Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
22-05-2022 01:02
Static task
static1
Behavioral task
behavioral1
Sample
fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe
Resource
win10-20220414-en
General
-
Target
fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe
-
Size
305KB
-
MD5
686b0dd1af09ca0f4ac165ed0de104ff
-
SHA1
4d0a37fd423d20761c2cc87a0a0dfd7fcdf9b48c
-
SHA256
fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f
-
SHA512
cc2c7a0f02e096aa163c4d21f6b534fafaf9d7a67b7802ef94508abf1e13b1c0a01db22bd06ea4502213f2443e882f808202bc9307a8e29ba29e862ba29faac1
Malware Config
Extracted
smokeloader
2020
http://bahninfo.at/upload/
http://img4mobi.com/upload/
http://equix.ru/upload/
http://worldalltv.com/upload/
http://negarehgallery.com/upload/
http://lite-server.ru/upload/
http://piratia/su/upload/
http://go-piratia.ru/upload/
http://monsutiur4.com/
http://nusurionuy5ff.at/
http://moroitomo4.net/
http://susuerulianita1.net/
http://cucumbetuturel4.com/
http://nunuslushau.com/
http://linislominyt11.at/
http://luxulixionus.net/
http://lilisjjoer44.com/
http://nikogminut88.at/
http://limo00ruling.org/
http://mini55tunul.com/
http://samnutu11nuli.com/
http://nikogkojam.org/
https://ny-city-mall.com/search.php
https://fresh-cars.net/search.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
E743.exe1C10.exeE953.exepid process 3660 E743.exe 4024 1C10.exe 2068 E953.exe -
Modifies Windows Firewall 1 TTPs
-
Deletes itself 1 IoCs
Processes:
pid process 3008 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exeE743.exe1C10.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E743.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E743.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E743.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C10.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C10.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2876 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exepid process 2472 fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe 2472 fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3008 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exeE743.exe1C10.exepid process 2472 fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe 3660 E743.exe 4024 1C10.exe 3008 3008 3008 3008 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 192 WMIC.exe Token: SeSecurityPrivilege 192 WMIC.exe Token: SeTakeOwnershipPrivilege 192 WMIC.exe Token: SeLoadDriverPrivilege 192 WMIC.exe Token: SeSystemProfilePrivilege 192 WMIC.exe Token: SeSystemtimePrivilege 192 WMIC.exe Token: SeProfSingleProcessPrivilege 192 WMIC.exe Token: SeIncBasePriorityPrivilege 192 WMIC.exe Token: SeCreatePagefilePrivilege 192 WMIC.exe Token: SeBackupPrivilege 192 WMIC.exe Token: SeRestorePrivilege 192 WMIC.exe Token: SeShutdownPrivilege 192 WMIC.exe Token: SeDebugPrivilege 192 WMIC.exe Token: SeSystemEnvironmentPrivilege 192 WMIC.exe Token: SeRemoteShutdownPrivilege 192 WMIC.exe Token: SeUndockPrivilege 192 WMIC.exe Token: SeManageVolumePrivilege 192 WMIC.exe Token: 33 192 WMIC.exe Token: 34 192 WMIC.exe Token: 35 192 WMIC.exe Token: 36 192 WMIC.exe Token: SeIncreaseQuotaPrivilege 192 WMIC.exe Token: SeSecurityPrivilege 192 WMIC.exe Token: SeTakeOwnershipPrivilege 192 WMIC.exe Token: SeLoadDriverPrivilege 192 WMIC.exe Token: SeSystemProfilePrivilege 192 WMIC.exe Token: SeSystemtimePrivilege 192 WMIC.exe Token: SeProfSingleProcessPrivilege 192 WMIC.exe Token: SeIncBasePriorityPrivilege 192 WMIC.exe Token: SeCreatePagefilePrivilege 192 WMIC.exe Token: SeBackupPrivilege 192 WMIC.exe Token: SeRestorePrivilege 192 WMIC.exe Token: SeShutdownPrivilege 192 WMIC.exe Token: SeDebugPrivilege 192 WMIC.exe Token: SeSystemEnvironmentPrivilege 192 WMIC.exe Token: SeRemoteShutdownPrivilege 192 WMIC.exe Token: SeUndockPrivilege 192 WMIC.exe Token: SeManageVolumePrivilege 192 WMIC.exe Token: 33 192 WMIC.exe Token: 34 192 WMIC.exe Token: 35 192 WMIC.exe Token: 36 192 WMIC.exe Token: SeIncreaseQuotaPrivilege 2256 WMIC.exe Token: SeSecurityPrivilege 2256 WMIC.exe Token: SeTakeOwnershipPrivilege 2256 WMIC.exe Token: SeLoadDriverPrivilege 2256 WMIC.exe Token: SeSystemProfilePrivilege 2256 WMIC.exe Token: SeSystemtimePrivilege 2256 WMIC.exe Token: SeProfSingleProcessPrivilege 2256 WMIC.exe Token: SeIncBasePriorityPrivilege 2256 WMIC.exe Token: SeCreatePagefilePrivilege 2256 WMIC.exe Token: SeBackupPrivilege 2256 WMIC.exe Token: SeRestorePrivilege 2256 WMIC.exe Token: SeShutdownPrivilege 2256 WMIC.exe Token: SeDebugPrivilege 2256 WMIC.exe Token: SeSystemEnvironmentPrivilege 2256 WMIC.exe Token: SeRemoteShutdownPrivilege 2256 WMIC.exe Token: SeUndockPrivilege 2256 WMIC.exe Token: SeManageVolumePrivilege 2256 WMIC.exe Token: 33 2256 WMIC.exe Token: 34 2256 WMIC.exe Token: 35 2256 WMIC.exe Token: 36 2256 WMIC.exe Token: SeIncreaseQuotaPrivilege 2256 WMIC.