Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14-06-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe
Resource
win10-20240404-en
General
-
Target
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe
-
Size
5.5MB
-
MD5
04a37e41e24d0ad8e500007a84f8547b
-
SHA1
e10758ab7f52698278c919557f22454a8db36197
-
SHA256
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68
-
SHA512
25970ff89b29479b12e4b886bd55dc2a2d9e603020cb08f92a177be3458deec86ebfd2b4b0fba71a18bc35a63c8081c4fb7bddd69dfb5897f081181168c5cf94
-
SSDEEP
98304:aLneSU1WBwQe5qHiFUuM2i3I22xBme3sANiAuGItbKRnGYEGngBKdUzvJA:aLneSFad5qfsxPFeuRTO0KdA
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AddInProcess32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
AddInProcess32.exedescription ioc process File opened (read-only) \??\A: AddInProcess32.exe File opened (read-only) \??\I: AddInProcess32.exe File opened (read-only) \??\J: AddInProcess32.exe File opened (read-only) \??\K: AddInProcess32.exe File opened (read-only) \??\L: AddInProcess32.exe File opened (read-only) \??\O: AddInProcess32.exe File opened (read-only) \??\R: AddInProcess32.exe File opened (read-only) \??\U: AddInProcess32.exe File opened (read-only) \??\V: AddInProcess32.exe File opened (read-only) \??\Y: AddInProcess32.exe File opened (read-only) \??\B: AddInProcess32.exe File opened (read-only) \??\E: AddInProcess32.exe File opened (read-only) \??\H: AddInProcess32.exe File opened (read-only) \??\N: AddInProcess32.exe File opened (read-only) \??\T: AddInProcess32.exe File opened (read-only) \??\X: AddInProcess32.exe File opened (read-only) \??\Z: AddInProcess32.exe File opened (read-only) \??\G: AddInProcess32.exe File opened (read-only) \??\M: AddInProcess32.exe File opened (read-only) \??\P: AddInProcess32.exe File opened (read-only) \??\Q: AddInProcess32.exe File opened (read-only) \??\S: AddInProcess32.exe File opened (read-only) \??\W: AddInProcess32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exeAddInProcess32.exedescription pid process target process PID 2908 set thread context of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 set thread context of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 4160 set thread context of 596 4160 AddInProcess32.exe InstallUtil.exe -
Drops file in Program Files directory 1 IoCs
Processes:
AddInProcess32.exedescription ioc process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe AddInProcess32.exe -
Checks processor information in registry 2 TTPs 19 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier AddInProcess32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier AddInProcess32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data AddInProcess32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor AddInProcess32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 AddInProcess32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exeAddInProcess32.exeAddInProcess32.exepowershell.exeInstallUtil.exepid process 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe 4160 AddInProcess32.exe 4160 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 3420 powershell.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 3420 powershell.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 3420 powershell.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 596 InstallUtil.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe 2332 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exeAddInProcess32.exeInstallUtil.exepowershell.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe Token: SeDebugPrivilege 4160 AddInProcess32.exe Token: SeDebugPrivilege 596 InstallUtil.exe Token: SeBackupPrivilege 596 InstallUtil.exe Token: SeSecurityPrivilege 596 InstallUtil.exe Token: SeSecurityPrivilege 596 InstallUtil.exe Token: SeSecurityPrivilege 596 InstallUtil.exe Token: SeSecurityPrivilege 596 InstallUtil.exe Token: SeDebugPrivilege 3420 powershell.exe Token: SeDebugPrivilege 2332 AddInProcess32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AddInProcess32.exepid process 2332 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exeAddInProcess32.exeAddInProcess32.exedescription pid process target process PID 2908 wrote to memory of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 4160 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 2908 wrote to memory of 2332 2908 dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe AddInProcess32.exe PID 4160 wrote to memory of 596 4160 AddInProcess32.exe InstallUtil.exe PID 4160 wrote to memory of 596 4160 AddInProcess32.exe InstallUtil.exe PID 4160 wrote to memory of 596 4160 AddInProcess32.exe InstallUtil.exe PID 4160 wrote to memory of 596 4160 AddInProcess32.exe InstallUtil.exe PID 4160 wrote to memory of 596 4160 AddInProcess32.exe InstallUtil.exe PID 4160 wrote to memory of 596 4160 AddInProcess32.exe InstallUtil.exe PID 4160 wrote to memory of 596 4160 AddInProcess32.exe InstallUtil.exe PID 4160 wrote to memory of 596 4160 AddInProcess32.exe InstallUtil.exe PID 2332 wrote to memory of 3420 2332 AddInProcess32.exe powershell.exe PID 2332 wrote to memory of 3420 2332 AddInProcess32.exe powershell.exe PID 2332 wrote to memory of 3420 2332 AddInProcess32.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe"C:\Users\Admin\AppData\Local\Temp\dfe4ef2a64994387cd195d13c7fb123e53e7741a16a09a5d32d74ef16f032e68.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HpuydohFilesize
46KB
MD5b13fcb3223116f6eec60be9143cae98b
SHA19a9eb6da6d8e008a51e6ce6212c49bfbe7cb3c88
SHA256961fc9bf866c5b58401d3c91735f9a7b7b4fc93c94038c504c965491f622b52b
