Analysis

  • max time kernel
    152s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    06-12-2021 11:12

General

  • Target

    cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32.exe

  • Size

    279KB

  • MD5

    6ce5053c05174843a4d486fd5922fd6d

  • SHA1

    5ac7310582c5e9b2b51acea9ab5da2d059dbcf9d

  • SHA256

    cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32

  • SHA512

    176c8db888d5cfb820a0112255269adec43c40a5e82262f17ca7b8f559734c03622c06a0c7864279a7f98dff30f67600b149140e345ff2541dab48cba89f9222

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

b620be4c85b4051a92040003edbc322be4eb082d

Attributes
  • url4cnc

    http://91.219.236.207/capibar

    http://185.225.19.18/capibar

    http://91.219.237.227/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Deletes itself 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32.exe
    "C:\Users\Admin\AppData\Local\Temp\cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Users\Admin\AppData\Local\Temp\cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32.exe
      "C:\Users\Admin\AppData\Local\Temp\cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1856
  • C:\Users\Admin\AppData\Local\Temp\EFA0.exe
    C:\Users\Admin\AppData\Local\Temp\EFA0.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\EFA0.exe
      C:\Users\Admin\AppData\Local\Temp\EFA0.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:744
  • C:\Users\Admin\AppData\Local\Temp\5BC9.exe
    C:\Users\Admin\AppData\Local\Temp\5BC9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:424
    • C:\Users\Admin\AppData\Local\Temp\5BC9.exe
      C:\Users\Admin\AppData\Local\Temp\5BC9.exe
      2⤵
      • Executes dropped EXE
      PID:644
  • C:\Users\Admin\AppData\Local\Temp\6511.exe
    C:\Users\Admin\AppData\Local\Temp\6511.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\AmquSDtE & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\6511.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:4916
  • C:\Users\Admin\AppData\Local\Temp\6DCC.exe
    C:\Users\Admin\AppData\Local\Temp\6DCC.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1228
  • C:\Users\Admin\AppData\Local\Temp\74C3.exe
    C:\Users\Admin\AppData\Local\Temp\74C3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\74C3.exe
      C:\Users\Admin\AppData\Local\Temp\74C3.exe
      2⤵
      • Executes dropped EXE
      PID:2496
    • C:\Users\Admin\AppData\Local\Temp\74C3.exe
      C:\Users\Admin\AppData\Local\Temp\74C3.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2676

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\74C3.exe.log
    MD5

    4de34ae26d6f8e75b21ca785fe848774

    SHA1

    0899d1dd34e6d8b7e513a30a57aa4bfaa4d17090

    SHA256

    0b9b31708187948cb3e445afc11c88cf4c34c00423e31bd83cc330012d8127f8

    SHA512

    aa08459ff6948555ca3f48b1537b222a56f33fba103a1b4e688667660a2b692bda2d7943f5b2d26232d5c87a0651c3e7e0c5437a78e9723d25b26036cb1c1f2b

  • C:\Users\Admin\AppData\Local\Temp\5BC9.exe
    MD5

    45cf4ea0f9268e7306da20dea9d14210

    SHA1

    3574746d1d089f9989ee2c9e2048f014a61100ca

    SHA256

    919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281

    SHA512

    3996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d

  • C:\Users\Admin\AppData\Local\Temp\5BC9.exe
    MD5

    45cf4ea0f9268e7306da20dea9d14210

    SHA1

    3574746d1d089f9989ee2c9e2048f014a61100ca

    SHA256

    919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281

    SHA512

    3996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d

  • C:\Users\Admin\AppData\Local\Temp\5BC9.exe
    MD5

    45cf4ea0f9268e7306da20dea9d14210

    SHA1

    3574746d1d089f9989ee2c9e2048f014a61100ca

    SHA256

    919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281

    SHA512

    3996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d

  • C:\Users\Admin\AppData\Local\Temp\6511.exe
    MD5

    863355ba1dd127f6e9773970ba2fa10c

    SHA1

    0514cc30e318062b58eb6ab80e7b1a3f2e4b5425

    SHA256

    d033936fc89fe40b0d769d101e13936c738de6ecfbc6eade4be3297293d77d44

    SHA512

    b6a92c6d4f566650de3f960a3aed1547758564906ac30c774879285a73fbbe08dd2f8442e80c87dd7ffdd83b36336cb601bae5854204db3444ae3269bb5261ad

