Analysis

  • max time kernel
    153s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    16-09-2021 14:18

General

  • Target

    6b53e5d2d9ce484483c7580162272e18.exe

  • Size

    259KB

  • MD5

    6b53e5d2d9ce484483c7580162272e18

  • SHA1

    4d044581e69f2bb876ddb15e45d15d79207360f7

  • SHA256

    395a803ba3e091e6ac2629c5591e6cd874f68332a436287d0121f5f21b3524e6

  • SHA512

    3c2d68b3e2e5df3d27d53964905116db1b498ff87b9a0ad04a007e2df58d2244e08a61ed34b5b42b5289b110519c88168805f6d48ff37dbc741b04bbdd9b96bd

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://fazanaharahe1.xyz/

http://xandelissane2.xyz/

http://ustiassosale3.xyz/

http://cytheriata4.xyz/

http://ggiergionard5.xyz/

http://rrelleynaniy6.store/

http://danniemusoa7.store/

http://nastanizab8.store/

http://onyokandis9.store/

http://dmunaavank10.store/

http://gilmandros11.site/

http://cusanthana12.site/

http://willietjeana13.site/

http://ximusokall14.site/

http://blodinetisha15.site/

http://urydiahadyss16.club/

http://glasamaddama17.club/

http://marlingarly18.club/

http://alluvianna19.club/

http://xandirkaniel20.club/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

Mix 1592021

C2

93.115.20.139:28978

Extracted

Family

redline

Botnet

33

C2

94.26.248.150:17618

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b53e5d2d9ce484483c7580162272e18.exe
    "C:\Users\Admin\AppData\Local\Temp\6b53e5d2d9ce484483c7580162272e18.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\6b53e5d2d9ce484483c7580162272e18.exe
      "C:\Users\Admin\AppData\Local\Temp\6b53e5d2d9ce484483c7580162272e18.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1980
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {6A3B193E-5456-417F-AAEF-ED4B40B20567} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Roaming\tevbjfw
      C:\Users\Admin\AppData\Roaming\tevbjfw
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Users\Admin\AppData\Roaming\tevbjfw
        C:\Users\Admin\AppData\Roaming\tevbjfw
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:1344
  • C:\Users\Admin\AppData\Local\Temp\8B0F.exe
    C:\Users\Admin\AppData\Local\Temp\8B0F.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\8B0F.exe
      C:\Users\Admin\AppData\Local\Temp\8B0F.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1676
  • C:\Users\Admin\AppData\Local\Temp\92EC.exe
    C:\Users\Admin\AppData\Local\Temp\92EC.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\92EC.exe
      C:\Users\Admin\AppData\Local\Temp\92EC.exe
      2⤵
      • Executes dropped EXE
      PID:1388
    • C:\Users\Admin\AppData\Local\Temp\92EC.exe
      C:\Users\Admin\AppData\Local\Temp\92EC.exe
      2⤵
      • Executes dropped EXE
      PID:900
    • C:\Users\Admin\AppData\Local\Temp\92EC.exe
      C:\Users\Admin\AppData\Local\Temp\92EC.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1692
  • C:\Users\Admin\AppData\Local\Temp\A15F.exe
    C:\Users\Admin\AppData\Local\Temp\A15F.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:636
  • C:\Users\Admin\AppData\Local\Temp\AF16.exe
    C:\Users\Admin\AppData\Local\Temp\AF16.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1984
  • C:\Users\Admin\AppData\Local\Temp\BA4D.exe
    C:\Users\Admin\AppData\Local\Temp\BA4D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1052
  • C:\Users\Admin\AppData\Local\Temp\1DD1.exe
    C:\Users\Admin\AppData\Local\Temp\1DD1.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    PID:1020
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\JOSQbprCMEiq & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1DD1.exe"
      2⤵
        PID:636
        • C:\Windows\SysWOW64\timeout.exe
          timeout 4
          3⤵
          • Delays execution with timeout.exe
          PID:1812
    • C:\Users\Admin\AppData\Local\Temp\24C4.exe
      C:\Users\Admin\AppData\Local\Temp\24C4.exe
      1⤵
      • Executes dropped EXE
      PID:864
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qqbscuzg\
        2⤵
          PID:1556

