Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    23-11-2021 18:10

General

  • Target

    b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3.exe

  • Size

    291KB

  • MD5

    77eba54f232bf1b960b14e3bdeb5865d

  • SHA1

    8a4fb7ca64c1a01220813af6df7a185c6ac6cd37

  • SHA256

    b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3

  • SHA512

    da3549e99b123552c157b1aad8d9f22430abc85b84b100983d57e4f2bdad51337ff331e2f1569d4b8be65fc04d0b9fbde095524a046823c39109a198dec41f44

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nalirou70.top/

http://xacokuo80.top/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Extracted

Family

redline

C2

185.159.80.90:38655

Extracted

Family

redline

Botnet

@123

C2

141.95.82.50:63652

Extracted

Family

redline

Botnet

Firefox

C2

194.127.179.0:42417

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 8 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3.exe
    "C:\Users\Admin\AppData\Local\Temp\b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3.exe
      "C:\Users\Admin\AppData\Local\Temp\b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:416
  • C:\Users\Admin\AppData\Local\Temp\5010.exe
    C:\Users\Admin\AppData\Local\Temp\5010.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Users\Admin\AppData\Local\Temp\5010.exe
      C:\Users\Admin\AppData\Local\Temp\5010.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1012
  • C:\Users\Admin\AppData\Local\Temp\5457.exe
    C:\Users\Admin\AppData\Local\Temp\5457.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bienfhy\
      2⤵
        PID:1200
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\tldkjals.exe" C:\Windows\SysWOW64\bienfhy\
        2⤵
          PID:1216
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create bienfhy binPath= "C:\Windows\SysWOW64\bienfhy\tldkjals.exe /d\"C:\Users\Admin\AppData\Local\Temp\5457.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:3172
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description bienfhy "wifi internet conection"
            2⤵
              PID:1028
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start bienfhy
              2⤵
                PID:2212
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:2368
              • C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3308
                • C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                  C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                  2⤵
                  • Executes dropped EXE
                  PID:3580
                • C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                  C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:872
              • C:\Windows\SysWOW64\bienfhy\tldkjals.exe
                C:\Windows\SysWOW64\bienfhy\tldkjals.exe /d"C:\Users\Admin\AppData\Local\Temp\5457.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1456
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  • Suspicious use of WriteProcessMemory
                  PID:2984
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1260
              • C:\Users\Admin\AppData\Local\Temp\B768.exe
                C:\Users\Admin\AppData\Local\Temp\B768.exe
                1⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: MapViewOfSection
                PID:652
              • C:\Users\Admin\AppData\Local\Temp\BB90.exe
                C:\Users\Admin\AppData\Local\Temp\BB90.exe
                1⤵
                • Executes dropped EXE
                PID:648
              • C:\Users\Admin\AppData\Local\Temp\C91D.exe
                C:\Users\Admin\AppData\Local\Temp\C91D.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:3004
              • C:\Users\Admin\AppData\Local\Temp\CF58.exe
                C:\Users\Admin\AppData\Local\Temp\CF58.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3144
              • C:\Users\Admin\AppData\Local\Temp\D61F.exe
                C:\Users\Admin\AppData\Local\Temp\D61F.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1384

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              New Service

              1
              T1050

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Privilege Escalation

              New Service

              1
              T1050

              Defense Evasion

              Disabling Security Tools

              1
              T1089

              Modify Registry

              2
              T1112

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Peripheral Device Discovery

              1
              T1120

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5B3D.exe.log
                MD5

                41fbed686f5700fc29aaccf83e8ba7fd

                SHA1

                5271bc29538f11e42a3b600c8dc727186e912456

                SHA256

                df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

                SHA512

                234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

              • C:\Users\Admin\AppData\Local\Temp\5010.exe
                MD5

                77eba54f232bf1b960b14e3bdeb5865d

                SHA1

                8a4fb7ca64c1a01220813af6df7a185c6ac6cd37

                SHA256

                b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3

                SHA512

                da3549e99b123552c157b1aad8d9f22430abc85b84b100983d57e4f2bdad51337ff331e2f1569d4b8be65fc04d0b9fbde095524a046823c39109a198dec41f44

