Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2022 23:46
Static task
static1
Behavioral task
behavioral1
Sample
06b37780cb3afdf3fa0f8a238114bd7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
06b37780cb3afdf3fa0f8a238114bd7f.exe
Resource
win10v2004-20220812-en
General
-
Target
06b37780cb3afdf3fa0f8a238114bd7f.exe
-
Size
1.2MB
-
MD5
06b37780cb3afdf3fa0f8a238114bd7f
-
SHA1
b843dc0253ca495cdd042314fe9031c9cd645350
-
SHA256
94e55f1981d309c200304267e75948dde7cae6a852e2539650016c28d7575900
-
SHA512
0d3a82b2073856baf9600e1afd7c209de5b25b04f0aa4b07e8ad0675673c409530c5b02d98506d31f6dbb959825932257ab44624d199efac5d7fea6dccf36774
-
SSDEEP
24576:PR964zGEH9mhMh40EL6pxchdGrg17gDrX/axcT5x/Vx9:J446/ajVB3aU/P9
Malware Config
Extracted
redline
2
185.106.93.214:45623
-
auth_value
c270d8603c9a3fa0f5e04bf34055f108
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1368-132-0x0000000002510000-0x0000000002519000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/184-139-0x0000000000400000-0x0000000000460000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
Processes:
F189.exeF562.exe4B5.exesvcupdater.exepid process 4980 F189.exe 2828 F562.exe 4700 4B5.exe 2072 svcupdater.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
AppLaunch.exepid process 4476 AppLaunch.exe 4476 AppLaunch.exe 4476 AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
F189.exeF562.exedescription pid process target process PID 4980 set thread context of 184 4980 F189.exe AppLaunch.exe PID 2828 set thread context of 4476 2828 F562.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2900 4980 WerFault.exe F189.exe 4596 2828 WerFault.exe F562.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exe06b37780cb3afdf3fa0f8a238114bd7f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 AppLaunch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06b37780cb3afdf3fa0f8a238114bd7f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06b37780cb3afdf3fa0f8a238114bd7f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 06b37780cb3afdf3fa0f8a238114bd7f.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 94 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
06b37780cb3afdf3fa0f8a238114bd7f.exepid process 1368 06b37780cb3afdf3fa0f8a238114bd7f.exe 1368 06b37780cb3afdf3fa0f8a238114bd7f.exe 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3036 -
Suspicious behavior: MapViewOfSection 23 IoCs
Processes:
06b37780cb3afdf3fa0f8a238114bd7f.exepid process 1368 06b37780cb3afdf3fa0f8a238114bd7f.exe 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 3036 -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
AppLaunch.exeAppLaunch.exedescription pid process Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 Token: SeDebugPrivilege 184 AppLaunch.exe Token: SeShutdownPrivilege 4476 AppLaunch.exe Token: SeCreatePagefilePrivilege 4476 AppLaunch.exe Token: SeShutdownPrivilege 3036 Token: SeCreatePagefilePrivilege 3036 -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
