Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    29-10-2021 18:23

General

  • Target

    3b947ed5aabdd775b1afc31a5c4d39a0.exe

  • Size

    336KB

  • MD5

    3b947ed5aabdd775b1afc31a5c4d39a0

  • SHA1

    552aa072522f22a003cadd3bcad5e4eb981a5cbb

  • SHA256

    8245ad87eea6a1f19f658adef8a30b9a512760d866b7075bbf205d7a54296234

  • SHA512

    ae62f33e3b0dae89bbd33481b50e6ba53f31ad8699d1570c8b03d73c2045e870cba25a06cc3dcea07d784ca688f63c2c335bd262b0722b4461d29ab54357c226

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xacokuo8.top/

http://hajezey1.top/

http://nusurtal4f.net/

http://netomishnetojuk.net/

http://escalivrouter.net/

http://nick22doom4.net/

http://wrioshtivsio.su/

http://nusotiso4.su/

http://rickkhtovkka.biz/

http://palisotoliso.net/

http://193.56.146.214/

https://193.56.146.214/

rc4.i32
rc4.i32
rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

vidar

Version

41.6

Botnet

754

C2

https://mas.to/@lilocc

Attributes
  • profile_id

    754

Extracted

Family

redline

Botnet

999888988

C2

93.115.20.139:28978

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b947ed5aabdd775b1afc31a5c4d39a0.exe
    "C:\Users\Admin\AppData\Local\Temp\3b947ed5aabdd775b1afc31a5c4d39a0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\3b947ed5aabdd775b1afc31a5c4d39a0.exe
      "C:\Users\Admin\AppData\Local\Temp\3b947ed5aabdd775b1afc31a5c4d39a0.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1044
  • C:\Users\Admin\AppData\Local\Temp\A3AF.exe
    C:\Users\Admin\AppData\Local\Temp\A3AF.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Users\Admin\AppData\Local\Temp\A3AF.exe
      C:\Users\Admin\AppData\Local\Temp\A3AF.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1572
  • C:\Users\Admin\AppData\Local\Temp\ADAE.exe
    C:\Users\Admin\AppData\Local\Temp\ADAE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1780
  • C:\Users\Admin\AppData\Local\Temp\AFC1.exe
    C:\Users\Admin\AppData\Local\Temp\AFC1.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:796
  • C:\Users\Admin\AppData\Local\Temp\B445.exe
    C:\Users\Admin\AppData\Local\Temp\B445.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im B445.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B445.exe" & del C:\ProgramData\*.dll & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im B445.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1540
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 6
        3⤵
        • Delays execution with timeout.exe
        PID:324
  • C:\Users\Admin\AppData\Local\Temp\BC41.exe
    C:\Users\Admin\AppData\Local\Temp\BC41.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\BC41.exe
      "BC41.exe"
      2⤵
        PID:1440
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 564
        2⤵
        • Loads dropped DLL
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1700
    • C:\Users\Admin\AppData\Local\Temp\C650.exe
      C:\Users\Admin\AppData\Local\Temp\C650.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:984
    • C:\Users\Admin\AppData\Local\Temp\CD73.exe
      C:\Users\Admin\AppData\Local\Temp\CD73.exe
      1⤵
      • Executes dropped EXE
      PID:1740

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    3
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\A3AF.exe
      MD5

      3b947ed5aabdd775b1afc31a5c4d39a0

      SHA1

      552aa072522f22a003cadd3bcad5e4eb981a5cbb

      SHA256

      8245ad87eea6a1f19f658adef8a30b9a512760d866b7075bbf205d7a54296234

      SHA512

      ae62f33e3b0dae89bbd33481b50e6ba53f31ad8699d1570c8b03d73c2045e870cba25a06cc3dcea07d784ca688f63c2c335bd262b0722b4461d29ab54357c226

    • C:\Users\Admin\AppData\Local\Temp\A3AF.exe
      MD5

      3b947ed5aabdd775b1afc31a5c4d39a0

      SHA1

      552aa072522f22a003cadd3bcad5e4eb981a5cbb

      SHA256

      8245ad87eea6a1f19f658adef8a30b9a512760d866b7075bbf205d7a54296234

      SHA512

      ae62f33e3b0dae89bbd33481b50e6ba53f31ad8699d1570c8b03d73c2045e870cba25a06cc3dcea07d784ca688f63c2c335bd262b0722b4461d29ab54357c226