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
cmd.exedescription pid process target process PID 3008 wrote to memory of 3660 3008 E743.exe PID 3008 wrote to memory of 3660 3008 E743.exe PID 3008 wrote to memory of 3660 3008 E743.exe PID 3008 wrote to memory of 4024 3008 1C10.exe PID 3008 wrote to memory of 4024 3008 1C10.exe PID 3008 wrote to memory of 4024 3008 1C10.exe PID 3008 wrote to memory of 2244 3008 cmd.exe PID 3008 wrote to memory of 2244 3008 cmd.exe PID 2244 wrote to memory of 192 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 192 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2256 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2256 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2152 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2152 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1280 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1280 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1820 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1820 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2680 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2680 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 4068 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 4068 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 3384 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 3384 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 3900 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 3900 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 3136 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 3136 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1036 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1036 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1344 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1344 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 940 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 940 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1160 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 1160 2244 cmd.exe WMIC.exe PID 2244 wrote to memory of 2876 2244 cmd.exe ipconfig.exe PID 2244 wrote to memory of 2876 2244 cmd.exe ipconfig.exe PID 2244 wrote to memory of 204 2244 cmd.exe ROUTE.EXE PID 2244 wrote to memory of 204 2244 cmd.exe ROUTE.EXE PID 2244 wrote to memory of 2204 2244 cmd.exe netsh.exe PID 2244 wrote to memory of 2204 2244 cmd.exe netsh.exe PID 2244 wrote to memory of 1288 2244 cmd.exe systeminfo.exe PID 2244 wrote to memory of 1288 2244 cmd.exe systeminfo.exe PID 3008 wrote to memory of 2068 3008 E953.exe PID 3008 wrote to memory of 2068 3008 E953.exe PID 3008 wrote to memory of 2068 3008 E953.exe PID 2244 wrote to memory of 3848 2244 cmd.exe tasklist.exe PID 2244 wrote to memory of 3848 2244 cmd.exe tasklist.exe PID 3008 wrote to memory of 716 3008 explorer.exe PID 3008 wrote to memory of 716 3008 explorer.exe PID 3008 wrote to memory of 716 3008 explorer.exe PID 3008 wrote to memory of 716 3008 explorer.exe PID 3008 wrote to memory of 4068 3008 explorer.exe PID 3008 wrote to memory of 4068 3008 explorer.exe PID 3008 wrote to memory of 4068 3008 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe"C:\Users\Admin\AppData\Local\Temp\fe2cab422d35030b188efa9600dca661e53a38351d035e7937902ef522bff42f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E743.exeC:\Users\Admin\AppData\Local\Temp\E743.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1C10.exeC:\Users\Admin\AppData\Local\Temp\1C10.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\cmd.execmd1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv2⤵
