Analysis
-
max time kernel
140s -
max time network
159s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
07-12-2021 12:54
Static task
static1
Behavioral task
behavioral1
Sample
a6e7910146fecdecd20bf89bb1be0f92.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
a6e7910146fecdecd20bf89bb1be0f92.exe
Resource
win10-en-20211104
General
-
Target
a6e7910146fecdecd20bf89bb1be0f92.exe
-
Size
321KB
-
MD5
a6e7910146fecdecd20bf89bb1be0f92
-
SHA1
81866a8450a9cd58435e59289966a3db40f09f78
-
SHA256
21837b705147ad533b64db7fcf2170662da3e2f9210d410a75caa83380e9a47f
-
SHA512
a6c92d3f57176b95c7338ea8160b8d4960725556a40f5e88e9412cf11bba7e6839a67144ee003a9b6b044b573129e51bfc31326a4d9be8a07bcbfec4cf63631b
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
Extracted
redline
195.133.47.114:38627
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1484-74-0x0000000000D50000-0x0000000000DB8000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1F84.exe family_redline C:\Users\Admin\AppData\Local\Temp\1F84.exe family_redline behavioral1/memory/1908-104-0x0000000000AE0000-0x0000000000B4C000-memory.dmp family_redline behavioral1/memory/1584-137-0x0000000000940000-0x00000000009AC000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
EDE8.exe511.exeSmartClock.exe1F84.exe2B38.exe4030.exepid process 736 EDE8.exe 1484 511.exe 1532 SmartClock.exe 1444 1F84.exe 1908 2B38.exe 1932 4030.exe -
Deletes itself 1 IoCs
Processes:
pid process 1352 -
Drops startup file 1 IoCs
Processes:
EDE8.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk EDE8.exe -
Loads dropped DLL 7 IoCs
Processes:
EDE8.exeWerFault.exepid process 736 EDE8.exe 736 EDE8.exe 736 EDE8.exe 1352 1568 WerFault.exe 1568 WerFault.exe 1568 WerFault.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
511.exe2B38.exepid process 1484 511.exe 1908 2B38.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1568 1932 WerFault.exe 4030.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a6e7910146fecdecd20bf89bb1be0f92.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a6e7910146fecdecd20bf89bb1be0f92.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a6e7910146fecdecd20bf89bb1be0f92.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a6e7910146fecdecd20bf89bb1be0f92.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 1532 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a6e7910146fecdecd20bf89bb1be0f92.exepid process 1584 a6e7910146fecdecd20bf89bb1be0f92.exe 1584 a6e7910146fecdecd20bf89bb1be0f92.exe 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1352 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a6e7910146fecdecd20bf89bb1be0f92.exepid process 1584 a6e7910146fecdecd20bf89bb1be0f92.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1352 1352 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1352 1352 1352 1352 -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
EDE8.exe4030.exedescription pid process target process PID 1352 wrote to memory of 736 1352 EDE8.exe PID 1352 wrote to memory of 736 1352 EDE8.exe PID 1352 wrote to memory of 736 1352 EDE8.exe PID 1352 wrote to memory of 736 1352 EDE8.exe PID 1352 wrote to memory of 1484 1352 511.exe PID 1352 wrote to memory of 1484 1352 511.exe PID 1352 wrote to memory of 1484 1352 511.exe PID 1352 wrote to memory of 1484 1352 511.exe PID 1352 wrote to memory of 1484 1352 511.exe PID 1352 wrote to memory of 1484 1352 511.exe PID 1352 wrote to memory of 1484 1352 511.exe PID 736 wrote to memory of 1532 736 EDE8.exe SmartClock.exe PID 