Analysis
-
max time kernel
169s -
max time network
165s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-12-2021 14:18
Static task
static1
Behavioral task
behavioral1
Sample
90b477d2d26f07e17a71d0e17dbb706b.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
90b477d2d26f07e17a71d0e17dbb706b.exe
Resource
win10-en-20211104
General
-
Target
90b477d2d26f07e17a71d0e17dbb706b.exe
-
Size
213KB
-
MD5
90b477d2d26f07e17a71d0e17dbb706b
-
SHA1
5d2a4046cf3aad360ada50ab052e4cd702592722
-
SHA256
eebb0bc908c35371455035b1bfdf3e1b89abd056deaece5b295f0863f0c5aeed
-
SHA512
625f48bc38070c80f0b99a13ec87920f3f073be417a52ff3316be08f9d8fa56e17b7b2d344e8fd86e83076355d007d735577b092aa943d2e6f8f39fc64ecb131
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
raccoon
1.8.3-hotfix
f797145799b7b1b77b35d81de942eee0908da519
-
url4cnc
http://91.219.236.27/capibar
http://94.158.245.167/capibar
http://185.163.204.216/capibar
http://185.225.19.238/capibar
http://185.163.204.218/capibar
https://t.me/capibar
Extracted
raccoon
1.8.3-hotfix
fd4f23250443a724a3d1548e6ab07c481dfc2814
-
url4cnc
http://91.219.236.27/duglassa1
http://94.158.245.167/duglassa1
http://185.163.204.216/duglassa1
http://185.225.19.238/duglassa1
http://185.163.204.218/duglassa1
https://t.me/duglassa1
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/352-138-0x0000000000050000-0x00000000000B9000-memory.dmp family_redline behavioral2/memory/2636-168-0x0000000000F30000-0x0000000001006000-memory.dmp family_redline behavioral2/memory/1348-202-0x00000000002B0000-0x0000000000384000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
E849.exeE849.exe78A.exeCAB.exe62EA.exe7C5F.exe97A8.exepid process 2716 E849.exe 4460 E849.exe 500 78A.exe 352 CAB.exe 2636 62EA.exe 4328 7C5F.exe 1348 97A8.exe -
Deletes itself 1 IoCs
Processes:
pid process 396 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
CAB.exe62EA.exe97A8.exepid process 352 CAB.exe 2636 62EA.exe 1348 97A8.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
90b477d2d26f07e17a71d0e17dbb706b.exeE849.exedescription pid process target process PID 3644 set thread context of 4252 3644 90b477d2d26f07e17a71d0e17dbb706b.exe 90b477d2d26f07e17a71d0e17dbb706b.exe PID 2716 set thread context of 4460 2716 E849.exe E849.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
90b477d2d26f07e17a71d0e17dbb706b.exeE849.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 90b477d2d26f07e17a71d0e17dbb706b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E849.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E849.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E849.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 90b477d2d26f07e17a71d0e17dbb706b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 90b477d2d26f07e17a71d0e17dbb706b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
90b477d2d26f07e17a71d0e17dbb706b.exepid process 4252 90b477d2d26f07e17a71d0e17dbb706b.exe 4252 90b477d2d26f07e17a71d0e17dbb706b.exe 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 396 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 396 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
