Analysis
-
max time kernel
110s -
max time network
176s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-02-2023 15:33
Static task
static1
General
-
Target
4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe
-
Size
764KB
-
MD5
58dc9b88868c396c738d14550f5bb8d0
-
SHA1
7568ab17d63c449b9c7f4f2f6fbc4bd0c2e0a38a
-
SHA256
4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0
-
SHA512
957bc61aa153cc06d44ab6bc6503b34bd70c9e2dfa579c1a839dc0663483a997dbdb30a5983bfa5f185ef893e72c284dec84ef5ac88cf5e759bc7c86154d25d0
-
SSDEEP
12288:PMrry908ycA0s+cSmg8wgkxSUQVd53NrNeWTCwvpLRnxUPdQhbjOa2a9+sSuhoD:YyI0s+czUVxSZBNrNdlLRxU+hbjO/a9c
Malware Config
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Extracted
redline
crypt
176.113.115.17:4132
-
auth_value
407e05c9b3a74d99a20f90b091547bd6
Signatures
-
Processes:
aYGYG.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aYGYG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aYGYG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aYGYG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aYGYG.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aYGYG.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2816-417-0x0000000000980000-0x00000000009C6000-memory.dmp family_redline behavioral1/memory/2816-422-0x0000000002530000-0x0000000002574000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
dhun.exedjrn.exeaYGYG.exebYGYG.execrWrW.exedjrjr.exepid process 1836 dhun.exe 4192 djrn.exe 3556 aYGYG.exe 4276 bYGYG.exe 2816 crWrW.exe 2232 djrjr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
aYGYG.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" aYGYG.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exedhun.exedjrn.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dhun.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dhun.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce djrn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" djrn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
djrjr.exedescription pid process target process PID 2232 set thread context of 2304 2232 djrjr.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
aYGYG.exebYGYG.execrWrW.exeAppLaunch.exepid process 3556 aYGYG.exe 3556 aYGYG.exe 4276 bYGYG.exe 4276 bYGYG.exe 2816 crWrW.exe 2816 crWrW.exe 2304 AppLaunch.exe 2304 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
aYGYG.exebYGYG.execrWrW.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 3556 aYGYG.exe Token: SeDebugPrivilege 4276 bYGYG.exe Token: SeDebugPrivilege 2816 crWrW.exe Token: SeDebugPrivilege 2304 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exedhun.exedjrn.exedjrjr.exedescription pid process target process PID 2704 wrote to memory of 1836 2704 4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe dhun.exe PID 2704 wrote to memory of 1836 2704 4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe dhun.exe PID 2704 wrote to memory of 1836 2704 4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe dhun.exe PID 1836 wrote to memory of 4192 1836 dhun.exe djrn.exe PID 1836 wrote to memory of 4192 1836 dhun.exe djrn.exe PID 1836 wrote to memory of 4192 1836 dhun.exe djrn.exe PID 4192 wrote to memory of 3556 4192 djrn.exe aYGYG.exe PID 4192 wrote to memory of 3556 4192 djrn.exe aYGYG.exe PID 4192 wrote to memory of 4276 4192 djrn.exe bYGYG.exe PID 4192 wrote to memory of 4276 4192 djrn.exe bYGYG.exe PID 4192 wrote to memory of 4276 4192 djrn.exe bYGYG.exe PID 1836 wrote to memory of 2816 1836 dhun.exe crWrW.exe PID 1836 wrote to memory of 2816 1836 dhun.exe crWrW.exe PID 1836 wrote to memory of 2816 1836 dhun.exe crWrW.exe PID 2704 wrote to memory of 2232 2704 4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe djrjr.exe PID 2704 wrote to memory of 2232 2704 4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe djrjr.exe PID 2704 wrote to memory of 2232 2704 4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe djrjr.exe PID 2232 wrote to memory of 2304 2232 djrjr.exe AppLaunch.exe PID 2232 wrote to memory of 2304 2232 djrjr.exe AppLaunch.exe PID 2232 wrote to memory of 2304 2232 djrjr.exe AppLaunch.exe PID 2232 wrote to memory of 2304 2232 djrjr.exe AppLaunch.exe PID 2232 wrote to memory of 2304 2232 djrjr.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe"C:\Users\Admin\AppData\Local\Temp\4a8248de1ec4189b7c84cc52fc712c1d8e364197bb048ac42b75a564b5d58fe0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhun.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhun.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\djrn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\djrn.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aYGYG.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aYGYG.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bYGYG.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bYGYG.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crWrW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crWrW.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djrjr.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djrjr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhun.exeFilesize
