Analysis

  • max time kernel
    153s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    21-11-2021 15:54

General

  • Target

    f071a9a50163c04aa45daae82b852f72.exe

  • Size

    338KB

  • MD5

    f071a9a50163c04aa45daae82b852f72

  • SHA1

    0aefaad339329762ac863043993a52f2aa10b60b

  • SHA256

    09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d

  • SHA512

    00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Extracted

Family

redline

C2

185.159.80.90:38637

Extracted

Family

redline

Botnet

1823930346

C2

185.92.74.63:10829

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe
    "C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe
      "C:\Users\Admin\AppData\Local\Temp\f071a9a50163c04aa45daae82b852f72.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4368
  • C:\Users\Admin\AppData\Local\Temp\1643.exe
    C:\Users\Admin\AppData\Local\Temp\1643.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\AppData\Local\Temp\1643.exe
      C:\Users\Admin\AppData\Local\Temp\1643.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:2784
  • C:\Users\Admin\AppData\Local\Temp\2538.exe
    C:\Users\Admin\AppData\Local\Temp\2538.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jykaxha\
      2⤵
        PID:1500
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\yzxhkdit.exe" C:\Windows\SysWOW64\jykaxha\
        2⤵
          PID:1812
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create jykaxha binPath= "C:\Windows\SysWOW64\jykaxha\yzxhkdit.exe /d\"C:\Users\Admin\AppData\Local\Temp\2538.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:2384
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description jykaxha "wifi internet conection"
            2⤵
              PID:2660
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start jykaxha
              2⤵
                PID:1736
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:2668
              • C:\Users\Admin\AppData\Local\Temp\317E.exe
                C:\Users\Admin\AppData\Local\Temp\317E.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:596
                • C:\Users\Admin\AppData\Local\Temp\317E.exe
                  C:\Users\Admin\AppData\Local\Temp\317E.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1132
                • C:\Users\Admin\AppData\Local\Temp\317E.exe
                  C:\Users\Admin\AppData\Local\Temp\317E.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2128
              • C:\Windows\SysWOW64\jykaxha\yzxhkdit.exe
                C:\Windows\SysWOW64\jykaxha\yzxhkdit.exe /d"C:\Users\Admin\AppData\Local\Temp\2538.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4012
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  PID:5112
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2196
              • C:\Users\Admin\AppData\Roaming\avghgju
                C:\Users\Admin\AppData\Roaming\avghgju
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4272
                • C:\Users\Admin\AppData\Roaming\avghgju
                  C:\Users\Admin\AppData\Roaming\avghgju
                  2⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:396
              • C:\Users\Admin\AppData\Local\Temp\AE02.exe
                C:\Users\Admin\AppData\Local\Temp\AE02.exe
                1⤵
                • Executes dropped EXE
                PID:1600
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 480
                  2⤵
                  • Suspicious use of NtCreateProcessExOtherParentProcess
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2768
              • C:\Users\Admin\AppData\Local\Temp\DD21.exe
                C:\Users\Admin\AppData\Local\Temp\DD21.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:1444
                • C:\Users\Admin\AppData\Local\Temp\DD21.exe
                  C:\Users\Admin\AppData\Local\Temp\DD21.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1972
                • C:\Users\Admin\AppData\Local\Temp\DD21.exe
                  C:\Users\Admin\AppData\Local\Temp\DD21.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4608

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              New Service

              1
              T1050

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Privilege Escalation

              New Service

              1
              T1050

              Defense Evasion

              Disabling Security Tools

              1
              T1089

              Modify Registry

              2
              T1112

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Peripheral Device Discovery

              1
              T1120

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\317E.exe.log
                MD5

                41fbed686f5700fc29aaccf83e8ba7fd

                SHA1

                5271bc29538f11e42a3b600c8dc727186e912456

                SHA256

                df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

                SHA512

                234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DD21.exe.log
                MD5

                41fbed686f5700fc29aaccf83e8ba7fd

                SHA1

                5271bc29538f11e42a3b600c8dc727186e912456

                SHA256

                df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

                SHA512

                234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

              • C:\Users\Admin\AppData\Local\Temp\1643.exe
                MD5

                b595f73148a774b00160998be099258b

                SHA1

                13182fcebcf31316b1d2021663aa0b2ccc3a2c82

                SHA256

                1044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4

                SHA512

                8b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4

              • C:\Users\Admin\AppData\Local\Temp\1643.exe
                MD5

                b595f73148a774b00160998be099258b

                SHA1

                13182fcebcf31316b1d2021663aa0b2ccc3a2c82

                SHA256

                1044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4

                SHA512

                8b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4

              • C:\Users\Admin\AppData\Local\Temp\1643.exe
                MD5

                b595f73148a774b00160998be099258b

                SHA1

                13182fcebcf31316b1d2021663aa0b2ccc3a2c82

                SHA256

                1044d982ca91c8e93ebf71487f50132d4b82cf2a09b5124788d70da8b8cc68c4

                SHA512

                8b49f6f72feee9bf06644759935ff65830c40112dd63f2f0c6e39d95eb0086f487c6067ba0aca30358eae87293d76485f6e78ada9b0f465c5fd0c52006f871b4