90b477d2d26f07e17a71d0e17dbb706b.exeE849.exepid process 4252 90b477d2d26f07e17a71d0e17dbb706b.exe 4460 E849.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
CAB.exe62EA.exedescription pid process Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeDebugPrivilege 352 CAB.exe Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeDebugPrivilege 2636 62EA.exe Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 Token: SeShutdownPrivilege 396 Token: SeCreatePagefilePrivilege 396 -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
90b477d2d26f07e17a71d0e17dbb706b.exeE849.exedescription pid process target process PID 3644 wrote to memory of 4252 3644 90b477d2d26f07e17a71d0e17dbb706b.exe 90b477d2d26f07e17a71d0e17dbb706b.exe PID 3644 wrote to memory of 4252 3644 90b477d2d26f07e17a71d0e17dbb706b.exe 90b477d2d26f07e17a71d0e17dbb706b.exe PID 3644 wrote to memory of 4252 3644 90b477d2d26f07e17a71d0e17dbb706b.exe 90b477d2d26f07e17a71d0e17dbb706b.exe PID 3644 wrote to memory of 4252 3644 90b477d2d26f07e17a71d0e17dbb706b.exe 90b477d2d26f07e17a71d0e17dbb706b.exe PID 3644 wrote to memory of 4252 3644 90b477d2d26f07e17a71d0e17dbb706b.exe 90b477d2d26f07e17a71d0e17dbb706b.exe PID 3644 wrote to memory of 4252 3644 90b477d2d26f07e17a71d0e17dbb706b.exe 90b477d2d26f07e17a71d0e17dbb706b.exe PID 396 wrote to memory of 2716 396 E849.exe PID 396 wrote to memory of 2716 396 E849.exe PID 396 wrote to memory of 2716 396 E849.exe PID 2716 wrote to memory of 4460 2716 E849.exe E849.exe PID 2716 wrote to memory of 4460 2716 E849.exe E849.exe PID 2716 wrote to memory of 4460 2716 E849.exe E849.exe PID 2716 wrote to memory of 4460 2716 E849.exe E849.exe PID 2716 wrote to memory of 4460 2716 E849.exe E849.exe PID 2716 wrote to memory of 4460 2716 E849.exe E849.exe PID 396 wrote to memory of 500 396 78A.exe PID 396 wrote to memory of 500 396 78A.exe PID 396 wrote to memory of 500 396 78A.exe PID 396 wrote to memory of 352 396 CAB.exe PID 396 wrote to memory of 352 396 CAB.exe PID 396 wrote to memory of 352 396 CAB.exe PID 396 wrote to memory of 2636 396 62EA.exe PID 396 wrote to memory of 2636 396 62EA.exe PID 396 wrote to memory of 2636 396 62EA.exe PID 396 wrote to memory of 4328 396 7C5F.exe PID 396 wrote to memory of 4328 396 7C5F.exe PID 396 wrote to memory of 4328 396 7C5F.exe PID 396 wrote to memory of 1348 396 97A8.exe PID 396 wrote to memory of 1348 396 97A8.exe PID 396 wrote to memory of 1348 396 97A8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90b477d2d26f07e17a71d0e17dbb706b.exe"C:\Users\Admin\AppData\Local\Temp\90b477d2d26f07e17a71d0e17dbb706b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\90b477d2d26f07e17a71d0e17dbb706b.exe"C:\Users\Admin\AppData\Local\Temp\90b477d2d26f07e17a71d0e17dbb706b.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E849.exeC:\Users\Admin\AppData\Local\Temp\E849.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E849.exeC:\Users\Admin\AppData\Local\Temp\E849.