Analysis
-
max time kernel
70s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
12-03-2022 20:56
Static task
static1
Behavioral task
behavioral1
Sample
0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe
Resource
win10v2004-20220310-en
General
-
Target
0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe
-
Size
234KB
-
MD5
c84fc9842b288932a1c1cc8f1371ea21
-
SHA1
2e048768e866cb00596b3b6718956d0ff070f615
-
SHA256
0da6fa4b335e835322515d0a96c88d6a133349d57560f476821d90e2477ffbeb
-
SHA512
04eedd48ac09195da84eb9d7b7fb37a77f9ebc13cbb9f342a33e3d1e821536622ae90d3c29c2c76b68cb2076eea7f627e84b34a5fb4b5f6cd3924fa749be9a46
Malware Config
Extracted
smokeloader
2020
http://coralee.at/upload/
http://ducvietcao.com/upload/
http://biz-acc.ru/upload/
http://toimap.com/upload/
http://bbb7d.com/upload/
http://piratia-life.ru/upload/
http://curvreport.com/upload/
http://viagratos.com/upload/
http://mordo.ru/upload/
http://pkodev.net/upload/
Extracted
raccoon
ccba3157b9f42051adf38fbb8f5d0aca7f2b7366
-
url4cnc
http://185.163.204.81/nui8xtgen
http://194.180.191.33/nui8xtgen
http://174.138.11.98/nui8xtgen
http://194.180.191.44/nui8xtgen
http://91.219.236.120/nui8xtgen
https://t.me/nui8xtgen
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Danabot Key Exchange Request
suricata: ET MALWARE Danabot Key Exchange Request
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 62 3116 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
C8DB.exeED9A.exe1CD9.exepid process 1316 C8DB.exe 5060 ED9A.exe 2600 1CD9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
C8DB.exedescription pid process target process PID 1316 set thread context of 4748 1316 C8DB.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3392 1316 WerFault.exe C8DB.exe 3516 2600 WerFault.exe 1CD9.exe 2548 1316 WerFault.exe C8DB.exe 3324 1316 WerFault.exe C8DB.exe 2084 1316 WerFault.exe C8DB.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
0da6fa4b335e835322515d0a96c88d6a133349d57560f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe -
Checks processor information in registry 2 TTPs 45 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
C8DB.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet C8DB.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier C8DB.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C8DB.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C8DB.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision C8DB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0da6fa4b335e835322515d0a96c88d6a133349d57560f.exepid process 4804 0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe 4804 0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 2640 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
0da6fa4b335e835322515d0a96c88d6a133349d57560f.exepid process 4804 0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
ED9A.exedescription pid process Token: SeShutdownPrivilege 2640 Token: SeCreatePagefilePrivilege 2640 Token: SeDebugPrivilege 5060 ED9A.exe Token: SeShutdownPrivilege 2640 Token: SeCreatePagefilePrivilege 2640 Token: SeShutdownPrivilege 2640 Token: SeCreatePagefilePrivilege 2640 Token: SeShutdownPrivilege 2640 Token: SeCreatePagefilePrivilege 2640 Token: SeShutdownPrivilege 2640 Token: SeCreatePagefilePrivilege 2640 -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
