Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
01-08-2023 03:53
Static task
static1
Behavioral task
behavioral1
Sample
1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe
Resource
win7-20230712-en
General
-
Target
1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe
-
Size
7.5MB
-
MD5
5e46cc22ddf121ab4001ee5ee664d376
-
SHA1
cd0475812d4a0b2398beea77dd865e514262635d
-
SHA256
1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6
-
SHA512
63b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354
-
SSDEEP
196608:PoCKFCGSiWz3WsiOL95v55+GHncYSxK+TW+sE4m3pk:QCKkeWixOnx5K8WW+0Wu
Malware Config
Extracted
amadey
3.85
45.9.74.166/b7djSDcPcZ/index.php
45.9.74.141/b7djSDcPcZ/index.php
Extracted
systembc
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
Detects Arechclient2 RAT 2 IoCs
Arechclient2.
Processes:
resource yara_rule behavioral2/memory/4084-171-0x0000000000400000-0x0000000000AA0000-memory.dmp MALWARE_Win_Arechclient behavioral2/memory/1464-186-0x0000000000400000-0x0000000000AA0000-memory.dmp MALWARE_Win_Arechclient -
Detects DLL dropped by Raspberry Robin. 9 IoCs
Raspberry Robin.
Processes:
resource yara_rule behavioral2/memory/4084-167-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/4084-166-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/4084-168-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/1464-180-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/1464-181-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/1464-182-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/4084-190-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/4084-191-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/1464-194-0x0000000074410000-0x00000000745D2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 -
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4084-171-0x0000000000400000-0x0000000000AA0000-memory.dmp family_sectoprat behavioral2/memory/1464-186-0x0000000000400000-0x0000000000AA0000-memory.dmp family_sectoprat -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 18 3968 rundll32.exe 19 3156 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
bstyoops.exeBRA.exeBRA.exebstyoops.exepid process 3152 bstyoops.exe 4084 BRA.exe 1464 BRA.exe 644 bstyoops.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exepid process 3684 rundll32.exe 3968 rundll32.exe 3740 rundll32.exe 3156 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe themida C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe themida C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe themida behavioral2/memory/4084-171-0x0000000000400000-0x0000000000AA0000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe themida behavioral2/memory/1464-186-0x0000000000400000-0x0000000000AA0000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bstyoops.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1148472871-1113856141-1322182616-1000\Software\Microsoft\Windows\CurrentVersion\Run\BRA.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000057051\\BRA.exe" bstyoops.exe Set value (str) \REGISTRY\USER\S-1-5-21-1148472871-1113856141-1322182616-1000\Software\Microsoft\Windows\CurrentVersion\Run\sf64r.dll = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\1000058061\\sf64r.dll, rundll" bstyoops.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
BRA.exeBRA.exepid process 4084 BRA.exe 1464 BRA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exebstyoops.exeBRA.exeBRA.exerundll32.exerundll32.exebstyoops.exepid process 4660 1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe 4660 1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe 3152 bstyoops.exe 3152 bstyoops.exe 4084 BRA.exe 4084 BRA.exe 1464 BRA.exe 1464 BRA.exe 3968 rundll32.exe 3968 rundll32.exe 3156 rundll32.exe 3156 rundll32.exe 1464 BRA.exe 4084 BRA.exe 644 bstyoops.exe 644 bstyoops.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
