Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
23-11-2021 13:28
Static task
static1
Behavioral task
behavioral1
Sample
9ae2b414e30f5c9a34030c6597a90dee.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
9ae2b414e30f5c9a34030c6597a90dee.exe
Resource
win10-en-20211104
General
-
Target
9ae2b414e30f5c9a34030c6597a90dee.exe
-
Size
292KB
-
MD5
9ae2b414e30f5c9a34030c6597a90dee
-
SHA1
e2a42239c591fb647cec87c464dab831b94c4d3c
-
SHA256
c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328
-
SHA512
8d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8
Malware Config
Extracted
smokeloader
2020
http://nalirou70.top/
http://xacokuo80.top/
Extracted
tofsee
quadoil.ru
lakeflex.ru
Extracted
redline
185.159.80.90:38637
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1340-91-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1340-92-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1340-93-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1340-94-0x0000000000418EE6-mapping.dmp family_redline behavioral1/memory/1340-97-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
A313.exeA729.exeA313.exeB5CA.exeB5CA.exewpdphbdq.exepid process 1752 A313.exe 1384 A729.exe 732 A313.exe 1504 B5CA.exe 1340 B5CA.exe 676 wpdphbdq.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
pid process 1188 -
Loads dropped DLL 2 IoCs
Processes:
A313.exeB5CA.exepid process 1752 A313.exe 1504 B5CA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
9ae2b414e30f5c9a34030c6597a90dee.exeA313.exeB5CA.exewpdphbdq.exedescription pid process target process PID 1380 set thread context of 268 1380 9ae2b414e30f5c9a34030c6597a90dee.exe 9ae2b414e30f5c9a34030c6597a90dee.exe PID 1752 set thread context of 732 1752 A313.exe A313.exe PID 1504 set thread context of 1340 1504 B5CA.exe B5CA.exe PID 676 set thread context of 1300 676 wpdphbdq.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9ae2b414e30f5c9a34030c6597a90dee.exeA313.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9ae2b414e30f5c9a34030c6597a90dee.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9ae2b414e30f5c9a34030c6597a90dee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A313.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A313.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A313.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9ae2b414e30f5c9a34030c6597a90dee.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9ae2b414e30f5c9a34030c6597a90dee.exepid process 268 9ae2b414e30f5c9a34030c6597a90dee.exe 268 9ae2b414e30f5c9a34030c6597a90dee.exe 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 1188 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1188 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
9ae2b414e30f5c9a34030c6597a90dee.exeA313.exepid process 268 9ae2b414e30f5c9a34030c6597a90dee.exe 732 A313.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
B5CA.exedescription pid process Token: SeShutdownPrivilege 1188 Token: SeShutdownPrivilege 1188 Token: SeShutdownPrivilege 1188 Token: SeDebugPrivilege 1340 B5CA.