F189.exeF562.exe4B5.execmd.exedescription pid process target process PID 3036 wrote to memory of 4980 3036 F189.exe PID 3036 wrote to memory of 4980 3036 F189.exe PID 3036 wrote to memory of 4980 3036 F189.exe PID 4980 wrote to memory of 184 4980 F189.exe AppLaunch.exe PID 4980 wrote to memory of 184 4980 F189.exe AppLaunch.exe PID 4980 wrote to memory of 184 4980 F189.exe AppLaunch.exe PID 4980 wrote to memory of 184 4980 F189.exe AppLaunch.exe PID 4980 wrote to memory of 184 4980 F189.exe AppLaunch.exe PID 3036 wrote to memory of 2828 3036 F562.exe PID 3036 wrote to memory of 2828 3036 F562.exe PID 3036 wrote to memory of 2828 3036 F562.exe PID 2828 wrote to memory of 4476 2828 F562.exe AppLaunch.exe PID 2828 wrote to memory of 4476 2828 F562.exe AppLaunch.exe PID 2828 wrote to memory of 4476 2828 F562.exe AppLaunch.exe PID 2828 wrote to memory of 4476 2828 F562.exe AppLaunch.exe PID 2828 wrote to memory of 4476 2828 F562.exe AppLaunch.exe PID 3036 wrote to memory of 4700 3036 4B5.exe PID 3036 wrote to memory of 4700 3036 4B5.exe PID 4700 wrote to memory of 4988 4700 4B5.exe cmd.exe PID 4700 wrote to memory of 4988 4700 4B5.exe cmd.exe PID 3036 wrote to memory of 364 3036 explorer.exe PID 3036 wrote to memory of 364 3036 explorer.exe PID 3036 wrote to memory of 364 3036 explorer.exe PID 3036 wrote to memory of 364 3036 explorer.exe PID 4988 wrote to memory of 1128 4988 cmd.exe schtasks.exe PID 4988 wrote to memory of 1128 4988 cmd.exe schtasks.exe PID 3036 wrote to memory of 2436 3036 explorer.exe PID 3036 wrote to memory of 2436 3036 explorer.exe PID 3036 wrote to memory of 2436 3036 explorer.exe PID 3036 wrote to memory of 2436 3036 explorer.exe PID 3036 wrote to memory of 1828 3036 explorer.exe PID 3036 wrote to memory of 1828 3036 explorer.exe PID 3036 wrote to memory of 1828 3036 explorer.exe PID 3036 wrote to memory of 4180 3036 explorer.exe PID 3036 wrote to memory of 4180 3036 explorer.exe PID 3036 wrote to memory of 4180 3036 explorer.exe PID 3036 wrote to memory of 4180 3036 explorer.exe PID 3036 wrote to memory of 1456 3036 explorer.exe PID 3036 wrote to memory of 1456 3036 explorer.exe PID 3036 wrote to memory of 1456 3036 explorer.exe PID 3036 wrote to memory of 1372 3036 explorer.exe PID 3036 wrote to memory of 1372 3036 explorer.exe PID 3036 wrote to memory of 1372 3036 explorer.exe PID 3036 wrote to memory of 1372 3036 explorer.exe PID 3036 wrote to memory of 2112 3036 explorer.exe PID 3036 wrote to memory of 2112 3036 explorer.exe PID 3036 wrote to memory of 2112 3036 explorer.exe PID 3036 wrote to memory of 1744 3036 explorer.exe PID 3036 wrote to memory of 1744 3036 explorer.exe PID 3036 wrote to memory of 1744 3036 explorer.exe PID 3036 wrote to memory of 1744 3036 explorer.exe PID 3036 wrote to memory of 4152 3036 explorer.exe PID 3036 wrote to memory of 4152 3036 explorer.exe PID 3036 wrote to memory of 4152 3036 explorer.exe PID 3036 wrote to memory of 4152 3036 explorer.exe PID 3036 wrote to memory of 3064 3036 explorer.exe PID 3036 wrote to memory of 3064 3036 explorer.exe PID 3036 wrote to memory