Analysis

  • max time kernel
    123s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    11-03-2021 04:43

General

  • Target

    SecuriteInfo.com.W32.AIDetect.malware1.8119.17745.exe

  • Size

    301KB

  • MD5

    4945a14049174b18fc91e04b65dc0dd5

  • SHA1

    28086f5cc0b9f97014575dac95b9de5065977a83

  • SHA256

    ea8588de894d9657daa047958ca98c5e9549ca25bc09e9df2a9c8ae044daef42

  • SHA512

    10e478b6f5d6eb81713f92d8c25a4ee517bd5d37e5962bc16d7b9be652770d844ce537777ec0d023e83069f2de43195cfd08ca1992853d1f7bc6bb35ece3656f

Malware Config

Extracted

Family

smokeloader

Version

2019

C2

http://10022020newfolder1002002131-service1002.space/

http://10022020newfolder1002002231-service1002.space/

http://10022020newfolder3100231-service1002.space/

http://10022020newfolder1002002431-service1002.space/

http://10022020newfolder1002002531-service1002.space/

http://10022020newfolder33417-01242510022020.space/

http://10022020test125831-service1002012510022020.space/

http://10022020test136831-service1002012510022020.space/

http://10022020test147831-service1002012510022020.space/

http://10022020test146831-service1002012510022020.space/

http://10022020test134831-service1002012510022020.space/

http://10022020est213531-service100201242510022020.ru/

http://10022020yes1t3481-service1002012510022020.ru/

http://10022020test13561-service1002012510022020.su/

http://10022020test14781-service1002012510022020.info/

http://10022020test13461-service1002012510022020.net/

http://10022020test15671-service1002012510022020.tech/

http://10022020test12671-service1002012510022020.online/

http://10022020utest1341-service1002012510022020.ru/

http://10022020uest71-service100201dom2510022020.ru/

rc4.i32
rc4.i32

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • Executes dropped EXE 6 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 15 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.8119.17745.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.8119.17745.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.8119.17745.exe
        "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.8119.17745.exe"
        3⤵
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:3484
    • C:\Users\Admin\AppData\Local\Temp\8F65.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\8F65.tmp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3568
    • C:\Users\Admin\AppData\Local\Temp\9254.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\9254.tmp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Users\Admin\AppData\Local\Temp\1837264067.exe
        "C:\Users\Admin\AppData\Local\Temp\1837264067.exe"
        3⤵
        • Executes dropped EXE
        • Windows security modification
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4468
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1837264067.exe" -Force
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1636
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout 1
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Windows\SysWOW64\timeout.exe
            timeout 1
            5⤵
            • Delays execution with timeout.exe
            PID:220
        • C:\Users\Admin\AppData\Local\Temp\1837264067.exe
          "C:\Users\Admin\AppData\Local\Temp\1837264067.exe"
          4⤵
          • Executes dropped EXE
          PID:2104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 1956
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:3972
      • C:\Users\Admin\AppData\Local\Temp\1832078390.exe
        "C:\Users\Admin\AppData\Local\Temp\1832078390.exe"
        3⤵
        • Executes dropped EXE
        PID:672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 268
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:1060
    • C:\Users\Admin\AppData\Local\Temp\9737.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\9737.tmp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1772
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3128 -s 7752
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2396
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4508
  • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
    "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4956
  • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4716

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

5
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1832078390.exe
    MD5

    58f807333c6bf89503690d4ac187a596

    SHA1

    6835874207df9383886662a5f0378e0d760c1a94

    SHA256

    18b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a

    SHA512

    0eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4

  • C:\Users\Admin\AppData\Local\Temp\1832078390.exe
    MD5

    58f807333c6bf89503690d4ac187a596

    SHA1

    6835874207df9383886662a5f0378e0d760c1a94

    SHA256

    18b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a

    SHA512

    0eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4

  • C:\Users\Admin\AppData\Local\Temp\1837264067.exe
    MD5

    5ad4c3484acd2449fe561d869e45cfe9

    SHA1

    2da16a5ba99d9606e7bc9632579b805b4c388b3a

    SHA256

    15b2e5a4550cad8f72dcfa21b8c1836d58ae51b8cdbec9c705b9270525aa6fdc

    SHA512

    bc7ccabde11c24c20e9f76b42a0b19d7a6b7bdd132dec3b52b49004c1f438ed58a07a637e543735113419da50daf43b3220a1ed7c7c671f95e1dde952fc2b2d1

  • C:\Users\Admin\AppData\Local\Temp\1837264067.exe
    MD5

    5ad4c3484acd2449fe561d869e45cfe9

    SHA1

    2da16a5ba99d9606e7bc9632579b805b4c388b3a

    SHA256

    15b2e5a4550cad8f72dcfa21b8c1836d58ae51b8cdbec9c705b9270525aa6fdc

    SHA512

    bc7ccabde11c24c20e9f76b42a0b19d7a6b7bdd132dec3b52b49004c1f438ed58a07a637e543735113419da50daf43b3220a1ed7c7c671f95e1dde952fc2b2d1