736 wrote to memory of 1532 736 EDE8.exe SmartClock.exe PID 736 wrote to memory of 1532 736 EDE8.exe SmartClock.exe PID 736 wrote to memory of 1532 736 EDE8.exe SmartClock.exe PID 1352 wrote to memory of 1444 1352 1F84.exe PID 1352 wrote to memory of 1444 1352 1F84.exe PID 1352 wrote to memory of 1444 1352 1F84.exe PID 1352 wrote to memory of 1444 1352 1F84.exe PID 1352 wrote to memory of 1908 1352 2B38.exe PID 1352 wrote to memory of 1908 1352 2B38.exe PID 1352 wrote to memory of 1908 1352 2B38.exe PID 1352 wrote to memory of 1908 1352 2B38.exe PID 1352 wrote to memory of 1908 1352 2B38.exe PID 1352 wrote to memory of 1908 1352 2B38.exe PID 1352 wrote to memory of 1908 1352 2B38.exe PID 1352 wrote to memory of 1932 1352 4030.exe PID 1352 wrote to memory of 1932 1352 4030.exe PID 1352 wrote to memory of 1932 1352 4030.exe PID 1932 wrote to memory of 1568 1932 4030.exe WerFault.exe PID 1932 wrote to memory of 1568 1932 4030.exe WerFault.exe PID 1932 wrote to memory of 1568 1932 4030.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6e7910146fecdecd20bf89bb1be0f92.exe"C:\Users\Admin\AppData\Local\Temp\a6e7910146fecdecd20bf89bb1be0f92.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EDE8.exeC:\Users\Admin\AppData\Local\Temp\EDE8.exe1⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\511.exeC:\Users\Admin\AppData\Local\Temp\511.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\1F84.exeC:\Users\Admin\AppData\Local\Temp\1F84.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2B38.exeC:\Users\Admin\AppData\Local\Temp\2B38.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\4030.exeC:\Users\Admin\AppData\Local\Temp\4030.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1932 -s 1162⤵
- Loads dropped DLL
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\50E3.exeC:\Users\Admin\AppData\Local\Temp\50E3.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1F84.exeMD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
C:\Users\Admin\AppData\Local\Temp\1F84.exeMD5
3ba1d635fed88d8af279be91b7007bae
SHA162a1d59c746cdb51e699114f410749384a70cf73
SHA2563151b115c3370d5360286bfe3a053d0d543f0e5d21faa68fee167224e68d115a
SHA51283254fb484bd40740e5e0483dcc7fd8ce612033b00238494fdcdc5a5dcb3503195e0e2694edd5d848c07e2ddc61cafdb7d331afc4792ccd788837ebbce18bfeb
-
C:\Users\Admin\AppData\Local\Temp\2B38.exeMD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
C:\Users\Admin\AppData\Local\Temp\2B38.exeMD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
C:\Users\Admin\AppData\Local\Temp\4030.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
C:\Users\Admin\AppData\Local\Temp\4030.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
C:\Users\Admin\AppData\Local\Temp\50E3.exeMD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
C:\Users\Admin\AppData\Local\Temp\50E3.exeMD5
f80418f12c03a56ac2e8d8b189c13750
SHA1cd0b728375e4e178b50bca8ad65ce79aede30d37
SHA256cbc5d7db8e27b2369a1d83c2d8615c1dbb6263e8b80c4b12a86493c9df093716
SHA512e3fb85cc08a94193528ecc760b58904df47aa302419267c5b3386468e1d7fdece63fee05d8d95a083637b70a24035d3123c94463111ba372b39fcc69787aa196
-
C:\Users\Admin\AppData\Local\Temp\511.exeMD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
C:\Users\Admin\AppData\Local\Temp\511.exeMD5
77ce7ab11225c5e723b7b1be0308e8c0
SHA1709a8df1d49f28cf8c293694bbbbd0f07735829b
SHA256d407b5c7d9568448f1e7387924fe4dded9e016632879c386c307ef5dcf63f496
SHA512f73582206397db625bdefbbaf8abdc1a820ae8054eb2ef2a3ed18c8e00e8365c7ad81013b33990e4304619b3834a1b8b15c782905204add158fca686e2c25c3b