C8DB.exedescription pid process target process PID 2640 wrote to memory of 1316 2640 C8DB.exe PID 2640 wrote to memory of 1316 2640 C8DB.exe PID 2640 wrote to memory of 1316 2640 C8DB.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 2640 wrote to memory of 5060 2640 ED9A.exe PID 2640 wrote to memory of 5060 2640 ED9A.exe PID 2640 wrote to memory of 5060 2640 ED9A.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 3116 1316 C8DB.exe rundll32.exe PID 2640 wrote to memory of 2600 2640 1CD9.exe PID 2640 wrote to memory of 2600 2640 1CD9.exe PID 2640 wrote to memory of 2600 2640 1CD9.exe PID 1316 wrote to memory of 4748 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 4748 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 4748 1316 C8DB.exe rundll32.exe PID 1316 wrote to memory of 4748 1316 C8DB.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe"C:\Users\Admin\AppData\Local\Temp\0da6fa4b335e835322515d0a96c88d6a133349d57560f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\C8DB.exeC:\Users\Admin\AppData\Local\Temp\C8DB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 6122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 8762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 9362⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Checks processor information in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 9402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1316 -ip 13161⤵
-
C:\Users\Admin\AppData\Local\Temp\ED9A.exeC:\Users\Admin\AppData\Local\Temp\ED9A.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1CD9.exeC:\Users\Admin\AppData\Local\Temp\1CD9.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 9002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2600 -ip 26001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1316 -ip 13161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1316 -ip 13161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1316 -ip 13161⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1CD9.exeMD5
e86f1cd73f0be7895872a04dcdfb7766
SHA13b2b9441b33ad62ffd0482fb7809751d3b9bad2a
SHA256e7add15b111b57233b6b738daa79d3be3369d2a8858618c2906b6ef1347dc2c3
SHA5128b80db7f3133be76feda9c0c05d4739018df74d763d15c8d910ebe77917fa6533bbef3c73a085219874a3d0f1c6de6260bb6bd3f0c514bf99dcfd6a2ed13baab
-
C:\Users\Admin\AppData\Local\Temp\1CD9.exeMD5
e86f1cd73f0be7895872a04dcdfb7766
SHA13b2b9441b33ad62ffd0482fb7809751d3b9bad2a
SHA256e7add15b111b57233b6b738daa79d3be3369d2a8858618c2906b6ef1347dc2c3
SHA5128b80db7f3133be76feda9c0c05d4739018df74d763d15c8d910ebe77917fa6533bbef3c73a085219874a3d0f1c6de6260bb6bd3f0c514bf99dcfd6a2ed13baab
-
C:\Users\Admin\AppData\Local\Temp\C8DB.exeMD5
5db4e7f04bb163a1337f216ee2076568
SHA1d1f09aadd4d7583c18a5dbe889477179718de362
SHA25612cdcdee943f989fc68b7781176572822605b5ace00dcdb445e58e6bf60c9a5a
SHA5122b14db4807294180165c472a16fcb1ce4fd156165d760b6d0c6eb176e8775e67097db629a88c66ec1ff69e31772455e7957beea20f2288b03647f5134de83263
-
C:\Users\Admin\AppData\Local\Temp\C8DB.exeMD5
5db4e7f04bb163a1337f216ee2076568
SHA1d1f09aadd4d7583c18a5dbe889477179718de362
SHA25612cdcdee943f989fc68b7781176572822605b5ace00dcdb445e58e6bf60c9a5a
SHA5122b14db4807294180165c472a16fcb1ce4fd156165d760b6d0c6eb176e8775e67097db629a88c66ec1ff69e31772455e7957beea20f2288b03647f5134de83263
-
C:\Users\Admin\AppData\Local\Temp\ED9A.exeMD5
13781cc9bdc015e5f39a62acbd277eda