  • C:\Users\Admin\AppData\Local\Temp\1837264067.exe
    MD5

    5ad4c3484acd2449fe561d869e45cfe9

    SHA1

    2da16a5ba99d9606e7bc9632579b805b4c388b3a

    SHA256

    15b2e5a4550cad8f72dcfa21b8c1836d58ae51b8cdbec9c705b9270525aa6fdc

    SHA512

    bc7ccabde11c24c20e9f76b42a0b19d7a6b7bdd132dec3b52b49004c1f438ed58a07a637e543735113419da50daf43b3220a1ed7c7c671f95e1dde952fc2b2d1

  • C:\Users\Admin\AppData\Local\Temp\8F65.tmp.exe
    MD5

    75108940b5bcb39969c6ceb388a7d757

    SHA1

    f27f37c1228d2d851c027a38c53bfb3ffdff2181

    SHA256

    5cd66e5ff2736faf6c50137d8147d1b89bbb83589ad21febadb4fe79b9d62cfe

    SHA512

    69ea0c9b27307f9f340ff238d85011c0ea761166456fd1f73940b56355d191118398b1f442fc99bc10c9fbadcbd3078402d40782db83b007cee6a372368b9015

  • C:\Users\Admin\AppData\Local\Temp\8F65.tmp.exe
    MD5

    75108940b5bcb39969c6ceb388a7d757

    SHA1

    f27f37c1228d2d851c027a38c53bfb3ffdff2181

    SHA256

    5cd66e5ff2736faf6c50137d8147d1b89bbb83589ad21febadb4fe79b9d62cfe

    SHA512

    69ea0c9b27307f9f340ff238d85011c0ea761166456fd1f73940b56355d191118398b1f442fc99bc10c9fbadcbd3078402d40782db83b007cee6a372368b9015

  • C:\Users\Admin\AppData\Local\Temp\9254.tmp.exe
    MD5

    9128e7db75549f010032613d3d794ee0

    SHA1

    8b7bd9777cc59f14c7ecda1689079ba741a10eb7

    SHA256

    9ba985c9a8b39d7b33a59463467baea0f35ce5c1dd1647354708fd1e08894f22

    SHA512

    df1c4e8f8403894a9bba503195e834f22711e54d0950cdac2a8d990c9c8eff71fb4cae24303eb3dd93f188987cda9b4b0f9f9174be5dc7adee94b2a2e949a686

  • C:\Users\Admin\AppData\Local\Temp\9254.tmp.exe
    MD5

    9128e7db75549f010032613d3d794ee0

    SHA1

    8b7bd9777cc59f14c7ecda1689079ba741a10eb7

    SHA256

    9ba985c9a8b39d7b33a59463467baea0f35ce5c1dd1647354708fd1e08894f22

    SHA512

    df1c4e8f8403894a9bba503195e834f22711e54d0950cdac2a8d990c9c8eff71fb4cae24303eb3dd93f188987cda9b4b0f9f9174be5dc7adee94b2a2e949a686

  • C:\Users\Admin\AppData\Local\Temp\9737.tmp.exe
    MD5

    cccbcd98e1f50d10a6a736aa8b17fe78

    SHA1

    9683954602105f4eca9fa074e311e7c18a165c07

    SHA256

    1c89593029c82f452bb75b026043b8f2e71e3db25f39863b519087750787f6d5

    SHA512

    1f53b910497a6973a5c128b741378a01f65c107e9f32993d0d2c3380c17148e86086488626067ff52b3e1e62b574f520900de0bfe190b008bd22b60667d4e67c

  • C:\Users\Admin\AppData\Local\Temp\9737.tmp.exe
    MD5

    cccbcd98e1f50d10a6a736aa8b17fe78

    SHA1

    9683954602105f4eca9fa074e311e7c18a165c07

    SHA256

    1c89593029c82f452bb75b026043b8f2e71e3db25f39863b519087750787f6d5

    SHA512

    1f53b910497a6973a5c128b741378a01f65c107e9f32993d0d2c3380c17148e86086488626067ff52b3e1e62b574f520900de0bfe190b008bd22b60667d4e67c

  • \Users\Admin\AppData\Local\Temp\4DD3.tmp
    MD5

    50741b3f2d7debf5d2bed63d88404029

    SHA1

    56210388a627b926162b36967045be06ffb1aad3

    SHA256

    f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

    SHA512

    fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

  • memory/220-84-0x0000000000000000-mapping.dmp
  • memory/672-50-0x0000000000000000-mapping.dmp
  • memory/1060-53-0x0000000004A20000-0x0000000004A21000-memory.dmp
    Filesize