-
C:\Users\Admin\AppData\Local\Temp\EDE8.exeMD5
98b52264ed1fea478041b0a318fbc3c6
SHA1c7085124bee6c4b3c76312384fcc598e2fdfc4a0
SHA25615bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c
SHA5126c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6
-
C:\Users\Admin\AppData\Local\Temp\EDE8.exeMD5
98b52264ed1fea478041b0a318fbc3c6
SHA1c7085124bee6c4b3c76312384fcc598e2fdfc4a0
SHA25615bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c
SHA5126c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnkMD5
9da8970f5d32129ed8f8d023f46b1ae9
SHA102ed680329260f9bc60a761e746b5cfa88396591
SHA256522adb34bd7291f7db6c798333e644ab285184fe5e10eb7512279f8fb26e3f96
SHA51231eedc9f13a5e91208b466ec7334377f802fa6a4e87604f2467835a982e95bcda5c44d6c11d2bae04d509b52836f1991e24e2764685a09bba15085db44b7191a
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
98b52264ed1fea478041b0a318fbc3c6
SHA1c7085124bee6c4b3c76312384fcc598e2fdfc4a0
SHA25615bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c
SHA5126c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6
-
\Users\Admin\AppData\Local\Temp\4030.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
\Users\Admin\AppData\Local\Temp\4030.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
\Users\Admin\AppData\Local\Temp\4030.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
\Users\Admin\AppData\Local\Temp\4030.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
\Users\Admin\AppData\Local\Temp\4030.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
\Users\Admin\AppData\Local\Temp\4030.exeMD5
180fc8466647515a888cba4bdacb60db
SHA1a6a5201f997c665603c9fe05a1d08add514337a3
SHA2563c8517c6cfab98c7fdda9f3a53e7178c0a42729a9473d53224788581e42bb116
SHA5124146285d11141ac567e0c574c3aa4f19201ad9825b2a605f5022a4305ac9860529bb4443ea80ac5ccb0e51873fa802c7d6fa8d13ac195cd35519b82ba3c3fa1b
-
\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
98b52264ed1fea478041b0a318fbc3c6
SHA1c7085124bee6c4b3c76312384fcc598e2fdfc4a0
SHA25615bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c
SHA5126c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6
-
\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
98b52264ed1fea478041b0a318fbc3c6
SHA1c7085124bee6c4b3c76312384fcc598e2fdfc4a0
SHA25615bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c
SHA5126c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6
-
\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
98b52264ed1fea478041b0a318fbc3c6
SHA1c7085124bee6c4b3c76312384fcc598e2fdfc4a0
SHA25615bf44d71b89c75e4c9315abbcf0bbdb535a840c772575fccdb3eecb555e387c
SHA5126c18339e1dfbbbf91fd3a300127fb1b9bc38acc9c9892d03df187a7024291e544d21ec7f54ef82b1dace5d1fc033b807041cfc5e0bcbadc353ed96453c7869e6
-
memory/736-65-0x0000000000310000-0x00000000003A1000-memory.dmpFilesize
580KB
-
memory/736-62-0x0000000000638000-0x00000000006B8000-memory.dmpFilesize
512KB
-
memory/736-60-0x0000000000000000-mapping.dmp
-
memory/736-66-0x0000000000400000-0x0000000000540000-memory.dmpFilesize
1.2MB
-
memory/1352-59-0x0000000001DD0000-0x0000000001DE6000-memory.dmpFilesize
88KB
-
memory/1444-94-0x0000000000000000-mapping.dmp
-
memory/1444-117-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB
-
memory/1444-97-0x0000000001100000-0x0000000001101000-memory.dmpFilesize
4KB
-
memory/1484-87-0x0000000000D50000-0x0000000000D51000-memory.dmpFilesize
4KB
-
memory/1484-116-0x0000000002450000-0x0000000002451000-memory.dmpFilesize
4KB
-
memory/1484-92-0x0000000075100000-0x0000000075180000-memory.dmpFilesize