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1188 1188 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1188 1188 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9ae2b414e30f5c9a34030c6597a90dee.exeA313.exeB5CA.exeA729.exewpdphbdq.exedescription pid process target process PID 1380 wrote to memory of 268 1380 9ae2b414e30f5c9a34030c6597a90dee.exe 9ae2b414e30f5c9a34030c6597a90dee.exe PID 1380 wrote to memory of 268 1380 9ae2b414e30f5c9a34030c6597a90dee.exe 9ae2b414e30f5c9a34030c6597a90dee.exe PID 1380 wrote to memory of 268 1380 9ae2b414e30f5c9a34030c6597a90dee.exe 9ae2b414e30f5c9a34030c6597a90dee.exe PID 1380 wrote to memory of 268 1380 9ae2b414e30f5c9a34030c6597a90dee.exe 9ae2b414e30f5c9a34030c6597a90dee.exe PID 1380 wrote to memory of 268 1380 9ae2b414e30f5c9a34030c6597a90dee.exe 9ae2b414e30f5c9a34030c6597a90dee.exe PID 1380 wrote to memory of 268 1380 9ae2b414e30f5c9a34030c6597a90dee.exe 9ae2b414e30f5c9a34030c6597a90dee.exe PID 1380 wrote to memory of 268 1380 9ae2b414e30f5c9a34030c6597a90dee.exe 9ae2b414e30f5c9a34030c6597a90dee.exe PID 1188 wrote to memory of 1752 1188 A313.exe PID 1188 wrote to memory of 1752 1188 A313.exe PID 1188 wrote to memory of 1752 1188 A313.exe PID 1188 wrote to memory of 1752 1188 A313.exe PID 1188 wrote to memory of 1384 1188 A729.exe PID 1188 wrote to memory of 1384 1188 A729.exe PID 1188 wrote to memory of 1384 1188 A729.exe PID 1188 wrote to memory of 1384 1188 A729.exe PID 1752 wrote to memory of 732 1752 A313.exe A313.exe PID 1752 wrote to memory of 732 1752 A313.exe A313.exe PID 1752 wrote to memory of 732 1752 A313.exe A313.exe PID 1752 wrote to memory of 732 1752 A313.exe A313.exe PID 1752 wrote to memory of 732 1752 A313.exe A313.exe PID 1752 wrote to memory of 732 1752 A313.exe A313.exe PID 1752 wrote to memory of 732 1752 A313.exe A313.exe PID 1188 wrote to memory of 1504 1188 B5CA.exe PID 1188 wrote to memory of 1504 1188 B5CA.exe PID 1188 wrote to memory of 1504 1188 B5CA.exe PID 1188 wrote to memory of 1504 1188 B5CA.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1384 wrote to memory of 960 1384 A729.exe cmd.exe PID 1384 wrote to memory of 960 1384 A729.exe cmd.exe PID 1384 wrote to memory of 960 1384 A729.exe cmd.exe PID 1384 wrote to memory of 960 1384 A729.exe cmd.exe PID 1384 wrote to memory of 1720 1384 A729.exe cmd.exe PID 1384 wrote to memory of 1720 1384 A729.exe cmd.exe PID 1384 wrote to memory of 1720 1384 A729.exe cmd.exe PID 1384 wrote to memory of 1720 1384 A729.exe cmd.exe PID 1384 wrote to memory of 240 1384 A729.exe sc.exe PID 1384 wrote to memory of 240 1384 A729.exe sc.exe PID 1384 wrote to memory of 240 1384 A729.exe sc.exe PID 1384 wrote to memory of 240 1384 A729.exe sc.exe PID 1384 wrote to memory of 928 1384 A729.exe sc.exe PID 1384 wrote to memory of 928 1384 A729.exe sc.exe PID 1384 wrote to memory of 928 1384 A729.exe sc.exe PID 1384 wrote to memory of 928 1384 A729.exe sc.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1504 wrote to memory of 1340 1504 B5CA.exe B5CA.exe PID 1384 wrote to memory of 2008 1384 A729.exe sc.exe PID 1384 wrote to memory of 2008 1384 A729.exe sc.exe PID 1384 wrote to memory of 2008 1384 A729.exe sc.exe PID 1384 wrote to memory of 2008 1384 A729.exe sc.exe PID 1384 wrote to memory of 1264 1384 A729.exe netsh.exe PID 1384 wrote to memory of 1264 1384 A729.exe netsh.exe PID 1384 wrote to memory of 1264 1384 A729.exe netsh.exe PID 1384 wrote to memory of 1264 1384 A729.exe netsh.exe PID 676 wrote to memory of 1300 676 wpdphbdq.exe svchost.exe PID 676 wrote to memory of 1300 676 wpdphbdq.exe svchost.exe PID 676 wrote to memory of 1300 676 wpdphbdq.exe svchost.exe PID 676 wrote to memory of 1300 676 wpdphbdq.exe svchost.exe PID 676 wrote to memory of 1300 676 wpdphbdq.