    4KB

  • memory/1060-54-0x0000000004A20000-0x0000000004A21000-memory.dmp
    Filesize

    4KB

  • memory/1636-85-0x0000000008170000-0x0000000008171000-memory.dmp
    Filesize

    4KB

  • memory/1636-58-0x0000000000000000-mapping.dmp
  • memory/1636-119-0x0000000009A90000-0x0000000009A91000-memory.dmp
    Filesize

    4KB

  • memory/1636-117-0x0000000009AA0000-0x0000000009AA1000-memory.dmp
    Filesize

    4KB

  • memory/1636-116-0x00000000071C3000-0x00000000071C4000-memory.dmp
    Filesize

    4KB

  • memory/1636-115-0x0000000009AF0000-0x0000000009AF1000-memory.dmp
    Filesize

    4KB

  • memory/1636-113-0x000000007EAA0000-0x000000007EAA1000-memory.dmp
    Filesize

    4KB

  • memory/1636-114-0x0000000009950000-0x0000000009951000-memory.dmp
    Filesize

    4KB

  • memory/1636-111-0x00000000097E0000-0x00000000097E1000-memory.dmp
    Filesize

    4KB

  • memory/1636-104-0x0000000009820000-0x0000000009853000-memory.dmp
    Filesize

    204KB

  • memory/1636-86-0x0000000008540000-0x0000000008541000-memory.dmp
    Filesize

    4KB

  • memory/1636-87-0x0000000008A40000-0x0000000008A41000-memory.dmp
    Filesize

    4KB

  • memory/1636-83-0x0000000008100000-0x0000000008101000-memory.dmp
    Filesize

    4KB

  • memory/1636-82-0x0000000007EA0000-0x0000000007EA1000-memory.dmp
    Filesize

    4KB

  • memory/1636-81-0x00000000076A0000-0x00000000076A1000-memory.dmp
    Filesize

    4KB

  • memory/1636-72-0x00000000071C2000-0x00000000071C3000-memory.dmp
    Filesize

    4KB

  • memory/1636-67-0x00000000071C0000-0x00000000071C1000-memory.dmp
    Filesize

    4KB

  • memory/1636-63-0x0000000007800000-0x0000000007801000-memory.dmp
    Filesize

    4KB

  • memory/1636-61-0x0000000004D20000-0x0000000004D21000-memory.dmp
    Filesize

    4KB

  • memory/1636-60-0x0000000073900000-0x0000000073FEE000-memory.dmp
    Filesize

    6.9MB

  • memory/1772-64-0x0000000004C20000-0x0000000004C21000-memory.dmp
    Filesize

    4KB

  • memory/1772-26-0x0000000000000000-mapping.dmp
  • memory/1772-80-0x0000000007304000-0x0000000007306000-memory.dmp
    Filesize

    8KB

  • memory/1772-79-0x0000000007303000-0x0000000007304000-memory.dmp
    Filesize

    4KB

  • memory/1772-78-0x0000000007300000-0x0000000007301000-memory.dmp
    Filesize

    4KB

  • memory/1772-69-0x0000000007302000-0x0000000007303000-memory.dmp
    Filesize

    4KB

  • memory/1772-77-0x0000000000400000-0x0000000000459000-memory.dmp
    Filesize

    356KB

  • memory/1772-73-0x0000000007190000-0x00000000071CC000-memory.dmp
    Filesize

    240KB

  • memory/1772-76-0x0000000002D30000-0x0000000002D86000-memory.dmp
    Filesize

    344KB

  • memory/1772-66-0x0000000004980000-0x00000000049BE000-memory.dmp
    Filesize

    248KB

  • memory/1772-65-0x0000000073900000-0x0000000073FEE000-memory.dmp
    Filesize

    6.9MB

  • memory/1772-62-0x00000000031A0000-0x00000000031A1000-memory.dmp
    Filesize

    4KB

  • memory/1896-59-0x0000000000000000-mapping.dmp
  • memory/2104-93-0x000000000041F37A-mapping.dmp
  • memory/2104-91-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/2104-112-0x00000000057D0000-0x00000000057D1000-memory.dmp
    Filesize

