Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
21-11-2021 15:54
Static task
static1
Behavioral task
behavioral1
Sample
f071a9a50163c04aa45daae82b852f72.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
f071a9a50163c04aa45daae82b852f72.exe
Resource
win10-en-20211104
General
-
Target
f071a9a50163c04aa45daae82b852f72.exe
-
Size
338KB
-
MD5
f071a9a50163c04aa45daae82b852f72
-
SHA1
0aefaad339329762ac863043993a52f2aa10b60b
-
SHA256
09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d
-
SHA512
00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8
Malware Config
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
tofsee
quadoil.ru
lakeflex.ru
Extracted
redline
185.159.80.90:38637
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1200-97-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1200-98-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1200-99-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1200-100-0x0000000000418EE6-mapping.dmp family_redline behavioral1/memory/1200-102-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
BF3A.exeCE48.exeBF3A.exeDC6C.exeDC6C.exefcubrjvDC6C.exefcubrjvpid process 1056 BF3A.exe 1076 CE48.exe 1636 BF3A.exe 1528 DC6C.exe 884 DC6C.exe 1912 fcubrjv 1200 DC6C.exe 960 fcubrjv -
Deletes itself 1 IoCs
Processes:
pid process 1272 -
Loads dropped DLL 3 IoCs
Processes:
BF3A.exeDC6C.exepid process 1056 BF3A.exe 1528 DC6C.exe 1528 DC6C.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
f071a9a50163c04aa45daae82b852f72.exeBF3A.exeDC6C.exedescription pid process target process PID 804 set thread context of 472 804 f071a9a50163c04aa45daae82b852f72.exe f071a9a50163c04aa45daae82b852f72.exe PID 1056 set thread context of 1636 1056 BF3A.exe BF3A.exe PID 1528 set thread context of 1200 1528 DC6C.exe DC6C.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fcubrjvf071a9a50163c04aa45daae82b852f72.exeBF3A.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcubrjv Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f071a9a50163c04aa45daae82b852f72.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f071a9a50163c04aa45daae82b852f72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BF3A.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BF3A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcubrjv Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fcubrjv Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f071a9a50163c04aa45daae82b852f72.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BF3A.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f071a9a50163c04aa45daae82b852f72.exepid process 472 f071a9a50163c04aa45daae82b852f72.exe 472 f071a9a50163c04aa45daae82b852f72.exe 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1272 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
f071a9a50163c04aa45daae82b852f72.exeBF3A.exefcubrjvpid process 472 f071a9a50163c04aa45daae82b852f72.exe 1636 BF3A.exe 960 fcubrjv -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1272 Token: SeShutdownPrivilege 1272 Token: SeShutdownPrivilege 1272 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1272 1272 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1272 1272 -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
f071a9a50163c04aa45daae82b852f72.exeBF3A.exeCE48.exeDC6C.exetaskeng.exedescription pid process target process PID 804 wrote to memory of 472 804 f071a9a50163c04aa45daae82b852f72.exe f071a9a50163c04aa45daae82b852f72.exe PID 804 wrote to memory of 472 804 f071a9a50163c04aa45daae82b852f72.exe f071a9a50163c04aa45daae82b852f72.exe PID 804 wrote to memory of 472 804 f071a9a50163c04aa45daae82b852f72.exe f071a9a50163c04aa45daae82b852f72.exe PID 804 wrote to memory of 472 804 f071a9a50163c04aa45daae82b852f72.exe f071a9a50163c04aa45daae82b852f72.exe PID 804 wrote to memory of 472 804 f071a9a50163c04aa45daae82b852f72.exe f071a9a50163c04aa45daae82b852f72.exe PID 804 wrote to memory of 472 804 f071a9a50163c04aa45daae82b852f72.exe f071a9a50163c04aa45daae82b852f72.exe PID 804 wrote to memory of 472 804 f071a9a50163c04aa45daae82b852f72.exe f071a9a50163c04aa45daae82b852f72.exe PID 1272 wrote to memory of 1056 1272 BF3A.exe PID 1272 wrote to memory of 1056 1272 BF3A.exe PID 1272 wrote to memory of 1056 1272 BF3A.exe PID 1272 wrote to memory of 1056 1272 BF3A.exe PID 1272 wrote to memory of 1076 1272 CE48.exe PID 1272 wrote to memory of 1076 1272 CE48.exe PID 1272 wrote to memory of 1076 1272 CE48.exe PID 1272 wrote