  • C:\Users\Admin\AppData\Local\Temp\6511.exe
    MD5

    863355ba1dd127f6e9773970ba2fa10c

    SHA1

    0514cc30e318062b58eb6ab80e7b1a3f2e4b5425

    SHA256

    d033936fc89fe40b0d769d101e13936c738de6ecfbc6eade4be3297293d77d44

    SHA512

    b6a92c6d4f566650de3f960a3aed1547758564906ac30c774879285a73fbbe08dd2f8442e80c87dd7ffdd83b36336cb601bae5854204db3444ae3269bb5261ad

  • C:\Users\Admin\AppData\Local\Temp\6DCC.exe
    MD5

    b863582bafa8cf3d912c52aefd8f8b8c

    SHA1

    f272e8102fde54145d8da7ad1aa8b51fd6b691ef

    SHA256

    4bb2e211a3844b88fd193fb121208c3a95c83af1c649f2d654461fcec7441b50

    SHA512

    84561aeb00867b009738954d8f0f4cc254555d8e7f6830b03f61d8113a531df2ebe29479b29f623308cd39651adb954cd4d4a60a1f992eec3337233a3b38d4f1

  • C:\Users\Admin\AppData\Local\Temp\6DCC.exe
    MD5

    b863582bafa8cf3d912c52aefd8f8b8c

    SHA1

    f272e8102fde54145d8da7ad1aa8b51fd6b691ef

    SHA256

    4bb2e211a3844b88fd193fb121208c3a95c83af1c649f2d654461fcec7441b50

    SHA512

    84561aeb00867b009738954d8f0f4cc254555d8e7f6830b03f61d8113a531df2ebe29479b29f623308cd39651adb954cd4d4a60a1f992eec3337233a3b38d4f1

  • C:\Users\Admin\AppData\Local\Temp\74C3.exe
    MD5

    418d67bdccc7c74875e0bc6c222a556e

    SHA1

    7f24f43e0de601467c5dcc6b654623dbe8151e49

    SHA256

    a5a8bd220d25a52cb97b7aaeffca5ab4c8d47f5d53302411f10348f0fa1a6aa2

    SHA512

    bc260724449b64c2a231d20c8b967b8ed51fe0d534127d84a33def4440869fad43af6be88a9eb22653bf9556662ea1dd0258af34ed0c44865304835f806a0064

  • C:\Users\Admin\AppData\Local\Temp\74C3.exe
    MD5

    418d67bdccc7c74875e0bc6c222a556e

    SHA1

    7f24f43e0de601467c5dcc6b654623dbe8151e49

    SHA256

    a5a8bd220d25a52cb97b7aaeffca5ab4c8d47f5d53302411f10348f0fa1a6aa2

    SHA512

    bc260724449b64c2a231d20c8b967b8ed51fe0d534127d84a33def4440869fad43af6be88a9eb22653bf9556662ea1dd0258af34ed0c44865304835f806a0064

  • C:\Users\Admin\AppData\Local\Temp\74C3.exe
    MD5

    418d67bdccc7c74875e0bc6c222a556e

    SHA1

    7f24f43e0de601467c5dcc6b654623dbe8151e49

    SHA256

    a5a8bd220d25a52cb97b7aaeffca5ab4c8d47f5d53302411f10348f0fa1a6aa2

    SHA512

    bc260724449b64c2a231d20c8b967b8ed51fe0d534127d84a33def4440869fad43af6be88a9eb22653bf9556662ea1dd0258af34ed0c44865304835f806a0064

  • C:\Users\Admin\AppData\Local\Temp\74C3.exe
    MD5

    418d67bdccc7c74875e0bc6c222a556e

    SHA1

    7f24f43e0de601467c5dcc6b654623dbe8151e49

    SHA256

    a5a8bd220d25a52cb97b7aaeffca5ab4c8d47f5d53302411f10348f0fa1a6aa2

    SHA512

    bc260724449b64c2a231d20c8b967b8ed51fe0d534127d84a33def4440869fad43af6be88a9eb22653bf9556662ea1dd0258af34ed0c44865304835f806a0064

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\JCBFIL~1.ZIP
    MD5

    c219337123df32ea07fc452d2b5b34f4

    SHA1

    0c636dba6293997d5b592ca776239773056e601f

    SHA256

    c2ccdee550e5ffc31eab182fc0d58d25881d855f0f30d2244ef26c27579d6c74

    SHA512

    0dca0922f68b74a15fccc5756f0c087c651e2f5786ada1b16d5cefd8b272f3d617463fcc431ad938e95088c3414892f7d2f9a8fb8722f920c5656357510c6e37

