Analysis
-
max time kernel
298s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe
Resource
win10-20240404-en
General
-
Target
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe
-
Size
5.5MB
-
MD5
04a37e41e24d0ad8e500007a84f8547b
-
SHA1
e10758ab7f52698278c919557f22454a8db36197
-
SHA256
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68
-
SHA512
25970ff89b29479b12e4b886bd55dc2a2d9e603020cb08f92a177be3458deec86ebfd2b4b0fba71a18bc35a63c8081c4fb7bddd69dfb5897f081181168c5cf94
-
SSDEEP
98304:aLneSU1WBwQe5qHiFUuM2i3I22xBme3sANiAuGItbKRnGYEGngBKdUzvJA:aLneSFad5qfsxPFeuRTO0KdA
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" AddInProcess32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL 14 IoCs
Processes:
AddInProcess32.exeInstallUtil.exepid process 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2044 InstallUtil.exe 2044 InstallUtil.exe 2044 InstallUtil.exe 2044 InstallUtil.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AddInProcess32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AddInProcess32.exedescription ioc process File opened (read-only) \??\V: AddInProcess32.exe File opened (read-only) \??\H: AddInProcess32.exe File opened (read-only) \??\Q: AddInProcess32.exe File opened (read-only) \??\N: AddInProcess32.exe File opened (read-only) \??\R: AddInProcess32.exe File opened (read-only) \??\U: AddInProcess32.exe File opened (read-only) \??\W: AddInProcess32.exe File opened (read-only) \??\Z: AddInProcess32.exe File opened (read-only) \??\A: AddInProcess32.exe File opened (read-only) \??\M: AddInProcess32.exe File opened (read-only) \??\G: AddInProcess32.exe File opened (read-only) \??\J: AddInProcess32.exe File opened (read-only) \??\K: AddInProcess32.exe File opened (read-only) \??\O: AddInProcess32.exe File opened (read-only) \??\S: AddInProcess32.exe File opened (read-only) \??\T: AddInProcess32.exe File opened (read-only) \??\B: AddInProcess32.exe File opened (read-only) \??\E: AddInProcess32.exe File opened (read-only) \??\X: AddInProcess32.exe File opened (read-only) \??\P: AddInProcess32.exe File opened (read-only) \??\Y: AddInProcess32.exe File opened (read-only) \??\I: AddInProcess32.exe File opened (read-only) \??\L: AddInProcess32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exeAddInProcess32.exedescription pid process target process PID 2452 set thread context of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 set thread context of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2440 set thread context of 2044 2440 AddInProcess32.exe InstallUtil.exe -
Drops file in Program Files directory 1 IoCs
Processes:
AddInProcess32.exedescription ioc process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe AddInProcess32.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AddInProcess32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AddInProcess32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AddInProcess32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz AddInProcess32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier AddInProcess32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information AddInProcess32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor AddInProcess32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exeAddInProcess32.exeAddInProcess32.exepowershell.exeInstallUtil.exepid process 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe 2440 AddInProcess32.exe 2440 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2936 powershell.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2044 InstallUtil.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe 2260 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exeAddInProcess32.exeInstallUtil.exeAddInProcess32.exepowershell.exedescription pid process Token: SeDebugPrivilege 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe Token: SeDebugPrivilege 2440 AddInProcess32.exe Token: SeDebugPrivilege 2044 InstallUtil.exe Token: SeBackupPrivilege 2044 InstallUtil.exe Token: SeSecurityPrivilege 2044 InstallUtil.exe Token: SeSecurityPrivilege 2044 InstallUtil.exe Token: SeSecurityPrivilege 2044 InstallUtil.exe Token: SeSecurityPrivilege 2044 InstallUtil.exe Token: SeDebugPrivilege 2260 AddInProcess32.exe Token: SeDebugPrivilege 2936 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AddInProcess32.exepid process 2260 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exeAddInProcess32.exeAddInProcess32.exedescription pid process target process PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2440 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2452 wrote to memory of 2260 2452 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2440 wrote to memory of 2044 2440 AddInProcess32.exe InstallUtil.exe PID 2260 wrote to memory of 2936 2260 AddInProcess32.exe powershell.exe PID 2260 wrote to memory of 2936 2260 AddInProcess32.exe powershell.exe PID 2260 wrote to memory of 2936 2260 AddInProcess32.exe powershell.exe PID 2260 wrote to memory of 2936 2260 AddInProcess32.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe"C:\Users\Admin\AppData\Local\Temp\dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RrerhsoiFilesize
46KB
MD5b13fcb3223116f6eec60be9143cae98b
SHA19a9eb6da6d8e008a51e6ce6212c49bfbe7cb3c88
SHA256961fc9bf866c5b58401d3c91735f9a7b7b4fc93c94038c504c965491f622b52b
SHA51289d72b893acd2ec537b3c3deffcc71d1ce02211f9f5b931c561625ee7162052b511e46d4b4596c0a715e1c992310f2536ebdd512db400eeab23c8960ec4d312d
-
\Program Files\Mozilla Firefox\firefox.exeFilesize
654KB
MD51fd347ee17287e9c9532c46a49c4abc4
SHA1ad5d9599030bfbcc828c4321fffd7b9066369393
SHA256912373af6f3c176b7e0a71c986d6288f76f5be80de7c9a580b110690271e9237
SHA5129e52622077e805fcff2c6fe510524bf9ca7246da9ef42843041e82ced28b59163a2729335139df9e2d2a4c748ed56471bb053f337655a77d2d0976370f07acf4
-
memory/2044-55-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2044-76-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2044-77-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2044-75-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2044-48-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2044-49-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2044-51-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2044-54-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/2260-66-0x0000000063280000-0x00000000634BE000-memory.dmpFilesize
2.2MB
-
memory/2260-72-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-142-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-83-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-82-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-81-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-74-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-68-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-70-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-73-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-26-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-30-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-34-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-38-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-28-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-32-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-36-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-44-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-42-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-40-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-71-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-67-0x000000006E600000-0x000000006E69D000-memory.dmpFilesize
628KB
-
memory/2260-65-0x00000000029B0000-0x0000000002ED1000-memory.dmpFilesize
5.1MB
-
memory/2260-64-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-62-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-61-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2260-60-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2440-24-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2440-19-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2440-59-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2440-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2440-23-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2440-13-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2440-9-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2440-21-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2440-58-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2440-57-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2440-15-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2440-25-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2440-78-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2440-11-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2452-63-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2452-5-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2452-6-0x0000000004470000-0x000000000448A000-memory.dmpFilesize
104KB
-
memory/2452-4-0x00000000744CE000-0x00000000744CF000-memory.dmpFilesize
4KB
-
memory/2452-3-0x00000000059C0000-0x0000000005A04000-memory.dmpFilesize
272KB
-
memory/2452-0-0x00000000744CE000-0x00000000744CF000-memory.dmpFilesize
4KB
-
memory/2452-18-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2452-8-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2452-2-0x00000000744C0000-0x0000000074BAE000-memory.dmpFilesize
6.9MB
-
memory/2452-1-0x0000000000230000-0x00000000007C0000-memory.dmpFilesize
5.6MB
-
memory/2452-7-0x00000000044A0000-0x00000000044A6000-memory.dmpFilesize
24KB