533KB
MD59d8c03055f7b2c0627cd5e369db9954e
SHA1dc311f83418f0131ec4b36306ebcfb950bf57e8a
SHA25625378bb875c9002ec4c9490ece2140391a82fcbcab8799fd00d1a0dacd38b72c
SHA512a34fad66c08733e94628f6cbd6e1722dee574df7082e916ae45c1bb11d638c007e75607e62701c817114d5f759aa38b79d7d9c3229366a2a68baff3342f9119b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dhun.exeFilesize
533KB
MD59d8c03055f7b2c0627cd5e369db9954e
SHA1dc311f83418f0131ec4b36306ebcfb950bf57e8a
SHA25625378bb875c9002ec4c9490ece2140391a82fcbcab8799fd00d1a0dacd38b72c
SHA512a34fad66c08733e94628f6cbd6e1722dee574df7082e916ae45c1bb11d638c007e75607e62701c817114d5f759aa38b79d7d9c3229366a2a68baff3342f9119b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djrjr.exeFilesize
283KB
MD5457dcca2cfa8e1592521e4bc580d2097
SHA1de855fa7934126fd1cde834b752999ebe79e367f
SHA25654ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc
SHA512d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djrjr.exeFilesize
283KB
MD5457dcca2cfa8e1592521e4bc580d2097
SHA1de855fa7934126fd1cde834b752999ebe79e367f
SHA25654ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc
SHA512d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crWrW.exeFilesize
294KB
MD5bd2200de9318b085c7bbe57b9d0712de
SHA16c67d6cb9c5480a99bf86ae695dc683ed1e6b04f
SHA2561ebc588480bfd81a5db0d6ec7c82833f44e50f9d586d9a031b6377d606789cc9
SHA5123fdbaea338327084aeabcd86f9af6424500f2fbf50208e07910ef8197c2440a39ac921b64ea9368dfca8ca9c40e531c37478d9ec9b9bfbb3307ac0c87ed50b41
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crWrW.exeFilesize
294KB
MD5bd2200de9318b085c7bbe57b9d0712de
SHA16c67d6cb9c5480a99bf86ae695dc683ed1e6b04f
SHA2561ebc588480bfd81a5db0d6ec7c82833f44e50f9d586d9a031b6377d606789cc9
SHA5123fdbaea338327084aeabcd86f9af6424500f2fbf50208e07910ef8197c2440a39ac921b64ea9368dfca8ca9c40e531c37478d9ec9b9bfbb3307ac0c87ed50b41
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\djrn.exeFilesize
202KB
MD519081bfda44e9dc456faff6c44bbebb6
SHA163bef40f69772bc2a58a4c1094c1436c5e70c287
SHA2565a50e47fa3c925eae161edf8dc928793279a8e96e4f05c698d62dc6ae8e05656
SHA5127403ad62b13cf83b35d9ee40fcac7b0c978caca534929729d40201a36ff44cb97538e23a2d9e4c4de240c72c8b7b1db9d07946c31eb80953f4dad036bb9b3d90
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\djrn.exeFilesize
202KB
MD519081bfda44e9dc456faff6c44bbebb6
SHA163bef40f69772bc2a58a4c1094c1436c5e70c287
SHA2565a50e47fa3c925eae161edf8dc928793279a8e96e4f05c698d62dc6ae8e05656
SHA5127403ad62b13cf83b35d9ee40fcac7b0c978caca534929729d40201a36ff44cb97538e23a2d9e4c4de240c72c8b7b1db9d07946c31eb80953f4dad036bb9b3d90
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aYGYG.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aYGYG.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bYGYG.exeFilesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bYGYG.exeFilesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
memory/1836-180-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-173-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-163-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-181-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-161-0x0000000000000000-mapping.dmp
-
memory/1836-179-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-178-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-177-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-176-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-175-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-174-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-164-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-172-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-171-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-170-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-165-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-168-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-167-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/1836-166-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2232-461-0x0000000000000000-mapping.dmp
-
memory/2304-559-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2304-507-0x000000000041B592-mapping.dmp
-
memory/2304-575-0x0000000009680000-0x00000000096CB000-memory.dmpFilesize
300KB
-
