Analysis
-
max time kernel
129s -
max time network
187s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05-12-2022 11:48
Static task
static1
Behavioral task
behavioral1
Sample
17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe
Resource
win10-20220812-en
General
-
Target
17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe
-
Size
310KB
-
MD5
074aea4f0466ec20c9f7b4669578e8ac
-
SHA1
63ddadae65c4a15c5504c0632bfabcf9a478d603
-
SHA256
17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e
-
SHA512
b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca
-
SSDEEP
3072:IQgpJhlCORXi5lK4d9pptt2OWOra2L8ICgI/q2IC3myueNZ+59hTDw02rwlpRj5f:Y/R6dHptVr8I70J3mMNZEU02slfe2U
Malware Config
Extracted
amadey
3.50
62.204.41.6/p9cWxH/index.php
Extracted
redline
NewDef2023
185.106.92.214:2510
-
auth_value
048f34b18865578890538db10b2e9edf
Signatures
-
Detect Amadey credential stealer module 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll amadey_cred_module \Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4756-359-0x0000000002390000-0x00000000023CE000-memory.dmp family_redline behavioral1/memory/4756-370-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 9 4412 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
gntuud.exeanon.exelinda5.exegntuud.exegntuud.exepid process 5044 gntuud.exe 4756 anon.exe 3616 linda5.exe 924 gntuud.exe 3860 gntuud.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 312 rundll32.exe 312 rundll32.exe 3824 rundll32.exe 3824 rundll32.exe 4412 rundll32.exe 4412 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
gntuud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\linda5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000011001\\linda5.exe" gntuud.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
linda5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings linda5.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
anon.exerundll32.exepid process 4756 anon.exe 4756 anon.exe 4412 rundll32.exe 4412 rundll32.exe 4412 rundll32.exe 4412 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
anon.exedescription pid process Token: SeDebugPrivilege 4756 anon.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exegntuud.exelinda5.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 2708 wrote to memory of 5044 2708 17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe gntuud.exe PID 2708 wrote to memory of 5044 2708 17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe gntuud.exe PID 2708 wrote to memory of 5044 2708 17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe gntuud.exe PID 5044 wrote to memory of 3460 5044 gntuud.exe schtasks.exe PID 5044 wrote to memory of 3460 5044 gntuud.exe schtasks.exe PID 5044 wrote to memory of 3460 5044 gntuud.exe schtasks.exe PID 5044 wrote to memory of 4756 5044 gntuud.exe anon.exe PID 5044 wrote to memory of 4756 5044 gntuud.exe anon.exe PID 5044 wrote to memory of 4756 5044 gntuud.exe anon.exe PID 5044 wrote to memory of 3616 5044 gntuud.exe linda5.exe PID 5044 wrote to memory of 3616 5044 gntuud.exe linda5.exe PID 5044 wrote to memory of 3616 5044 gntuud.exe linda5.exe PID 3616 wrote to memory of 4772 3616 linda5.exe control.exe PID 3616 wrote to memory of 4772 3616 linda5.exe control.exe PID 3616 wrote to memory of 4772 3616 linda5.exe control.exe PID 4772 wrote to memory of 312 4772 control.exe rundll32.exe PID 4772 wrote to memory of 312 4772 control.exe rundll32.exe PID 4772 wrote to memory of 312 4772 control.exe rundll32.exe PID 312 wrote to memory of 2760 312 rundll32.exe RunDll32.exe PID 312 wrote to memory of 2760 312 rundll32.exe RunDll32.exe PID 2760 wrote to memory of 3824 2760 RunDll32.exe rundll32.exe PID 2760 wrote to memory of 3824 2760 RunDll32.exe rundll32.exe PID 2760 wrote to memory of 3824 2760 RunDll32.exe rundll32.exe PID 5044 wrote to memory of 4412 5044 gntuud.exe rundll32.exe PID 5044 wrote to memory of 4412 5044 gntuud.exe rundll32.exe PID 5044 wrote to memory of 4412 5044 gntuud.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe"C:\Users\Admin\AppData\Local\Temp\17c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000010001\anon.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\anon.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000011001\linda5.exe"C:\Users\Admin\AppData\Local\Temp\1000011001\linda5.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\A3HE.CPl",4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\A3HE.CPl",5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\A3HE.CPl",6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\A3HE.CPl",7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000010001\anon.exeFilesize
330KB
MD50da15cc2749e7117722946f24f941a52
SHA1466f5d7208af46d10a33efb50235099024ba9d8b
SHA256d510a346e59953f8015eb4f8f014896f25255f28a924a749d54152ebb6cfe4df
SHA512e2af593a8babe932d62b2b8f83f55037f31d8650d140b4b839ff3a5f2220d243e4a5e526065f90b8516db73f7fce6ae53f6c76083c4bdf6335c1ec527fea8000
-
C:\Users\Admin\AppData\Local\Temp\1000010001\anon.exeFilesize
330KB
MD50da15cc2749e7117722946f24f941a52
SHA1466f5d7208af46d10a33efb50235099024ba9d8b
SHA256d510a346e59953f8015eb4f8f014896f25255f28a924a749d54152ebb6cfe4df
SHA512e2af593a8babe932d62b2b8f83f55037f31d8650d140b4b839ff3a5f2220d243e4a5e526065f90b8516db73f7fce6ae53f6c76083c4bdf6335c1ec527fea8000
-