SHA16e23d7202309911ba31481b26817e88099ebdb08
SHA256d1884a463523caebc85411f37d02368a8bba12647d8a3362b5f8fec2582022d2
SHA512de71ee5b9e98c121ee453838083e3b90dde5b02b96294c82957599771d3cfc1b963967420afec5f8d33caa1d3153ada368c3fa56dd1e0938262bbc5a2b36d991
-
C:\Users\Admin\AppData\Local\Temp\ED9A.exeMD5
13781cc9bdc015e5f39a62acbd277eda
SHA16e23d7202309911ba31481b26817e88099ebdb08
SHA256d1884a463523caebc85411f37d02368a8bba12647d8a3362b5f8fec2582022d2
SHA512de71ee5b9e98c121ee453838083e3b90dde5b02b96294c82957599771d3cfc1b963967420afec5f8d33caa1d3153ada368c3fa56dd1e0938262bbc5a2b36d991
-
C:\Users\Admin\AppData\Local\Temp\Uwqurfoyhf.tmpMD5
d2b9b4254dd8cd2e94ba6e833cc5b48f
SHA13a7db9c8f59313e0253882b262a9ef1c237c0d45
SHA2563134dd27cab347c041e3cd4ce762fa52b0829490a35759ba2f0acb827d8bda8a
SHA512d22df5a5effda4acf02743473189cc661db20de07f5adfdd638b251f8944fb5a627c123a17c4aa267c9c5efd39c6d0dfe0edce26091515cf9775bc8adbb99f9a
-
memory/1316-200-0x0000000003AEF000-0x0000000003AF0000-memory.dmpFilesize
4KB
-
memory/1316-191-0x0000000003A50000-0x0000000003B90000-memory.dmpFilesize
1.2MB
-
memory/1316-143-0x0000000002340000-0x000000000255D000-memory.dmpFilesize
2.1MB
-
memory/1316-144-0x0000000000400000-0x0000000000629000-memory.dmpFilesize
2.2MB
-
memory/1316-145-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-141-0x0000000000400000-0x0000000000629000-memory.dmpFilesize
2.2MB
-
memory/1316-193-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-195-0x00000000040E0000-0x00000000040E1000-memory.dmpFilesize
4KB
-
memory/1316-196-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-198-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-199-0x0000000003A50000-0x0000000003B90000-memory.dmpFilesize
1.2MB
-
memory/1316-203-0x0000000003B5E000-0x0000000003B5F000-memory.dmpFilesize
4KB
-
memory/1316-202-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-214-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-197-0x0000000003A50000-0x0000000003B90000-memory.dmpFilesize
1.2MB
-
memory/1316-194-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-192-0x0000000003A50000-0x0000000003B90000-memory.dmpFilesize
1.2MB
-
memory/1316-142-0x0000000002262000-0x000000000233E000-memory.dmpFilesize
880KB
-
memory/1316-189-0x0000000003C10000-0x0000000003C11000-memory.dmpFilesize
4KB
-
memory/1316-188-0x0000000003A50000-0x0000000003B90000-memory.dmpFilesize
1.2MB
-
memory/1316-187-0x0000000003A50000-0x0000000003B90000-memory.dmpFilesize
1.2MB
-
memory/1316-186-0x0000000002E50000-0x0000000002E51000-memory.dmpFilesize
4KB
-
memory/1316-185-0x0000000003A50000-0x0000000003B90000-memory.dmpFilesize
1.2MB
-
memory/1316-184-0x0000000003A50000-0x0000000003B90000-memory.dmpFilesize
1.2MB
-
memory/1316-183-0x0000000002E40000-0x0000000002E41000-memory.dmpFilesize
4KB
-
memory/1316-182-0x0000000002F60000-0x000000000398B000-memory.dmpFilesize
10.2MB
-
memory/1316-181-0x0000000003BE0000-0x0000000003BE1000-memory.dmpFilesize
4KB
-
memory/1316-179-0x0000000002F60000-0x000000000398B000-memory.dmpFilesize
10.2MB
-
memory/1316-215-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-216-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-178-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-177-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/1316-176-0x0000000002F60000-0x000000000398B000-memory.dmpFilesize
10.2MB
-