of 3064 3036 explorer.exe PID 3036 wrote to memory of 820 3036 explorer.exe PID 3036 wrote to memory of 820 3036 explorer.exe PID 3036 wrote to memory of 820 3036 explorer.exe PID 3036 wrote to memory of 820 3036 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b37780cb3afdf3fa0f8a238114bd7f.exe"C:\Users\Admin\AppData\Local\Temp\06b37780cb3afdf3fa0f8a238114bd7f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\F189.exeC:\Users\Admin\AppData\Local\Temp\F189.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 2802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4980 -ip 49801⤵
-
C:\Users\Admin\AppData\Local\Temp\F562.exeC:\Users\Admin\AppData\Local\Temp\F562.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 2682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2828 -ip 28281⤵
-
C:\Users\Admin\AppData\Local\Temp\4B5.exeC:\Users\Admin\AppData\Local\Temp\4B5.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /C schtasks /create /tn UEstrPhfRW /tr C:\Users\Admin\AppData\Roaming\UEstrPhfRW\svcupdater.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /tn UEstrPhfRW /tr C:\Users\Admin\AppData\Roaming\UEstrPhfRW\svcupdater.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Roaming\UEstrPhfRW\svcupdater.exeC:\Users\Admin\AppData\Roaming\UEstrPhfRW\svcupdater.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4B5.exeFilesize
4.7MB
MD571b4b9ba8cfdfba4cc276ef81436959b
SHA1856b4d255a1384afb285457d6cc3a070a8a64368
SHA2560879a6256e7036871aba1f4a2ce3615e44b0c3246e8d5aa306a9539648202980
SHA5128fdc3339d7b2e3332c16f458dd2d9ff58279c67b94d291f5b9894517f557d624efec08ee79dbfd46f9686b5e363258a1a9c2199824afc4934768c7777981efaa
-
C:\Users\Admin\AppData\Local\Temp\4B5.exeFilesize
4.7MB
MD571b4b9ba8cfdfba4cc276ef81436959b
SHA1856b4d255a1384afb285457d6cc3a070a8a64368
SHA2560879a6256e7036871aba1f4a2ce3615e44b0c3246e8d5aa306a9539648202980
SHA5128fdc3339d7b2e3332c16f458dd2d9ff58279c67b94d291f5b9894517f557d624efec08ee79dbfd46f9686b5e363258a1a9c2199824afc4934768c7777981efaa
-
C:\Users\Admin\AppData\Local\Temp\F189.exeFilesize
1.3MB
MD56ffcc2848e7da926954cdda9415cc750
SHA1c218117b84e16d79d9f22e76d9844703f3629a05
SHA256f003541518f9abc9799499b504b0609ea9a9a149674cd6d1fde5cdd18b29a25a
SHA512c0b04f49f0008de05b25e38c28695b93482148e4e76fde02f58fc1e5b8178f3e5c9b4ffdf183003a26afe71fda50153612f16bc55150c079735c85856c71f169
-
C:\Users\Admin\AppData\Local\Temp\F189.exeFilesize
1.3MB
MD56ffcc2848e7da926954cdda9415cc750
SHA1c218117b84e16d79d9f22e76d9844703f3629a05
SHA256f003541518f9abc9799499b504b0609ea9a9a149674cd6d1fde5cdd18b29a25a
SHA512c0b04f49f0008de05b25e38c28695b93482148e4e76fde02f58fc1e5b8178f3e5c9b4ffdf183003a26afe71fda50153612f16bc55150c079735c85856c71f169
-
C:\Users\Admin\AppData\Local\Temp\F562.exeFilesize
1.1MB
MD55cf1156e38e889646bf40f3e790b76e2
SHA13b12d8f1abb4882a603de7ce784c8628f09b4beb
SHA256c788590703cfa78836357a549728794b3df2764b88ab2d3ee6b566809aed4a54
SHA51212191876a5686d67b06d0f9ecef8d2193cde5bdfd85ba7f97eee16c2c4c18d98e85a328e61a579a28c99611e83eb3ba5ed6404ab1833d3c8cc023e5c322f45cd
