Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-12-2021 12:11
Static task
static1
Behavioral task
behavioral1
Sample
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe
Resource
win10-en-20211208
General
-
Target
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe
-
Size
171KB
-
MD5
595911ab63d7ce2dea26ed3e9aa427df
-
SHA1
841da4a7454d379274e231eefaf9428c298804dc
-
SHA256
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570
-
SHA512
b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
icedid
3372020928
jeliskvosh.com
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/824-137-0x0000000000DA0000-0x0000000000E09000-memory.dmp family_redline behavioral1/memory/1372-157-0x0000000000040000-0x00000000000E6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
2F49.exe2F49.exeD5FA.exe27A5.exe85E3.exepid process 4444 2F49.exe 4360 2F49.exe 2532 D5FA.exe 824 27A5.exe 1372 85E3.exe -
Deletes itself 1 IoCs
Processes:
pid process 3032 -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 2648 regsvr32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
27A5.exe85E3.exepid process 824 27A5.exe 1372 85E3.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe2F49.exedescription pid process target process PID 3652 set thread context of 3856 3652 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe PID 4444 set thread context of 4360 4444 2F49.exe 2F49.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe2F49.exeD5FA.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2F49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D5FA.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2F49.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2F49.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D5FA.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D5FA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exepid process 3856 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe 3856 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe2F49.exeD5FA.exepid process 3856 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe 4360 2F49.exe 2532 D5FA.exe 3032 3032 3032 3032 -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe2F49.exedescription pid process target process PID 3652 wrote to memory of 3856 3652 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe PID 3652 wrote to memory of 3856 3652 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe PID 3652 wrote to memory of 3856 3652 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe PID 3652 wrote to memory of 3856 3652 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe PID 3652 wrote to memory of 3856 3652 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe PID 3652 wrote to memory of 3856 3652 d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe PID 3032 wrote to memory of 4444 3032 2F49.exe PID 3032 wrote to memory of 4444 3032 2F49.exe PID 3032 wrote to memory of 4444 3032 2F49.exe PID 4444 wrote to memory of 4360 4444 2F49.exe 2F49.exe PID 4444 wrote to memory of 4360 4444 2F49.exe 2F49.exe PID 4444 wrote to memory of 4360 4444 2F49.exe 2F49.exe PID 4444 wrote to memory of 4360 4444 2F49.exe 2F49.exe PID 4444 wrote to memory of 4360 4444 2F49.exe 2F49.exe PID 4444 wrote to memory of 4360 4444 2F49.exe 2F49.exe PID 3032 wrote to memory of 2532 3032 D5FA.exe PID 3032 wrote to memory of 2532 3032 D5FA.exe PID 3032 wrote to memory of 2532 3032 D5FA.exe PID 3032 wrote to memory of 824 3032 27A5.exe PID 3032 wrote to memory of 824 3032 27A5.exe PID 3032 wrote to memory of 824 3032 27A5.exe PID 3032 wrote to memory of 1372 3032 85E3.exe PID 3032 wrote to memory of 1372 3032 85E3.exe PID 3032 wrote to memory of 1372 3032 85E3.exe PID 3032 wrote to memory of 1596 3032 explorer.exe PID 3032 wrote to memory of 1596 3032 explorer.exe PID 3032 wrote to memory of 1596 3032 explorer.exe PID 3032 wrote to memory of 1596 3032 explorer.exe PID 3032 wrote to memory of 2360 3032 explorer.exe PID 3032 wrote to memory of 2360 3032 explorer.exe PID 3032 wrote to memory of 2360 3032 explorer.exe PID 3032 wrote to memory of 2648 3032 regsvr32.exe PID 3032 wrote to memory of 2648 3032 regsvr32.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe"C:\Users\Admin\AppData\Local\Temp\d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe"C:\Users\Admin\AppData\Local\Temp\d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3856