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\TNXAFV~1.ZIP
    MD5

    503a91b64ade70e8836412696a64ed17

    SHA1

    b51e9c3e6855101fd2cc27a925687845a3672e52

    SHA256

    f85224ffe3ed7274f8c4861947ae1367b60948e305b24e049973aedff6e276ab

    SHA512

    7228fd1e71cfb222947473c3c930e51bb3757137893b2cc3230092e76be0901c96db55df65a67410a74ede36e759dfa3b028f64549a8fc8a58e8391fa69876ff

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\_Files\_Chrome\DEFAUL~1.BIN
    MD5

    b963abf9a7967b3a22da64c9193fc932

    SHA1

    0831556392b56c00b07f04deb5474c4202c545e8

    SHA256

    6c0930a55e2b55dc01dbbcf1b43f4ceae3bd4b25bdde062953292427bdcb18f5

    SHA512

    64514a43b52786e09676bec07e15bc7224309c06c0ea5f691933ca3164c57a3e33d748fa8bd4596cf7deb64cbcd1e49ca75be4c22d79789d7ac3b1df45c19af2

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\_Files\_Chrome\DEFAUL~1.DB
    MD5

    b608d407fc15adea97c26936bc6f03f6

    SHA1

    953e7420801c76393902c0d6bb56148947e41571

    SHA256

    b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

    SHA512

    cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\_Files\_Chrome\DEFAUL~2.DB
    MD5

    055c8c5c47424f3c2e7a6fc2ee904032

    SHA1

    5952781d22cff35d94861fac25d89a39af6d0a87

    SHA256

    531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a

    SHA512

    c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\_Files\_Chrome\DEFAUL~3.DB
    MD5

    8ee018331e95a610680a789192a9d362

    SHA1

    e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9

    SHA256

    94354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575

    SHA512

    4b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\_Files\_INFOR~1.TXT
    MD5

    53a58c60115ecc2da48dff22466ef866

    SHA1

    336154bd56ceb9905e14d2afc9c5a45e7f9f4627

    SHA256

    c7820e5fcd2025f42892d074eb6bc21a88a2525229889fe1db2ee3fcfc5be179

    SHA512

    970521c4872ecefd79403bfba0588c32db37c5677c5b1cc5a97827191e01228834f1200e8f63714b3c1612eeefe82dd2850951639ad59c4485e40a551dab06cd

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\_Files\_SCREE~1.JPE
    MD5

    e507bee4f27c63a74a341dde3c781bb0

    SHA1

    9819cb346670b8a42afdeeab43c04dda52b320cd

    SHA256

    8f629c889a22361e73d2e916b593b24f356169f79161a7e3712a23f16cafd1de

    SHA512

    a423b2bc6949f7fd78da4bce1bc18f42f99291fe1e509b219171c5425bf71e214404c3b7c2dcb5d828a38455f34e09a8300f2600e3fa0ae01381fd9dd95980f2

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\files_\SCREEN~1.JPG
    MD5

    e507bee4f27c63a74a341dde3c781bb0

    SHA1

    9819cb346670b8a42afdeeab43c04dda52b320cd

    SHA256

    8f629c889a22361e73d2e916b593b24f356169f79161a7e3712a23f16cafd1de

    SHA512

    a423b2bc6949f7fd78da4bce1bc18f42f99291fe1e509b219171c5425bf71e214404c3b7c2dcb5d828a38455f34e09a8300f2600e3fa0ae01381fd9dd95980f2

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\files_\SYSTEM~1.TXT
    MD5

    53a58c60115ecc2da48dff22466ef866

    SHA1

    336154bd56ceb9905e14d2afc9c5a45e7f9f4627

    SHA256

    c7820e5fcd2025f42892d074eb6bc21a88a2525229889fe1db2ee3fcfc5be179

    SHA512

    970521c4872ecefd79403bfba0588c32db37c5677c5b1cc5a97827191e01228834f1200e8f63714b3c1612eeefe82dd2850951639ad59c4485e40a551dab06cd

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\files_\_Chrome\DEFAUL~1.BIN
    MD5

    b963abf9a7967b3a22da64c9193fc932

    SHA1

    0831556392b56c00b07f04deb5474c4202c545e8

    SHA256

    6c0930a55e2b55dc01dbbcf1b43f4ceae3bd4b25bdde062953292427bdcb18f5

    SHA512

    64514a43b52786e09676bec07e15bc7224309c06c0ea5f691933ca3164c57a3e33d748fa8bd4596cf7deb64cbcd1e49ca75be4c22d79789d7ac3b1df45c19af2