    4KB

  • memory/2104-96-0x0000000073900000-0x0000000073FEE000-memory.dmp
    Filesize

    6.9MB

  • memory/2396-70-0x00000217A0780000-0x00000217A0781000-memory.dmp
    Filesize

    4KB

  • memory/2396-71-0x00000217A0780000-0x00000217A0781000-memory.dmp
    Filesize

    4KB

  • memory/3128-8-0x0000000000B00000-0x0000000000B17000-memory.dmp
    Filesize

    92KB

  • memory/3256-30-0x0000000004B30000-0x0000000004B31000-memory.dmp
    Filesize

    4KB

  • memory/3256-17-0x0000000002310000-0x000000000231A000-memory.dmp
    Filesize

    40KB

  • memory/3256-34-0x0000000004B34000-0x0000000004B36000-memory.dmp
    Filesize

    8KB

  • memory/3256-18-0x0000000004B40000-0x0000000004B41000-memory.dmp
    Filesize

    4KB

  • memory/3256-31-0x0000000004B32000-0x0000000004B33000-memory.dmp
    Filesize

    4KB

  • memory/3256-19-0x00000000023B0000-0x00000000023B9000-memory.dmp
    Filesize

    36KB

  • memory/3256-33-0x0000000004B33000-0x0000000004B34000-memory.dmp
    Filesize

    4KB

  • memory/3256-12-0x0000000000000000-mapping.dmp
  • memory/3256-15-0x00000000021C0000-0x00000000021C1000-memory.dmp
    Filesize

    4KB

  • memory/3256-16-0x0000000073900000-0x0000000073FEE000-memory.dmp
    Filesize

    6.9MB

  • memory/3484-3-0x0000000000400000-0x000000000040C000-memory.dmp
    Filesize

    48KB

  • memory/3484-4-0x0000000000402A38-mapping.dmp
  • memory/3568-9-0x0000000000000000-mapping.dmp
  • memory/3568-133-0x0000000008FF0000-0x0000000008FF1000-memory.dmp
    Filesize

    4KB

  • memory/3568-90-0x0000000007E40000-0x0000000007E41000-memory.dmp
    Filesize

    4KB

  • memory/3568-21-0x0000000004AF0000-0x0000000004AF1000-memory.dmp
    Filesize

    4KB

  • memory/3568-32-0x0000000007364000-0x0000000007366000-memory.dmp
    Filesize

    8KB

  • memory/3568-22-0x0000000073900000-0x0000000073FEE000-memory.dmp
    Filesize

    6.9MB

  • memory/3568-35-0x0000000003050000-0x000000000308C000-memory.dmp
    Filesize

    240KB

  • memory/3568-23-0x00000000049E0000-0x0000000004A0D000-memory.dmp
    Filesize

    180KB

  • memory/3568-92-0x00000000084D0000-0x00000000084D1000-memory.dmp
    Filesize

    4KB

  • memory/3568-27-0x0000000004CF0000-0x0000000004CF1000-memory.dmp
    Filesize

    4KB

  • memory/3568-39-0x0000000007363000-0x0000000007364000-memory.dmp
    Filesize

    4KB

  • memory/3568-134-0x00000000091D0000-0x00000000091D1000-memory.dmp
    Filesize

    4KB

  • memory/3568-36-0x0000000000400000-0x000000000043F000-memory.dmp
    Filesize

    252KB

  • memory/3568-20-0x0000000003200000-0x0000000003201000-memory.dmp
    Filesize

    4KB

  • memory/3568-37-0x0000000007360000-0x0000000007361000-memory.dmp
    Filesize

    4KB

  • memory/3568-95-0x00000000084F0000-0x00000000084F1000-memory.dmp
    Filesize

    4KB

  • memory/3568-38-0x0000000007362000-0x0000000007363000-memory.dmp
    Filesize

    4KB

  • memory/3568-141-0x0000000009CB0000-0x0000000009CB1000-memory.dmp
    Filesize

    4KB

  • memory/3568-89-0x0000000007C70000-0x0000000007C71000-memory.dmp
    Filesize

    4KB

  • memory/3568-102-0x00000000087E0000-0x00000000087E1000-memory.dmp
    Filesize

    4KB

  • memory/3568-25-0x0000000004AA0000-0x0000000004ACC000-memory.dmp
    Filesize

    176KB

  • memory/3972-101-0x00000000046B0000-0x00000000046B1000-memory.dmp
    Filesize

    4KB

  • memory/4468-40-0x0000000000000000-mapping.dmp
  • memory/4468-48-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
    Filesize

    4KB

  • memory/4468-56-0x00000000081A0000-0x00000000081A1000-memory.dmp
    Filesize

    4KB

  • memory/4468-57-0x0000000008240000-0x00000000082D7000-memory.dmp
    Filesize

    604KB

  • memory/4468-43-0x0000000073900000-0x0000000073FEE000-memory.dmp
    Filesize

    6.9MB

  • memory/4468-49-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
    Filesize

    4KB

  • memory/4468-44-0x0000000000300000-0x0000000000301000-memory.dmp
    Filesize

    4KB

  • memory/4468-47-0x00000000054A0000-0x00000000054A1000-memory.dmp
    Filesize

    4KB

  • memory/4692-5-0x0000000000030000-0x000000000003D000-memory.dmp
    Filesize

    52KB

  • memory/4692-2-0x0000000002DC0000-0x0000000002DC1000-memory.dmp
    Filesize

    4KB