              • C:\Users\Admin\AppData\Local\Temp\2538.exe
                MD5

                64765141b86d4bce1470e9b8b9de492d

                SHA1

                8497035ee193ff0351f8ca6a5b924bf6db8f706d

                SHA256

                e1e65f9c773cc00d08dda0f9971fbb971c033d32382bdd1a59194adcde2c3e7e

                SHA512

                f8404a22092a659585eafa2f5504e630abe0302713e3ad13848f4809d92c39f284d85eb4db6c9cf9dc660ebe22b397e97b116cc196d698ab2ccdf1836b48507a

              • C:\Users\Admin\AppData\Local\Temp\2538.exe
                MD5

                64765141b86d4bce1470e9b8b9de492d

                SHA1

                8497035ee193ff0351f8ca6a5b924bf6db8f706d

                SHA256

                e1e65f9c773cc00d08dda0f9971fbb971c033d32382bdd1a59194adcde2c3e7e

                SHA512

                f8404a22092a659585eafa2f5504e630abe0302713e3ad13848f4809d92c39f284d85eb4db6c9cf9dc660ebe22b397e97b116cc196d698ab2ccdf1836b48507a

              • C:\Users\Admin\AppData\Local\Temp\317E.exe
                MD5

                a50ee9aad29943a28a90270c948aa700

                SHA1

                188bfab768eb5d04f6d637838ebdc4e5583febd0

                SHA256

                162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

                SHA512

                556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

              • C:\Users\Admin\AppData\Local\Temp\317E.exe
                MD5

                a50ee9aad29943a28a90270c948aa700

                SHA1

                188bfab768eb5d04f6d637838ebdc4e5583febd0

                SHA256

                162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

                SHA512

                556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

              • C:\Users\Admin\AppData\Local\Temp\317E.exe
                MD5

                a50ee9aad29943a28a90270c948aa700

                SHA1

                188bfab768eb5d04f6d637838ebdc4e5583febd0

                SHA256

                162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

                SHA512

                556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

              • C:\Users\Admin\AppData\Local\Temp\317E.exe
                MD5

                a50ee9aad29943a28a90270c948aa700

                SHA1

                188bfab768eb5d04f6d637838ebdc4e5583febd0

                SHA256

                162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc

                SHA512

                556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2

              • C:\Users\Admin\AppData\Local\Temp\AE02.exe
                MD5

                03651bfa0fa57d86e5a612e0cc81bc09

                SHA1

                67738024bea02128f0d7a9939e193dc706bcd0d8

                SHA256

                48183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b

                SHA512

                b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4

              • C:\Users\Admin\AppData\Local\Temp\AE02.exe
                MD5

                03651bfa0fa57d86e5a612e0cc81bc09

                SHA1

                67738024bea02128f0d7a9939e193dc706bcd0d8

                SHA256

                48183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b

                SHA512

                b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4

              • C:\Users\Admin\AppData\Local\Temp\DD21.exe
                MD5

                e12209fce0519090586f1632f675df56

                SHA1

                7614e266c04bafca3c5d0eefb46f60fd6901ba1a

                SHA256

                1fe945f3bec81b904912a702ca72a674a01374471653f4faebf61ce326145530

                SHA512

                1fcd7c793ca40818dcf38806b6b8e612840261d8e77de8b1fc2f49cf4d0d49a2b0331c3058fbae3f8be65c04f04f1149c34872075cc2c8bce1481801cc176503

              • C:\Users\Admin\AppData\Local\Temp\DD21.exe
                MD5

                e12209fce0519090586f1632f675df56

                SHA1

                7614e266c04bafca3c5d0eefb46f60fd6901ba1a

                SHA256

                1fe945f3bec81b904912a702ca72a674a01374471653f4faebf61ce326145530

                SHA512

                1fcd7c793ca40818dcf38806b6b8e612840261d8e77de8b1fc2f49cf4d0d49a2b0331c3058fbae3f8be65c04f04f1149c34872075cc2c8bce1481801cc176503