              • C:\Users\Admin\AppData\Local\Temp\5010.exe
                MD5

                77eba54f232bf1b960b14e3bdeb5865d

                SHA1

                8a4fb7ca64c1a01220813af6df7a185c6ac6cd37

                SHA256

                b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3

                SHA512

                da3549e99b123552c157b1aad8d9f22430abc85b84b100983d57e4f2bdad51337ff331e2f1569d4b8be65fc04d0b9fbde095524a046823c39109a198dec41f44

              • C:\Users\Admin\AppData\Local\Temp\5010.exe
                MD5

                77eba54f232bf1b960b14e3bdeb5865d

                SHA1

                8a4fb7ca64c1a01220813af6df7a185c6ac6cd37

                SHA256

                b4715f26f3cd3c0ee465b984519a303cf951c99c90fe9784be2912196ebcd0c3

                SHA512

                da3549e99b123552c157b1aad8d9f22430abc85b84b100983d57e4f2bdad51337ff331e2f1569d4b8be65fc04d0b9fbde095524a046823c39109a198dec41f44

              • C:\Users\Admin\AppData\Local\Temp\5457.exe
                MD5

                a2aa390da678b7ca876b1bb3a92bc957

                SHA1

                12f57b514e523a9a03af6fff3b68c57cdd2d94e6

                SHA256

                6ab96a6d5efc0cbc10259c7e52f98d50fdba4086a6e314e26a60c36b98df538f

                SHA512

                7c6c7c5bb576985a7036db5ae1741bc3274ecd65d23bdc270a24c20b1a3bc7fde3efec08fa6c762c75daadf0fd5b5ec2ec48dbee76867ee776ad46e458547d51

              • C:\Users\Admin\AppData\Local\Temp\5457.exe
                MD5

                a2aa390da678b7ca876b1bb3a92bc957

                SHA1

                12f57b514e523a9a03af6fff3b68c57cdd2d94e6

                SHA256

                6ab96a6d5efc0cbc10259c7e52f98d50fdba4086a6e314e26a60c36b98df538f

                SHA512

                7c6c7c5bb576985a7036db5ae1741bc3274ecd65d23bdc270a24c20b1a3bc7fde3efec08fa6c762c75daadf0fd5b5ec2ec48dbee76867ee776ad46e458547d51

              • C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                MD5

                e850bf7dbab0575d6bcde28710be9192

                SHA1

                9d8c748670b02c2e01c6ad894cacd1dd27ba0814

                SHA256

                c5f10feca7a51c7e54414820d37ca533175a78465578b4b03c531c8422a16db0

                SHA512

                4f181a6e43fc116ad9b5c92b762d7609e620b57e3c19009fe88fbbc3a248495a042d4e92644e333c10cb5c774e5237a9e312690a8c98975a9af029ba85087352

              • C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                MD5

                e850bf7dbab0575d6bcde28710be9192

                SHA1

                9d8c748670b02c2e01c6ad894cacd1dd27ba0814

                SHA256

                c5f10feca7a51c7e54414820d37ca533175a78465578b4b03c531c8422a16db0

                SHA512

                4f181a6e43fc116ad9b5c92b762d7609e620b57e3c19009fe88fbbc3a248495a042d4e92644e333c10cb5c774e5237a9e312690a8c98975a9af029ba85087352

              • C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                MD5

                e850bf7dbab0575d6bcde28710be9192

                SHA1

                9d8c748670b02c2e01c6ad894cacd1dd27ba0814

                SHA256

                c5f10feca7a51c7e54414820d37ca533175a78465578b4b03c531c8422a16db0

                SHA512

                4f181a6e43fc116ad9b5c92b762d7609e620b57e3c19009fe88fbbc3a248495a042d4e92644e333c10cb5c774e5237a9e312690a8c98975a9af029ba85087352