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ae2b414e30f5c9a34030c6597a90dee.exe"C:\Users\Admin\AppData\Local\Temp\9ae2b414e30f5c9a34030c6597a90dee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9ae2b414e30f5c9a34030c6597a90dee.exe"C:\Users\Admin\AppData\Local\Temp\9ae2b414e30f5c9a34030c6597a90dee.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\A313.exeC:\Users\Admin\AppData\Local\Temp\A313.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\A313.exeC:\Users\Admin\AppData\Local\Temp\A313.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\A729.exeC:\Users\Admin\AppData\Local\Temp\A729.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bbhfqeny\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wpdphbdq.exe" C:\Windows\SysWOW64\bbhfqeny\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bbhfqeny binPath= "C:\Windows\SysWOW64\bbhfqeny\wpdphbdq.exe /d\"C:\Users\Admin\AppData\Local\Temp\A729.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bbhfqeny "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bbhfqeny2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Users\Admin\AppData\Local\Temp\B5CA.exeC:\Users\Admin\AppData\Local\Temp\B5CA.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\B5CA.exeC:\Users\Admin\AppData\Local\Temp\B5CA.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\bbhfqeny\wpdphbdq.exeC:\Windows\SysWOW64\bbhfqeny\wpdphbdq.exe /d"C:\Users\Admin\AppData\Local\Temp\A729.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\A313.exeMD5
9ae2b414e30f5c9a34030c6597a90dee
SHA1e2a42239c591fb647cec87c464dab831b94c4d3c
SHA256c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328
SHA5128d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8
-
C:\Users\Admin\AppData\Local\Temp\A313.exeMD5
9ae2b414e30f5c9a34030c6597a90dee
SHA1e2a42239c591fb647cec87c464dab831b94c4d3c
SHA256c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328
SHA5128d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8
-
C:\Users\Admin\AppData\Local\Temp\A313.exeMD5
9ae2b414e30f5c9a34030c6597a90dee
SHA1e2a42239c591fb647cec87c464dab831b94c4d3c
SHA256c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328
SHA5128d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8
-
C:\Users\Admin\AppData\Local\Temp\A729.exeMD5
c041220f9f23150757ec7096e0597572
SHA13336e3c9faef9a91b21ca5177a8105dfff180094
SHA256e933a08308b3d374d64d0ccecae1247fadf0c80028bea1bd5b33ad0a239f9370
SHA512905d640d42286b896401a57e2786ac51b77074524e562696e7dc22cf60a92c121a2dcd18a638b600344f42c42f2bbec28e5bfe38d483ddf89df20820e3211936
-
C:\Users\Admin\AppData\Local\Temp\A729.exeMD5
c041220f9f23150757ec7096e0597572
SHA13336e3c9faef9a91b21ca5177a8105dfff180094
SHA256e933a08308b3d374d64d0ccecae1247fadf0c80028bea1bd5b33ad0a239f9370
SHA512905d640d42286b896401a57e2786ac51b77074524e562696e7dc22cf60a92c121a2dcd18a638b600344f42c42f2bbec28e5bfe38d483ddf89df20820e3211936
-
C:\Users\Admin\AppData\Local\Temp\B5CA.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
C:\Users\Admin\AppData\Local\Temp\B5CA.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
C:\Users\Admin\AppData\Local\Temp\B5CA.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
C:\Users\Admin\AppData\Local\Temp\wpdphbdq.exeMD5
4fa55d2636e11b470b85cd55e7093975
SHA122cd28367b42d5aa1f836323a3182058fb7cd47a
SHA256897c8204db1c6a2a6fd274525001db7996e32d71daa07ab534adefb9fb30a162