-
C:\Users\Admin\AppData\Local\Temp\F562.exeFilesize
1.1MB
MD55cf1156e38e889646bf40f3e790b76e2
SHA13b12d8f1abb4882a603de7ce784c8628f09b4beb
SHA256c788590703cfa78836357a549728794b3df2764b88ab2d3ee6b566809aed4a54
SHA51212191876a5686d67b06d0f9ecef8d2193cde5bdfd85ba7f97eee16c2c4c18d98e85a328e61a579a28c99611e83eb3ba5ed6404ab1833d3c8cc023e5c322f45cd
-
C:\Users\Admin\AppData\Roaming\UEstrPhfRW\svcupdater.exeFilesize
4.7MB
MD571b4b9ba8cfdfba4cc276ef81436959b
SHA1856b4d255a1384afb285457d6cc3a070a8a64368
SHA2560879a6256e7036871aba1f4a2ce3615e44b0c3246e8d5aa306a9539648202980
SHA5128fdc3339d7b2e3332c16f458dd2d9ff58279c67b94d291f5b9894517f557d624efec08ee79dbfd46f9686b5e363258a1a9c2199824afc4934768c7777981efaa
-
C:\Users\Admin\AppData\Roaming\UEstrPhfRW\svcupdater.exeFilesize
4.7MB
MD571b4b9ba8cfdfba4cc276ef81436959b
SHA1856b4d255a1384afb285457d6cc3a070a8a64368
SHA2560879a6256e7036871aba1f4a2ce3615e44b0c3246e8d5aa306a9539648202980
SHA5128fdc3339d7b2e3332c16f458dd2d9ff58279c67b94d291f5b9894517f557d624efec08ee79dbfd46f9686b5e363258a1a9c2199824afc4934768c7777981efaa
-
memory/184-180-0x000000000C070000-0x000000000C0E6000-memory.dmpFilesize
472KB
-
memory/184-179-0x000000000B440000-0x000000000B4A6000-memory.dmpFilesize
408KB
-
memory/184-178-0x000000000C140000-0x000000000C6E4000-memory.dmpFilesize
5.6MB
-
memory/184-139-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/184-138-0x0000000000000000-mapping.dmp
-
memory/184-154-0x000000000B570000-0x000000000BB88000-memory.dmpFilesize
6.1MB
-
memory/184-194-0x000000000DE40000-0x000000000E36C000-memory.dmpFilesize
5.2MB
-
memory/184-156-0x000000000B0D0000-0x000000000B1DA000-memory.dmpFilesize
1.0MB
-
memory/184-157-0x000000000B000000-0x000000000B012000-memory.dmpFilesize
72KB
-
memory/184-158-0x000000000B060000-0x000000000B09C000-memory.dmpFilesize
240KB
-
memory/184-193-0x000000000D740000-0x000000000D902000-memory.dmpFilesize
1.8MB
-
memory/184-181-0x000000000BFF0000-0x000000000C040000-memory.dmpFilesize
320KB
-
memory/184-177-0x000000000B3A0000-0x000000000B432000-memory.dmpFilesize
584KB
-
memory/364-166-0x0000000000BF0000-0x0000000000BFB000-memory.dmpFilesize
44KB
-
memory/364-164-0x0000000000000000-mapping.dmp
-
memory/820-216-0x0000000000210000-0x0000000000218000-memory.dmpFilesize
32KB
-
memory/820-207-0x0000000000200000-0x000000000020B000-memory.dmpFilesize
44KB
-
memory/820-205-0x0000000000000000-mapping.dmp
-
memory/820-206-0x0000000000210000-0x0000000000218000-memory.dmpFilesize
32KB
-
memory/1128-165-0x0000000000000000-mapping.dmp
-
memory/1368-132-0x0000000002510000-0x0000000002519000-memory.dmpFilesize
36KB
-
memory/1368-134-0x0000000000400000-0x0000000000535000-memory.dmpFilesize
1.2MB
-
memory/1368-133-0x0000000000400000-0x0000000000535000-memory.dmpFilesize
1.2MB
-
memory/1372-188-0x0000000000A90000-0x0000000000A94000-memory.dmpFilesize
16KB
-
memory/1372-187-0x0000000000000000-mapping.dmp
-
memory/1372-189-0x0000000000A80000-0x0000000000A89000-memory.dmpFilesize
36KB
-
memory/1372-211-0x0000000000A90000-0x0000000000A94000-memory.dmpFilesize