-
C:\Users\Admin\AppData\Local\Temp\2F49.exeC:\Users\Admin\AppData\Local\Temp\2F49.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\2F49.exeC:\Users\Admin\AppData\Local\Temp\2F49.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4360
-
C:\Users\Admin\AppData\Local\Temp\D5FA.exeC:\Users\Admin\AppData\Local\Temp\D5FA.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2532
-
C:\Users\Admin\AppData\Local\Temp\27A5.exeC:\Users\Admin\AppData\Local\Temp\27A5.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:824
-
C:\Users\Admin\AppData\Local\Temp\85E3.exeC:\Users\Admin\AppData\Local\Temp\85E3.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1372
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1596
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2360
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\B447.dll1⤵
- Loads dropped DLL
PID:2648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\27A5.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\27A5.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\2F49.exeMD5
595911ab63d7ce2dea26ed3e9aa427df
SHA1841da4a7454d379274e231eefaf9428c298804dc
SHA256d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570
SHA512b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13
-
C:\Users\Admin\AppData\Local\Temp\2F49.exeMD5
595911ab63d7ce2dea26ed3e9aa427df
SHA1841da4a7454d379274e231eefaf9428c298804dc
SHA256d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570
SHA512b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13
-
C:\Users\Admin\AppData\Local\Temp\2F49.exeMD5
595911ab63d7ce2dea26ed3e9aa427df
SHA1841da4a7454d379274e231eefaf9428c298804dc
SHA256d97de9ff3962ab65737018f8bf4ba9d2baa143f1b9217d119db2cafbaa2a2570
SHA512b20c6ece4fc7b08c84642eb4377a8f494ba15ac2c8ff6454f111a9c489d1249ee9d0e5967a3a8408b12edac6324f1d92b72adfe8530746d3b8f6e8656017ba13
-
C:\Users\Admin\AppData\Local\Temp\85E3.exeMD5
a73c4054b630f348c4ffb1f5939c8c02
SHA18fc966305d9810ffd1aa4c79344a06892be5c9d4
SHA256db8c5ef558a72c5075366149d86e43f8b22c7af51ae71d0456d2c44116a80835
SHA512a53605fe5de2730089db38b58f4b007a081438015119f8742adf99534cff5e7e64c6c5d85bf1f289a4be1a677c7481f5d5d9a2c18d0259ada78c1d7343e8e0cd
-
C:\Users\Admin\AppData\Local\Temp\85E3.exeMD5
a73c4054b630f348c4ffb1f5939c8c02
SHA18fc966305d9810ffd1aa4c79344a06892be5c9d4
SHA256db8c5ef558a72c5075366149d86e43f8b22c7af51ae71d0456d2c44116a80835
SHA512a53605fe5de2730089db38b58f4b007a081438015119f8742adf99534cff5e7e64c6c5d85bf1f289a4be1a677c7481f5d5d9a2c18d0259ada78c1d7343e8e0cd
-
C:\Users\Admin\AppData\Local\Temp\B447.dllMD5
d59fa2838f83e31ef0d2bd34bd86ef40
SHA1d9115b1a962256b6accabfee45c5654f3ee64a47
SHA25632de1e4b5582279bf16bfcad4c55b5e0f1151afddb2a96013442b3158f4a02d8
SHA51292a9888556706f4f3bf33e6cdfeddca958780438c73a6749e18b4a59b866b96e67c1736cf557ed470ae095c3385bb0818c4199bc00d2c088a5179029c587a93f
-
C:\Users\Admin\AppData\Local\Temp\D5FA.exeMD5
265ed6f79387305a37bd4a598403adf1
SHA1c0647e1d4a77715a54141e4898bebcd322f3d9da
SHA2561c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5
SHA5121a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62
-
C:\Users\Admin\AppData\Local\Temp\D5FA.exeMD5
265ed6f79387305a37bd4a598403adf1
SHA1c0647e1d4a77715a54141e4898bebcd322f3d9da
SHA2561c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5
SHA5121a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62
-
\Users\Admin\AppData\Local\Temp\B447.dllMD5