              • C:\Users\Admin\AppData\Local\Temp\DD21.exe
                MD5

                e12209fce0519090586f1632f675df56

                SHA1

                7614e266c04bafca3c5d0eefb46f60fd6901ba1a

                SHA256

                1fe945f3bec81b904912a702ca72a674a01374471653f4faebf61ce326145530

                SHA512

                1fcd7c793ca40818dcf38806b6b8e612840261d8e77de8b1fc2f49cf4d0d49a2b0331c3058fbae3f8be65c04f04f1149c34872075cc2c8bce1481801cc176503

              • C:\Users\Admin\AppData\Local\Temp\DD21.exe
                MD5

                e12209fce0519090586f1632f675df56

                SHA1

                7614e266c04bafca3c5d0eefb46f60fd6901ba1a

                SHA256

                1fe945f3bec81b904912a702ca72a674a01374471653f4faebf61ce326145530

                SHA512

                1fcd7c793ca40818dcf38806b6b8e612840261d8e77de8b1fc2f49cf4d0d49a2b0331c3058fbae3f8be65c04f04f1149c34872075cc2c8bce1481801cc176503

              • C:\Users\Admin\AppData\Local\Temp\yzxhkdit.exe
                MD5

                bb888799007434095da7447f2910bf70

                SHA1

                8b38cea7095fbd53752206542b5d36759841b118

                SHA256

                8b4e6cddbe5383d4de7fb9e266bd5d1977fef84192771032db3f28832edc1319

                SHA512

                93bf2abc690ed6f025d74a55a28dcd87bb6ca28a3acbda0fa1aa42e3e30ff575b23cc8047fc3555206043dfd5d263c2d11302973e02b0ff708e5d24b0d7c9b01

              • C:\Users\Admin\AppData\Roaming\avghgju
                MD5

                f071a9a50163c04aa45daae82b852f72

                SHA1

                0aefaad339329762ac863043993a52f2aa10b60b

                SHA256

                09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d

                SHA512

                00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8

              • C:\Users\Admin\AppData\Roaming\avghgju
                MD5

                f071a9a50163c04aa45daae82b852f72

                SHA1

                0aefaad339329762ac863043993a52f2aa10b60b

                SHA256

                09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d

                SHA512

                00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8

              • C:\Users\Admin\AppData\Roaming\avghgju
                MD5

                f071a9a50163c04aa45daae82b852f72

                SHA1

                0aefaad339329762ac863043993a52f2aa10b60b

                SHA256

                09cfbddd9deb3cbcb96d615e4d39da78d275d513bc789a6afe6416ce5ab8c63d

                SHA512

                00047a2d676022a8ea1fca8316dd3277174b82639547c9feb5511799db92fba344e474add6d5a9821dcb839d39052c8d01950190b6ed68db935bac639b8e1bf8

              • C:\Windows\SysWOW64\jykaxha\yzxhkdit.exe
                MD5

                bb888799007434095da7447f2910bf70

                SHA1

                8b38cea7095fbd53752206542b5d36759841b118

                SHA256

                8b4e6cddbe5383d4de7fb9e266bd5d1977fef84192771032db3f28832edc1319

                SHA512

                93bf2abc690ed6f025d74a55a28dcd87bb6ca28a3acbda0fa1aa42e3e30ff575b23cc8047fc3555206043dfd5d263c2d11302973e02b0ff708e5d24b0d7c9b01

              • memory/396-188-0x0000000000402DD8-mapping.dmp
              • memory/596-140-0x0000000005500000-0x0000000005501000-memory.dmp
                Filesize

                4KB

              • memory/596-138-0x0000000004D80000-0x0000000004D81000-memory.dmp
                Filesize

                4KB

              • memory/596-136-0x0000000000480000-0x0000000000481000-memory.dmp
                Filesize

                4KB

              • memory/596-141-0x0000000004FF0000-0x0000000004FF1000-memory.dmp
                Filesize

                4KB

              • memory/596-139-0x0000000002750000-0x0000000002751000-memory.dmp
                Filesize

                4KB

              • memory/596-133-0x0000000000000000-mapping.dmp
              • memory/976-129-0x0000000002EA1000-0x0000000002EB2000-memory.dmp
                Filesize

                68KB

              • memory/976-123-0x0000000000000000-mapping.dmp
              • memory/1444-197-0x00000000003B0000-0x00000000003B1000-memory.dmp
                Filesize

                4KB

              • memory/1444-194-0x0000000000000000-mapping.dmp
              • memory/1444-201-0x0000000004D70000-0x0000000004D71000-memory.dmp
                Filesize