C:\Users\Admin\AppData\Local\Temp\1000011001\linda5.exeFilesize
1.6MB
MD52c199298ae06bd824b1a7349bf689121
SHA138c9703832098397757a9f8bd01411eea459f263
SHA25677b7c841e994b84d073f7e66f1ddb038066b86f608fe68ed8eebe44e5a049f0e
SHA5124bbea89d5c7b9e406ade97ae66f986d7e1378f021dcc21e5bc06d3672be288e79b2fa5d260ee5c2470930e206c0df994830bad12694dfa98e8d9d4d466005f4c
-
C:\Users\Admin\AppData\Local\Temp\1000011001\linda5.exeFilesize
1.6MB
MD52c199298ae06bd824b1a7349bf689121
SHA138c9703832098397757a9f8bd01411eea459f263
SHA25677b7c841e994b84d073f7e66f1ddb038066b86f608fe68ed8eebe44e5a049f0e
SHA5124bbea89d5c7b9e406ade97ae66f986d7e1378f021dcc21e5bc06d3672be288e79b2fa5d260ee5c2470930e206c0df994830bad12694dfa98e8d9d4d466005f4c
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeFilesize
310KB
MD5074aea4f0466ec20c9f7b4669578e8ac
SHA163ddadae65c4a15c5504c0632bfabcf9a478d603
SHA25617c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e
SHA512b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeFilesize
310KB
MD5074aea4f0466ec20c9f7b4669578e8ac
SHA163ddadae65c4a15c5504c0632bfabcf9a478d603
SHA25617c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e
SHA512b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeFilesize
310KB
MD5074aea4f0466ec20c9f7b4669578e8ac
SHA163ddadae65c4a15c5504c0632bfabcf9a478d603
SHA25617c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e
SHA512b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exeFilesize
310KB
MD5074aea4f0466ec20c9f7b4669578e8ac
SHA163ddadae65c4a15c5504c0632bfabcf9a478d603
SHA25617c801f4c9484a48710362ed91b002b1f5406e95644068b361d1775ae6b7b29e
SHA512b528eb13da218cb71cf5255738bc006832269603e5198bb57aebbe7c60f8c966cf35fc813423f11e9498c28dfae0f3ee682edef762fe2e9bdbe5338eb460ddca
-
C:\Users\Admin\AppData\Local\Temp\A3HE.CPlFilesize
2.8MB
MD541bd04aed995a0c85aade918e354d154
SHA1b89b59708ac1540212422cb0adb57eff61492713
SHA256d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09
SHA512e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
\Users\Admin\AppData\Local\Temp\A3HE.cplFilesize
2.8MB
MD541bd04aed995a0c85aade918e354d154
SHA1b89b59708ac1540212422cb0adb57eff61492713
SHA256d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09
SHA512e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17
-
\Users\Admin\AppData\Local\Temp\A3HE.cplFilesize
2.8MB
MD541bd04aed995a0c85aade918e354d154
SHA1b89b59708ac1540212422cb0adb57eff61492713
SHA256d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09
SHA512e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17
-
\Users\Admin\AppData\Local\Temp\A3HE.cplFilesize
2.8MB
MD541bd04aed995a0c85aade918e354d154
SHA1b89b59708ac1540212422cb0adb57eff61492713
SHA256d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09
SHA512e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17
-
\Users\Admin\AppData\Local\Temp\A3HE.cplFilesize
2.8MB
MD541bd04aed995a0c85aade918e354d154
SHA1b89b59708ac1540212422cb0adb57eff61492713
SHA256d2c57b0143ea1722a00e194239abc1d4a5086cfec6e36d8c52b3dfea308c2d09
SHA512e320b71e0144018bceca4164a1d69c1588b199d3983457b1bbe47424cf8de3ea63dfd5a4b5a7cc55829604317d4ca12e0016d6e2b8408109b4cf2cfa85095d17
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
126KB
MD598cc0f811ad5ff43fedc262961002498
SHA137e48635fcef35c0b3db3c1f0c35833899eb53d8
SHA25662d5b300b911a022c5c146ea010769cd0c2fdcc86aba7e5be25aff1f799220be
SHA512d2ae90628acf92c6f7d176a4c866a0b6a6cfcfd722f0aec89cb48afead4318311c3ca95fe6865ac254b601b70ef5f289a35f4b26fba67a4c9b3cc5e68c7bf9c1
-
memory/312-617-0x0000000004E60000-0x0000000004F74000-memory.dmpFilesize
1.1MB
-
memory/312-494-0x0000000004E60000-0x0000000004F74000-memory.dmpFilesize
1.1MB
-
memory/312-493-0x0000000004AC0000-0x0000000004D36000-memory.dmpFilesize
2.5MB
-
memory/312-437-0x0000000000000000-mapping.dmp
-
memory/924-607-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB
-
memory/924-606-0x00000000006DB000-0x00000000006FA000-memory.dmpFilesize
124KB
-
memory/2708-136-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-135-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-140-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-141-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-142-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-143-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-144-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-145-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-146-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-147-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-148-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-149-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-150-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-151-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-152-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-153-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-154-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-155-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-156-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB
-