BRA.exeBRA.exedescription pid process Token: SeDebugPrivilege 1464 BRA.exe Token: SeDebugPrivilege 4084 BRA.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exepid process 4660 1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exebstyoops.execmd.exerundll32.exerundll32.exedescription pid process target process PID 4660 wrote to memory of 3152 4660 1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe bstyoops.exe PID 4660 wrote to memory of 3152 4660 1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe bstyoops.exe PID 4660 wrote to memory of 3152 4660 1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe bstyoops.exe PID 3152 wrote to memory of 2188 3152 bstyoops.exe schtasks.exe PID 3152 wrote to memory of 2188 3152 bstyoops.exe schtasks.exe PID 3152 wrote to memory of 2188 3152 bstyoops.exe schtasks.exe PID 3152 wrote to memory of 2168 3152 bstyoops.exe cmd.exe PID 3152 wrote to memory of 2168 3152 bstyoops.exe cmd.exe PID 3152 wrote to memory of 2168 3152 bstyoops.exe cmd.exe PID 2168 wrote to memory of 3468 2168 cmd.exe cmd.exe PID 2168 wrote to memory of 3468 2168 cmd.exe cmd.exe PID 2168 wrote to memory of 3468 2168 cmd.exe cmd.exe PID 2168 wrote to memory of 2492 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 2492 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 2492 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 5108 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 5108 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 5108 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 1432 2168 cmd.exe cmd.exe PID 2168 wrote to memory of 1432 2168 cmd.exe cmd.exe PID 2168 wrote to memory of 1432 2168 cmd.exe cmd.exe PID 2168 wrote to memory of 3128 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 3128 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 3128 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 1356 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 1356 2168 cmd.exe cacls.exe PID 2168 wrote to memory of 1356 2168 cmd.exe cacls.exe PID 3152 wrote to memory of 4084 3152 bstyoops.exe BRA.exe PID 3152 wrote to memory of 4084 3152 bstyoops.exe BRA.exe PID 3152 wrote to memory of 4084 3152 bstyoops.exe BRA.exe PID 3152 wrote to memory of 1464 3152 bstyoops.exe BRA.exe PID 3152 wrote to memory of 1464 3152 bstyoops.exe BRA.exe PID 3152 wrote to memory of 1464 3152 bstyoops.exe BRA.exe PID 3152 wrote to memory of 3684 3152 bstyoops.exe rundll32.exe PID 3152 wrote to memory of 3684 3152 bstyoops.exe rundll32.exe PID 3152 wrote to memory of 3684 3152 bstyoops.exe rundll32.exe PID 3684 wrote to memory of 3968 3684 rundll32.exe rundll32.exe PID 3684 wrote to memory of 3968 3684 rundll32.exe rundll32.exe PID 3152 wrote to memory of 3740 3152 bstyoops.exe rundll32.exe PID 3152 wrote to memory of 3740 3152 bstyoops.exe rundll32.exe PID 3152 wrote to memory of 3740 3152 bstyoops.exe rundll32.exe PID 3740 wrote to memory of 3156 3740 rundll32.exe rundll32.exe PID 3740 wrote to memory of 3156 3740 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe"C:\Users\Admin\AppData\Local\Temp\1aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "Admin:N"&&CACLS "bstyoops.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "Admin:N"&&CACLS "..\c2868ed41c" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:R" /E4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe"C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe"C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll, rundll3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll, rundll4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll, rundll3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dll, rundll4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exeFilesize
2.7MB
MD5d5bddbbbf64a97dc0e98d4db2b675fb3
SHA1aeef4f429b68100f46f4a91000b7d593f0ef1462
SHA2568a6e1479d2efdd7ef244c34512a6a8b9c23df2b86374641a07473e4f00f5b457
SHA5121f451f7ec3d157756687049ec893aff1997cff60797af33c6209782058b2414c8c77976444928c4d3922db5e4126843f8f99729cbf348c78a9f6c78437d121aa
-
C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exeFilesize
2.7MB
MD5d5bddbbbf64a97dc0e98d4db2b675fb3
SHA1aeef4f429b68100f46f4a91000b7d593f0ef1462
SHA2568a6e1479d2efdd7ef244c34512a6a8b9c23df2b86374641a07473e4f00f5b457
SHA5121f451f7ec3d157756687049ec893aff1997cff60797af33c6209782058b2414c8c77976444928c4d3922db5e4126843f8f99729cbf348c78a9f6c78437d121aa
-
C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exeFilesize
2.7MB
MD5d5bddbbbf64a97dc0e98d4db2b675fb3
SHA1aeef4f429b68100f46f4a91000b7d593f0ef1462
SHA2568a6e1479d2efdd7ef244c34512a6a8b9c23df2b86374641a07473e4f00f5b457