    • C:\Users\Admin\AppData\Local\Temp\A3AF.exe
      MD5

      3b947ed5aabdd775b1afc31a5c4d39a0

      SHA1

      552aa072522f22a003cadd3bcad5e4eb981a5cbb

      SHA256

      8245ad87eea6a1f19f658adef8a30b9a512760d866b7075bbf205d7a54296234

      SHA512

      ae62f33e3b0dae89bbd33481b50e6ba53f31ad8699d1570c8b03d73c2045e870cba25a06cc3dcea07d784ca688f63c2c335bd262b0722b4461d29ab54357c226

    • C:\Users\Admin\AppData\Local\Temp\ADAE.exe
      MD5

      42758e2569239a774becdb12698b124c

      SHA1

      4ab353c4177a69fc9a6f3844852762809591dd2f

      SHA256

      e3380dfdd6297ac134bb22c7c1603782f198a5b2164855bf66a95bae47ab472d

      SHA512

      959a6d4e39bc949f8c92c4213a7dd424eff46aaccbce6553d42863f4341b934ceb14997f67fdc2013d064a09c6134b9a113438347b7dedf65e3a7e2ada5def18

    • C:\Users\Admin\AppData\Local\Temp\ADAE.exe
      MD5

      42758e2569239a774becdb12698b124c

      SHA1

      4ab353c4177a69fc9a6f3844852762809591dd2f

      SHA256

      e3380dfdd6297ac134bb22c7c1603782f198a5b2164855bf66a95bae47ab472d

      SHA512

      959a6d4e39bc949f8c92c4213a7dd424eff46aaccbce6553d42863f4341b934ceb14997f67fdc2013d064a09c6134b9a113438347b7dedf65e3a7e2ada5def18

    • C:\Users\Admin\AppData\Local\Temp\AFC1.exe
      MD5

      73252acb344040ddc5d9ce78a5d3a4c2

      SHA1

      3a16c3698ccf7940adfb2b2a9cc8c20b1ba1d015

      SHA256

      b8ac77c37de98099dcdc5924418d445f4b11ecf326edd41a2d49ed6efd2a07eb

      SHA512

      1541e3d7bd163a4c348c6e5c7098c6f3add62b1121296ca28934a69ad308c2e51ca6b841359010da96e71fa42fd6e09f7591448433dc3b01104007808427c3de

    • C:\Users\Admin\AppData\Local\Temp\B445.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • C:\Users\Admin\AppData\Local\Temp\BC41.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • C:\Users\Admin\AppData\Local\Temp\BC41.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • C:\Users\Admin\AppData\Local\Temp\C650.exe
      MD5

      31be6099d31bdbf1ed339effdc1c7064

      SHA1

      6b1077be6cf57ea98c3be8b6f0268d025ea72d88

      SHA256

      9d9056d76be4beb3cc17cd95c47108ab42d73255f2bc031423d044ed927fb885

      SHA512

      ecc057643c2e65c74f3286c8856eb57fec75fcb650fbe864d53ec0c36c34e0da3242e19657b1abb75aa3eee88a7367e77ffc0e3fe98bfef0d180c74966d1cede

    • C:\Users\Admin\AppData\Local\Temp\CD73.exe
      MD5

      0efd1c9d005446aef5fee4eb512f5887

      SHA1

      4c816aabaf80d2abb5cf3587f1c8ed77ad008569

      SHA256

      7eb03078f08f097b0eebc611ac1b3f6f443fac5abdfb8879175193aedf24d37b

      SHA512

      f36137716b7f9b3aeac6645606849cf4bf655561cd9968e45ab798179dd18407c8d51eaf134befb0dc10103e7ee24b251f1bda5737eb776ec352c9d5a375e427

    • \ProgramData\mozglue.dll
      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • \ProgramData\msvcp140.dll
      MD5

      109f0f02fd37c84bfc7508d4227d7ed5

      SHA1

      ef7420141bb15ac334d3964082361a460bfdb975

      SHA256

      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

      SHA512

      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

    • \ProgramData\nss3.dll
      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • \ProgramData\vcruntime140.dll
      MD5

      7587bf9cb4147022cd5681b015183046

      SHA1

      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

      SHA256

      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

      SHA512

      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

    • \Users\Admin\AppData\Local\Temp\1105.tmp
      MD5

      d124f55b9393c976963407dff51ffa79

      SHA1

      2c7bbedd79791bfb866898c85b504186db610b5d

      SHA256

      ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

      SHA512

      278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

    • \Users\Admin\AppData\Local\Temp\A3AF.exe
      MD5

      3b947ed5aabdd775b1afc31a5c4d39a0

      SHA1

      552aa072522f22a003cadd3bcad5e4eb981a5cbb

      SHA256

      8245ad87eea6a1f19f658adef8a30b9a512760d866b7075bbf205d7a54296234

      SHA512

      ae62f33e3b0dae89bbd33481b50e6ba53f31ad8699d1570c8b03d73c2045e870cba25a06cc3dcea07d784ca688f63c2c335bd262b0722b4461d29ab54357c226

