Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 19:38
Static task
static1
Behavioral task
behavioral1
Sample
1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe
Resource
win10v2004-20230221-en
General
-
Target
1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe
-
Size
264KB
-
MD5
5028754736b592a4ea2be83eb8351e2e
-
SHA1
23dd444f6a05c07bb7fdd4a74417683199055283
-
SHA256
1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19
-
SHA512
63e3bf3bcf9369719f2c86cbbf3f22f802b77498db1ac47961f1865b99e0c600f50a23ab63e555b0f4c091d327bcc8e2e8fd997c515c29e2f33c79460c7539de
-
SSDEEP
3072:79BRraw+dmuDhLQuGzIi7H+vsQODbQ1md7/+gQ6ke4bR+1MBexgbpd5iNZCU3wsd:nlawhuDhLK7+hEbWw72b6ke4t2MBQr3
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe dcrat C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe dcrat behavioral1/memory/968-175-0x0000000000400000-0x0000000000480000-memory.dmp dcrat C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe dcrat C:\BridgewebReviewsessionnet\servernetdhcp.exe dcrat C:\BridgewebReviewsessionnet\servernetdhcp.exe dcrat behavioral1/memory/3576-209-0x0000000000710000-0x0000000000790000-memory.dmp dcrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Kplubxjiptganhbubzyqedcratbuild (4).exeWScript.exeEE1E.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation Kplubxjiptganhbubzyqedcratbuild (4).exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation EE1E.exe -
Executes dropped EXE 5 IoCs
Processes:
EE1E.exeKplubxjiptganhbubzyqedcratbuild (4).exeEE1E.exeservernetdhcp.exeshiawsepid process 3964 EE1E.exe 4540 Kplubxjiptganhbubzyqedcratbuild (4).exe 968 EE1E.exe 3576 servernetdhcp.exe 1060 shiawse -
Suspicious use of SetThreadContext 1 IoCs
Processes:
EE1E.exedescription pid process target process PID 3964 set thread context of 968 3964 EE1E.exe EE1E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exeshiawsedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI shiawse Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI shiawse Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI shiawse Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe -
Modifies registry class 1 IoCs
Processes:
Kplubxjiptganhbubzyqedcratbuild (4).exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings Kplubxjiptganhbubzyqedcratbuild (4).exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exepid process 1932 1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe 1932 1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
EE1E.exepid process 3284 968 EE1E.exe -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exeshiawsepid process 1932 1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 1060 shiawse -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
EE1E.exeEE1E.exeservernetdhcp.exedescription pid process Token: SeDebugPrivilege 3964 EE1E.exe Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeDebugPrivilege 968 EE1E.exe Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeDebugPrivilege 3576 servernetdhcp.exe Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