SHA5121f451f7ec3d157756687049ec893aff1997cff60797af33c6209782058b2414c8c77976444928c4d3922db5e4126843f8f99729cbf348c78a9f6c78437d121aa
-
C:\Users\Admin\AppData\Local\Temp\1000057051\BRA.exeFilesize
2.7MB
MD5d5bddbbbf64a97dc0e98d4db2b675fb3
SHA1aeef4f429b68100f46f4a91000b7d593f0ef1462
SHA2568a6e1479d2efdd7ef244c34512a6a8b9c23df2b86374641a07473e4f00f5b457
SHA5121f451f7ec3d157756687049ec893aff1997cff60797af33c6209782058b2414c8c77976444928c4d3922db5e4126843f8f99729cbf348c78a9f6c78437d121aa
-
C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dllFilesize
6.2MB
MD5374d8e8089ecf5f1a161514d1b346432
SHA1cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0
SHA256a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de
SHA512085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c
-
C:\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dllFilesize
6.2MB
MD5374d8e8089ecf5f1a161514d1b346432
SHA1cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0
SHA256a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de
SHA512085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
7.5MB
MD55e46cc22ddf121ab4001ee5ee664d376
SHA1cd0475812d4a0b2398beea77dd865e514262635d
SHA2561aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6
SHA51263b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
7.5MB
MD55e46cc22ddf121ab4001ee5ee664d376
SHA1cd0475812d4a0b2398beea77dd865e514262635d
SHA2561aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6
SHA51263b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
7.5MB
MD55e46cc22ddf121ab4001ee5ee664d376
SHA1cd0475812d4a0b2398beea77dd865e514262635d
SHA2561aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6
SHA51263b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
7.5MB
MD55e46cc22ddf121ab4001ee5ee664d376
SHA1cd0475812d4a0b2398beea77dd865e514262635d
SHA2561aebf6a1a305f1040ea16c21c143697f7c76277c8a957691d25698db30a971b6
SHA51263b5ec2dced11380f208ba88ab1a11b9cb347436291e5d03787c2655f6126a33c9ed2cc958f50c00e315ec44be6f25a19a36539f51e48b3849a051ab23b24354
-
\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dllFilesize
6.2MB
MD5374d8e8089ecf5f1a161514d1b346432
SHA1cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0
SHA256a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de
SHA512085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c
-
\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dllFilesize
6.2MB
MD5374d8e8089ecf5f1a161514d1b346432
SHA1cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0
SHA256a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de
SHA512085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c
-
\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dllFilesize
6.2MB
MD5374d8e8089ecf5f1a161514d1b346432
SHA1cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0
SHA256a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de
SHA512085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c
-
\Users\Admin\AppData\Local\Temp\1000058061\sf64r.dllFilesize
6.2MB
MD5374d8e8089ecf5f1a161514d1b346432
SHA1cf3b7d0b7a80a64a5e5a02cf0ea1b588ca0ce0d0
SHA256a216650a36498389a10434af63324705ac991f815bae1ba65d9ecf31f71862de
SHA512085c681ac01da5fd5dbc922e7039b41bf6c0b0dc0446ac7e8e5ba904c187c32b0b7e081206c50cbe88b1af303ac2215c7672af3ec1a46eb73bcd576b003f628c
-
memory/644-247-0x0000000000E30000-0x0000000001AFE000-memory.dmpFilesize
12.8MB
-
memory/644-241-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/644-248-0x0000000001EC0000-0x0000000001EC1000-memory.dmpFilesize
4KB
-
memory/644-252-0x0000000000E30000-0x0000000001AFE000-memory.dmpFilesize
12.8MB
-
memory/644-243-0x0000000001BE0000-0x0000000001BE1000-memory.dmpFilesize
4KB
-
memory/644-244-0x0000000001DA0000-0x0000000001DA1000-memory.dmpFilesize
4KB
-
memory/644-245-0x0000000001DB0000-0x0000000001DB1000-memory.dmpFilesize
4KB
-
memory/644-246-0x0000000000E30000-0x0000000001AFE000-memory.dmpFilesize
12.8MB
-
memory/644-240-0x0000000000E10000-0x0000000000E11000-memory.dmpFilesize
4KB
-
memory/644-242-0x0000000001BD0000-0x0000000001BD1000-memory.dmpFilesize
4KB
-
memory/1464-235-0x0000000006190000-0x00000000061A2000-memory.dmpFilesize
72KB
-
memory/1464-194-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/1464-193-0x0000000000400000-0x0000000000AA0000-memory.dmpFilesize
6.6MB
-
memory/1464-186-0x0000000000400000-0x0000000000AA0000-memory.dmpFilesize
6.6MB
-