              • C:\Users\Admin\AppData\Local\Temp\5B3D.exe
                MD5

                e850bf7dbab0575d6bcde28710be9192

                SHA1

                9d8c748670b02c2e01c6ad894cacd1dd27ba0814

                SHA256

                c5f10feca7a51c7e54414820d37ca533175a78465578b4b03c531c8422a16db0

                SHA512

                4f181a6e43fc116ad9b5c92b762d7609e620b57e3c19009fe88fbbc3a248495a042d4e92644e333c10cb5c774e5237a9e312690a8c98975a9af029ba85087352

              • C:\Users\Admin\AppData\Local\Temp\B768.exe
                MD5

                03651bfa0fa57d86e5a612e0cc81bc09

                SHA1

                67738024bea02128f0d7a9939e193dc706bcd0d8

                SHA256

                48183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b

                SHA512

                b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4

              • C:\Users\Admin\AppData\Local\Temp\B768.exe
                MD5

                03651bfa0fa57d86e5a612e0cc81bc09

                SHA1

                67738024bea02128f0d7a9939e193dc706bcd0d8

                SHA256

                48183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b

                SHA512

                b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4

              • C:\Users\Admin\AppData\Local\Temp\BB90.exe
                MD5

                b25fdabef081394cfc659b7f9574e323

                SHA1

                84c00d9786f82767814033f70401cb193e0024c0

                SHA256

                ebc4acabf30b159e1a855e529b5c045fa7af9356e70433fa3ce8ce9599b151e6

                SHA512

                42dae5ed2501280d02102d9969a60f7415a688af4db9b93949e1e6c4e3928916e374a9e47416aad32e6eb6f30b0e7966bc699bd13fbbd14b3c7059f8540f45a8

              • C:\Users\Admin\AppData\Local\Temp\BB90.exe
                MD5

                b25fdabef081394cfc659b7f9574e323

                SHA1

                84c00d9786f82767814033f70401cb193e0024c0

                SHA256

                ebc4acabf30b159e1a855e529b5c045fa7af9356e70433fa3ce8ce9599b151e6

                SHA512

                42dae5ed2501280d02102d9969a60f7415a688af4db9b93949e1e6c4e3928916e374a9e47416aad32e6eb6f30b0e7966bc699bd13fbbd14b3c7059f8540f45a8

              • C:\Users\Admin\AppData\Local\Temp\C91D.exe
                MD5

                8db49ad1e3564676b5c89aea32d52831

                SHA1

                c376e927b72b596e64e7144983c05ff3d735c092

                SHA256

                151a58796dc7a9e850d8d22f399d542d39ae64f8d6fa2862c8f34e522f5b3e6f

                SHA512

                18f3cec93a2ef53ab19647c1aba182cc5980a191e2b54430e3f7bfa864c62ea305a76dcc8c7a2361cb386d621ad31edf7fcb995cd47606c43e56183c62c6be0a

              • C:\Users\Admin\AppData\Local\Temp\C91D.exe
                MD5

                8db49ad1e3564676b5c89aea32d52831

                SHA1

                c376e927b72b596e64e7144983c05ff3d735c092

                SHA256

                151a58796dc7a9e850d8d22f399d542d39ae64f8d6fa2862c8f34e522f5b3e6f

                SHA512

                18f3cec93a2ef53ab19647c1aba182cc5980a191e2b54430e3f7bfa864c62ea305a76dcc8c7a2361cb386d621ad31edf7fcb995cd47606c43e56183c62c6be0a

              • C:\Users\Admin\AppData\Local\Temp\CF58.exe
                MD5

                e93861c6783582541a7529d0c5466df9

                SHA1

                6c35da40a2a8bc95211e246ac29cb13b1d3c9d18

                SHA256

                9995f44edede8afef849090432e98064d584c55471124850867620c4f0f397a5

                SHA512

                00ce72cd061504c6a81dfcf22597b3834f89bbb18eebffd93177f846b8a8cabf00fb85f4f256a47d4e83215a06d28b30a971e04604d85704728f2fc157d4fe10

              • C:\Users\Admin\AppData\Local\Temp\CF58.exe
                MD5

                e93861c6783582541a7529d0c5466df9

                SHA1

                6c35da40a2a8bc95211e246ac29cb13b1d3c9d18

                SHA256

                9995f44edede8afef849090432e98064d584c55471124850867620c4f0f397a5

                SHA512

                00ce72cd061504c6a81dfcf22597b3834f89bbb18eebffd93177f846b8a8cabf00fb85f4f256a47d4e83215a06d28b30a971e04604d85704728f2fc157d4fe10