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Virtualization/Sandbox Evasion

      1
      T1497

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      5
      T1012

      Virtualization/Sandbox Evasion

      1
      T1497

      System Information Discovery

      5
      T1082

      Peripheral Device Discovery

      1
      T1120

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1DD1.exe
        MD5

        5286f944c769d5dc97b4d0d4ae83c56d

        SHA1

        836ac55696c0f53fcb38cd6fdeb3a2e6a2e5b06d

        SHA256

        717190eb4edc11546b3ee8555b6c5ad8ee8aa72d3171e0460584fb182d69641d

        SHA512

        95854f2d6dcaf422a9209a8476feccc73f33d94a7a515f10e2de78a52d0d371ff777584e9e443623f311fbd16bf3079ddd9c38f1e11d73a385fbd3c9923a2011

      • C:\Users\Admin\AppData\Local\Temp\24C4.exe
        MD5

        a3ce1cb0ba94e0feadb89d8cf8389f08

        SHA1

        5976e1dcc66f3a1180b1e073acefa35544cd60e5

        SHA256

        46058c5023fc7316ebadb02abdb301b3a2a9e6a0a710dbaba6a604b93259e812

        SHA512

        b62e48b0ce5a850e26b879e8ec81e26de0ff39587b63a24c3412a931e9aec76b1b99dcf4add668c8e8f184822afed856e99a71cf21a02cf80fbb1125267b36d1

      • C:\Users\Admin\AppData\Local\Temp\24C4.exe
        MD5

        a3ce1cb0ba94e0feadb89d8cf8389f08

        SHA1

        5976e1dcc66f3a1180b1e073acefa35544cd60e5

        SHA256

        46058c5023fc7316ebadb02abdb301b3a2a9e6a0a710dbaba6a604b93259e812

        SHA512

        b62e48b0ce5a850e26b879e8ec81e26de0ff39587b63a24c3412a931e9aec76b1b99dcf4add668c8e8f184822afed856e99a71cf21a02cf80fbb1125267b36d1

      • C:\Users\Admin\AppData\Local\Temp\8B0F.exe
        MD5

        7cd3c3a4ba3221934b5cabb715e91b63

        SHA1

        fc1ee7e6af2a0a6d6dc1c33206c36a61b14e124b

        SHA256

        ae04757e6b40020b661be64a699c258a9206117a77545bbad750c676fa0d6a75

        SHA512

        0bcb8d82138a2f2e77ba8b2bb7a154e2995f7c889dfd1be134a76eae934c6484db642d5b9e18a76d19ec0342cdac79aad2ad806f03cb1e9d106833df3bc35615

      • C:\Users\Admin\AppData\Local\Temp\8B0F.exe
        MD5

        7cd3c3a4ba3221934b5cabb715e91b63

        SHA1

        fc1ee7e6af2a0a6d6dc1c33206c36a61b14e124b

        SHA256

        ae04757e6b40020b661be64a699c258a9206117a77545bbad750c676fa0d6a75

        SHA512

        0bcb8d82138a2f2e77ba8b2bb7a154e2995f7c889dfd1be134a76eae934c6484db642d5b9e18a76d19ec0342cdac79aad2ad806f03cb1e9d106833df3bc35615

      • C:\Users\Admin\AppData\Local\Temp\8B0F.exe
        MD5

        7cd3c3a4ba3221934b5cabb715e91b63

        SHA1

        fc1ee7e6af2a0a6d6dc1c33206c36a61b14e124b

        SHA256

        ae04757e6b40020b661be64a699c258a9206117a77545bbad750c676fa0d6a75

        SHA512

        0bcb8d82138a2f2e77ba8b2bb7a154e2995f7c889dfd1be134a76eae934c6484db642d5b9e18a76d19ec0342cdac79aad2ad806f03cb1e9d106833df3bc35615

      • C:\Users\Admin\AppData\Local\Temp\92EC.exe
        MD5

        9d9b13b42035d341d721ac396370e0d2

        SHA1

        9f753604cd2c0c39a6c564ed617e79b491dc63f3

        SHA256

        dfab32c05c3ee8754a23d584e56b54312db92e6b7d540afbd272fc84fae71008

        SHA512

        11f7fac62750a51863d3727475fef8e6ee197d3069198463738265166cefbfc3c29ebf40e6a3433471f67a5c53142d7afae99b597afdd2f8c6d7e5bc37df366e