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\files_\_Chrome\DEFAUL~1.DB
    MD5

    b608d407fc15adea97c26936bc6f03f6

    SHA1

    953e7420801c76393902c0d6bb56148947e41571

    SHA256

    b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

    SHA512

    cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\files_\_Chrome\DEFAUL~2.DB
    MD5

    055c8c5c47424f3c2e7a6fc2ee904032

    SHA1

    5952781d22cff35d94861fac25d89a39af6d0a87

    SHA256

    531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a

    SHA512

    c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a

  • C:\Users\Admin\AppData\Local\Temp\AmquSDtE\files_\_Chrome\DEFAUL~3.DB
    MD5

    8ee018331e95a610680a789192a9d362

    SHA1

    e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9

    SHA256

    94354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575

    SHA512

    4b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4

  • C:\Users\Admin\AppData\Local\Temp\EFA0.exe
    MD5

    6ce5053c05174843a4d486fd5922fd6d

    SHA1

    5ac7310582c5e9b2b51acea9ab5da2d059dbcf9d

    SHA256

    cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32

    SHA512

    176c8db888d5cfb820a0112255269adec43c40a5e82262f17ca7b8f559734c03622c06a0c7864279a7f98dff30f67600b149140e345ff2541dab48cba89f9222

  • C:\Users\Admin\AppData\Local\Temp\EFA0.exe
    MD5

    6ce5053c05174843a4d486fd5922fd6d

    SHA1

    5ac7310582c5e9b2b51acea9ab5da2d059dbcf9d

    SHA256

    cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32

    SHA512

    176c8db888d5cfb820a0112255269adec43c40a5e82262f17ca7b8f559734c03622c06a0c7864279a7f98dff30f67600b149140e345ff2541dab48cba89f9222

  • C:\Users\Admin\AppData\Local\Temp\EFA0.exe
    MD5

    6ce5053c05174843a4d486fd5922fd6d

    SHA1

    5ac7310582c5e9b2b51acea9ab5da2d059dbcf9d

    SHA256

    cb1538b4b7281abc7c18ea8e7b9abf539dfc9e4dcac72b977601c45d184e8e32

    SHA512

    176c8db888d5cfb820a0112255269adec43c40a5e82262f17ca7b8f559734c03622c06a0c7864279a7f98dff30f67600b149140e345ff2541dab48cba89f9222

  • memory/424-131-0x0000000000000000-mapping.dmp
  • memory/424-138-0x0000000002150000-0x00000000021D2000-memory.dmp
    Filesize

    520KB

  • memory/424-134-0x0000000000598000-0x0000000000608000-memory.dmp
    Filesize

    448KB

  • memory/644-143-0x0000000000400000-0x0000000002BB9000-memory.dmp
    Filesize

    39.7MB

  • memory/644-156-0x0000000000400000-0x0000000002BB9000-memory.dmp
    Filesize

    39.7MB

  • memory/644-145-0x0000000004890000-0x000000000491F000-memory.dmp
    Filesize

    572KB

  • memory/644-144-0x0000000002C10000-0x0000000002D5A000-memory.dmp
    Filesize

    1.3MB

  • memory/644-139-0x0000000000400000-0x0000000002BB9000-memory.dmp
    Filesize

    39.7MB

  • memory/644-136-0x0000000000401E7A-mapping.dmp
  • memory/644-135-0x0000000000400000-0x0000000002BB9000-memory.dmp
    Filesize

    39.7MB

  • memory/744-128-0x0000000000402F47-mapping.dmp
  • memory/988-147-0x00000000020C0000-0x0000000002107000-memory.dmp
    Filesize

    284KB

  • memory/988-148-0x0000000000400000-0x0000000000469000-memory.dmp
    Filesize

    420KB

  • memory/988-146-0x0000000000718000-0x000000000073E000-memory.dmp
    Filesize

    152KB

  • memory/988-140-0x0000000000000000-mapping.dmp
  • memory/1228-169-0x0000000004CF0000-0x0000000004CF1000-memory.dmp
    Filesize

    4KB

  • memory/1228-193-0x0000000005100000-0x0000000005101000-memory.dmp
    Filesize

    4KB

  • memory/1228-149-0x0000000000000000-mapping.dmp
  • memory/1228-171-0x0000000075FB0000-0x0000000076534000-memory.dmp
    Filesize