    • \Users\Admin\AppData\Local\Temp\BC41.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\BC41.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\BC41.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\BC41.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\BC41.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\BC41.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • memory/324-128-0x0000000000000000-mapping.dmp
    • memory/796-89-0x0000000000400000-0x0000000002EFA000-memory.dmp
      Filesize

      43.0MB

    • memory/796-66-0x0000000000000000-mapping.dmp
    • memory/796-87-0x0000000000220000-0x0000000000228000-memory.dmp
      Filesize

      32KB

    • memory/796-88-0x0000000000230000-0x0000000000239000-memory.dmp
      Filesize

      36KB

    • memory/984-106-0x0000000000400000-0x0000000002B4D000-memory.dmp
      Filesize

      39.3MB

    • memory/984-103-0x00000000002B0000-0x00000000002B9000-memory.dmp
      Filesize

      36KB

    • memory/984-101-0x0000000002BED000-0x0000000002BFE000-memory.dmp
      Filesize

      68KB

    • memory/984-96-0x0000000000000000-mapping.dmp
    • memory/1044-56-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB

    • memory/1044-58-0x0000000075B71000-0x0000000075B73000-memory.dmp
      Filesize

      8KB

    • memory/1044-57-0x0000000000402E0C-mapping.dmp
    • memory/1252-93-0x0000000004700000-0x000000000477C000-memory.dmp
      Filesize

      496KB

    • memory/1252-95-0x0000000004860000-0x0000000004936000-memory.dmp
      Filesize

      856KB

    • memory/1252-94-0x0000000000400000-0x0000000002F6F000-memory.dmp
      Filesize

      43.4MB

    • memory/1252-77-0x0000000000000000-mapping.dmp
    • memory/1264-60-0x0000000002930000-0x0000000002946000-memory.dmp
      Filesize

      88KB

    • memory/1264-98-0x0000000003930000-0x0000000003946000-memory.dmp
      Filesize

      88KB

    • memory/1264-102-0x0000000003B20000-0x0000000003B36000-memory.dmp
      Filesize

      88KB

    • memory/1264-121-0x0000000003DA0000-0x0000000003DB6000-memory.dmp
      Filesize

      88KB

    • memory/1308-85-0x00000000012A0000-0x00000000012A1000-memory.dmp
      Filesize

      4KB

    • memory/1308-81-0x0000000000000000-mapping.dmp
    • memory/1344-68-0x0000000002BDD000-0x0000000002BED000-memory.dmp
      Filesize

      64KB

    • memory/1344-61-0x0000000000000000-mapping.dmp
    • memory/1540-127-0x0000000000000000-mapping.dmp
    • memory/1572-72-0x0000000000402E0C-mapping.dmp
    • memory/1684-59-0x0000000000220000-0x0000000000229000-memory.dmp
      Filesize

      36KB

    • memory/1684-55-0x0000000002CCD000-0x0000000002CDD000-memory.dmp
      Filesize

      64KB

    • memory/1700-112-0x0000000000000000-mapping.dmp
    • memory/1700-120-0x0000000000460000-0x0000000000461000-memory.dmp
      Filesize

      4KB

    • memory/1720-126-0x0000000000000000-mapping.dmp
    • memory/1740-113-0x0000000000280000-0x000000000030E000-memory.dmp
      Filesize

      568KB

    • memory/1740-109-0x0000000002D4D000-0x0000000002D9C000-memory.dmp
      Filesize

      316KB

    • memory/1740-119-0x0000000000400000-0x0000000002B8B000-memory.dmp
      Filesize

      39.5MB

    • memory/1740-99-0x0000000000000000-mapping.dmp
    • memory/1780-107-0x0000000000510000-0x000000000052A000-memory.dmp
      Filesize

      104KB

    • memory/1780-63-0x0000000000000000-mapping.dmp
    • memory/1780-105-0x00000000004F0000-0x000000000050F000-memory.dmp
      Filesize

      124KB

    • memory/1780-75-0x0000000000BA0000-0x0000000000BA1000-memory.dmp
      Filesize

      4KB

    • memory/1780-92-0x0000000000380000-0x0000000000383000-memory.dmp
      Filesize

      12KB

    • memory/1780-90-0x0000000004300000-0x0000000004301000-memory.dmp
      Filesize

      4KB