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns2⤵
- Gathers network information
-
C:\Windows\system32\ROUTE.EXEroute print2⤵
-
C:\Windows\system32\netsh.exenetsh firewall show state2⤵
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
-
C:\Windows\system32\tasklist.exetasklist /v2⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
-
C:\Users\Admin\AppData\Local\Temp\E953.exeC:\Users\Admin\AppData\Local\Temp\E953.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1C10.exeFilesize
305KB
MD5f31faec182e68366e6e95e2711f44f9f
SHA1f8edb35e8f3dae879e27f47a0c0f18da265da9e8
SHA2567567f86def3dc8084c7109194fb9f6507fd2aa690750b0c686309977bd6d28bd
SHA512850d162c5b5bd06e50ffa14c29af84bcdd598a18dfd2ab3d4411fab6bf138e58720c3360d97efae03b9b613694de07c386b3385496b89a248051983cff0009b9
-
C:\Users\Admin\AppData\Local\Temp\1C10.exeFilesize
305KB
MD5f31faec182e68366e6e95e2711f44f9f
SHA1f8edb35e8f3dae879e27f47a0c0f18da265da9e8
SHA2567567f86def3dc8084c7109194fb9f6507fd2aa690750b0c686309977bd6d28bd
SHA512850d162c5b5bd06e50ffa14c29af84bcdd598a18dfd2ab3d4411fab6bf138e58720c3360d97efae03b9b613694de07c386b3385496b89a248051983cff0009b9
-
C:\Users\Admin\AppData\Local\Temp\E743.exeFilesize
305KB
MD5964b31b5ca88f324e6d069bc5e0a43e4
SHA192d06a52e922603ef9a61c7f14249a43f204cbc7
SHA2563643ad39e4b8990ea7dcfb4f92fe565a1fe9d5e930525629577521649bee06ad
SHA512add8ae27dbafaefa7b6b2d4f005f6730b8948b3cea85089b682a0d9641498fa8bb172d875af416ccce8d743785c01b4e7ebc59cda18ffe69e7a4bd0dfe7dd0ea
-
C:\Users\Admin\AppData\Local\Temp\E743.exeFilesize
305KB
MD5964b31b5ca88f324e6d069bc5e0a43e4
SHA192d06a52e922603ef9a61c7f14249a43f204cbc7
SHA2563643ad39e4b8990ea7dcfb4f92fe565a1fe9d5e930525629577521649bee06ad
SHA512add8ae27dbafaefa7b6b2d4f005f6730b8948b3cea85089b682a0d9641498fa8bb172d875af416ccce8d743785c01b4e7ebc59cda18ffe69e7a4bd0dfe7dd0ea
-
C:\Users\Admin\AppData\Local\Temp\E953.exeFilesize
3.9MB
MD54f8a7c030aa8784e5f9726de742be5b5
SHA1b458828a0383defa2b1c79dc043d7e7e8cc712c4
SHA256b8885e1a627026d5ebbce5dfc321358a1d339e0b30c887ab39e4b9e972f90952
SHA5120c74b22a46d6362fc8e5a9d919c8d32f6a2e21e9c3bdbfb0be679407a753f8995cc929956c7bd0351e6f4b8e224ea7fa4ebdc9b8d07c324608ffa2e20b4b8d69
-
C:\Users\Admin\AppData\Local\Temp\E953.exeFilesize
3.9MB
MD54f8a7c030aa8784e5f9726de742be5b5
SHA1b458828a0383defa2b1c79dc043d7e7e8cc712c4
SHA256b8885e1a627026d5ebbce5dfc321358a1d339e0b30c887ab39e4b9e972f90952
SHA5120c74b22a46d6362fc8e5a9d919c8d32f6a2e21e9c3bdbfb0be679407a753f8995cc929956c7bd0351e6f4b8e224ea7fa4ebdc9b8d07c324608ffa2e20b4b8d69
-
memory/192-240-0x0000000000000000-mapping.dmp
-
memory/204-257-0x0000000000000000-mapping.dmp
-
memory/716-301-0x0000000000000000-mapping.dmp
-
memory/940-254-0x0000000000000000-mapping.dmp
-
memory/1036-252-0x0000000000000000-mapping.dmp
-
memory/1160-255-0x0000000000000000-mapping.dmp
-
memory/1280-243-0x0000000000000000-mapping.dmp
-
memory/1288-259-0x0000000000000000-mapping.dmp
-
memory/1344-253-0x0000000000000000-mapping.dmp
-
memory/1820-244-0x0000000000000000-mapping.dmp
-
memory/2068-260-0x0000000000000000-mapping.dmp
-
memory/2152-242-0x0000000000000000-mapping.dmp
-
memory/2204-258-0x0000000000000000-mapping.dmp
-
memory/2244-239-0x0000000000000000-mapping.dmp
-
memory/2256-241-0x0000000000000000-mapping.dmp
-
memory/2472-132-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-135-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-142-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-143-0x00000000001D0000-0x00000000001D9000-memory.dmpFilesize
36KB
-
memory/2472-144-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/2472-141-0x0000000000490000-0x000000000053E000-memory.dmpFilesize
696KB
-
memory/2472-145-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-146-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-147-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-148-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-149-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-150-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-151-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-152-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-153-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-139-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-138-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-137-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-136-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-140-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-134-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-133-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-131-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-118-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-130-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-129-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-128-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-127-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-126-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-117-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-125-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-123-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-122-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-121-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-120-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2472-119-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/2680-247-0x0000000000000000-mapping.dmp
-
memory/2876-256-0x0000000000000000-mapping.dmp
-
memory/3008-235-0x00000000041A0000-0x00000000041B6000-memory.dmpFilesize
88KB
-
memory/3008-194-0x00000000026D0000-0x00000000026E6000-memory.dmpFilesize
88KB
-
memory/3008-154-0x0000000000500000-0x0000000000516000-memory.dmpFilesize
88KB
-
memory/3008-238-0x0000000004D10000-0x0000000004D1F000-memory.dmpFilesize
60KB
-
memory/3136-251-0x0000000000000000-mapping.dmp
-
memory/3384-249-0x0000000000000000-mapping.dmp
-
memory/3660-173-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-187-0x0000000000490000-0x00000000005DA000-memory.dmpFilesize
1.3MB
-
memory/3660-184-0x00000000007B1000-0x00000000007C2000-memory.dmpFilesize
68KB
-
memory/3660-171-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-189-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/3660-190-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-191-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-188-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-186-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-183-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-172-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-177-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-175-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-155-0x0000000000000000-mapping.dmp
-
memory/3660-157-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-170-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-176-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-174-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-182-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-178-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-179-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-185-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-159-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-169-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-168-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-158-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-181-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-160-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-180-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-167-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-166-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-165-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-163-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-162-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3660-161-0x0000000076F40000-0x00000000770CE000-memory.dmpFilesize
1.6MB
-
memory/3848-281-0x0000000000000000-mapping.dmp
-
memory/3900-250-0x0000000000000000-mapping.dmp
-
memory/4024-234-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/4024-233-0x00000000001F0000-0x00000000001F9000-memory.dmpFilesize
36KB
-
memory/4024-232-0x0000000000490000-0x00000000005DA000-memory.dmpFilesize
1.3MB
-
memory/4024-195-0x0000000000000000-mapping.dmp
-
memory/4068-248-0x0000000000000000-mapping.dmp
-
memory/4068-323-0x0000000000000000-mapping.dmp