memory/2708-157-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-158-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-159-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-160-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-161-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-162-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-163-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-164-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-165-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-116-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-138-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-137-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-139-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-169-0x0000000002070000-0x00000000020AE000-memory.dmpFilesize
248KB
-
memory/2708-172-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB
-
memory/2708-134-0x0000000002070000-0x00000000020AE000-memory.dmpFilesize
248KB
-
memory/2708-133-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/2708-117-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-132-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-118-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-131-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-129-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-128-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-127-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-119-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-115-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-126-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-125-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-120-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-121-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-124-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-123-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2708-122-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/2760-507-0x0000000000000000-mapping.dmp
-
memory/3460-221-0x0000000000000000-mapping.dmp
-
memory/3616-263-0x0000000000000000-mapping.dmp
-
memory/3824-508-0x0000000000000000-mapping.dmp
-
memory/3824-556-0x0000000004E40000-0x00000000050B6000-memory.dmpFilesize
2.5MB
-
memory/3824-557-0x00000000051E0000-0x00000000052F4000-memory.dmpFilesize
1.1MB
-
memory/3824-616-0x00000000051E0000-0x00000000052F4000-memory.dmpFilesize
1.1MB
-
memory/3860-745-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB
-
memory/4412-625-0x0000000000000000-mapping.dmp
-
memory/4756-469-0x00000000050C0000-0x00000000051CA000-memory.dmpFilesize
1.0MB
-
memory/4756-465-0x00000000058C0000-0x0000000005EC6000-memory.dmpFilesize
6.0MB
-
memory/4756-335-0x0000000000726000-0x0000000000757000-memory.dmpFilesize
196KB
-
memory/4756-336-0x0000000000490000-0x00000000005DA000-memory.dmpFilesize
1.3MB
-
memory/4756-337-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/4756-359-0x0000000002390000-0x00000000023CE000-memory.dmpFilesize
248KB
-
memory/4756-368-0x0000000004A20000-0x0000000004F1E000-memory.dmpFilesize
5.0MB
-
memory/4756-370-0x0000000004F60000-0x0000000004F9C000-memory.dmpFilesize
240KB
-
memory/4756-374-0x0000000004FA0000-0x0000000005032000-memory.dmpFilesize
584KB
-
memory/4756-495-0x00000000053B0000-0x00000000053FB000-memory.dmpFilesize
300KB
-
memory/4756-624-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/4756-498-0x0000000000490000-0x00000000005DA000-memory.dmpFilesize
1.3MB
-
memory/4756-623-0x0000000000726000-0x0000000000757000-memory.dmpFilesize
196KB
-
memory/4756-481-0x0000000005200000-0x0000000005212000-memory.dmpFilesize
72KB
-
memory/4756-568-0x00000000063E0000-0x000000000690C000-memory.dmpFilesize
5.2MB
-
memory/4756-567-0x0000000006200000-0x00000000063C2000-memory.dmpFilesize
1.8MB
-
memory/4756-559-0x0000000005510000-0x0000000005576000-memory.dmpFilesize
408KB
-
memory/4756-490-0x0000000005220000-0x000000000525E000-memory.dmpFilesize
248KB
-
memory/4756-252-0x0000000000000000-mapping.dmp
-
memory/4756-497-0x0000000000726000-0x0000000000757000-memory.dmpFilesize
196KB
-
memory/4772-378-0x0000000000000000-mapping.dmp
-
memory/5044-186-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-181-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-195-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/5044-185-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-184-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-182-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-183-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-180-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-192-0x0000000000776000-0x0000000000795000-memory.dmpFilesize
124KB
-
memory/5044-213-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB
-
memory/5044-249-0x0000000000776000-0x0000000000795000-memory.dmpFilesize
124KB
-
memory/5044-187-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-179-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-178-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-176-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-175-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-250-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/5044-251-0x0000000000400000-0x0000000000483000-memory.dmpFilesize
524KB
-
memory/5044-171-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-174-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-173-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-170-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-168-0x0000000076EA0000-0x000000007702E000-memory.dmpFilesize
1.6MB
-
memory/5044-166-0x0000000000000000-mapping.dmp