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\78A.exeC:\Users\Admin\AppData\Local\Temp\78A.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\CAB.exeC:\Users\Admin\AppData\Local\Temp\CAB.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\62EA.exeC:\Users\Admin\AppData\Local\Temp\62EA.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7C5F.exeC:\Users\Admin\AppData\Local\Temp\7C5F.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\97A8.exeC:\Users\Admin\AppData\Local\Temp\97A8.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\62EA.exeMD5
c910c28e370e3e16c2a27e7acf65ea9a
SHA1a25693d3842385bcde757b070e78973e43f37526
SHA2565dc8f665251e67cf8f784e537df31894f9106d7dbdb72f35ce53b2c3ad357f0d
SHA512624d164eda0b6f9a1c309539bc128c5b560c0a0013176eb4d9333055654cfa4243b2211c0b5ac3bf666036a1fdcc7c3e2999abb0e8ad3a6809bf4d2ddeaee230
-
C:\Users\Admin\AppData\Local\Temp\62EA.exeMD5
c910c28e370e3e16c2a27e7acf65ea9a
SHA1a25693d3842385bcde757b070e78973e43f37526
SHA2565dc8f665251e67cf8f784e537df31894f9106d7dbdb72f35ce53b2c3ad357f0d
SHA512624d164eda0b6f9a1c309539bc128c5b560c0a0013176eb4d9333055654cfa4243b2211c0b5ac3bf666036a1fdcc7c3e2999abb0e8ad3a6809bf4d2ddeaee230
-
C:\Users\Admin\AppData\Local\Temp\78A.exeMD5
bce50d5b17bb88f22f0000511026520d
SHA1599aaed4ee72ec0e0fc4cada844a1c210e332961
SHA25677e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455
SHA512c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536
-
C:\Users\Admin\AppData\Local\Temp\78A.exeMD5
bce50d5b17bb88f22f0000511026520d
SHA1599aaed4ee72ec0e0fc4cada844a1c210e332961
SHA25677e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455
SHA512c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536
-
C:\Users\Admin\AppData\Local\Temp\7C5F.exeMD5
82647c7fd8bfcebe57a46f009285e030
SHA1d602af33f0bb33493b0d3530ee9369b5cfe2df0a
SHA256eefc11d7652518188e5cec696e4e45f774acc45b4d158cba71eb5a8cfe392736
SHA5123c956fca15a15ef0e4804f51de7aa1cd2dbd829340558378350defbb2924986c72cce4af54b126e078d09d9acbe4bb435f1160944523f8fb6dbf871cbf546fa9
-
C:\Users\Admin\AppData\Local\Temp\7C5F.exeMD5
82647c7fd8bfcebe57a46f009285e030
SHA1d602af33f0bb33493b0d3530ee9369b5cfe2df0a
SHA256eefc11d7652518188e5cec696e4e45f774acc45b4d158cba71eb5a8cfe392736
SHA5123c956fca15a15ef0e4804f51de7aa1cd2dbd829340558378350defbb2924986c72cce4af54b126e078d09d9acbe4bb435f1160944523f8fb6dbf871cbf546fa9
-
C:\Users\Admin\AppData\Local\Temp\97A8.exeMD5
64b2cfe0f18217540ae8dc5745789aad
SHA142971b008f9725fa0b327535f91b84066ab6628a
SHA2564f8c42ee1bd0fd0b402f417446088606e87cb4d7a921447306ae4bb0259aeebb
SHA512986783d6af653e098b9c7fad665cd2d18c5599913670125a74209206ab723937d26f6f0af33e8ec3c3062f4d87ec0ee9cfbf9690c378bfdabd92bab67939fa3c
-
C:\Users\Admin\AppData\Local\Temp\97A8.exeMD5
64b2cfe0f18217540ae8dc5745789aad
SHA142971b008f9725fa0b327535f91b84066ab6628a
SHA2564f8c42ee1bd0fd0b402f417446088606e87cb4d7a921447306ae4bb0259aeebb
SHA512986783d6af653e098b9c7fad665cd2d18c5599913670125a74209206ab723937d26f6f0af33e8ec3c3062f4d87ec0ee9cfbf9690c378bfdabd92bab67939fa3c
-
