-memory.dmpFilesize
472KB
-
memory/2412-278-0x00000000075B0000-0x00000000075FB000-memory.dmpFilesize
300KB
-
memory/2412-277-0x0000000007590000-0x00000000075AC000-memory.dmpFilesize
112KB
-
memory/2412-274-0x00000000074A0000-0x0000000007506000-memory.dmpFilesize
408KB
-
memory/2412-272-0x0000000007300000-0x0000000007366000-memory.dmpFilesize
408KB
-
memory/2412-254-0x0000000006CD0000-0x00000000072F8000-memory.dmpFilesize
6.2MB
-
memory/2412-249-0x0000000006660000-0x0000000006696000-memory.dmpFilesize
216KB
-
memory/2424-144-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-197-0x00000000060E0000-0x00000000061BA000-memory.dmpFilesize
872KB
-
memory/2424-135-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-142-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-143-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-116-0x0000000000000000-mapping.dmp
-
memory/2424-146-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-145-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-148-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-147-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-149-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-150-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-151-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-152-0x0000000000FA0000-0x0000000000FA8000-memory.dmpFilesize
32KB
-
memory/2424-153-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-154-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-155-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-156-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-157-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-158-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-159-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-160-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-162-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-161-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-163-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-164-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-165-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-167-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-166-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-168-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-170-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-169-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-171-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-173-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-172-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-177-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-179-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-180-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-178-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-176-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-181-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-182-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-175-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-183-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-174-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-141-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-198-0x00000000062E0000-0x0000000006372000-memory.dmpFilesize
584KB
-
memory/2424-199-0x00000000063A0000-0x00000000063C2000-memory.dmpFilesize
136KB
-
memory/2424-201-0x0000000006690000-0x00000000069E0000-memory.dmpFilesize
3.3MB
-
memory/2424-140-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-137-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-139-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-138-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-136-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-134-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-133-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-132-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-131-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-130-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-118-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-129-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-128-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-127-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-119-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-125-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-124-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-121-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-123-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-120-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/2424-122-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/3880-620-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3880-600-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3880-587-0x0000000000402E87-mapping.dmp
-
memory/3932-429-0x0000000005A60000-0x0000000006066000-memory.dmpFilesize
6.0MB
-
memory/3932-431-0x0000000005580000-0x000000000568A000-memory.dmpFilesize
1.0MB
-
memory/3932-444-0x0000000005690000-0x00000000056DB000-memory.dmpFilesize
300KB
-
memory/3932-439-0x0000000005510000-0x000000000554E000-memory.dmpFilesize
248KB
-
memory/3932-376-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3932-436-0x00000000054B0000-0x00000000054C2000-memory.dmpFilesize
72KB
-
memory/3932-309-0x000000000042210E-mapping.dmp
-
memory/3932-563-0x0000000006920000-0x00000000069B2000-memory.dmpFilesize
584KB
-
memory/3932-564-0x0000000006EC0000-0x00000000073BE000-memory.dmpFilesize
5.0MB
-
memory/3932-573-0x00000000073C0000-0x0000000007582000-memory.dmpFilesize
1.8MB
-
memory/3932-574-0x0000000007AC0000-0x0000000007FEC000-memory.dmpFilesize
5.2MB
-
memory/3932-577-0x0000000007690000-0x00000000076E0000-memory.dmpFilesize
320KB
-
memory/4304-448-0x0000000005910000-0x00000000059D4000-memory.dmpFilesize
784KB
-
memory/4304-299-0x0000000000000000-mapping.dmp
-
memory/4304-368-0x00000000007C0000-0x00000000007C8000-memory.dmpFilesize
32KB
-
memory/4304-450-0x0000000005E20000-0x0000000006170000-memory.dmpFilesize
3.3MB