Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-09-2021 12:59
Static task
static1
General
-
Target
b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe
-
Size
145KB
-
MD5
51fb8179a5f88bc327d1c66581f73129
-
SHA1
033aa3edf2b8f09907290a301ec0b76af202dcfa
-
SHA256
b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a
-
SHA512
60b83fdf20f31d64672523001c408838509ba86a006a25cf03285192a25744748bf13f4a93b65ef688018cd2c2aad06680395f293bc04268164e46e90048d208
Malware Config
Extracted
smokeloader
2020
http://naghenrietti1.top/
http://kimballiett2.top/
http://xadriettany3.top/
http://jebeccallis4.top/
http://nityanneron5.top/
http://umayaniela6.top/
http://lynettaram7.top/
http://sadineyalas8.top/
http://geenaldencia9.top/
http://aradysiusep10.top/
Extracted
redline
135.181.142.223:30397
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/492-153-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/492-154-0x000000000041C5CE-mapping.dmp family_redline behavioral1/memory/492-163-0x0000000005770000-0x0000000005D76000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
EC69.exeEFF5.exeF70A.exeEC69.exeevgjebjEFF5.exeevgjebjEFF5.exepid process 3536 EC69.exe 3420 EFF5.exe 4360 F70A.exe 4556 EC69.exe 4516 evgjebj 4372 EFF5.exe 728 evgjebj 492 EFF5.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
F70A.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F70A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F70A.exe -
Deletes itself 1 IoCs
Processes:
pid process 3048 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\F70A.exe themida C:\Users\Admin\AppData\Local\Temp\F70A.exe themida behavioral1/memory/4360-138-0x0000000000940000-0x0000000000941000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
F70A.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F70A.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
F70A.exepid process 4360 F70A.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exeEC69.exeevgjebjEFF5.exedescription pid process target process PID 3704 set thread context of 4164 3704 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe PID 3536 set thread context of 4556 3536 EC69.exe EC69.exe PID 4516 set thread context of 728 4516 evgjebj evgjebj PID 3420 set thread context of 492 3420 EFF5.exe EFF5.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exeEC69.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EC69.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EC69.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EC69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exepid process 4164 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe 4164 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3048 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exeEC69.exepid process 4164 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe 4556 EC69.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
F70A.exeEFF5.exedescription pid process Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 4360 F70A.exe Token: SeDebugPrivilege 492 EFF5.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exeEFF5.exeEC69.exeevgjebjdescription pid process target process PID 3704 wrote to memory of 4164 3704 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe PID 3704 wrote to memory of 4164 3704 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe PID 3704 wrote to memory of 4164 3704 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe PID 3704 wrote to memory of 4164 3704 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe PID 3704 wrote to memory of 4164 3704 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe PID 3704 wrote to memory of 4164 3704 b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe PID 3048 wrote to memory of 3536 3048 EC69.exe PID 3048 wrote to memory of 3536 3048 EC69.exe PID 3048 wrote to memory of 3536 3048 EC69.exe PID 3048 wrote to memory of 3420 3048 EFF5.exe PID 3048 wrote to memory of 3420 3048 EFF5.exe PID 3048 wrote to memory of 3420 3048 EFF5.exe PID 3420 wrote to memory of 4372 3420 EFF5.exe EFF5.exe PID 3420 wrote to memory of 4372 