C:\Users\Admin\AppData\Local\Temp\CAB.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\CAB.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\E849.exeMD5
90b477d2d26f07e17a71d0e17dbb706b
SHA15d2a4046cf3aad360ada50ab052e4cd702592722
SHA256eebb0bc908c35371455035b1bfdf3e1b89abd056deaece5b295f0863f0c5aeed
SHA512625f48bc38070c80f0b99a13ec87920f3f073be417a52ff3316be08f9d8fa56e17b7b2d344e8fd86e83076355d007d735577b092aa943d2e6f8f39fc64ecb131
-
C:\Users\Admin\AppData\Local\Temp\E849.exeMD5
90b477d2d26f07e17a71d0e17dbb706b
SHA15d2a4046cf3aad360ada50ab052e4cd702592722
SHA256eebb0bc908c35371455035b1bfdf3e1b89abd056deaece5b295f0863f0c5aeed
SHA512625f48bc38070c80f0b99a13ec87920f3f073be417a52ff3316be08f9d8fa56e17b7b2d344e8fd86e83076355d007d735577b092aa943d2e6f8f39fc64ecb131
-
C:\Users\Admin\AppData\Local\Temp\E849.exeMD5
90b477d2d26f07e17a71d0e17dbb706b
SHA15d2a4046cf3aad360ada50ab052e4cd702592722
SHA256eebb0bc908c35371455035b1bfdf3e1b89abd056deaece5b295f0863f0c5aeed
SHA512625f48bc38070c80f0b99a13ec87920f3f073be417a52ff3316be08f9d8fa56e17b7b2d344e8fd86e83076355d007d735577b092aa943d2e6f8f39fc64ecb131
-
memory/352-160-0x00000000066B0000-0x00000000066B1000-memory.dmpFilesize
4KB
-
memory/352-154-0x0000000074730000-0x0000000074CB4000-memory.dmpFilesize
5.5MB
-
memory/352-164-0x00000000079E0000-0x00000000079E1000-memory.dmpFilesize
4KB
-
memory/352-135-0x0000000000000000-mapping.dmp
-
memory/352-163-0x00000000072E0000-0x00000000072E1000-memory.dmpFilesize
4KB
-
memory/352-162-0x0000000006970000-0x0000000006971000-memory.dmpFilesize
4KB
-
memory/352-138-0x0000000000050000-0x00000000000B9000-memory.dmpFilesize
420KB
-
memory/352-139-0x00000000012D0000-0x00000000012D1000-memory.dmpFilesize
4KB
-
memory/352-140-0x0000000076C40000-0x0000000076E02000-memory.dmpFilesize
1.8MB
-
memory/352-161-0x00000000067D0000-0x00000000067D1000-memory.dmpFilesize
4KB
-
memory/352-159-0x0000000005C20000-0x0000000005C21000-memory.dmpFilesize
4KB
-
memory/352-144-0x0000000002E50000-0x0000000002E95000-memory.dmpFilesize
276KB
-
memory/352-158-0x00000000069F0000-0x00000000069F1000-memory.dmpFilesize
4KB
-
memory/352-145-0x0000000076660000-0x0000000076751000-memory.dmpFilesize
964KB
-
memory/352-146-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/352-148-0x0000000071570000-0x00000000715F0000-memory.dmpFilesize
512KB
-
memory/352-149-0x0000000005EE0000-0x0000000005EE1000-memory.dmpFilesize
4KB
-
memory/352-150-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/352-151-0x00000000059E0000-0x00000000059E1000-memory.dmpFilesize
4KB
-
memory/352-152-0x00000000058D0000-0x00000000058D1000-memory.dmpFilesize
4KB
-
memory/352-153-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB
-
memory/352-157-0x000000006F7E0000-0x000000006F82B000-memory.dmpFilesize
300KB
-
memory/352-155-0x0000000075310000-0x0000000076658000-memory.dmpFilesize
19.3MB
-
memory/352-156-0x0000000005910000-0x0000000005911000-memory.dmpFilesize
4KB
-
memory/396-143-0x00000000021E0000-0x00000000021F6000-memory.dmpFilesize
88KB
-
memory/396-122-0x00000000003C0000-0x00000000003D6000-memory.dmpFilesize
88KB
-