      • C:\Users\Admin\AppData\Local\Temp\92EC.exe
        MD5

        9d9b13b42035d341d721ac396370e0d2

        SHA1

        9f753604cd2c0c39a6c564ed617e79b491dc63f3

        SHA256

        dfab32c05c3ee8754a23d584e56b54312db92e6b7d540afbd272fc84fae71008

        SHA512

        11f7fac62750a51863d3727475fef8e6ee197d3069198463738265166cefbfc3c29ebf40e6a3433471f67a5c53142d7afae99b597afdd2f8c6d7e5bc37df366e

      • C:\Users\Admin\AppData\Local\Temp\92EC.exe
        MD5

        9d9b13b42035d341d721ac396370e0d2

        SHA1

        9f753604cd2c0c39a6c564ed617e79b491dc63f3

        SHA256

        dfab32c05c3ee8754a23d584e56b54312db92e6b7d540afbd272fc84fae71008

        SHA512

        11f7fac62750a51863d3727475fef8e6ee197d3069198463738265166cefbfc3c29ebf40e6a3433471f67a5c53142d7afae99b597afdd2f8c6d7e5bc37df366e

      • C:\Users\Admin\AppData\Local\Temp\92EC.exe
        MD5

        9d9b13b42035d341d721ac396370e0d2

        SHA1

        9f753604cd2c0c39a6c564ed617e79b491dc63f3

        SHA256

        dfab32c05c3ee8754a23d584e56b54312db92e6b7d540afbd272fc84fae71008

        SHA512

        11f7fac62750a51863d3727475fef8e6ee197d3069198463738265166cefbfc3c29ebf40e6a3433471f67a5c53142d7afae99b597afdd2f8c6d7e5bc37df366e

      • C:\Users\Admin\AppData\Local\Temp\92EC.exe
        MD5

        9d9b13b42035d341d721ac396370e0d2

        SHA1

        9f753604cd2c0c39a6c564ed617e79b491dc63f3

        SHA256

        dfab32c05c3ee8754a23d584e56b54312db92e6b7d540afbd272fc84fae71008

        SHA512

        11f7fac62750a51863d3727475fef8e6ee197d3069198463738265166cefbfc3c29ebf40e6a3433471f67a5c53142d7afae99b597afdd2f8c6d7e5bc37df366e

      • C:\Users\Admin\AppData\Local\Temp\A15F.exe
        MD5

        ad91dd410d0a5638a8b5893b8064fdd3

        SHA1

        37f19e3745b9b94f583662f1bfeff2222f6d59df

        SHA256

        82db2417985edb62a8c281b663a4a5873658661a690e60caada051f5efcf0609

        SHA512

        73e37a2b33ca1485ff0610c530899510a7b37d62f376f31a0c4d2eb97081c59798d182935ce155a5e4d07304c2058d2354bb91e269ae8212f57c8b1ef5b71df4

      • C:\Users\Admin\AppData\Local\Temp\AF16.exe
        MD5

        0e997731d1d653acd4b583ec6cb55148

        SHA1

        c89071fb698f4195accc88965a9331565249a972

        SHA256

        3f18ae3357dc0d67f836e29dbf60653f50046f826ee5ff491bfe9d59980cfd12

        SHA512

        1e6f6887429c20cbd2435068da10be09fcc29e649973b55825ec4fff29ef6d924335f08a47bee21f17150b40cc1c69bb1b8969e7f947c9e8a8f6a9f38a61d7b8

      • C:\Users\Admin\AppData\Local\Temp\BA4D.exe
        MD5

        dd283112e52bc6b6c5c37d7501291498

        SHA1

        ef4065201f0848a8f735203797da74a3917362c0

        SHA256

        eefe80bd8f09a8e4d75d1d66402bc7000f56f5f4f337b2aa84cc0c76d81435a3

        SHA512

        f41f6347219cf69fc308d0155e42432e209b305f47159c4e867cf666455fc3143e8b4d99bd5724d071da419aa83800e6009b1272fc2eb25dabd38fe2225b2f70