to memory of 1076 1272 CE48.exe PID 1056 wrote to memory of 1636 1056 BF3A.exe BF3A.exe PID 1056 wrote to memory of 1636 1056 BF3A.exe BF3A.exe PID 1056 wrote to memory of 1636 1056 BF3A.exe BF3A.exe PID 1056 wrote to memory of 1636 1056 BF3A.exe BF3A.exe PID 1056 wrote to memory of 1636 1056 BF3A.exe BF3A.exe PID 1056 wrote to memory of 1636 1056 BF3A.exe BF3A.exe PID 1056 wrote to memory of 1636 1056 BF3A.exe BF3A.exe PID 1272 wrote to memory of 1528 1272 DC6C.exe PID 1272 wrote to memory of 1528 1272 DC6C.exe PID 1272 wrote to memory of 1528 1272 DC6C.exe PID 1272 wrote to memory of 1528 1272 DC6C.exe PID 1076 wrote to memory of 1704 1076 CE48.exe cmd.exe PID 1076 wrote to memory of 1704 1076 CE48.exe cmd.exe PID 1076 wrote to memory of 1704 1076 CE48.exe cmd.exe PID 1076 wrote to memory of 1704 1076 CE48.exe cmd.exe PID 1076 wrote to memory of 364 1076 CE48.exe cmd.exe PID 1076 wrote to memory of 364 1076 CE48.exe cmd.exe PID 1076 wrote to memory of 364 1076 CE48.exe cmd.exe PID 1076 wrote to memory of 364 1076 CE48.exe cmd.exe PID 1076 wrote to memory of 1944 1076 CE48.exe sc.exe PID 1076 wrote to memory of 1944 1076 CE48.exe sc.exe PID 1076 wrote to memory of 1944 1076 CE48.exe sc.exe PID 1076 wrote to memory of 1944 1076 CE48.exe sc.exe PID 1528 wrote to memory of 884 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 884 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 884 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 884 1528 DC6C.exe DC6C.exe PID 1076 wrote to memory of 1960 1076 CE48.exe sc.exe PID 1076 wrote to memory of 1960 1076 CE48.exe sc.exe PID 1076 wrote to memory of 1960 1076 CE48.exe sc.exe PID 1076 wrote to memory of 1960 1076 CE48.exe sc.exe PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe PID 944 wrote to memory of 1912 944 taskeng.exe fcubrjv PID 944 wrote to memory of 1912 944 taskeng.exe fcubrjv PID 944 wrote to memory of 1912 944 taskeng.exe fcubrjv PID 944 wrote to memory of 1912 944 taskeng.exe fcubrjv PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe PID 1528 wrote to memory of 1200 1528 DC6C.exe DC6C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe"C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe"C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\BF3A.exeC:\Users\Admin\AppData\Local\Temp\BF3A.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BF3A.exeC:\Users\Admin\AppData\Local\Temp\BF3A.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\CE48.exeC:\Users\Admin\AppData\Local\Temp\CE48.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ckuybxct\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\inxnbg.exe" C:\Windows\SysWOW64\ckuybxct\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ckuybxct binPath= "C:\Windows\SysWOW64\ckuybxct\inxnbg.exe /d\"C:\Users\Admin\AppData\Local\Temp\CE48.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ckuybxct "wifi internet conection"2⤵
-
C:\Users\Admin\AppData\Local\Temp\DC6C.exeC:\Users\Admin\AppData\Local\Temp\DC6C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DC6C.exeC:\Users\Admin\AppData\Local\Temp\DC6C.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DC6C.exeC:\Users\Admin\AppData\Local\Temp\DC6C.exe2⤵
- Executes dropped EXE
-
C:\Windows\system32\taskeng.exetaskeng.exe {AC825901-CBA2-4FAC-B408-31477A0C2B2C} S-1-5-21-2955169046-2371869340-1800780948-1000:UKNHJUQT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\fcubrjvC:\Users\Admin\AppData\Roaming\fcubrjv2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\fcubrjvC:\Users\Admin\AppData\Roaming\fcubrjv3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\BF3A.exeMD5
b595f73148a774b00160998be099258b
SHA113182fcebcf31316b1d2021663aa0b2ccc3a2c82
SHA2561044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4
SHA5128b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4
-
C:\Users\Admin\AppData\Local\Temp\BF3A.exeMD5
b595f73148a774b00160998be099258b
SHA113182fcebcf31316b1d2021663aa0b2ccc3a2c82
SHA2561044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4
SHA5128b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4
-
C:\Users\Admin\AppData\Local\Temp\BF3A.exeMD5
b595f73148a774b00160998be099258b
SHA113182fcebcf31316b1d2021663aa0b2ccc3a2c82
SHA2561044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4
SHA5128b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4
-
C:\Users\Admin\AppData\Local\Temp\CE48.exeMD5
64765141b86d4bce1470e9b8b9de492d