3420 EFF5.exe EFF5.exe PID 3420 wrote to memory of 4372 3420 EFF5.exe EFF5.exe PID 3048 wrote to memory of 4360 3048 F70A.exe PID 3048 wrote to memory of 4360 3048 F70A.exe PID 3048 wrote to memory of 4360 3048 F70A.exe PID 3536 wrote to memory of 4556 3536 EC69.exe EC69.exe PID 3536 wrote to memory of 4556 3536 EC69.exe EC69.exe PID 3536 wrote to memory of 4556 3536 EC69.exe EC69.exe PID 3536 wrote to memory of 4556 3536 EC69.exe EC69.exe PID 3536 wrote to memory of 4556 3536 EC69.exe EC69.exe PID 3536 wrote to memory of 4556 3536 EC69.exe EC69.exe PID 3420 wrote to memory of 492 3420 EFF5.exe EFF5.exe PID 3420 wrote to memory of 492 3420 EFF5.exe EFF5.exe PID 3420 wrote to memory of 492 3420 EFF5.exe EFF5.exe PID 4516 wrote to memory of 728 4516 evgjebj evgjebj PID 4516 wrote to memory of 728 4516 evgjebj evgjebj PID 4516 wrote to memory of 728 4516 evgjebj evgjebj PID 4516 wrote to memory of 728 4516 evgjebj evgjebj PID 4516 wrote to memory of 728 4516 evgjebj evgjebj PID 4516 wrote to memory of 728 4516 evgjebj evgjebj PID 3420 wrote to memory of 492 3420 EFF5.exe EFF5.exe PID 3420 wrote to memory of 492 3420 EFF5.exe EFF5.exe PID 3420 wrote to memory of 492 3420 EFF5.exe EFF5.exe PID 3420 wrote to memory of 492 3420 EFF5.exe EFF5.exe PID 3420 wrote to memory of 492 3420 EFF5.exe EFF5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe"C:\Users\Admin\AppData\Local\Temp\b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe"C:\Users\Admin\AppData\Local\Temp\b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EC69.exeC:\Users\Admin\AppData\Local\Temp\EC69.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\EC69.exeC:\Users\Admin\AppData\Local\Temp\EC69.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EFF5.exeC:\Users\Admin\AppData\Local\Temp\EFF5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\EFF5.exeC:\Users\Admin\AppData\Local\Temp\EFF5.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\EFF5.exeC:\Users\Admin\AppData\Local\Temp\EFF5.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\F70A.exeC:\Users\Admin\AppData\Local\Temp\F70A.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\evgjebjC:\Users\Admin\AppData\Roaming\evgjebj1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\evgjebjC:\Users\Admin\AppData\Roaming\evgjebj2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EFF5.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\EC69.exeMD5
51fb8179a5f88bc327d1c66581f73129
SHA1033aa3edf2b8f09907290a301ec0b76af202dcfa
SHA256b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a
SHA51260b83fdf20f31d64672523001c408838509ba86a006a25cf03285192a25744748bf13f4a93b65ef688018cd2c2aad06680395f293bc04268164e46e90048d208
-
C:\Users\Admin\AppData\Local\Temp\EC69.exeMD5
51fb8179a5f88bc327d1c66581f73129
SHA1033aa3edf2b8f09907290a301ec0b76af202dcfa
SHA256b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a
SHA51260b83fdf20f31d64672523001c408838509ba86a006a25cf03285192a25744748bf13f4a93b65ef688018cd2c2aad06680395f293bc04268164e46e90048d208
-
C:\Users\Admin\AppData\Local\Temp\EC69.exeMD5
51fb8179a5f88bc327d1c66581f73129
SHA1033aa3edf2b8f09907290a301ec0b76af202dcfa
SHA256b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a
SHA51260b83fdf20f31d64672523001c408838509ba86a006a25cf03285192a25744748bf13f4a93b65ef688018cd2c2aad06680395f293bc04268164e46e90048d208
-
C:\Users\Admin\AppData\Local\Temp\EFF5.exeMD5
8df6ef1e48d3a33226c91bf4a93b0c8a
SHA1e70ed102babe577b9481be056cb8cc0564bdc669
SHA2565c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd
SHA512d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0
-
C:\Users\Admin\AppData\Local\Temp\EFF5.exeMD5
8df6ef1e48d3a33226c91bf4a93b0c8a
SHA1e70ed102babe577b9481be056cb8cc0564bdc669
SHA2565c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd
SHA512d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0
-
C:\Users\Admin\AppData\Local\Temp\EFF5.exeMD5
8df6ef1e48d3a33226c91bf4a93b0c8a
SHA1e70ed102babe577b9481be056cb8cc0564bdc669
SHA2565c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd
SHA512d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0