      • C:\Users\Admin\AppData\Roaming\tevbjfw
        MD5

        6b53e5d2d9ce484483c7580162272e18

        SHA1

        4d044581e69f2bb876ddb15e45d15d79207360f7

        SHA256

        395a803ba3e091e6ac2629c5591e6cd874f68332a436287d0121f5f21b3524e6

        SHA512

        3c2d68b3e2e5df3d27d53964905116db1b498ff87b9a0ad04a007e2df58d2244e08a61ed34b5b42b5289b110519c88168805f6d48ff37dbc741b04bbdd9b96bd

      • C:\Users\Admin\AppData\Roaming\tevbjfw
        MD5

        6b53e5d2d9ce484483c7580162272e18

        SHA1

        4d044581e69f2bb876ddb15e45d15d79207360f7

        SHA256

        395a803ba3e091e6ac2629c5591e6cd874f68332a436287d0121f5f21b3524e6

        SHA512

        3c2d68b3e2e5df3d27d53964905116db1b498ff87b9a0ad04a007e2df58d2244e08a61ed34b5b42b5289b110519c88168805f6d48ff37dbc741b04bbdd9b96bd

      • C:\Users\Admin\AppData\Roaming\tevbjfw
        MD5

        6b53e5d2d9ce484483c7580162272e18

        SHA1

        4d044581e69f2bb876ddb15e45d15d79207360f7

        SHA256

        395a803ba3e091e6ac2629c5591e6cd874f68332a436287d0121f5f21b3524e6

        SHA512

        3c2d68b3e2e5df3d27d53964905116db1b498ff87b9a0ad04a007e2df58d2244e08a61ed34b5b42b5289b110519c88168805f6d48ff37dbc741b04bbdd9b96bd

      • \Users\Admin\AppData\Local\Temp\8B0F.exe
        MD5

        7cd3c3a4ba3221934b5cabb715e91b63

        SHA1

        fc1ee7e6af2a0a6d6dc1c33206c36a61b14e124b

        SHA256

        ae04757e6b40020b661be64a699c258a9206117a77545bbad750c676fa0d6a75

        SHA512

        0bcb8d82138a2f2e77ba8b2bb7a154e2995f7c889dfd1be134a76eae934c6484db642d5b9e18a76d19ec0342cdac79aad2ad806f03cb1e9d106833df3bc35615

      • \Users\Admin\AppData\Local\Temp\92EC.exe
        MD5

        9d9b13b42035d341d721ac396370e0d2

        SHA1

        9f753604cd2c0c39a6c564ed617e79b491dc63f3

        SHA256

        dfab32c05c3ee8754a23d584e56b54312db92e6b7d540afbd272fc84fae71008

        SHA512

        11f7fac62750a51863d3727475fef8e6ee197d3069198463738265166cefbfc3c29ebf40e6a3433471f67a5c53142d7afae99b597afdd2f8c6d7e5bc37df366e

      • \Users\Admin\AppData\Local\Temp\92EC.exe
        MD5

        9d9b13b42035d341d721ac396370e0d2

        SHA1

        9f753604cd2c0c39a6c564ed617e79b491dc63f3

        SHA256

        dfab32c05c3ee8754a23d584e56b54312db92e6b7d540afbd272fc84fae71008

        SHA512

        11f7fac62750a51863d3727475fef8e6ee197d3069198463738265166cefbfc3c29ebf40e6a3433471f67a5c53142d7afae99b597afdd2f8c6d7e5bc37df366e

      • \Users\Admin\AppData\Local\Temp\92EC.exe
        MD5

        9d9b13b42035d341d721ac396370e0d2

        SHA1

        9f753604cd2c0c39a6c564ed617e79b491dc63f3

        SHA256

        dfab32c05c3ee8754a23d584e56b54312db92e6b7d540afbd272fc84fae71008

        SHA512

        11f7fac62750a51863d3727475fef8e6ee197d3069198463738265166cefbfc3c29ebf40e6a3433471f67a5c53142d7afae99b597afdd2f8c6d7e5bc37df366e

      • memory/636-99-0x0000000000640000-0x0000000000641000-memory.dmp
        Filesize

