Analysis
-
max time kernel
70s -
max time network
76s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-02-2023 17:21
Static task
static1
General
-
Target
4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe
-
Size
765KB
-
MD5
0dc4d3569b05bee985c4e21c3326a173
-
SHA1
b13cb82f1a5a1a9fc26a006d717e2d904342d555
-
SHA256
4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4
-
SHA512
572087c94e7ca67235239f3b671ac1113705c2e62954656a415e32a5998484306360f0f5655cbf30d07ede77d0e807f7882003d6c49138bab2328703d8f1fbb9
-
SSDEEP
12288:qMr7y90us6wjlGS1raZGPM7CS+CAJZhrI3b/fcNJiZUZX8bicp/JPOr:5y7srTU+SpAbiriiZlWkE
Malware Config
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Extracted
redline
crypt
176.113.115.17:4132
-
auth_value
407e05c9b3a74d99a20f90b091547bd6
Signatures
-
Processes:
awm97.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" awm97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" awm97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" awm97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" awm97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" awm97.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3980-421-0x0000000004A80000-0x0000000004AC6000-memory.dmp family_redline behavioral1/memory/3980-426-0x0000000004B00000-0x0000000004B44000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
dxx99.exedhC60.exeawm97.exebjq68.execqU83.exedWf46.exepid process 3752 dxx99.exe 1372 dhC60.exe 4992 awm97.exe 4292 bjq68.exe 3980 cqU83.exe 1204 dWf46.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
awm97.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" awm97.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
dhC60.exe4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exedxx99.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dhC60.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dxx99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dxx99.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dhC60.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
dWf46.exedescription pid process target process PID 1204 set thread context of 4476 1204 dWf46.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
awm97.exebjq68.execqU83.exeAppLaunch.exepid process 4992 awm97.exe 4992 awm97.exe 4292 bjq68.exe 4292 bjq68.exe 3980 cqU83.exe 3980 cqU83.exe 4476 AppLaunch.exe 4476 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
awm97.exebjq68.execqU83.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4992 awm97.exe Token: SeDebugPrivilege 4292 bjq68.exe Token: SeDebugPrivilege 3980 cqU83.exe Token: SeDebugPrivilege 4476 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exedxx99.exedhC60.exedWf46.exedescription pid process target process PID 4124 wrote to memory of 3752 4124 4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe dxx99.exe PID 4124 wrote to memory of 3752 4124 4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe dxx99.exe PID 4124 wrote to memory of 3752 4124 4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe dxx99.exe PID 3752 wrote to memory of 1372 3752 dxx99.exe dhC60.exe PID 3752 wrote to memory of 1372 3752 dxx99.exe dhC60.exe PID 3752 wrote to memory of 1372 3752 dxx99.exe dhC60.exe PID 1372 wrote to memory of 4992 1372 dhC60.exe awm97.exe PID 1372 wrote to memory of 4992 1372 dhC60.exe awm97.exe PID 1372 wrote to memory of 4292 1372 dhC60.exe bjq68.exe PID 1372 wrote to memory of 4292 1372 dhC60.exe bjq68.exe PID 1372 wrote to memory of 4292 1372 dhC60.exe bjq68.exe PID 3752 wrote to memory of 3980 3752 dxx99.exe cqU83.exe PID 3752 wrote to memory of 3980 3752 dxx99.exe cqU83.exe PID 3752 wrote to memory of 3980 3752 dxx99.exe cqU83.exe PID 4124 wrote to memory of 1204 4124 4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe dWf46.exe PID 4124 wrote to memory of 1204 4124 4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe dWf46.exe PID 4124 wrote to memory of 1204 4124 4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe dWf46.exe PID 1204 wrote to memory of 4476 1204 dWf46.exe AppLaunch.exe PID 1204 wrote to memory of 4476 1204 dWf46.exe AppLaunch.exe PID 1204 wrote to memory of 4476 1204 dWf46.exe AppLaunch.exe PID 1204 wrote to memory of 4476 1204 dWf46.exe AppLaunch.exe PID 1204 wrote to memory of 4476 1204 dWf46.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe"C:\Users\Admin\AppData\Local\Temp\4929260e99d60ec569bc679696e5b37ef7f3fb1a2369e08e95ff8846c8a788c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxx99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxx99.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhC60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhC60.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\awm97.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\awm97.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bjq68.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bjq68.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cqU83.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cqU83.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWf46.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWf46.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWf46.exeFilesize