512KB
-
memory/1484-73-0x0000000074F80000-0x0000000074FCA000-memory.dmpFilesize
296KB
-
memory/1484-69-0x0000000000000000-mapping.dmp
-
memory/1484-89-0x0000000076B70000-0x0000000076BFF000-memory.dmpFilesize
572KB
-
memory/1484-82-0x00000000001C0000-0x0000000000205000-memory.dmpFilesize
276KB
-
memory/1484-75-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/1484-74-0x0000000000D50000-0x0000000000DB8000-memory.dmpFilesize
416KB
-
memory/1484-86-0x0000000075AD0000-0x0000000075C2C000-memory.dmpFilesize
1.4MB
-
memory/1484-84-0x0000000076E20000-0x0000000076E77000-memory.dmpFilesize
348KB
-
memory/1484-83-0x0000000076C20000-0x0000000076C67000-memory.dmpFilesize
284KB
-
memory/1484-77-0x0000000075850000-0x00000000758FC000-memory.dmpFilesize
688KB
-
memory/1532-90-0x0000000000628000-0x00000000006A8000-memory.dmpFilesize
512KB
-
memory/1532-80-0x0000000000000000-mapping.dmp
-
memory/1532-93-0x0000000000400000-0x0000000000540000-memory.dmpFilesize
1.2MB
-
memory/1568-126-0x000007FEFC291000-0x000007FEFC293000-memory.dmpFilesize
8KB
-
memory/1568-125-0x0000000000000000-mapping.dmp
-
memory/1568-153-0x0000000001C00000-0x0000000001C01000-memory.dmpFilesize
4KB
-
memory/1584-58-0x0000000000400000-0x00000000004D2000-memory.dmpFilesize
840KB
-
memory/1584-143-0x0000000076E20000-0x0000000076E77000-memory.dmpFilesize
348KB
-
memory/1584-55-0x00000000005D8000-0x00000000005E9000-memory.dmpFilesize
68KB
-
memory/1584-56-0x0000000075D31000-0x0000000075D33000-memory.dmpFilesize
8KB
-
memory/1584-151-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/1584-149-0x0000000075100000-0x0000000075180000-memory.dmpFilesize
512KB
-
memory/1584-148-0x0000000076B70000-0x0000000076BFF000-memory.dmpFilesize
572KB
-
memory/1584-146-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/1584-145-0x0000000075AD0000-0x0000000075C2C000-memory.dmpFilesize
1.4MB
-
memory/1584-136-0x0000000074F80000-0x0000000074FCA000-memory.dmpFilesize
296KB
-
memory/1584-141-0x0000000075850000-0x00000000758FC000-memory.dmpFilesize
688KB
-
memory/1584-142-0x0000000076C20000-0x0000000076C67000-memory.dmpFilesize
284KB
-
memory/1584-139-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/1584-138-0x00000000002D0000-0x0000000000315000-memory.dmpFilesize
276KB
-
memory/1584-132-0x0000000000000000-mapping.dmp
-
memory/1584-137-0x0000000000940000-0x00000000009AC000-memory.dmpFilesize
432KB
-
memory/1584-57-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB
-
memory/1908-109-0x0000000076E20000-0x0000000076E77000-memory.dmpFilesize
348KB
-
memory/1908-118-0x0000000000340000-0x0000000000385000-memory.dmpFilesize
276KB
-
memory/1908-103-0x0000000074F80000-0x0000000074FCA000-memory.dmpFilesize
296KB
-
memory/1908-104-0x0000000000AE0000-0x0000000000B4C000-memory.dmpFilesize
432KB
-
memory/1908-105-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB
-
memory/1908-107-0x0000000075850000-0x00000000758FC000-memory.dmpFilesize
688KB
-
memory/1908-108-0x0000000076C20000-0x0000000076C67000-memory.dmpFilesize
284KB
-
memory/1908-99-0x0000000000000000-mapping.dmp
-
memory/1908-111-0x0000000075AD0000-0x0000000075C2C000-memory.dmpFilesize
1.4MB
-
memory/1908-114-0x0000000076B70000-0x0000000076BFF000-memory.dmpFilesize
572KB
-
memory/1908-112-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/1908-119-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/1908-115-0x0000000075100000-0x0000000075180000-memory.dmpFilesize
512KB
-
memory/1932-123-0x0000000000000000-mapping.dmp