Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-12-2021 00:49
Static task
static1
Behavioral task
behavioral1
Sample
9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe
Resource
win10-en-20211104
General
-
Target
9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe
-
Size
318KB
-
MD5
cc73917de2123e14ca3be379e9eac3f8
-
SHA1
2bc2ae34f60cb49b27e304a4054994cd50618e80
-
SHA256
9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1
-
SHA512
927e500abeb1fe582f3ea58a04d3415ce75f7e0253f959557dd057996684a98652e900e40eeb1d883267769311e66d86f4010a078e275089655857abb3d26558
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Extracted
raccoon
1.8.3-hotfix
a265248b3381a96b9544405f000f9ebe9ef2475e
-
url4cnc
http://91.219.236.27/opussenseus1
http://94.158.245.167/opussenseus1
http://185.163.204.216/opussenseus1
http://185.225.19.238/opussenseus1
http://185.163.204.218/opussenseus1
https://t.me/opussenseus1
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2876-142-0x00000000011E0000-0x000000000124E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\A4C9.exe family_redline C:\Users\Admin\AppData\Local\Temp\A4C9.exe family_redline behavioral1/memory/2064-187-0x00000000012B0000-0x0000000001320000-memory.dmp family_redline behavioral1/memory/2564-217-0x0000000001040000-0x00000000010B0000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
3F37.execahbvhsSmartClock.exe8579.exeA4C9.exeCB3E.exeE5EB.exeFB78.exe79E.exepid process 592 3F37.exe 4012 cahbvhs 4092 SmartClock.exe 2876 8579.exe 1056 A4C9.exe 2064 CB3E.exe 3644 E5EB.exe 2564 FB78.exe 524 79E.exe -
Deletes itself 1 IoCs
Processes:
pid process 3060 -
Drops startup file 1 IoCs
Processes:
3F37.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 3F37.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
8579.exeCB3E.exeFB78.exepid process 2876 8579.exe 2064 CB3E.exe 2564 FB78.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3176 3644 WerFault.exe E5EB.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.execahbvhsdescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cahbvhs Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cahbvhs Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cahbvhs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 4092 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exepid process 2368 9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe 2368 9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3060 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.execahbvhspid process 2368 9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe 4012 cahbvhs -
Suspicious use of AdjustPrivilegeToken 51 IoCs
Processes:
8579.exeA4C9.exeWerFault.exeCB3E.exeFB78.exedescription pid process Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeDebugPrivilege 2876 8579.exe Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeDebugPrivilege 1056 A4C9.exe Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeDebugPrivilege 3176 WerFault.exe Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeDebugPrivilege 2064 CB3E.exe Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeDebugPrivilege 2564 FB78.exe Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 Token: SeShutdownPrivilege 3060 Token: SeCreatePagefilePrivilege 3060 -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