                4KB

              • memory/1500-146-0x0000000000000000-mapping.dmp
              • memory/1600-191-0x0000000001190000-0x00000000012DA000-memory.dmp
                Filesize

                1.3MB

              • memory/1600-192-0x0000000000400000-0x0000000001085000-memory.dmp
                Filesize

                12.5MB

              • memory/1600-183-0x0000000000000000-mapping.dmp
              • memory/1736-152-0x0000000000000000-mapping.dmp
              • memory/1812-147-0x0000000000000000-mapping.dmp
              • memory/2128-177-0x00000000062E0000-0x00000000062E1000-memory.dmp
                Filesize

                4KB

              • memory/2128-164-0x0000000005300000-0x0000000005301000-memory.dmp
                Filesize

                4KB

              • memory/2128-165-0x0000000005340000-0x0000000005341000-memory.dmp
                Filesize

                4KB

              • memory/2128-166-0x0000000005280000-0x0000000005886000-memory.dmp
                Filesize

                6.0MB

              • memory/2128-162-0x00000000052A0000-0x00000000052A1000-memory.dmp
                Filesize

                4KB

              • memory/2128-163-0x00000000053D0000-0x00000000053D1000-memory.dmp
                Filesize

                4KB

              • memory/2128-179-0x0000000007470000-0x0000000007471000-memory.dmp
                Filesize

                4KB

              • memory/2128-155-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/2128-156-0x0000000000418EE6-mapping.dmp
              • memory/2128-175-0x00000000057E0000-0x00000000057E1000-memory.dmp
                Filesize

                4KB

              • memory/2128-161-0x0000000005890000-0x0000000005891000-memory.dmp
                Filesize

                4KB

              • memory/2128-178-0x0000000006D70000-0x0000000006D71000-memory.dmp
                Filesize

                4KB

              • memory/2196-204-0x0000000002E00000-0x0000000002EF1000-memory.dmp
                Filesize

                964KB

              • memory/2196-208-0x0000000002E9259C-mapping.dmp
              • memory/2196-209-0x0000000002E00000-0x0000000002EF1000-memory.dmp
                Filesize

                964KB

              • memory/2236-145-0x0000000002D60000-0x0000000002D76000-memory.dmp
                Filesize

                88KB

              • memory/2236-193-0x0000000006050000-0x0000000006066000-memory.dmp
                Filesize

                88KB

              • memory/2236-122-0x0000000000D20000-0x0000000000D36000-memory.dmp
                Filesize

                88KB

              • memory/2384-150-0x0000000000000000-mapping.dmp
              • memory/2660-151-0x0000000000000000-mapping.dmp
              • memory/2668-154-0x0000000000000000-mapping.dmp
              • memory/2784-131-0x0000000000402DD8-mapping.dmp
              • memory/4012-172-0x0000000000400000-0x0000000002B4E000-memory.dmp
                Filesize

                39.3MB

              • memory/4028-119-0x0000000000030000-0x0000000000039000-memory.dmp
                Filesize

                36KB

              • memory/4368-120-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/4368-121-0x0000000000402DD8-mapping.dmp
              • memory/4416-144-0x0000000000400000-0x0000000002B4E000-memory.dmp
                Filesize

                39.3MB

              • memory/4416-143-0x00000000001C0000-0x00000000001D3000-memory.dmp
                Filesize

                76KB

              • memory/4416-126-0x0000000000000000-mapping.dmp
              • memory/4416-142-0x0000000002E91000-0x0000000002EA2000-memory.dmp
                Filesize

                68KB

              • memory/4608-210-0x0000000000400000-0x0000000000424000-memory.dmp
                Filesize

                144KB

              • memory/4608-211-0x0000000000418F2A-mapping.dmp
              • memory/4608-219-0x0000000004FA0000-0x0000000004FA1000-memory.dmp
                Filesize

                4KB

              • memory/4608-220-0x0000000004E50000-0x0000000005456000-memory.dmp
                Filesize

                6.0MB

              • memory/4608-228-0x00000000080C0000-0x00000000080C1000-memory.dmp
                Filesize

                4KB

              • memory/5112-170-0x0000000000820000-0x0000000000821000-memory.dmp
                Filesize

                4KB

              • memory/5112-169-0x0000000002929A6B-mapping.dmp
              • memory/5112-168-0x0000000002920000-0x0000000002935000-memory.dmp
                Filesize

                84KB

              • memory/5112-171-0x0000000000820000-0x0000000000821000-memory.dmp
                Filesize

                4KB