283KB
MD5457dcca2cfa8e1592521e4bc580d2097
SHA1de855fa7934126fd1cde834b752999ebe79e367f
SHA25654ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc
SHA512d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dWf46.exeFilesize
283KB
MD5457dcca2cfa8e1592521e4bc580d2097
SHA1de855fa7934126fd1cde834b752999ebe79e367f
SHA25654ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc
SHA512d15709dd44e184612a86e7201c78887771e7cc062e8b4daf83c5bbf1d6dd74320e8c5058cde295d412d8e5b135f8686f8ed56aa9aa2a439b022319e6723bb752
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxx99.exeFilesize
533KB
MD54fdb1646e1be2707a648ade5ecce2be9
SHA120ad7f971edb06cd6b8be5490753f27df5f42d02
SHA256bc6fbe057f891bd88f9fdabcf77a71054037bd4c4b24afdb1d08f6a6b254c4d6
SHA51219d0d96fcc612fa9f2728754d560ab9874f4e15fae3ebd998525d230dfdfb63e8a7b15cb23d5154c26a227828abee58a630529fb4950205ffb6afc841c157e34
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxx99.exeFilesize
533KB
MD54fdb1646e1be2707a648ade5ecce2be9
SHA120ad7f971edb06cd6b8be5490753f27df5f42d02
SHA256bc6fbe057f891bd88f9fdabcf77a71054037bd4c4b24afdb1d08f6a6b254c4d6
SHA51219d0d96fcc612fa9f2728754d560ab9874f4e15fae3ebd998525d230dfdfb63e8a7b15cb23d5154c26a227828abee58a630529fb4950205ffb6afc841c157e34
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cqU83.exeFilesize
294KB
MD59cb6d089c5dbcb55ff923bd6284fbcb7
SHA18c7b12dba74c380b009a0709ecc916bd724b2958
SHA256b574767f81c77eee3e648805547b525692645f122b6bfd2461790c506ba7e339
SHA512f9cdc7f8272ab230056534c587de70ecd41e62814c44f6861b50218237ab0142a3d2451cd1ab9058866eca5ca29db4558b76d2bbc668a333043b8e31bee5dfe3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cqU83.exeFilesize
294KB
MD59cb6d089c5dbcb55ff923bd6284fbcb7
SHA18c7b12dba74c380b009a0709ecc916bd724b2958
SHA256b574767f81c77eee3e648805547b525692645f122b6bfd2461790c506ba7e339
SHA512f9cdc7f8272ab230056534c587de70ecd41e62814c44f6861b50218237ab0142a3d2451cd1ab9058866eca5ca29db4558b76d2bbc668a333043b8e31bee5dfe3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhC60.exeFilesize
202KB
MD5936d51b27c2ed3bfbac86bf9c8677bea
SHA1eed290215f5961deb6d9b2a6cba4bf5ddb783966
SHA2567b0c00adc9ca219fe1f1fc749194370b49e180eb61e54f3becaeed9bb0c4f03e
SHA512efbf4df5d9621cb272a9ca442c976a4f7c57e37c252318acbb0411d1075972b25e9d460254ca6db82be4c4db7eec272763d84b06e7838b863b39f3636e674819
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dhC60.exeFilesize
202KB
MD5936d51b27c2ed3bfbac86bf9c8677bea
SHA1eed290215f5961deb6d9b2a6cba4bf5ddb783966
SHA2567b0c00adc9ca219fe1f1fc749194370b49e180eb61e54f3becaeed9bb0c4f03e
SHA512efbf4df5d9621cb272a9ca442c976a4f7c57e37c252318acbb0411d1075972b25e9d460254ca6db82be4c4db7eec272763d84b06e7838b863b39f3636e674819
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\awm97.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\awm97.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bjq68.exeFilesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bjq68.exeFilesize
175KB
MD5ef8079cf160510d0da7162bc08f753d8
SHA1e786cc8bee83e4a37433ddccf9d3540e1f6533fe
SHA256a6416ca607f03e7d02dd9c8b546113c71f421c0ba8438dafb941d25f8cf2c9e6
SHA512959b08126358527b794a276f6e9f818250f888d9f108b46766f6c2e50186acc8f406acbeb94ca97b5f0e329b27f3851003446715d5d040b5c0fef4010011a2c3
-
memory/1204-460-0x0000000000000000-mapping.dmp
-
memory/1372-211-0x0000000000000000-mapping.dmp
-
memory/3752-181-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-172-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-164-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-165-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-166-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-167-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-162-0x0000000000000000-mapping.dmp
-
memory/3752-168-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-182-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-169-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-180-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-179-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-178-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-177-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-176-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-175-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-171-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-174-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3752-173-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/3980-454-0x0000000000580000-0x000000000062E000-memory.dmpFilesize