        4KB

      • memory/636-90-0x0000000000000000-mapping.dmp
      • memory/636-132-0x0000000000000000-mapping.dmp
      • memory/636-94-0x0000000000E90000-0x0000000000E91000-memory.dmp
        Filesize

        4KB

      • memory/864-130-0x0000000000000000-mapping.dmp
      • memory/864-137-0x0000000000400000-0x0000000000452000-memory.dmp
        Filesize

        328KB

      • memory/864-136-0x0000000000020000-0x0000000000033000-memory.dmp
        Filesize

        76KB

      • memory/1020-125-0x0000000000000000-mapping.dmp
      • memory/1020-128-0x0000000000C50000-0x0000000001347000-memory.dmp
        Filesize

        7.0MB

      • memory/1020-129-0x0000000000C51000-0x0000000000C85000-memory.dmp
        Filesize

        208KB

      • memory/1052-123-0x0000000001FF3000-0x0000000001FF4000-memory.dmp
        Filesize

        4KB

      • memory/1052-122-0x0000000001FF2000-0x0000000001FF3000-memory.dmp
        Filesize

        4KB

      • memory/1052-121-0x0000000001FF1000-0x0000000001FF2000-memory.dmp
        Filesize

        4KB

      • memory/1052-124-0x0000000001FF4000-0x0000000001FF6000-memory.dmp
        Filesize

        8KB

      • memory/1052-120-0x0000000000400000-0x0000000000526000-memory.dmp
        Filesize

        1.1MB

      • memory/1052-116-0x0000000001FA0000-0x0000000001FBF000-memory.dmp
        Filesize

        124KB

      • memory/1052-117-0x0000000001FC0000-0x0000000001FDE000-memory.dmp
        Filesize

        120KB

      • memory/1052-109-0x0000000000000000-mapping.dmp
      • memory/1052-119-0x0000000000230000-0x0000000000260000-memory.dmp
        Filesize

        192KB

      • memory/1344-70-0x0000000000402E68-mapping.dmp
      • memory/1352-98-0x0000000003CF0000-0x0000000003D05000-memory.dmp
        Filesize

        84KB

      • memory/1352-64-0x0000000002200000-0x0000000002216000-memory.dmp
        Filesize

        88KB

      • memory/1352-65-0x0000000003E60000-0x0000000003E70000-memory.dmp
        Filesize

        64KB

      • memory/1352-73-0x00000000026C0000-0x00000000026D6000-memory.dmp
        Filesize

        88KB

      • memory/1520-82-0x0000000000020000-0x0000000000029000-memory.dmp
        Filesize

        36KB

      • memory/1520-74-0x0000000000000000-mapping.dmp
      • memory/1676-78-0x0000000000400000-0x0000000000408000-memory.dmp
        Filesize

        32KB

      • memory/1676-79-0x0000000000402DCE-mapping.dmp
      • memory/1692-118-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
        Filesize

        4KB

      • memory/1692-112-0x000000000041C5EE-mapping.dmp
      • memory/1692-114-0x0000000000400000-0x0000000000422000-memory.dmp
        Filesize

        136KB

      • memory/1692-111-0x0000000000400000-0x0000000000422000-memory.dmp
        Filesize

        136KB

      • memory/1712-67-0x0000000000000000-mapping.dmp
      • memory/1728-86-0x00000000000F0000-0x00000000000F1000-memory.dmp
        Filesize

        4KB

      • memory/1728-83-0x0000000000000000-mapping.dmp
      • memory/1728-88-0x00000000041A0000-0x00000000041A1000-memory.dmp
        Filesize

        4KB

      • memory/1812-133-0x0000000000000000-mapping.dmp
      • memory/1980-60-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/1980-62-0x0000000075DA1000-0x0000000075DA3000-memory.dmp
        Filesize

        8KB

      • memory/1980-61-0x0000000000402E68-mapping.dmp
      • memory/1984-108-0x0000000000EB0000-0x0000000000EB1000-memory.dmp
        Filesize

        4KB

      • memory/1984-106-0x0000000001250000-0x0000000001251000-memory.dmp
        Filesize

        4KB

      • memory/1984-100-0x0000000000000000-mapping.dmp
      • memory/1988-63-0x0000000000020000-0x0000000000029000-memory.dmp
        Filesize

        36KB