3F37.exedescription pid process target process PID 3060 wrote to memory of 592 3060 3F37.exe PID 3060 wrote to memory of 592 3060 3F37.exe PID 3060 wrote to memory of 592 3060 3F37.exe PID 592 wrote to memory of 4092 592 3F37.exe SmartClock.exe PID 592 wrote to memory of 4092 592 3F37.exe SmartClock.exe PID 592 wrote to memory of 4092 592 3F37.exe SmartClock.exe PID 3060 wrote to memory of 2876 3060 8579.exe PID 3060 wrote to memory of 2876 3060 8579.exe PID 3060 wrote to memory of 2876 3060 8579.exe PID 3060 wrote to memory of 1056 3060 A4C9.exe PID 3060 wrote to memory of 1056 3060 A4C9.exe PID 3060 wrote to memory of 1056 3060 A4C9.exe PID 3060 wrote to memory of 2064 3060 CB3E.exe PID 3060 wrote to memory of 2064 3060 CB3E.exe PID 3060 wrote to memory of 2064 3060 CB3E.exe PID 3060 wrote to memory of 3644 3060 E5EB.exe PID 3060 wrote to memory of 3644 3060 E5EB.exe PID 3060 wrote to memory of 2564 3060 FB78.exe PID 3060 wrote to memory of 2564 3060 FB78.exe PID 3060 wrote to memory of 2564 3060 FB78.exe PID 3060 wrote to memory of 524 3060 79E.exe PID 3060 wrote to memory of 524 3060 79E.exe PID 3060 wrote to memory of 524 3060 79E.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe"C:\Users\Admin\AppData\Local\Temp\9e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3F37.exeC:\Users\Admin\AppData\Local\Temp\3F37.exe1⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Roaming\cahbvhsC:\Users\Admin\AppData\Roaming\cahbvhs1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\8579.exeC:\Users\Admin\AppData\Local\Temp\8579.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\A4C9.exeC:\Users\Admin\AppData\Local\Temp\A4C9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\CB3E.exeC:\Users\Admin\AppData\Local\Temp\CB3E.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\E5EB.exeC:\Users\Admin\AppData\Local\Temp\E5EB.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3644 -s 4202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\FB78.exeC:\Users\Admin\AppData\Local\Temp\FB78.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\79E.exeC:\Users\Admin\AppData\Local\Temp\79E.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3F37.exeMD5
e00025e17bdaabc16a52e899f4b5ad0b
SHA15d70684a816229201bea867631d1e488034daa70
SHA2566476006819eddd44ee6b2d4a3eff4d35e447e1ca34f25673bafb06e3b1cc9916
SHA5126c999d67393e0467ba1e8cb313442d39d944e8e8ecf2a009f8cd6845b55f91132622715407c13aa50e5b46ebfa3207b7ebeabbdedf078996d01107db0a020418
-
C:\Users\Admin\AppData\Local\Temp\3F37.exeMD5
e00025e17bdaabc16a52e899f4b5ad0b
SHA15d70684a816229201bea867631d1e488034daa70
SHA2566476006819eddd44ee6b2d4a3eff4d35e447e1ca34f25673bafb06e3b1cc9916
SHA5126c999d67393e0467ba1e8cb313442d39d944e8e8ecf2a009f8cd6845b55f91132622715407c13aa50e5b46ebfa3207b7ebeabbdedf078996d01107db0a020418
-
C:\Users\Admin\AppData\Local\Temp\79E.exeMD5
80ea247440983b626aa7da73141f3fad
SHA15b67259dfd67f8fc51d8de9539517d2a284b05b5
SHA256083e464c9c1fc540ec335e03ce67d7d823a0778e71f98e5a72b954ee15a262ba
SHA5127928a83da08291c41a568bdb642bf66aba0d2f6e1a06dd62bda609371214380c69a121220eea8baac96e0fbe2beae9827a50929e47fd022710f67670ee14e720
-
C:\Users\Admin\AppData\Local\Temp\8579.exeMD5
d92f413e5c665884f3b45f4b6bfeb640
SHA126910c896532597ab32f328e3f6f308d82aa68f5
SHA2560d397ba8d82603972ec469c7f8f99688143597bab496a0686f6fef08b85e0b2e
SHA5125b29a6945fb9d15b19375c74b2fb71c699e87a1882f9a276862471d8d0638e90d98a3034804e403a239f36f8fc3e299fe79c16bd68160a528c9ebe3629a9a773
-
C:\Users\Admin\AppData\Local\Temp\8579.exeMD5
d92f413e5c665884f3b45f4b6bfeb640
SHA126910c896532597ab32f328e3f6f308d82aa68f5
SHA2560d397ba8d82603972ec469c7f8f99688143597bab496a0686f6fef08b85e0b2e
SHA5125b29a6945fb9d15b19375c74b2fb71c699e87a1882f9a276862471d8d0638e90d98a3034804e403a239f36f8fc3e299fe79c16bd68160a528c9ebe3629a9a773
-
C:\Users\Admin\AppData\Local\Temp\A4C9.exeMD5
af3e72baaff0c1fc986ccd2e99f1c506
SHA197b7a37335e47b284992b9f32a3ceecc36e89b29
SHA2569da7b4e27292080a1754a51e8087e6c7d0929eadcfc942be2485f57b561c1162
SHA5121cd27bc0ff171e2c1194ff4994fa250d16dec73e9c8a73a3bb68240f81101f504cdc25033ee3fb7f2d2c0dfdd016334e1852e9e98ae188f855960f294c2af094
-
C:\Users\Admin\AppData\Local\Temp\A4C9.exeMD5
af3e72baaff0c1fc986ccd2e99f1c506
SHA197b7a37335e47b284992b9f32a3ceecc36e89b29
SHA2569da7b4e27292080a1754a51e8087e6c7d0929eadcfc942be2485f57b561c1162