              • C:\Users\Admin\AppData\Local\Temp\D61F.exe
                MD5

                cd217b0e6e936f9ae9492ec1a089cdcf

                SHA1

                14ac87815ea815f8997f0a4c751cc352822a7975

                SHA256

                5f5eacd77526de995a9caaaa7a963d18c5f7732b22fad8a0151ac8c25c9baad8

                SHA512

                fbf065be9b4cc648493e4829473902c7c68971a3b59be7908ad5699de69bd9283deab1487d1af05bf2110f4d2468992db6e5af02f26517b8ab376040702e0c73

              • C:\Users\Admin\AppData\Local\Temp\D61F.exe
                MD5

                cd217b0e6e936f9ae9492ec1a089cdcf

                SHA1

                14ac87815ea815f8997f0a4c751cc352822a7975

                SHA256

                5f5eacd77526de995a9caaaa7a963d18c5f7732b22fad8a0151ac8c25c9baad8

                SHA512

                fbf065be9b4cc648493e4829473902c7c68971a3b59be7908ad5699de69bd9283deab1487d1af05bf2110f4d2468992db6e5af02f26517b8ab376040702e0c73

              • C:\Users\Admin\AppData\Local\Temp\tldkjals.exe
                MD5

                91df67809c285ed945cb28dd0a460a96

                SHA1

                c28a1c69b0c1a20d7b7f2ab653f618d5b7b2b6e8

                SHA256

                2cfca6841d5de646a992756aada8af29cd758ca6353f6d83ee3eb8b8ebabbaf1

                SHA512

                ed41aa16119e0a8ec4abb01eaf84a12cb801bf008c1a3fe465f87aebb4e727a4d12e325678cf1b899a4547a00a0ac89f29fc43cbc6330a688de6329928c88113

              • C:\Windows\SysWOW64\bienfhy\tldkjals.exe
                MD5

                91df67809c285ed945cb28dd0a460a96

                SHA1

                c28a1c69b0c1a20d7b7f2ab653f618d5b7b2b6e8

                SHA256

                2cfca6841d5de646a992756aada8af29cd758ca6353f6d83ee3eb8b8ebabbaf1

                SHA512

                ed41aa16119e0a8ec4abb01eaf84a12cb801bf008c1a3fe465f87aebb4e727a4d12e325678cf1b899a4547a00a0ac89f29fc43cbc6330a688de6329928c88113

              • memory/416-116-0x0000000000400000-0x0000000000408000-memory.dmp
                Filesize

                32KB

              • memory/416-117-0x0000000000402DC6-mapping.dmp
              • memory/648-194-0x00000000026D0000-0x00000000026EB000-memory.dmp
                Filesize

                108KB

              • memory/648-193-0x000000001B270000-0x000000001B272000-memory.dmp
                Filesize

                8KB

              • memory/648-188-0x0000000000000000-mapping.dmp
              • memory/648-195-0x000000001BCD0000-0x000000001BCD1000-memory.dmp
                Filesize

                4KB

              • memory/648-196-0x000000001B100000-0x000000001B101000-memory.dmp
                Filesize

                4KB

              • memory/648-197-0x000000001B1A0000-0x000000001B1A1000-memory.dmp
                Filesize

                4KB

              • memory/648-191-0x00000000006A0000-0x00000000006A1000-memory.dmp
                Filesize

                4KB

              • memory/652-184-0x0000000000000000-mapping.dmp
              • memory/652-204-0x0000000000400000-0x0000000001085000-memory.dmp
                Filesize

                12.5MB

              • memory/652-202-0x0000000001170000-0x0000000001179000-memory.dmp
                Filesize

                36KB

              • memory/872-153-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/872-154-0x0000000000418EEE-mapping.dmp
              • memory/872-168-0x00000000053C0000-0x00000000059C6000-memory.dmp
                Filesize