SHA51201d72322e543f7ba2074fc042736294b3c0610f950381847110ecb37ff761d7b7efbe5b820058e26f2ccb7ae54d8bd919fb83bc3045d0db4f3ffd21e03cbf744
-
C:\Windows\SysWOW64\bbhfqeny\wpdphbdq.exeMD5
4fa55d2636e11b470b85cd55e7093975
SHA122cd28367b42d5aa1f836323a3182058fb7cd47a
SHA256897c8204db1c6a2a6fd274525001db7996e32d71daa07ab534adefb9fb30a162
SHA51201d72322e543f7ba2074fc042736294b3c0610f950381847110ecb37ff761d7b7efbe5b820058e26f2ccb7ae54d8bd919fb83bc3045d0db4f3ffd21e03cbf744
-
\Users\Admin\AppData\Local\Temp\A313.exeMD5
9ae2b414e30f5c9a34030c6597a90dee
SHA1e2a42239c591fb647cec87c464dab831b94c4d3c
SHA256c1169bf50d13f444cc43302250dedec41a5dfd2c8e122b6ed7de5f2c7bfe8328
SHA5128d6cc3ba9f82e52716b7ae8aa62b7f636fc0ca175d2c3874b352f7b7f758a0bcb6d73cfd2d3aba43d5a548da071f0278bb7b850375c878b305098d8808babcb8
-
\Users\Admin\AppData\Local\Temp\B5CA.exeMD5
a50ee9aad29943a28a90270c948aa700
SHA1188bfab768eb5d04f6d637838ebdc4e5583febd0
SHA256162182dc55594ee769bc830588561c7ba9ae2be7d2b2139b0b2dfc485cfb2fcc
SHA512556422af21215937dde56718a5dbcea547c70460ba1b4c36d075297b3574dfe2cd7c6641211d97aabe5eec8efc2b9d3ce83f8e1d36a5b8e4d1d00a093cd6b3d2
-
memory/240-87-0x0000000000000000-mapping.dmp
-
memory/268-58-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/268-56-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/268-57-0x0000000000402DC6-mapping.dmp
-
memory/676-110-0x0000000000400000-0x0000000002B41000-memory.dmpFilesize
39.3MB
-
memory/676-104-0x0000000002CFB000-0x0000000002D0C000-memory.dmpFilesize
68KB
-
memory/732-69-0x0000000000402DC6-mapping.dmp
-
memory/928-88-0x0000000000000000-mapping.dmp
-
memory/960-81-0x0000000000000000-mapping.dmp
-
memory/1188-60-0x0000000002AA0000-0x0000000002AB6000-memory.dmpFilesize
88KB
-
memory/1188-99-0x0000000003F60000-0x0000000003F76000-memory.dmpFilesize
88KB
-
memory/1264-100-0x0000000000000000-mapping.dmp
-
memory/1300-107-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/1300-108-0x0000000000089A6B-mapping.dmp
-
memory/1300-106-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/1340-97-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1340-102-0x0000000004960000-0x0000000004961000-memory.dmpFilesize
4KB
-
memory/1340-89-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1340-90-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1340-91-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1340-92-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1340-93-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1340-94-0x0000000000418EE6-mapping.dmp
-
memory/1380-59-0x0000000000230000-0x0000000000239000-memory.dmpFilesize
36KB
-
memory/1380-55-0x0000000002CEB000-0x0000000002CFC000-memory.dmpFilesize
68KB
-
memory/1384-63-0x0000000000000000-mapping.dmp
-
memory/1384-83-0x0000000000220000-0x0000000000233000-memory.dmpFilesize
76KB
-
memory/1384-77-0x0000000002CDB000-0x0000000002CEC000-memory.dmpFilesize
68KB
-
memory/1384-84-0x0000000000400000-0x0000000002B41000-memory.dmpFilesize
39.3MB
-
memory/1504-82-0x0000000001FE0000-0x0000000001FE1000-memory.dmpFilesize
4KB
-
memory/1504-75-0x0000000000A70000-0x0000000000A71000-memory.dmpFilesize
4KB
-
memory/1504-72-0x0000000000000000-mapping.dmp
-
memory/1720-85-0x0000000000000000-mapping.dmp
-
memory/1752-65-0x0000000002C4B000-0x0000000002C5C000-memory.dmpFilesize
68KB
-
memory/1752-61-0x0000000000000000-mapping.dmp
-
memory/2008-96-0x0000000000000000-mapping.dmp