SHA5121cd27bc0ff171e2c1194ff4994fa250d16dec73e9c8a73a3bb68240f81101f504cdc25033ee3fb7f2d2c0dfdd016334e1852e9e98ae188f855960f294c2af094
-
C:\Users\Admin\AppData\Local\Temp\CB3E.exeMD5
a83c3ca2bff1e575b4ce472bd2899ae3
SHA1177af089d606c62a5427a458b8d1cc232ddb952d
SHA2562c97180b9aa8267542d86d5420f2f95a02413c206ea250d93edf8b6ac5b55b04
SHA512027740dbd8ee9836039c2a96ddc7a83960ae551bb35e9346216dfc2e5b2959169438951fa1cb71bab2b9f13152c0fd61e2130c8b42baf35fa9e9e7f32869b324
-
C:\Users\Admin\AppData\Local\Temp\CB3E.exeMD5
a83c3ca2bff1e575b4ce472bd2899ae3
SHA1177af089d606c62a5427a458b8d1cc232ddb952d
SHA2562c97180b9aa8267542d86d5420f2f95a02413c206ea250d93edf8b6ac5b55b04
SHA512027740dbd8ee9836039c2a96ddc7a83960ae551bb35e9346216dfc2e5b2959169438951fa1cb71bab2b9f13152c0fd61e2130c8b42baf35fa9e9e7f32869b324
-
C:\Users\Admin\AppData\Local\Temp\E5EB.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
C:\Users\Admin\AppData\Local\Temp\E5EB.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
C:\Users\Admin\AppData\Local\Temp\FB78.exeMD5
a83c3ca2bff1e575b4ce472bd2899ae3
SHA1177af089d606c62a5427a458b8d1cc232ddb952d
SHA2562c97180b9aa8267542d86d5420f2f95a02413c206ea250d93edf8b6ac5b55b04
SHA512027740dbd8ee9836039c2a96ddc7a83960ae551bb35e9346216dfc2e5b2959169438951fa1cb71bab2b9f13152c0fd61e2130c8b42baf35fa9e9e7f32869b324
-
C:\Users\Admin\AppData\Local\Temp\FB78.exeMD5
a83c3ca2bff1e575b4ce472bd2899ae3
SHA1177af089d606c62a5427a458b8d1cc232ddb952d
SHA2562c97180b9aa8267542d86d5420f2f95a02413c206ea250d93edf8b6ac5b55b04
SHA512027740dbd8ee9836039c2a96ddc7a83960ae551bb35e9346216dfc2e5b2959169438951fa1cb71bab2b9f13152c0fd61e2130c8b42baf35fa9e9e7f32869b324
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
e00025e17bdaabc16a52e899f4b5ad0b
SHA15d70684a816229201bea867631d1e488034daa70
SHA2566476006819eddd44ee6b2d4a3eff4d35e447e1ca34f25673bafb06e3b1cc9916
SHA5126c999d67393e0467ba1e8cb313442d39d944e8e8ecf2a009f8cd6845b55f91132622715407c13aa50e5b46ebfa3207b7ebeabbdedf078996d01107db0a020418
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
e00025e17bdaabc16a52e899f4b5ad0b
SHA15d70684a816229201bea867631d1e488034daa70
SHA2566476006819eddd44ee6b2d4a3eff4d35e447e1ca34f25673bafb06e3b1cc9916
SHA5126c999d67393e0467ba1e8cb313442d39d944e8e8ecf2a009f8cd6845b55f91132622715407c13aa50e5b46ebfa3207b7ebeabbdedf078996d01107db0a020418
-
C:\Users\Admin\AppData\Roaming\cahbvhsMD5
cc73917de2123e14ca3be379e9eac3f8
SHA12bc2ae34f60cb49b27e304a4054994cd50618e80
SHA2569e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1
SHA512927e500abeb1fe582f3ea58a04d3415ce75f7e0253f959557dd057996684a98652e900e40eeb1d883267769311e66d86f4010a078e275089655857abb3d26558
-
C:\Users\Admin\AppData\Roaming\cahbvhsMD5
cc73917de2123e14ca3be379e9eac3f8
SHA12bc2ae34f60cb49b27e304a4054994cd50618e80
SHA2569e67104adeb57988cc9c495a21983e88b4d6967786d49f584a8e824fee8aacb1
SHA512927e500abeb1fe582f3ea58a04d3415ce75f7e0253f959557dd057996684a98652e900e40eeb1d883267769311e66d86f4010a078e275089655857abb3d26558
-
memory/524-234-0x0000000000000000-mapping.dmp
-
memory/524-236-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/524-237-0x0000000002850000-0x00000000028E1000-memory.dmpFilesize
580KB
-
memory/592-132-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/592-128-0x0000000000690000-0x00000000007DA000-memory.dmpFilesize
1.3MB
-
memory/592-127-0x0000000000591000-0x0000000000611000-memory.dmpFilesize
512KB
-
memory/592-122-0x0000000000000000-mapping.dmp
-
memory/1056-159-0x0000000000000000-mapping.dmp
-
memory/1056-173-0x00000000052D0000-0x00000000058D6000-memory.dmpFilesize
6.0MB
-
memory/1056-162-0x0000000000A90000-0x0000000000A91000-memory.dmpFilesize
4KB
-
memory/2064-194-0x0000000072050000-0x00000000720D0000-memory.dmpFilesize
512KB
-
memory/2064-199-0x0000000076F10000-0x0000000077494000-memory.dmpFilesize
5.5MB
-