                6.0MB

              • memory/872-158-0x00000000059D0000-0x00000000059D1000-memory.dmp
                Filesize

                4KB

              • memory/872-159-0x0000000005440000-0x0000000005441000-memory.dmp
                Filesize

                4KB

              • memory/872-160-0x0000000005570000-0x0000000005571000-memory.dmp
                Filesize

                4KB

              • memory/872-161-0x00000000054A0000-0x00000000054A1000-memory.dmp
                Filesize

                4KB

              • memory/872-183-0x00000000075E0000-0x00000000075E1000-memory.dmp
                Filesize

                4KB

              • memory/872-182-0x0000000006EE0000-0x0000000006EE1000-memory.dmp
                Filesize

                4KB

              • memory/872-175-0x0000000006440000-0x0000000006441000-memory.dmp
                Filesize

                4KB

              • memory/872-173-0x0000000005FE0000-0x0000000005FE1000-memory.dmp
                Filesize

                4KB

              • memory/872-167-0x00000000054E0000-0x00000000054E1000-memory.dmp
                Filesize

                4KB

              • memory/1012-131-0x0000000000402DC6-mapping.dmp
              • memory/1028-147-0x0000000000000000-mapping.dmp
              • memory/1200-143-0x0000000000000000-mapping.dmp
              • memory/1216-144-0x0000000000000000-mapping.dmp
              • memory/1260-180-0x0000000002EF259C-mapping.dmp
              • memory/1260-181-0x0000000002E60000-0x0000000002F51000-memory.dmp
                Filesize

                964KB

              • memory/1260-176-0x0000000002E60000-0x0000000002F51000-memory.dmp
                Filesize

                964KB

              • memory/1384-253-0x0000000004660000-0x0000000004699000-memory.dmp
                Filesize

                228KB

              • memory/1384-258-0x0000000007303000-0x0000000007304000-memory.dmp
                Filesize

                4KB

              • memory/1384-254-0x0000000000400000-0x0000000002B5C000-memory.dmp
                Filesize

                39.4MB

              • memory/1384-246-0x0000000004BC0000-0x0000000004BEE000-memory.dmp
                Filesize

                184KB

              • memory/1384-256-0x0000000007300000-0x0000000007301000-memory.dmp
                Filesize

                4KB

              • memory/1384-229-0x0000000000000000-mapping.dmp
              • memory/1384-257-0x0000000007302000-0x0000000007303000-memory.dmp
                Filesize

                4KB

              • memory/1384-259-0x0000000007304000-0x0000000007306000-memory.dmp
                Filesize

                8KB

              • memory/1456-170-0x0000000000400000-0x0000000001FCF000-memory.dmp
                Filesize

                27.8MB

              • memory/1456-169-0x0000000002100000-0x000000000224A000-memory.dmp
                Filesize

                1.3MB

              • memory/2212-149-0x0000000000000000-mapping.dmp
              • memory/2368-152-0x0000000000000000-mapping.dmp
              • memory/2540-115-0x0000000002249000-0x000000000225A000-memory.dmp
                Filesize

                68KB

              • memory/2540-118-0x0000000001FD0000-0x000000000207E000-memory.dmp
                Filesize

                696KB

              • memory/2984-166-0x0000000000390000-0x0000000000391000-memory.dmp
                Filesize

                4KB

              • memory/2984-165-0x0000000000390000-0x0000000000391000-memory.dmp
                Filesize

                4KB

              • memory/2984-163-0x0000000000680000-0x0000000000695000-memory.dmp
                Filesize

                84KB

              • memory/2984-164-0x0000000000689A6B-mapping.dmp
              • memory/3004-206-0x0000000001550000-0x0000000001596000-memory.dmp
                Filesize

                280KB

              • memory/3004-209-0x0000000074150000-0x0000000074241000-memory.dmp
                Filesize

                964KB

              • memory/3004-199-0x0000000000000000-mapping.dmp
              • memory/3004-203-0x0000000000F30000-0x0000000001041000-memory.dmp
                Filesize

                1.1MB

              • memory/3004-220-0x0000000005B80000-0x0000000005B81000-memory.dmp
                Filesize