memory/500-134-0x00000000006E8000-0x0000000000737000-memory.dmpFilesize
316KB
-
memory/500-142-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/500-131-0x0000000000000000-mapping.dmp
-
memory/500-141-0x0000000000540000-0x000000000068A000-memory.dmpFilesize
1.3MB
-
memory/1348-215-0x0000000074730000-0x0000000074CB4000-memory.dmpFilesize
5.5MB
-
memory/1348-218-0x000000006F960000-0x000000006F9AB000-memory.dmpFilesize
300KB
-
memory/1348-216-0x0000000075310000-0x0000000076658000-memory.dmpFilesize
19.3MB
-
memory/1348-214-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/1348-208-0x00000000716F0000-0x0000000071770000-memory.dmpFilesize
512KB
-
memory/1348-206-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1348-205-0x0000000076660000-0x0000000076751000-memory.dmpFilesize
964KB
-
memory/1348-204-0x0000000076C40000-0x0000000076E02000-memory.dmpFilesize
1.8MB
-
memory/1348-203-0x0000000000DF0000-0x0000000000DF1000-memory.dmpFilesize
4KB
-
memory/1348-202-0x00000000002B0000-0x0000000000384000-memory.dmpFilesize
848KB
-
memory/1348-199-0x0000000000000000-mapping.dmp
-
memory/1348-213-0x0000000001210000-0x000000000135A000-memory.dmpFilesize
1.3MB
-
memory/2636-195-0x00000000072C0000-0x00000000072C1000-memory.dmpFilesize
4KB
-
memory/2636-168-0x0000000000F30000-0x0000000001006000-memory.dmpFilesize
856KB
-
memory/2636-181-0x0000000075310000-0x0000000076658000-memory.dmpFilesize
19.3MB
-
memory/2636-184-0x000000006F960000-0x000000006F9AB000-memory.dmpFilesize
300KB
-
memory/2636-183-0x00000000059B0000-0x00000000059B1000-memory.dmpFilesize
4KB
-
memory/2636-165-0x0000000000000000-mapping.dmp
-
memory/2636-180-0x0000000074730000-0x0000000074CB4000-memory.dmpFilesize
5.5MB
-
memory/2636-182-0x00000000059A0000-0x00000000059A1000-memory.dmpFilesize
4KB
-
memory/2636-179-0x0000000002E90000-0x0000000002ED6000-memory.dmpFilesize
280KB
-
memory/2636-169-0x00000000011F0000-0x00000000011F1000-memory.dmpFilesize
4KB
-
memory/2636-170-0x0000000076C40000-0x0000000076E02000-memory.dmpFilesize
1.8MB
-
memory/2636-172-0x0000000000F30000-0x0000000000F31000-memory.dmpFilesize
4KB
-
memory/2636-171-0x0000000076660000-0x0000000076751000-memory.dmpFilesize
964KB
-
memory/2636-174-0x00000000716F0000-0x0000000071770000-memory.dmpFilesize
512KB
-
memory/2716-123-0x0000000000000000-mapping.dmp
-
memory/2716-129-0x0000000002B70000-0x0000000002CBA000-memory.dmpFilesize
1.3MB
-
memory/2716-130-0x0000000002B70000-0x0000000002CBA000-memory.dmpFilesize
1.3MB
-
memory/3644-121-0x00000000001F0000-0x00000000001F9000-memory.dmpFilesize
36KB
-
memory/3644-120-0x00000000001D0000-0x00000000001D9000-memory.dmpFilesize
36KB
-
memory/4252-119-0x0000000000402F47-mapping.dmp
-
memory/4252-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4328-198-0x0000000000400000-0x0000000002BBC000-memory.dmpFilesize
39.7MB
-
memory/4328-197-0x0000000002E60000-0x0000000002EEF000-memory.dmpFilesize
572KB
-
memory/4328-196-0x0000000002BC0000-0x0000000002D0A000-memory.dmpFilesize
1.3MB
-
memory/4328-185-0x0000000000000000-mapping.dmp
-
memory/4460-127-0x0000000000402F47-mapping.dmp