SHA51289d72b893acd2ec537b3c3deffcc71d1ce02211f9f5b931c561625ee7162052b511e46d4b4596c0a715e1c992310f2536ebdd512db400eeab23c8960ec4d312d
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rzq1u3nk.zlo.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
memory/596-34-0x0000000000400000-0x0000000000466000-memory.dmpFilesize
408KB
-
memory/596-96-0x00000000089C0000-0x00000000089DE000-memory.dmpFilesize
120KB
-
memory/596-104-0x000000000A030000-0x000000000A1F2000-memory.dmpFilesize
1.8MB
-
memory/596-42-0x00000000086C0000-0x000000000870B000-memory.dmpFilesize
300KB
-
memory/596-41-0x0000000008550000-0x000000000858E000-memory.dmpFilesize
248KB
-
memory/596-40-0x00000000084F0000-0x0000000008502000-memory.dmpFilesize
72KB
-
memory/596-39-0x00000000085B0000-0x00000000086BA000-memory.dmpFilesize
1.0MB
-
memory/596-38-0x0000000008A20000-0x0000000009026000-memory.dmpFilesize
6.0MB
-
memory/596-109-0x000000000A730000-0x000000000AC5C000-memory.dmpFilesize
5.2MB
-
memory/2332-111-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-56-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-188-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-61-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-62-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-112-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-114-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-52-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-115-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-113-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-21-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2332-22-0x0000000000400000-0x0000000000798000-memory.dmpFilesize
3.6MB
-
memory/2332-53-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-25-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-27-0x000000006E600000-0x000000006E69D000-memory.dmpFilesize
628KB
-
memory/2332-26-0x0000000063280000-0x00000000634BE000-memory.dmpFilesize
2.2MB
-
memory/2332-31-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-32-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-33-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-30-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-28-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-65-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-54-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-37-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-55-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-57-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-60-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-59-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-341-0x0000000004910000-0x00000000049D0000-memory.dmpFilesize
768KB
-
memory/2332-49-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2332-47-0x0000000002E80000-0x00000000033A1000-memory.dmpFilesize
5.1MB
-
memory/2908-8-0x0000000073ADE000-0x0000000073ADF000-memory.dmpFilesize
4KB
-
memory/2908-9-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/2908-0-0x0000000073ADE000-0x0000000073ADF000-memory.dmpFilesize
4KB
-
memory/2908-5-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/2908-6-0x0000000005E30000-0x0000000005E74000-memory.dmpFilesize
272KB
-
memory/2908-7-0x00000000060C0000-0x00000000060CA000-memory.dmpFilesize
40KB
-
memory/2908-3-0x0000000004E70000-0x0000000004F02000-memory.dmpFilesize
584KB
-
memory/2908-2-0x0000000005370000-0x000000000586E000-memory.dmpFilesize
5.0MB
-
memory/2908-4-0x0000000004F10000-0x0000000004FAC000-memory.dmpFilesize
624KB
-
memory/2908-10-0x0000000000E80000-0x0000000000E9A000-memory.dmpFilesize
104KB
-
memory/2908-1-0x0000000000FB0000-0x0000000001540000-memory.dmpFilesize
5.6MB
-
memory/2908-11-0x0000000000EB0000-0x0000000000EB6000-memory.dmpFilesize
24KB
-
memory/2908-24-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/2908-18-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/2908-14-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/3420-45-0x00000000070F0000-0x0000000007126000-memory.dmpFilesize
216KB
-
memory/3420-110-0x00000000098B0000-0x0000000009955000-memory.dmpFilesize
660KB
-
memory/3420-50-0x0000000007ED0000-0x0000000007F36000-memory.dmpFilesize
408KB
-
memory/3420-66-0x0000000008910000-0x0000000008986000-memory.dmpFilesize
472KB
-
memory/3420-51-0x0000000008120000-0x0000000008186000-memory.dmpFilesize
408KB
-
memory/3420-58-0x00000000081B0000-0x0000000008500000-memory.dmpFilesize
3.3MB
-
memory/3420-48-0x0000000007E30000-0x0000000007E52000-memory.dmpFilesize
136KB
-
memory/3420-101-0x0000000009770000-0x00000000097A3000-memory.dmpFilesize
204KB
-
memory/3420-102-0x0000000070730000-0x000000007077B000-memory.dmpFilesize
300KB
-
memory/3420-46-0x0000000007760000-0x0000000007D88000-memory.dmpFilesize
6.2MB
-
memory/3420-325-0x0000000009C20000-0x0000000009C28000-memory.dmpFilesize
32KB
-
memory/3420-63-0x0000000008000000-0x000000000801C000-memory.dmpFilesize
112KB
-
memory/3420-103-0x0000000009750000-0x000000000976E000-memory.dmpFilesize
120KB
-
memory/3420-320-0x0000000009C30000-0x0000000009C4A000-memory.dmpFilesize
104KB
-
memory/3420-116-0x0000000009C90000-0x0000000009D24000-memory.dmpFilesize
592KB
-
memory/4160-17-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/4160-19-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/4160-16-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/4160-15-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/4160-13-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/4160-20-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/4160-36-0x0000000073AD0000-0x00000000741BE000-memory.dmpFilesize
6.9MB
-
memory/4160-12-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB