Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-05-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe
Resource
win10-20220414-en
General
-
Target
26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe
-
Size
304KB
-
MD5
8ff62be376db466f631adfd8917f094f
-
SHA1
1c52c2a363d3d4b09a9d7c9a6b7d1aee2cd65ba9
-
SHA256
26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a
-
SHA512
2979cd26fe7f11ecdfba674d8e3bd6c359017b8f3898d5f884276ca75497a97ac4714be7f64ea0f8581e8dd2f42177dc574afcdab0868413948ad60a46a3c7d9
Malware Config
Extracted
smokeloader
2020
http://bahninfo.at/upload/
http://img4mobi.com/upload/
http://equix.ru/upload/
http://worldalltv.com/upload/
http://negarehgallery.com/upload/
http://lite-server.ru/upload/
http://piratia/su/upload/
http://go-piratia.ru/upload/
http://monsutiur4.com/
http://nusurionuy5ff.at/
http://moroitomo4.net/
http://susuerulianita1.net/
http://cucumbetuturel4.com/
http://nunuslushau.com/
http://linislominyt11.at/
http://luxulixionus.net/
http://lilisjjoer44.com/
http://nikogminut88.at/
http://limo00ruling.org/
http://mini55tunul.com/
http://samnutu11nuli.com/
http://nikogkojam.org/
https://ny-city-mall.com/search.php
https://fresh-cars.net/search.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
A22B.exeF212.exeA8EF.exepid process 3744 A22B.exe 4336 F212.exe 212 A8EF.exe -
Modifies Windows Firewall 1 TTPs
-
Deletes itself 1 IoCs
Processes:
pid process 2100 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
A22B.exeF212.exe26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A22B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F212.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F212.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A22B.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A22B.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F212.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 920 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exepid process 1784 26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe 1784 26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 2100 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2100 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exeA22B.exeF212.exepid process 1784 26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe 3744 A22B.exe 4336 F212.exe 2100 2100 2100 2100 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 4820 WMIC.exe Token: SeSecurityPrivilege 4820 WMIC.exe Token: SeTakeOwnershipPrivilege 4820 WMIC.exe Token: SeLoadDriverPrivilege 4820 WMIC.exe Token: SeSystemProfilePrivilege 4820 WMIC.exe Token: SeSystemtimePrivilege 4820 WMIC.exe Token: SeProfSingleProcessPrivilege 4820 WMIC.exe Token: SeIncBasePriorityPrivilege 4820 WMIC.exe Token: SeCreatePagefilePrivilege 4820 WMIC.exe Token: SeBackupPrivilege 4820 WMIC.exe Token: SeRestorePrivilege 4820 WMIC.exe Token: SeShutdownPrivilege 4820 WMIC.exe Token: SeDebugPrivilege 4820 WMIC.exe Token: SeSystemEnvironmentPrivilege 4820 WMIC.exe Token: SeRemoteShutdownPrivilege 4820 WMIC.exe Token: SeUndockPrivilege 4820 WMIC.exe Token: SeManageVolumePrivilege 4820 WMIC.exe Token: 33 4820 WMIC.exe Token: 34 4820 WMIC.exe Token: 35 4820 WMIC.exe Token: 36 4820 WMIC.exe Token: SeIncreaseQuotaPrivilege 4820 WMIC.exe Token: SeSecurityPrivilege 4820 WMIC.exe Token: SeTakeOwnershipPrivilege 4820 WMIC.exe Token: SeLoadDriverPrivilege 4820 WMIC.exe Token: SeSystemProfilePrivilege 4820 WMIC.exe Token: SeSystemtimePrivilege 4820 WMIC.exe Token: SeProfSingleProcessPrivilege 4820 WMIC.exe Token: SeIncBasePriorityPrivilege 4820 WMIC.exe Token: SeCreatePagefilePrivilege 4820 WMIC.exe Token: SeBackupPrivilege 4820 WMIC.exe Token: SeRestorePrivilege 4820 WMIC.exe Token: SeShutdownPrivilege 4820 WMIC.exe Token: SeDebugPrivilege 4820 WMIC.exe Token: SeSystemEnvironmentPrivilege 4820 WMIC.exe Token: SeRemoteShutdownPrivilege 4820 WMIC.exe Token: SeUndockPrivilege 4820 WMIC.exe Token: SeManageVolumePrivilege 4820 WMIC.exe Token: 33 4820 WMIC.exe Token: 34 4820 WMIC.exe Token: 35 4820 WMIC.exe Token: 36 4820 WMIC.exe Token: SeIncreaseQuotaPrivilege 4528 WMIC.exe Token: SeSecurityPrivilege 4528 WMIC.exe Token: SeTakeOwnershipPrivilege 4528 WMIC.exe Token: SeLoadDriverPrivilege 4528 WMIC.exe Token: SeSystemProfilePrivilege 4528 WMIC.exe Token: SeSystemtimePrivilege 4528 WMIC.exe Token: SeProfSingleProcessPrivilege 4528 WMIC.exe Token: SeIncBasePriorityPrivilege 4528 WMIC.exe Token: SeCreatePagefilePrivilege 4528 WMIC.exe Token: SeBackupPrivilege 4528 WMIC.exe Token: SeRestorePrivilege 4528 WMIC.exe Token: SeShutdownPrivilege 4528 WMIC.exe Token: SeDebugPrivilege 4528 WMIC.exe Token: SeSystemEnvironmentPrivilege 4528 WMIC.exe Token: SeRemoteShutdownPrivilege 4528 WMIC.exe Token: SeUndockPrivilege 4528 WMIC.exe Token: SeManageVolumePrivilege 4528 WMIC.exe Token: 33 4528 WMIC.exe Token: 34 4528 WMIC.exe Token: 35 4528 WMIC.exe Token: 36 4528 WMIC.exe Token: SeIncreaseQuotaPrivilege 4528 WMIC.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
cmd.exedescription pid process target process PID 2100 wrote to memory of 3744 2100 A22B.exe PID 2100 wrote to memory of 3744 2100 A22B.exe PID 2100 wrote to memory of 3744 2100 A22B.exe PID 2100 wrote to memory of 4336 2100 F212.exe PID 2100 wrote to memory of 4336 2100 F212.exe PID 2100 wrote to memory of 4336 2100 F212.exe PID 2100 wrote to memory of 4788 2100 cmd.exe PID 2100 wrote to memory of 4788 2100 cmd.exe PID 4788 wrote to memory of 4820 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4820 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4528 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4528 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4852 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4852 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4700 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4700 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 1736 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 1736 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4176 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4176 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 3564 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 3564 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 3296 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 3296 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 304 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 304 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 3976 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 3976 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4008 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 4008 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 1600 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 1600 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 812 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 812 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 3128 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 3128 4788 cmd.exe WMIC.exe PID 4788 wrote to memory of 920 4788 cmd.exe ipconfig.exe PID 4788 wrote to memory of 920 4788 cmd.exe ipconfig.exe PID 4788 wrote to memory of 4968 4788 cmd.exe ROUTE.EXE PID 4788 wrote to memory of 4968 4788 cmd.exe ROUTE.EXE PID 4788 wrote to memory of 3988 4788 cmd.exe netsh.exe PID 4788 wrote to memory of 3988 4788 cmd.exe netsh.exe PID 4788 wrote to memory of 3468 4788 cmd.exe systeminfo.exe PID 4788 wrote to memory of 3468 4788 cmd.exe systeminfo.exe PID 2100 wrote to memory of 212 2100 A8EF.exe PID 2100 wrote to memory of 212 2100 A8EF.exe PID 2100 wrote to memory of 212 2100 A8EF.exe PID 2100 wrote to memory of 1456 2100 explorer.exe PID 2100 wrote to memory of 1456 2100 explorer.exe PID 2100 wrote to memory of 1456 2100 explorer.exe PID 2100 wrote to memory of 1456 2100 explorer.exe PID 2100 wrote to memory of 2192 2100 explorer.exe PID 2100 wrote to memory of 2192 2100 explorer.exe PID 2100 wrote to memory of 2192 2100 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe"C:\Users\Admin\AppData\Local\Temp\26800011b9fe7e3d8944040da4e55acf2898e11634d29417c9016c4d22d0865a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\A22B.exeC:\Users\Admin\AppData\Local\Temp\A22B.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\F212.exeC:\Users\Admin\AppData\Local\Temp\F212.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\cmd.execmd1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv2⤵
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns2⤵
- Gathers network information
-
C:\Windows\system32\ROUTE.EXEroute print2⤵
-
C:\Windows\system32\netsh.exenetsh firewall show state2⤵
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
-
C:\Users\Admin\AppData\Local\Temp\A8EF.exeC:\Users\Admin\AppData\Local\Temp\A8EF.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\A22B.exeFilesize
305KB
MD526337dba80f6771e3a16b16903e57b7c
SHA18b11d6a96d6e409456cb00f6e46e227426b29c08
SHA25605aa0199c301a1971d1972af7210922af9ae6886e1333c9d4b463e889bd9eda1
SHA51245c320ece64bfd88acab6ca44ccca042e888bce09ea34e342b5e86c7f6b522e0c61a6bfa4affdc7e14ddceab8ec4d20cfc5fb0d9d42de37752610af3c91b85bc
-
C:\Users\Admin\AppData\Local\Temp\A22B.exeFilesize
305KB
MD526337dba80f6771e3a16b16903e57b7c
SHA18b11d6a96d6e409456cb00f6e46e227426b29c08
SHA25605aa0199c301a1971d1972af7210922af9ae6886e1333c9d4b463e889bd9eda1
SHA51245c320ece64bfd88acab6ca44ccca042e888bce09ea34e342b5e86c7f6b522e0c61a6bfa4affdc7e14ddceab8ec4d20cfc5fb0d9d42de37752610af3c91b85bc
-
C:\Users\Admin\AppData\Local\Temp\A8EF.exeFilesize
3.9MB
MD54f8a7c030aa8784e5f9726de742be5b5
SHA1b458828a0383defa2b1c79dc043d7e7e8cc712c4
SHA256b8885e1a627026d5ebbce5dfc321358a1d339e0b30c887ab39e4b9e972f90952
SHA5120c74b22a46d6362fc8e5a9d919c8d32f6a2e21e9c3bdbfb0be679407a753f8995cc929956c7bd0351e6f4b8e224ea7fa4ebdc9b8d07c324608ffa2e20b4b8d69
-
C:\Users\Admin\AppData\Local\Temp\A8EF.exeFilesize
3.9MB
MD54f8a7c030aa8784e5f9726de742be5b5
SHA1b458828a0383defa2b1c79dc043d7e7e8cc712c4
SHA256b8885e1a627026d5ebbce5dfc321358a1d339e0b30c887ab39e4b9e972f90952
SHA5120c74b22a46d6362fc8e5a9d919c8d32f6a2e21e9c3bdbfb0be679407a753f8995cc929956c7bd0351e6f4b8e224ea7fa4ebdc9b8d07c324608ffa2e20b4b8d69
-
C:\Users\Admin\AppData\Local\Temp\F212.exeFilesize
304KB
MD5cfbe64a303fb6e0000c7859bfb13a1a2
SHA1a6b85217a3bd9ef76f1235a9ab92384b96b7fede
SHA256256340cafa360c86852d0f2b648e85a9e0957a66f58c0bc572f6b7482bb75135
SHA512c411656d43d9b709db77c153da224e2930d26200dc081082d0a4beb0be23b6e63c9e747ec3d650cd670f72c08d79ba40d49c9091344e305a01657916109284b1
-
C:\Users\Admin\AppData\Local\Temp\F212.exeFilesize
304KB
MD5cfbe64a303fb6e0000c7859bfb13a1a2
SHA1a6b85217a3bd9ef76f1235a9ab92384b96b7fede
SHA256256340cafa360c86852d0f2b648e85a9e0957a66f58c0bc572f6b7482bb75135
SHA512c411656d43d9b709db77c153da224e2930d26200dc081082d0a4beb0be23b6e63c9e747ec3d650cd670f72c08d79ba40d49c9091344e305a01657916109284b1
-
memory/212-256-0x0000000000000000-mapping.dmp
-
memory/304-246-0x0000000000000000-mapping.dmp
-
memory/812-250-0x0000000000000000-mapping.dmp
-
memory/920-252-0x0000000000000000-mapping.dmp
-
memory/1456-296-0x0000000000000000-mapping.dmp
-
memory/1600-249-0x0000000000000000-mapping.dmp
-
memory/1736-240-0x0000000000000000-mapping.dmp
-
memory/1784-138-0x00000000007D1000-0x00000000007E1000-memory.dmpFilesize
64KB
-
memory/1784-146-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-125-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-126-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-127-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-128-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-129-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-130-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-131-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-132-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-133-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-134-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-135-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-136-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-137-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-114-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-139-0x00000000005C0000-0x00000000005C9000-memory.dmpFilesize
36KB
-
memory/1784-140-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/1784-141-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-142-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-143-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-144-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-145-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-124-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-147-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-148-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-149-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-115-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-116-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-117-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-123-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-122-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-121-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-120-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-118-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/1784-119-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/2100-191-0x0000000002AD0000-0x0000000002AE6000-memory.dmpFilesize
88KB
-
memory/2100-150-0x0000000000AF0000-0x0000000000B06000-memory.dmpFilesize
88KB
-
memory/2100-231-0x00000000045E0000-0x00000000045F6000-memory.dmpFilesize
88KB
-
memory/2100-234-0x0000000004D10000-0x0000000004D1F000-memory.dmpFilesize
60KB
-
memory/2192-323-0x0000000000000000-mapping.dmp
-
memory/3128-251-0x0000000000000000-mapping.dmp
-
memory/3296-245-0x0000000000000000-mapping.dmp
-
memory/3468-255-0x0000000000000000-mapping.dmp
-
memory/3564-244-0x0000000000000000-mapping.dmp
-
memory/3744-164-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-163-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-172-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-173-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-174-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-175-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-176-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-177-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-178-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-179-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-180-0x0000000000590000-0x00000000006DA000-memory.dmpFilesize
1.3MB
-
memory/3744-182-0x0000000000570000-0x0000000000579000-memory.dmpFilesize
36KB
-
memory/3744-184-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-183-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/3744-181-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-188-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-187-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-186-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-185-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-151-0x0000000000000000-mapping.dmp
-
memory/3744-153-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-154-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-155-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-171-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-169-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-156-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-158-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-157-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-159-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-162-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-168-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-170-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-167-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-166-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3744-165-0x0000000076F70000-0x00000000770FE000-memory.dmpFilesize
1.6MB
-
memory/3976-247-0x0000000000000000-mapping.dmp
-
memory/3988-254-0x0000000000000000-mapping.dmp
-
memory/4008-248-0x0000000000000000-mapping.dmp
-
memory/4176-243-0x0000000000000000-mapping.dmp
-
memory/4336-222-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/4336-192-0x0000000000000000-mapping.dmp
-
memory/4336-219-0x00000000006F1000-0x0000000000702000-memory.dmpFilesize
68KB
-
memory/4336-220-0x00000000001D0000-0x00000000001D9000-memory.dmpFilesize
36KB
-
memory/4528-237-0x0000000000000000-mapping.dmp
-
memory/4700-239-0x0000000000000000-mapping.dmp
-
memory/4788-235-0x0000000000000000-mapping.dmp
-
memory/4820-236-0x0000000000000000-mapping.dmp
-
memory/4852-238-0x0000000000000000-mapping.dmp
-
memory/4968-253-0x0000000000000000-mapping.dmp