EE1E.exeKplubxjiptganhbubzyqedcratbuild (4).exeWScript.execmd.exedescription pid process target process PID 3284 wrote to memory of 3964 3284 EE1E.exe PID 3284 wrote to memory of 3964 3284 EE1E.exe PID 3284 wrote to memory of 3964 3284 EE1E.exe PID 3284 wrote to memory of 2680 3284 explorer.exe PID 3284 wrote to memory of 2680 3284 explorer.exe PID 3284 wrote to memory of 2680 3284 explorer.exe PID 3284 wrote to memory of 2680 3284 explorer.exe PID 3284 wrote to memory of 1056 3284 explorer.exe PID 3284 wrote to memory of 1056 3284 explorer.exe PID 3284 wrote to memory of 1056 3284 explorer.exe PID 3284 wrote to memory of 1172 3284 explorer.exe PID 3284 wrote to memory of 1172 3284 explorer.exe PID 3284 wrote to memory of 1172 3284 explorer.exe PID 3284 wrote to memory of 1172 3284 explorer.exe PID 3284 wrote to memory of 3644 3284 explorer.exe PID 3284 wrote to memory of 3644 3284 explorer.exe PID 3284 wrote to memory of 3644 3284 explorer.exe PID 3964 wrote to memory of 4540 3964 EE1E.exe Kplubxjiptganhbubzyqedcratbuild (4).exe PID 3964 wrote to memory of 4540 3964 EE1E.exe Kplubxjiptganhbubzyqedcratbuild (4).exe PID 3964 wrote to memory of 4540 3964 EE1E.exe Kplubxjiptganhbubzyqedcratbuild (4).exe PID 3964 wrote to memory of 968 3964 EE1E.exe EE1E.exe PID 3964 wrote to memory of 968 3964 EE1E.exe EE1E.exe PID 3964 wrote to memory of 968 3964 EE1E.exe EE1E.exe PID 3964 wrote to memory of 968 3964 EE1E.exe EE1E.exe PID 3964 wrote to memory of 968 3964 EE1E.exe EE1E.exe PID 3964 wrote to memory of 968 3964 EE1E.exe EE1E.exe PID 3964 wrote to memory of 968 3964 EE1E.exe EE1E.exe PID 3964 wrote to memory of 968 3964 EE1E.exe EE1E.exe PID 3284 wrote to memory of 3816 3284 explorer.exe PID 3284 wrote to memory of 3816 3284 explorer.exe PID 3284 wrote to memory of 3816 3284 explorer.exe PID 3284 wrote to memory of 3816 3284 explorer.exe PID 4540 wrote to memory of 3896 4540 Kplubxjiptganhbubzyqedcratbuild (4).exe WScript.exe PID 4540 wrote to memory of 3896 4540 Kplubxjiptganhbubzyqedcratbuild (4).exe WScript.exe PID 4540 wrote to memory of 3896 4540 Kplubxjiptganhbubzyqedcratbuild (4).exe WScript.exe PID 3284 wrote to memory of 3308 3284 explorer.exe PID 3284 wrote to memory of 3308 3284 explorer.exe PID 3284 wrote to memory of 3308 3284 explorer.exe PID 3284 wrote to memory of 3308 3284 explorer.exe PID 3284 wrote to memory of 3464 3284 explorer.exe PID 3284 wrote to memory of 3464 3284 explorer.exe PID 3284 wrote to memory of 3464 3284 explorer.exe PID 3284 wrote to memory of 3464 3284 explorer.exe PID 3284 wrote to memory of 2096 3284 explorer.exe PID 3284 wrote to memory of 2096 3284 explorer.exe PID 3284 wrote to memory of 2096 3284 explorer.exe PID 3284 wrote to memory of 768 3284 explorer.exe PID 3284 wrote to memory of 768 3284 explorer.exe PID 3284 wrote to memory of 768 3284 explorer.exe PID 3284 wrote to memory of 768 3284 explorer.exe PID 3896 wrote to memory of 4840 3896 WScript.exe cmd.exe PID 3896 wrote to memory of 4840 3896 WScript.exe cmd.exe PID 3896 wrote to memory of 4840 3896 WScript.exe cmd.exe PID 4840 wrote to memory of 3576 4840 cmd.exe servernetdhcp.exe PID 4840 wrote to memory of 3576 4840 cmd.exe servernetdhcp.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe"C:\Users\Admin\AppData\Local\Temp\1d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EE1E.exeC:\Users\Admin\AppData\Local\Temp\EE1E.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe"C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\BridgewebReviewsessionnet\AmORnHXXcM93nRrD.vbe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\BridgewebReviewsessionnet\EkEJcrBOyegQfp.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\BridgewebReviewsessionnet\servernetdhcp.exe"C:\BridgewebReviewsessionnet\servernetdhcp.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\EE1E.exeC:\Users\Admin\AppData\Local\Temp\EE1E.exe2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Roaming\shiawseC:\Users\Admin\AppData\Roaming\shiawse1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\BridgewebReviewsessionnet\AmORnHXXcM93nRrD.vbeFilesize