16KB
-
memory/1456-186-0x0000000000BD0000-0x0000000000BDC000-memory.dmpFilesize
48KB
-
memory/1456-210-0x0000000000BE0000-0x0000000000BE6000-memory.dmpFilesize
24KB
-
memory/1456-182-0x0000000000000000-mapping.dmp
-
memory/1456-185-0x0000000000BE0000-0x0000000000BE6000-memory.dmpFilesize
24KB
-
memory/1744-213-0x0000000000AB0000-0x0000000000AD2000-memory.dmpFilesize
136KB
-
memory/1744-197-0x0000000000A80000-0x0000000000AA7000-memory.dmpFilesize
156KB
-
memory/1744-196-0x0000000000AB0000-0x0000000000AD2000-memory.dmpFilesize
136KB
-
memory/1744-195-0x0000000000000000-mapping.dmp
-
memory/1828-209-0x00000000007F0000-0x00000000007F9000-memory.dmpFilesize
36KB
-
memory/1828-172-0x00000000007F0000-0x00000000007F9000-memory.dmpFilesize
36KB
-
memory/1828-173-0x00000000007E0000-0x00000000007EF000-memory.dmpFilesize
60KB
-
memory/1828-169-0x0000000000000000-mapping.dmp
-
memory/2112-212-0x0000000000C40000-0x0000000000C45000-memory.dmpFilesize
20KB
-
memory/2112-190-0x0000000000000000-mapping.dmp
-
memory/2112-191-0x0000000000C40000-0x0000000000C45000-memory.dmpFilesize
20KB
-
memory/2112-192-0x0000000000C30000-0x0000000000C39000-memory.dmpFilesize
36KB
-
memory/2436-208-0x00000000007E0000-0x00000000007E7000-memory.dmpFilesize
28KB
-
memory/2436-167-0x0000000000000000-mapping.dmp
-
memory/2436-168-0x00000000007E0000-0x00000000007E7000-memory.dmpFilesize
28KB
-
memory/2436-170-0x00000000007D0000-0x00000000007DB000-memory.dmpFilesize
44KB
-
memory/2828-144-0x0000000000000000-mapping.dmp
-
memory/3064-215-0x00000000009C0000-0x00000000009C7000-memory.dmpFilesize
28KB
-
memory/3064-202-0x0000000000000000-mapping.dmp
-
memory/3064-204-0x00000000009B0000-0x00000000009BD000-memory.dmpFilesize
52KB
-
memory/3064-203-0x00000000009C0000-0x00000000009C7000-memory.dmpFilesize
28KB
-
memory/4152-198-0x0000000000000000-mapping.dmp
-
memory/4152-214-0x0000000000F00000-0x0000000000F06000-memory.dmpFilesize
24KB
-
memory/4152-200-0x0000000000EF0000-0x0000000000EFB000-memory.dmpFilesize
44KB
-
memory/4152-199-0x0000000000F00000-0x0000000000F06000-memory.dmpFilesize
24KB
-
memory/4180-183-0x0000000000D50000-0x0000000000D55000-memory.dmpFilesize
20KB
-
memory/4180-171-0x0000000000000000-mapping.dmp
-
memory/4180-176-0x0000000000D40000-0x0000000000D49000-memory.dmpFilesize
36KB
-
memory/4476-155-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4476-175-0x0000000000C00000-0x0000000000C1D000-memory.dmpFilesize
116KB
-
memory/4476-174-0x0000000000CC4000-0x0000000000CC6000-memory.dmpFilesize
8KB
-
memory/4476-159-0x0000000000CC3000-0x0000000000CC6000-memory.dmpFilesize
12KB
-
memory/4476-184-0x0000000002DA0000-0x0000000003DA0000-memory.dmpFilesize
16.0MB
-
memory/4476-201-0x0000000000C00000-0x0000000000C1D000-memory.dmpFilesize
116KB
-
memory/4476-148-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4476-147-0x0000000000000000-mapping.dmp
-
memory/4700-160-0x0000000000000000-mapping.dmp
-
memory/4980-135-0x0000000000000000-mapping.dmp
-
memory/4988-163-0x0000000000000000-mapping.dmp