memory/2704-144-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-140-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-152-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-153-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-154-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-155-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-156-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-157-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-158-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-160-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-159-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-150-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-149-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-148-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-147-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-146-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-138-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-137-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-145-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-115-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-143-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-142-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-141-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-151-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-139-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-136-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-135-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-134-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-133-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-132-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-131-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-130-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-116-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-129-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-128-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-127-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-117-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-126-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-118-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-119-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-125-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-124-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-120-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-121-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-122-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2704-123-0x0000000077D30000-0x0000000077EBE000-memory.dmpFilesize
1.6MB
-
memory/2816-361-0x0000000000000000-mapping.dmp
-
memory/2816-454-0x0000000000580000-0x00000000006CA000-memory.dmpFilesize
1.3MB
-
memory/2816-460-0x0000000000400000-0x0000000000579000-memory.dmpFilesize
1.5MB
-
memory/2816-459-0x0000000000821000-0x000000000084F000-memory.dmpFilesize
184KB
-
memory/2816-453-0x0000000000821000-0x000000000084F000-memory.dmpFilesize
184KB
-
memory/2816-437-0x0000000000580000-0x00000000006CA000-memory.dmpFilesize
1.3MB
-
memory/2816-440-0x0000000000400000-0x0000000000579000-memory.dmpFilesize
1.5MB
-
memory/2816-438-0x00000000059D0000-0x0000000005A1B000-memory.dmpFilesize
300KB
-
memory/2816-436-0x0000000000821000-0x000000000084F000-memory.dmpFilesize
184KB
-
memory/2816-422-0x0000000002530000-0x0000000002574000-memory.dmpFilesize
272KB
-
memory/2816-417-0x0000000000980000-0x00000000009C6000-memory.dmpFilesize
280KB
-
memory/3556-262-0x0000000000300000-0x000000000030A000-memory.dmpFilesize
40KB
-
memory/3556-259-0x0000000000000000-mapping.dmp
-
memory/4192-210-0x0000000000000000-mapping.dmp
-
memory/4276-333-0x0000000005690000-0x00000000056DB000-memory.dmpFilesize
300KB
-
memory/4276-338-0x0000000005A90000-0x0000000005B22000-memory.dmpFilesize
584KB
-
memory/4276-351-0x0000000006E30000-0x0000000006E80000-memory.dmpFilesize
320KB
-
memory/4276-350-0x0000000006DB0000-0x0000000006E26000-memory.dmpFilesize
472KB
-
memory/4276-342-0x0000000005B30000-0x0000000005B96000-memory.dmpFilesize
408KB
-
memory/4276-327-0x0000000005720000-0x000000000582A000-memory.dmpFilesize
1.0MB
-
memory/4276-339-0x0000000006730000-0x0000000006C2E000-memory.dmpFilesize
5.0MB
-
memory/4276-352-0x0000000007150000-0x0000000007312000-memory.dmpFilesize
1.8MB
-
memory/4276-326-0x0000000005C20000-0x0000000006226000-memory.dmpFilesize
6.0MB
-
memory/4276-313-0x0000000000D90000-0x0000000000DC2000-memory.dmpFilesize
200KB
-
memory/4276-263-0x0000000000000000-mapping.dmp
-
memory/4276-353-0x0000000007850000-0x0000000007D7C000-memory.dmpFilesize
5.2MB
-
memory/4276-331-0x0000000005650000-0x000000000568E000-memory.dmpFilesize
248KB
-
memory/4276-329-0x00000000030A0000-0x00000000030B2000-memory.dmpFilesize
72KB