memory/2064-187-0x00000000012B0000-0x0000000001320000-memory.dmpFilesize
448KB
-
memory/2064-188-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2064-189-0x0000000075460000-0x0000000075622000-memory.dmpFilesize
1.8MB
-
memory/2064-190-0x00000000006C0000-0x0000000000705000-memory.dmpFilesize
276KB
-
memory/2064-191-0x0000000074020000-0x0000000074111000-memory.dmpFilesize
964KB
-
memory/2064-192-0x00000000012B0000-0x00000000012B1000-memory.dmpFilesize
4KB
-
memory/2064-184-0x0000000000000000-mapping.dmp
-
memory/2064-203-0x0000000001010000-0x0000000001011000-memory.dmpFilesize
4KB
-
memory/2064-202-0x00000000702A0000-0x00000000702EB000-memory.dmpFilesize
300KB
-
memory/2064-200-0x00000000758F0000-0x0000000076C38000-memory.dmpFilesize
19.3MB
-
memory/2368-120-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/2368-119-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/2564-214-0x0000000000000000-mapping.dmp
-
memory/2564-217-0x0000000001040000-0x00000000010B0000-memory.dmpFilesize
448KB
-
memory/2564-218-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/2564-219-0x0000000075460000-0x0000000075622000-memory.dmpFilesize
1.8MB
-
memory/2564-224-0x0000000002710000-0x0000000002755000-memory.dmpFilesize
276KB
-
memory/2564-233-0x0000000002830000-0x0000000002831000-memory.dmpFilesize
4KB
-
memory/2876-144-0x0000000075460000-0x0000000075622000-memory.dmpFilesize
1.8MB
-
memory/2876-156-0x00000000053A0000-0x00000000053A1000-memory.dmpFilesize
4KB
-
memory/2876-175-0x0000000006E60000-0x0000000006E61000-memory.dmpFilesize
4KB
-
memory/2876-176-0x0000000007560000-0x0000000007561000-memory.dmpFilesize
4KB
-
memory/2876-142-0x00000000011E0000-0x000000000124E000-memory.dmpFilesize
440KB
-
memory/2876-139-0x0000000000000000-mapping.dmp
-
memory/2876-149-0x00000000059C0000-0x00000000059C1000-memory.dmpFilesize
4KB
-
memory/2876-172-0x0000000006790000-0x0000000006791000-memory.dmpFilesize
4KB
-
memory/2876-171-0x00000000061F0000-0x00000000061F1000-memory.dmpFilesize
4KB
-
memory/2876-170-0x00000000060D0000-0x00000000060D1000-memory.dmpFilesize
4KB
-
memory/2876-169-0x0000000005690000-0x0000000005691000-memory.dmpFilesize
4KB
-
memory/2876-143-0x0000000000C70000-0x0000000000C71000-memory.dmpFilesize
4KB
-
memory/2876-148-0x0000000072050000-0x00000000720D0000-memory.dmpFilesize
512KB
-
memory/2876-145-0x0000000074020000-0x0000000074111000-memory.dmpFilesize
964KB
-
memory/2876-146-0x00000000011E0000-0x00000000011E1000-memory.dmpFilesize
4KB
-
memory/2876-158-0x00000000702A0000-0x00000000702EB000-memory.dmpFilesize
300KB
-
memory/2876-157-0x00000000053B0000-0x00000000053B1000-memory.dmpFilesize
4KB
-
memory/2876-174-0x00000000063F0000-0x00000000063F1000-memory.dmpFilesize
4KB
-
memory/2876-150-0x00000000028C0000-0x0000000002905000-memory.dmpFilesize
276KB
-
memory/2876-151-0x00000000052F0000-0x00000000052F1000-memory.dmpFilesize
4KB
-
memory/2876-152-0x00000000054C0000-0x00000000054C1000-memory.dmpFilesize
4KB
-
memory/2876-155-0x00000000758F0000-0x0000000076C38000-memory.dmpFilesize
19.3MB
-
memory/2876-153-0x0000000005350000-0x0000000005351000-memory.dmpFilesize
4KB
-
memory/2876-154-0x0000000076F10000-0x0000000077494000-memory.dmpFilesize
5.5MB
-
memory/3060-121-0x00000000012F0000-0x0000000001306000-memory.dmpFilesize
88KB
-
memory/3060-138-0x0000000001490000-0x00000000014A6000-memory.dmpFilesize
88KB
-
memory/3644-206-0x0000000000000000-mapping.dmp
-
memory/4012-134-0x00000000007E1000-0x00000000007F2000-memory.dmpFilesize
68KB
-
memory/4012-135-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/4092-136-0x0000000000640000-0x000000000078A000-memory.dmpFilesize
1.3MB
-
memory/4092-137-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/4092-133-0x0000000000791000-0x0000000000811000-memory.dmpFilesize
512KB
-
memory/4092-129-0x0000000000000000-mapping.dmp