memory/2600-173-0x00000000021A0000-0x0000000002232000-memory.dmpFilesize
584KB
-
memory/2600-174-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2600-172-0x0000000000679000-0x00000000006CA000-memory.dmpFilesize
324KB
-
memory/2600-171-0x0000000000679000-0x00000000006CA000-memory.dmpFilesize
324KB
-
memory/2640-138-0x0000000002510000-0x0000000002526000-memory.dmpFilesize
88KB
-
memory/3116-158-0x0000000000840000-0x0000000000843000-memory.dmpFilesize
12KB
-
memory/3116-159-0x0000000000850000-0x0000000000853000-memory.dmpFilesize
12KB
-
memory/3116-152-0x0000000000810000-0x0000000000813000-memory.dmpFilesize
12KB
-
memory/3116-153-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/3116-154-0x0000000075940000-0x0000000075AE0000-memory.dmpFilesize
1.6MB
-
memory/3116-156-0x0000000000820000-0x0000000000823000-memory.dmpFilesize
12KB
-
memory/3116-157-0x0000000000830000-0x0000000000833000-memory.dmpFilesize
12KB
-
memory/4748-208-0x0000000003C50000-0x0000000003C51000-memory.dmpFilesize
4KB
-
memory/4748-209-0x00000000034B0000-0x00000000035F0000-memory.dmpFilesize
1.2MB
-
memory/4748-207-0x0000000002A80000-0x00000000034AB000-memory.dmpFilesize
10.2MB
-
memory/4748-211-0x00000000034B0000-0x00000000035F0000-memory.dmpFilesize
1.2MB
-
memory/4748-205-0x0000000003B90000-0x0000000003B91000-memory.dmpFilesize
4KB
-
memory/4748-212-0x000000000354F000-0x0000000003550000-memory.dmpFilesize
4KB
-
memory/4748-213-0x00000000035BE000-0x00000000035BF000-memory.dmpFilesize
4KB
-
memory/4748-204-0x0000000077790000-0x0000000077933000-memory.dmpFilesize
1.6MB
-
memory/4804-134-0x00000000007A9000-0x00000000007B2000-memory.dmpFilesize
36KB
-
memory/4804-135-0x00000000007A9000-0x00000000007B2000-memory.dmpFilesize
36KB
-
memory/4804-136-0x0000000000700000-0x0000000000709000-memory.dmpFilesize
36KB
-
memory/4804-137-0x0000000000400000-0x000000000046B000-memory.dmpFilesize
428KB
-
memory/5060-163-0x0000000004BF3000-0x0000000004BF4000-memory.dmpFilesize
4KB
-
memory/5060-150-0x0000000000560000-0x0000000000599000-memory.dmpFilesize
228KB
-
memory/5060-149-0x00000000005C9000-0x00000000005F5000-memory.dmpFilesize
176KB
-
memory/5060-148-0x00000000005C9000-0x00000000005F5000-memory.dmpFilesize
176KB
-
memory/5060-151-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/5060-206-0x00000000065A0000-0x0000000006632000-memory.dmpFilesize
584KB
-
memory/5060-155-0x0000000074060000-0x0000000074810000-memory.dmpFilesize
7.7MB
-
memory/5060-190-0x00000000064E0000-0x0000000006556000-memory.dmpFilesize
472KB
-
memory/5060-160-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/5060-161-0x0000000004C00000-0x00000000051A4000-memory.dmpFilesize
5.6MB
-
memory/5060-210-0x00000000067B0000-0x00000000067CE000-memory.dmpFilesize
120KB
-
memory/5060-162-0x0000000004BF2000-0x0000000004BF3000-memory.dmpFilesize
4KB
-
memory/5060-164-0x0000000005220000-0x0000000005838000-memory.dmpFilesize
6.1MB
-
memory/5060-165-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/5060-166-0x00000000058C0000-0x00000000059CA000-memory.dmpFilesize
1.0MB
-
memory/5060-167-0x00000000059F0000-0x0000000005A2C000-memory.dmpFilesize
240KB
-
memory/5060-180-0x0000000005D00000-0x0000000005D66000-memory.dmpFilesize
408KB
-
memory/5060-168-0x0000000004BF4000-0x0000000004BF6000-memory.dmpFilesize
8KB
-
memory/5060-217-0x0000000006AC0000-0x0000000006C82000-memory.dmpFilesize
1.8MB