SHA18497035ee193ff0351f8ca6a5b924bf6db8f706d
SHA256e1e65f9c773cc00d08dda0f9971fbb971c033d32382bdd1a59194adcde2c3e7e
SHA512f8404a22092a659585eafa2f5504e630abe0302713e3ad13848f4809d92c39f284d85eb4db6c9cf9dc660ebe22b397e97b116cc196d698ab2ccdf1836b48507a
-
C:\Users\Admin\AppData\Local\Temp\CE48.exeMD5
64765141b86d4bce1470e9b8b9de492d
SHA18497035ee193ff0351f8ca6a5b924bf6db8f706d
SHA256e1e65f9c773cc00d08dda0f9971fbb971c033d32382bdd1a59194adcde2c3e7e
SHA512f8404a22092a659585eafa2f5504e630abe0302713e3ad13848f4809d92c39f284d85eb4db6c9cf9dc660ebe22b397e97b116cc196d698ab2ccdf1836b48507a
-
C:\Users\Admin\AppData\Local\Temp\DC6C.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
C:\Users\Admin\AppData\Local\Temp\DC6C.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
C:\Users\Admin\AppData\Local\Temp\DC6C.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
C:\Users\Admin\AppData\Local\Temp\DC6C.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
C:\Users\Admin\AppData\Local\Temp\inxnbg.exeMD5
906cd68dac748cfdf0b2ee426572898f
SHA186913c6390ae3826d708c8dbd82658369ae2b281
SHA256a4774d262ae145887ad7700aee8cd454ee306c120c99a12fdd7e4a8e78a743c1
SHA51276299dcf3fb4f7494acb5d3c230939c46c748c4a41419ef6f8174afc02c745a3a3769d980868975e7d08f463886a67b5b4a6912d81b492e95d486d6f8f836bd3
-
C:\Users\Admin\AppData\Roaming\fcubrjvMD5
f071a9a50163c04aa45daae82b852f72
SHA10aefaad339329762ac863043993a52f2aa10b60b
SHA25609cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d
SHA51200047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8
-
C:\Users\Admin\AppData\Roaming\fcubrjvMD5
f071a9a50163c04aa45daae82b852f72
SHA10aefaad339329762ac863043993a52f2aa10b60b
SHA25609cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d
SHA51200047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8
-
C:\Users\Admin\AppData\Roaming\fcubrjvMD5
f071a9a50163c04aa45daae82b852f72
SHA10aefaad339329762ac863043993a52f2aa10b60b
SHA25609cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d
SHA51200047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8
-
\Users\Admin\AppData\Local\Temp\BF3A.exeMD5
b595f73148a774b00160998be099258b
SHA113182fcebcf31316b1d2021663aa0b2ccc3a2c82
SHA2561044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4
SHA5128b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4
-
\Users\Admin\AppData\Local\Temp\DC6C.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
\Users\Admin\AppData\Local\Temp\DC6C.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
memory/364-83-0x0000000000000000-mapping.dmp
-
memory/472-58-0x0000000075C21000-0x0000000075C23000-memory.dmpFilesize
8KB
-
memory/472-57-0x0000000000402DD8-mapping.dmp
-
memory/472-56-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/804-59-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB
-
memory/804-55-0x0000000002BE8000-0x0000000002BF9000-memory.dmpFilesize
68KB
-
memory/1056-65-0x0000000002C88000-0x0000000002C99000-memory.dmpFilesize
68KB
-
memory/1056-61-0x0000000000000000-mapping.dmp
-
memory/1076-81-0x0000000000400000-0x0000000002B4E000-memory.dmpFilesize
39.3MB
-
memory/1076-80-0x0000000000020000-0x0000000000033000-memory.dmpFilesize
76KB
-
memory/1076-63-0x0000000000000000-mapping.dmp
-
memory/1076-75-0x0000000002FA8000-0x0000000002FB9000-memory.dmpFilesize
68KB
-
memory/1200-104-0x00000000020F0000-0x00000000020F1000-memory.dmpFilesize
4KB
-
memory/1200-97-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1200-100-0x0000000000418EE6-mapping.dmp
-
memory/1200-99-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1200-98-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1200-96-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1200-95-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1200-102-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1272-107-0x0000000004210000-0x0000000004226000-memory.dmpFilesize
88KB
-
memory/1272-86-0x0000000003FF0000-0x0000000004006000-memory.dmpFilesize
88KB
-
memory/1272-60-0x0000000002B40000-0x0000000002B56000-memory.dmpFilesize
88KB
-
memory/1528-72-0x0000000000000000-mapping.dmp
-
memory/1528-84-0x0000000000500000-0x0000000000501000-memory.dmpFilesize
4KB
-
memory/1528-78-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB
-
memory/1636-69-0x0000000000402DD8-mapping.dmp
-
memory/1704-82-0x0000000000000000-mapping.dmp
-
memory/1912-93-0x0000000000000000-mapping.dmp
-
memory/1944-87-0x0000000000000000-mapping.dmp
-
memory/1960-89-0x0000000000000000-mapping.dmp