696KB
-
memory/3980-459-0x0000000000400000-0x0000000000579000-memory.dmpFilesize
1.5MB
-
memory/3980-426-0x0000000004B00000-0x0000000004B44000-memory.dmpFilesize
272KB
-
memory/3980-416-0x0000000000400000-0x0000000000579000-memory.dmpFilesize
1.5MB
-
memory/3980-413-0x0000000000580000-0x000000000062E000-memory.dmpFilesize
696KB
-
memory/3980-415-0x00000000007B0000-0x00000000007FB000-memory.dmpFilesize
300KB
-
memory/3980-440-0x00000000053D0000-0x000000000541B000-memory.dmpFilesize
300KB
-
memory/3980-361-0x0000000000000000-mapping.dmp
-
memory/3980-421-0x0000000004A80000-0x0000000004AC6000-memory.dmpFilesize
280KB
-
memory/4124-149-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-131-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-160-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-161-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-158-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-157-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-156-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-154-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-155-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-132-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-136-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-140-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-143-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-145-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-147-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-148-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-152-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-153-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-150-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-151-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-116-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-146-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-144-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-142-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-141-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-139-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-138-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-137-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-117-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-135-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-134-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-118-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-119-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-133-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-159-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-120-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-121-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-122-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-123-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-124-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-125-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-126-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-127-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-128-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-129-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4124-130-0x0000000077480000-0x000000007760E000-memory.dmpFilesize
1.6MB
-
memory/4292-332-0x00000000055F0000-0x000000000562E000-memory.dmpFilesize
248KB
-
memory/4292-264-0x0000000000000000-mapping.dmp
-
memory/4292-355-0x0000000007DF0000-0x0000000007E66000-memory.dmpFilesize
472KB
-
memory/4292-350-0x0000000007ED0000-0x0000000008092000-memory.dmpFilesize
1.8MB
-
memory/4292-342-0x0000000005A30000-0x0000000005A96000-memory.dmpFilesize
408KB
-
memory/4292-339-0x0000000006660000-0x0000000006B5E000-memory.dmpFilesize
5.0MB
-
memory/4292-338-0x0000000005920000-0x00000000059B2000-memory.dmpFilesize
584KB
-
memory/4292-334-0x0000000005760000-0x00000000057AB000-memory.dmpFilesize
300KB
-
memory/4292-351-0x00000000085D0000-0x0000000008AFC000-memory.dmpFilesize
5.2MB
-
memory/4292-330-0x0000000005570000-0x0000000005582000-memory.dmpFilesize
72KB
-
memory/4292-327-0x0000000005B50000-0x0000000006156000-memory.dmpFilesize
6.0MB
-
memory/4292-328-0x0000000005650000-0x000000000575A000-memory.dmpFilesize
1.0MB
-
memory/4292-314-0x0000000000BD0000-0x0000000000C02000-memory.dmpFilesize
200KB
-
memory/4292-356-0x0000000007E70000-0x0000000007EC0000-memory.dmpFilesize
320KB
-
memory/4476-506-0x000000000041B592-mapping.dmp
-
memory/4476-558-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/4476-574-0x0000000008E70000-0x0000000008EBB000-memory.dmpFilesize
300KB
-
memory/4992-263-0x0000000000CC0000-0x0000000000CCA000-memory.dmpFilesize
40KB
-
memory/4992-260-0x0000000000000000-mapping.dmp