-
C:\Users\Admin\AppData\Local\Temp\EFF5.exeMD5
8df6ef1e48d3a33226c91bf4a93b0c8a
SHA1e70ed102babe577b9481be056cb8cc0564bdc669
SHA2565c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd
SHA512d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0
-
C:\Users\Admin\AppData\Local\Temp\F70A.exeMD5
f853fe6b26dcf67545675aec618f3a99
SHA1a70f5ffd6dac789909ccb19dfb31272a520c7bc0
SHA256091ba447af0f0cabd66484b3f81e909ca01be4e27db9ccf42779174e04dad57a
SHA5124764e88d5bdcf88447e0782c88fec18f5a1083b460829e16635a8602173f1a6813d3ff93866bef587f9f9b682451d4386bd765b2da580c69f7483b48f074bbd3
-
C:\Users\Admin\AppData\Local\Temp\F70A.exeMD5
f853fe6b26dcf67545675aec618f3a99
SHA1a70f5ffd6dac789909ccb19dfb31272a520c7bc0
SHA256091ba447af0f0cabd66484b3f81e909ca01be4e27db9ccf42779174e04dad57a
SHA5124764e88d5bdcf88447e0782c88fec18f5a1083b460829e16635a8602173f1a6813d3ff93866bef587f9f9b682451d4386bd765b2da580c69f7483b48f074bbd3
-
C:\Users\Admin\AppData\Roaming\evgjebjMD5
51fb8179a5f88bc327d1c66581f73129
SHA1033aa3edf2b8f09907290a301ec0b76af202dcfa
SHA256b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a
SHA51260b83fdf20f31d64672523001c408838509ba86a006a25cf03285192a25744748bf13f4a93b65ef688018cd2c2aad06680395f293bc04268164e46e90048d208
-
C:\Users\Admin\AppData\Roaming\evgjebjMD5
51fb8179a5f88bc327d1c66581f73129
SHA1033aa3edf2b8f09907290a301ec0b76af202dcfa
SHA256b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a
SHA51260b83fdf20f31d64672523001c408838509ba86a006a25cf03285192a25744748bf13f4a93b65ef688018cd2c2aad06680395f293bc04268164e46e90048d208
-
C:\Users\Admin\AppData\Roaming\evgjebjMD5
51fb8179a5f88bc327d1c66581f73129
SHA1033aa3edf2b8f09907290a301ec0b76af202dcfa
SHA256b9a2feaa7b4989fa3b6a59d1fed7983d9fba99c54e6d30704f9cdc3826a3b20a
SHA51260b83fdf20f31d64672523001c408838509ba86a006a25cf03285192a25744748bf13f4a93b65ef688018cd2c2aad06680395f293bc04268164e46e90048d208
-
memory/492-153-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/492-154-0x000000000041C5CE-mapping.dmp
-
memory/492-163-0x0000000005770000-0x0000000005D76000-memory.dmpFilesize
6.0MB
-
memory/728-151-0x0000000000402FA5-mapping.dmp
-
memory/3048-118-0x0000000000430000-0x0000000000446000-memory.dmpFilesize
88KB
-
memory/3048-162-0x00000000004B0000-0x00000000004C6000-memory.dmpFilesize
88KB
-
memory/3420-127-0x0000000004920000-0x0000000004921000-memory.dmpFilesize
4KB
-
memory/3420-130-0x0000000002420000-0x0000000002421000-memory.dmpFilesize
4KB
-
memory/3420-122-0x0000000000000000-mapping.dmp
-
memory/3420-125-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/3420-128-0x00000000023E0000-0x00000000023E1000-memory.dmpFilesize
4KB
-
memory/3420-129-0x0000000004EC0000-0x0000000004EC1000-memory.dmpFilesize
4KB
-
memory/3536-119-0x0000000000000000-mapping.dmp
-
memory/3704-117-0x00000000021C0000-0x00000000021C9000-memory.dmpFilesize
36KB
-
memory/4164-115-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4164-116-0x0000000000402FA5-mapping.dmp
-
memory/4360-141-0x0000000005B70000-0x0000000005B71000-memory.dmpFilesize
4KB
-
memory/4360-140-0x0000000006210000-0x0000000006211000-memory.dmpFilesize
4KB
-
memory/4360-145-0x0000000005BF0000-0x0000000005BF1000-memory.dmpFilesize
4KB
-
memory/4360-144-0x00000000772D0000-0x000000007745E000-memory.dmpFilesize
1.6MB
-
memory/4360-131-0x0000000000000000-mapping.dmp
-
memory/4360-143-0x0000000005C00000-0x0000000005C01000-memory.dmpFilesize
4KB
-
memory/4360-146-0x0000000005C40000-0x0000000005C41000-memory.dmpFilesize
4KB
-
memory/4360-173-0x0000000008510000-0x0000000008511000-memory.dmpFilesize
4KB
-
memory/4360-142-0x0000000005D10000-0x0000000005D11000-memory.dmpFilesize
4KB
-
memory/4360-138-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/4360-166-0x00000000075E0000-0x00000000075E1000-memory.dmpFilesize
4KB
-
memory/4360-167-0x0000000007CE0000-0x0000000007CE1000-memory.dmpFilesize
4KB
-
memory/4360-168-0x0000000007560000-0x0000000007561000-memory.dmpFilesize
4KB
-
memory/4360-171-0x0000000007AE0000-0x0000000007AE1000-memory.dmpFilesize
4KB
-
memory/4556-135-0x0000000000402FA5-mapping.dmp