    5.5MB

  • memory/1228-152-0x0000000000C70000-0x0000000000DD2000-memory.dmp
    Filesize

    1.4MB

  • memory/1228-153-0x0000000000120000-0x0000000000121000-memory.dmp
    Filesize

    4KB

  • memory/1228-176-0x0000000004EA0000-0x0000000004EA1000-memory.dmp
    Filesize

    4KB

  • memory/1228-154-0x0000000076540000-0x0000000076702000-memory.dmp
    Filesize

    1.8MB

  • memory/1228-155-0x00000000023E0000-0x0000000002425000-memory.dmp
    Filesize

    276KB

  • memory/1228-173-0x0000000074B10000-0x0000000075E58000-memory.dmp
    Filesize

    19.3MB

  • memory/1228-179-0x0000000004D30000-0x0000000004D31000-memory.dmp
    Filesize

    4KB

  • memory/1228-180-0x000000006F130000-0x000000006F17B000-memory.dmp
    Filesize

    300KB

  • memory/1228-157-0x00000000773E0000-0x00000000774D1000-memory.dmp
    Filesize

    964KB

  • memory/1228-158-0x0000000000C70000-0x0000000000C71000-memory.dmp
    Filesize

    4KB

  • memory/1228-160-0x00000000733F0000-0x0000000073470000-memory.dmp
    Filesize

    512KB

  • memory/1228-165-0x0000000004EB0000-0x0000000004EB1000-memory.dmp
    Filesize

    4KB

  • memory/1228-161-0x00000000054C0000-0x00000000054C1000-memory.dmp
    Filesize

    4KB

  • memory/1228-162-0x00000000009C0000-0x00000000009C1000-memory.dmp
    Filesize

    4KB

  • memory/1228-197-0x0000000006930000-0x0000000006931000-memory.dmp
    Filesize

    4KB

  • memory/1228-190-0x0000000005AD0000-0x0000000005AD1000-memory.dmp
    Filesize

    4KB

  • memory/1228-191-0x0000000005040000-0x0000000005041000-memory.dmp
    Filesize

    4KB

  • memory/1228-195-0x0000000006980000-0x0000000006981000-memory.dmp
    Filesize

    4KB

  • memory/1228-194-0x0000000006140000-0x0000000006141000-memory.dmp
    Filesize

    4KB

  • memory/1856-121-0x0000000000402F47-mapping.dmp
  • memory/1856-120-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/2000-172-0x0000000005B00000-0x0000000005B01000-memory.dmp
    Filesize

    4KB

  • memory/2000-170-0x0000000005280000-0x0000000005281000-memory.dmp
    Filesize

    4KB

  • memory/2000-163-0x0000000000000000-mapping.dmp
  • memory/2000-174-0x0000000005670000-0x0000000005671000-memory.dmp
    Filesize

    4KB

  • memory/2000-175-0x00000000058E0000-0x00000000058E1000-memory.dmp
    Filesize

    4KB

  • memory/2000-177-0x0000000005270000-0x0000000005271000-memory.dmp
    Filesize

    4KB

  • memory/2000-178-0x0000000005000000-0x0000000005001000-memory.dmp
    Filesize

    4KB

  • memory/2000-167-0x0000000000770000-0x0000000000771000-memory.dmp
    Filesize

    4KB

  • memory/2036-130-0x0000000002DD0000-0x0000000002DE6000-memory.dmp
    Filesize

    88KB

  • memory/2036-122-0x0000000000DC0000-0x0000000000DD6000-memory.dmp
    Filesize

    88KB

  • memory/2676-182-0x0000000000400000-0x000000000045C000-memory.dmp
    Filesize

    368KB

  • memory/2676-183-0x0000000000457EDE-mapping.dmp
  • memory/2676-187-0x0000000005940000-0x0000000005941000-memory.dmp
    Filesize

    4KB

  • memory/2676-188-0x0000000005820000-0x0000000005821000-memory.dmp
    Filesize

    4KB

  • memory/3088-119-0x0000000000570000-0x0000000000579000-memory.dmp
    Filesize

    36KB

  • memory/3088-118-0x00000000006F9000-0x0000000000702000-memory.dmp
    Filesize

    36KB

  • memory/4488-123-0x0000000000000000-mapping.dmp
  • memory/4916-213-0x0000000000000000-mapping.dmp
  • memory/5044-198-0x0000000000000000-mapping.dmp