memory/1464-182-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/1464-181-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/1464-180-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/1464-176-0x0000000000400000-0x0000000000AA0000-memory.dmpFilesize
6.6MB
-
memory/3152-146-0x0000000000E30000-0x0000000001AFE000-memory.dmpFilesize
12.8MB
-
memory/3152-164-0x0000000000E30000-0x0000000001AFE000-memory.dmpFilesize
12.8MB
-
memory/3152-140-0x0000000000E30000-0x0000000001AFE000-memory.dmpFilesize
12.8MB
-
memory/3152-139-0x0000000002350000-0x0000000002351000-memory.dmpFilesize
4KB
-
memory/3152-142-0x0000000003C40000-0x0000000003C41000-memory.dmpFilesize
4KB
-
memory/3152-141-0x0000000002360000-0x0000000002361000-memory.dmpFilesize
4KB
-
memory/3152-170-0x0000000000E30000-0x0000000001AFE000-memory.dmpFilesize
12.8MB
-
memory/3152-138-0x0000000002340000-0x0000000002341000-memory.dmpFilesize
4KB
-
memory/3152-143-0x0000000003C50000-0x0000000003C51000-memory.dmpFilesize
4KB
-
memory/3152-144-0x0000000003C60000-0x0000000003C61000-memory.dmpFilesize
4KB
-
memory/3152-145-0x0000000003C70000-0x0000000003C71000-memory.dmpFilesize
4KB
-
memory/3156-229-0x00007FFD62700000-0x00007FFD63189000-memory.dmpFilesize
10.5MB
-
memory/3156-224-0x00007FFD62700000-0x00007FFD63189000-memory.dmpFilesize
10.5MB
-
memory/3968-211-0x00007FFD62700000-0x00007FFD63189000-memory.dmpFilesize
10.5MB
-
memory/3968-212-0x00007FFD7E560000-0x00007FFD7E562000-memory.dmpFilesize
8KB
-
memory/3968-218-0x00007FFD7B740000-0x00007FFD7B742000-memory.dmpFilesize
8KB
-
memory/3968-217-0x00007FFD7B730000-0x00007FFD7B732000-memory.dmpFilesize
8KB
-
memory/3968-216-0x00007FFD7C630000-0x00007FFD7C632000-memory.dmpFilesize
8KB
-
memory/3968-215-0x00007FFD7C620000-0x00007FFD7C622000-memory.dmpFilesize
8KB
-
memory/3968-214-0x00007FFD62700000-0x00007FFD63189000-memory.dmpFilesize
10.5MB
-
memory/3968-210-0x00007FFD7E550000-0x00007FFD7E552000-memory.dmpFilesize
8KB
-
memory/3968-213-0x00007FFD7E570000-0x00007FFD7E572000-memory.dmpFilesize
8KB
-
memory/4084-183-0x0000000005F20000-0x0000000005F4E000-memory.dmpFilesize
184KB
-
memory/4084-177-0x0000000005740000-0x00000000057B6000-memory.dmpFilesize
472KB
-
memory/4084-166-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/4084-173-0x00000000054D0000-0x0000000005562000-memory.dmpFilesize
584KB
-
memory/4084-174-0x0000000005570000-0x0000000005732000-memory.dmpFilesize
1.8MB
-
memory/4084-184-0x0000000005F50000-0x0000000005F88000-memory.dmpFilesize
224KB
-
memory/4084-167-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/4084-165-0x0000000000400000-0x0000000000AA0000-memory.dmpFilesize
6.6MB
-
memory/4084-191-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/4084-190-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/4084-189-0x0000000000400000-0x0000000000AA0000-memory.dmpFilesize
6.6MB
-
memory/4084-188-0x0000000006A10000-0x0000000006A2E000-memory.dmpFilesize
120KB
-
memory/4084-168-0x0000000074410000-0x00000000745D2000-memory.dmpFilesize
1.8MB
-
memory/4084-179-0x0000000005810000-0x0000000005876000-memory.dmpFilesize
408KB
-
memory/4084-178-0x00000000057C0000-0x0000000005810000-memory.dmpFilesize
320KB
-
memory/4084-187-0x00000000063E0000-0x000000000690C000-memory.dmpFilesize
5.2MB
-
memory/4084-171-0x0000000000400000-0x0000000000AA0000-memory.dmpFilesize
6.6MB
-
memory/4084-236-0x0000000006030000-0x000000000606E000-memory.dmpFilesize
248KB
-
memory/4084-172-0x0000000004FD0000-0x00000000054CE000-memory.dmpFilesize
5.0MB
-
memory/4660-119-0x0000000001540000-0x0000000001541000-memory.dmpFilesize
4KB
-
memory/4660-137-0x00000000003F0000-0x00000000010BE000-memory.dmpFilesize
12.8MB
-
memory/4660-126-0x0000000001980000-0x0000000001981000-memory.dmpFilesize
4KB
-
memory/4660-125-0x0000000001970000-0x0000000001971000-memory.dmpFilesize
4KB
-
memory/4660-124-0x0000000001960000-0x0000000001961000-memory.dmpFilesize
4KB
-
memory/4660-123-0x00000000003F0000-0x00000000010BE000-memory.dmpFilesize
12.8MB
-
memory/4660-122-0x0000000001560000-0x0000000001561000-memory.dmpFilesize
4KB
-
memory/4660-121-0x0000000001550000-0x0000000001551000-memory.dmpFilesize
4KB
-
memory/4660-118-0x00000000011F0000-0x00000000011F1000-memory.dmpFilesize
4KB
-
memory/4660-120-0x00000000003F0000-0x00000000010BE000-memory.dmpFilesize
12.8MB