                4KB

              • memory/3004-205-0x0000000000F30000-0x0000000001041000-memory.dmp
                Filesize

                1.1MB

              • memory/3004-207-0x0000000001520000-0x0000000001521000-memory.dmp
                Filesize

                4KB

              • memory/3004-218-0x0000000075D40000-0x0000000077088000-memory.dmp
                Filesize

                19.3MB

              • memory/3004-208-0x0000000077150000-0x0000000077312000-memory.dmp
                Filesize

                1.8MB

              • memory/3004-224-0x0000000005B90000-0x0000000005B91000-memory.dmp
                Filesize

                4KB

              • memory/3004-210-0x0000000000F30000-0x0000000000F31000-memory.dmp
                Filesize

                4KB

              • memory/3004-212-0x00000000720C0000-0x0000000072140000-memory.dmp
                Filesize

                512KB

              • memory/3004-217-0x0000000074250000-0x00000000747D4000-memory.dmp
                Filesize

                5.5MB

              • memory/3004-219-0x0000000001400000-0x000000000154A000-memory.dmp
                Filesize

                1.3MB

              • memory/3004-225-0x0000000071C60000-0x0000000071CAB000-memory.dmp
                Filesize

                300KB

              • memory/3008-151-0x0000000003320000-0x0000000003336000-memory.dmp
                Filesize

                88KB

              • memory/3008-243-0x0000000004F70000-0x0000000004F86000-memory.dmp
                Filesize

                88KB

              • memory/3008-119-0x0000000001250000-0x0000000001266000-memory.dmp
                Filesize

                88KB

              • memory/3144-228-0x0000000004CA0000-0x0000000004D06000-memory.dmp
                Filesize

                408KB

              • memory/3144-241-0x0000000004D12000-0x0000000004D13000-memory.dmp
                Filesize

                4KB

              • memory/3144-226-0x0000000002670000-0x00000000026D8000-memory.dmp
                Filesize

                416KB

              • memory/3144-221-0x0000000000000000-mapping.dmp
              • memory/3144-244-0x0000000004D14000-0x0000000004D16000-memory.dmp
                Filesize

                8KB

              • memory/3144-242-0x0000000004D13000-0x0000000004D14000-memory.dmp
                Filesize

                4KB

              • memory/3144-240-0x0000000004D10000-0x0000000004D11000-memory.dmp
                Filesize

                4KB

              • memory/3144-236-0x0000000000720000-0x000000000079F000-memory.dmp
                Filesize

                508KB

              • memory/3144-237-0x0000000002190000-0x000000000222C000-memory.dmp
                Filesize

                624KB

              • memory/3144-239-0x0000000000400000-0x00000000004A4000-memory.dmp
                Filesize

                656KB

              • memory/3172-146-0x0000000000000000-mapping.dmp
              • memory/3308-136-0x00000000050B0000-0x00000000050B1000-memory.dmp
                Filesize

                4KB

              • memory/3308-133-0x00000000007E0000-0x00000000007E1000-memory.dmp
                Filesize

                4KB

              • memory/3308-126-0x0000000000000000-mapping.dmp
              • memory/3308-138-0x00000000029D0000-0x00000000029D1000-memory.dmp
                Filesize

                4KB

              • memory/3308-140-0x0000000005280000-0x0000000005281000-memory.dmp
                Filesize

                4KB

              • memory/3308-142-0x0000000005790000-0x0000000005791000-memory.dmp
                Filesize

                4KB

              • memory/3568-129-0x00000000021E8000-0x00000000021F9000-memory.dmp
                Filesize

                68KB

              • memory/3568-135-0x0000000001FD0000-0x000000000211A000-memory.dmp
                Filesize

                1.3MB

              • memory/3568-120-0x0000000000000000-mapping.dmp
              • memory/3920-139-0x00000000001E0000-0x00000000001F3000-memory.dmp
                Filesize

                76KB

              • memory/3920-141-0x0000000000400000-0x0000000001FCF000-memory.dmp
                Filesize

                27.8MB

              • memory/3920-123-0x0000000000000000-mapping.dmp