d59fa2838f83e31ef0d2bd34bd86ef40
SHA1d9115b1a962256b6accabfee45c5654f3ee64a47
SHA25632de1e4b5582279bf16bfcad4c55b5e0f1151afddb2a96013442b3158f4a02d8
SHA51292a9888556706f4f3bf33e6cdfeddca958780438c73a6749e18b4a59b866b96e67c1736cf557ed470ae095c3385bb0818c4199bc00d2c088a5179029c587a93f
-
memory/824-149-0x00000000762B0000-0x0000000076834000-memory.dmpFilesize
5.5MB
-
memory/824-153-0x000000006FD50000-0x000000006FD9B000-memory.dmpFilesize
300KB
-
memory/824-150-0x0000000074BD0000-0x0000000075F18000-memory.dmpFilesize
19.3MB
-
memory/824-145-0x0000000005280000-0x0000000005281000-memory.dmpFilesize
4KB
-
memory/824-148-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/824-147-0x0000000004D80000-0x0000000004D81000-memory.dmpFilesize
4KB
-
memory/824-146-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/824-134-0x0000000000000000-mapping.dmp
-
memory/824-152-0x0000000002960000-0x0000000002961000-memory.dmpFilesize
4KB
-
memory/824-151-0x00000000029B0000-0x00000000029B1000-memory.dmpFilesize
4KB
-
memory/824-137-0x0000000000DA0000-0x0000000000E09000-memory.dmpFilesize
420KB
-
memory/824-138-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/824-139-0x0000000076E20000-0x0000000076FE2000-memory.dmpFilesize
1.8MB
-
memory/824-140-0x0000000002210000-0x0000000002255000-memory.dmpFilesize
276KB
-
memory/824-141-0x0000000074430000-0x0000000074521000-memory.dmpFilesize
964KB
-
memory/824-142-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB
-
memory/824-144-0x0000000071B00000-0x0000000071B80000-memory.dmpFilesize
512KB
-
memory/1372-163-0x0000000071B00000-0x0000000071B80000-memory.dmpFilesize
512KB
-
memory/1372-157-0x0000000000040000-0x00000000000E6000-memory.dmpFilesize
664KB
-
memory/1372-173-0x000000006FD50000-0x000000006FD9B000-memory.dmpFilesize
300KB
-
memory/1372-171-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/1372-169-0x0000000074BD0000-0x0000000075F18000-memory.dmpFilesize
19.3MB
-
memory/1372-170-0x0000000000CA0000-0x0000000000CE5000-memory.dmpFilesize
276KB
-
memory/1372-168-0x00000000762B0000-0x0000000076834000-memory.dmpFilesize
5.5MB
-
memory/1372-161-0x0000000000040000-0x0000000000041000-memory.dmpFilesize
4KB
-
memory/1372-160-0x0000000074430000-0x0000000074521000-memory.dmpFilesize
964KB
-
memory/1372-154-0x0000000000000000-mapping.dmp
-
memory/1372-159-0x0000000076E20000-0x0000000076FE2000-memory.dmpFilesize
1.8MB
-
memory/1372-158-0x0000000002840000-0x0000000002841000-memory.dmpFilesize
4KB
-
memory/1596-175-0x0000000002A80000-0x0000000002AF4000-memory.dmpFilesize
464KB
-
memory/1596-174-0x0000000000000000-mapping.dmp
-
memory/1596-176-0x0000000002A10000-0x0000000002A7B000-memory.dmpFilesize
428KB
-
memory/2360-179-0x0000000000630000-0x000000000063C000-memory.dmpFilesize
48KB
-
memory/2360-177-0x0000000000000000-mapping.dmp
-
memory/2360-178-0x0000000000640000-0x0000000000647000-memory.dmpFilesize
28KB
-
memory/2532-127-0x0000000000000000-mapping.dmp
-
memory/2532-130-0x0000000000786000-0x0000000000797000-memory.dmpFilesize
68KB
-
memory/2532-132-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/2532-131-0x00000000004D0000-0x000000000061A000-memory.dmpFilesize
1.3MB
-
memory/2648-183-0x00000000024C0000-0x00000000024CA000-memory.dmpFilesize
40KB
-
memory/2648-180-0x0000000000000000-mapping.dmp
-
memory/3032-119-0x0000000002CF0000-0x0000000002D06000-memory.dmpFilesize
88KB
-
memory/3032-133-0x0000000003280000-0x0000000003296000-memory.dmpFilesize
88KB
-
memory/3032-126-0x0000000003150000-0x0000000003166000-memory.dmpFilesize
88KB
-
memory/3652-118-0x0000000000860000-0x0000000000869000-memory.dmpFilesize
36KB
-
memory/3652-117-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/3856-115-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3856-116-0x0000000000402F47-mapping.dmp
-
memory/4360-124-0x0000000000402F47-mapping.dmp
-
memory/4444-120-0x0000000000000000-mapping.dmp