216B
MD582345b07f01234819a5e297e018b95e1
SHA1cef47391abf644460ad11c2d62c36d17eeb04acc
SHA25647648bbd2557c86df4bd8f8e87fe96756b65ad5caee4102b950febf8207cc6c9
SHA5121b9936c397ff9f19b1b8eb7be386c9c05fb8628aacb740e47cb0a97b3296bd7bb7a4c7ab8206c3c48635878ceeefec698bea21ebd28d154b9c5664953cef0842
-
C:\BridgewebReviewsessionnet\EkEJcrBOyegQfp.batFilesize
48B
MD5a55711ded8f3fafd3b1d7f24f9e18c01
SHA1472516155b494e0a377cb8b77da47bbd8209801e
SHA256d1f6947794271b7579a65733fe5e40a2f965271b0d9677209d84e4f39d24f177
SHA51229919810673fbb0c36618f64d64c7069fcaf83a1211ab7a5f57379937d01dc27ab5e58e7c665b3433beeb68040ca8732c713a0ab2d165b61bb62329ef573cfb4
-
C:\BridgewebReviewsessionnet\servernetdhcp.exeFilesize
488KB
MD5a89b5f16ad2d43b328e47a0f52bae148
SHA10c9e5802eb5cad0464754df3433e6f227857f847
SHA2568e22d996f05c15465c4ab92f4cee452419fdc1b569a63e0936e709a682df9123
SHA512f920f840875cfca9f709f181bc3971ea6c23cb0b14ab83d46a09ef081c59eed1fc1cd08c29ee43eafc0f484d06ef16a7e44b3b59f859eb5dab260dfd7fc4577c
-
C:\BridgewebReviewsessionnet\servernetdhcp.exeFilesize
488KB
MD5a89b5f16ad2d43b328e47a0f52bae148
SHA10c9e5802eb5cad0464754df3433e6f227857f847
SHA2568e22d996f05c15465c4ab92f4cee452419fdc1b569a63e0936e709a682df9123
SHA512f920f840875cfca9f709f181bc3971ea6c23cb0b14ab83d46a09ef081c59eed1fc1cd08c29ee43eafc0f484d06ef16a7e44b3b59f859eb5dab260dfd7fc4577c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EE1E.exe.logFilesize
1KB
MD5777c191192611ccd3ad42445d9b4fbff
SHA17102e6210880506e7d72644490c653f0d63bef69
SHA256c2c03dac7c91dd00f36b854abf0f004c5ac1b21a6799fe3d5c36c778c11ecec7
SHA5121a153ac56d3d6c76df88da46a13062ce2ff2849926756ec4e58b11ff1090807e16c32092d9f6a432b721a4b1930d838fcf4404c91480c6c830b07ca18f38f324
-
C:\Users\Admin\AppData\Local\Temp\EE1E.exeFilesize
3.4MB
MD5189f74645ef310147f25841e309a704d
SHA1a05b78dae4dc3ea00f141beec6763c0e17de4f76
SHA256a9f8ce22da0a86318879c5cf31feaa5ec6e77afd32eb2988b0f1e4630e64ab1e
SHA5126ddbc29602fde4029cc1e2c73fcb893c7caf721f1811a6211808a3c09ec11856ddfdb3328e2181eac346fb12641e9929250e861c851f8802f549bf465970d5ad
-
C:\Users\Admin\AppData\Local\Temp\EE1E.exeFilesize
3.4MB
MD5189f74645ef310147f25841e309a704d
SHA1a05b78dae4dc3ea00f141beec6763c0e17de4f76
SHA256a9f8ce22da0a86318879c5cf31feaa5ec6e77afd32eb2988b0f1e4630e64ab1e
SHA5126ddbc29602fde4029cc1e2c73fcb893c7caf721f1811a6211808a3c09ec11856ddfdb3328e2181eac346fb12641e9929250e861c851f8802f549bf465970d5ad
-
C:\Users\Admin\AppData\Local\Temp\EE1E.exeFilesize
3.4MB
MD5189f74645ef310147f25841e309a704d
SHA1a05b78dae4dc3ea00f141beec6763c0e17de4f76
SHA256a9f8ce22da0a86318879c5cf31feaa5ec6e77afd32eb2988b0f1e4630e64ab1e
SHA5126ddbc29602fde4029cc1e2c73fcb893c7caf721f1811a6211808a3c09ec11856ddfdb3328e2181eac346fb12641e9929250e861c851f8802f549bf465970d5ad
-
C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exeFilesize
797KB
MD54a42db55ac5a11c8e33ca17d26b815fd
SHA1feae8594bd646974b6bbfddf238c07adc306724a
SHA256de827e6c87dc9cc432a88ad110e469fedec378dde5db08a1125f0b1c81d43fa1
SHA512da527ec42e4f9e95742d25a1e5a8e1f1fb620b58ae9215a83375f37282608203e3c350b92d2c0e08a822ba4574421cf7ce38b63fb5cb268d8a335e2ada2d0d80
-
C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exeFilesize
797KB
MD54a42db55ac5a11c8e33ca17d26b815fd
SHA1feae8594bd646974b6bbfddf238c07adc306724a
SHA256de827e6c87dc9cc432a88ad110e469fedec378dde5db08a1125f0b1c81d43fa1
SHA512da527ec42e4f9e95742d25a1e5a8e1f1fb620b58ae9215a83375f37282608203e3c350b92d2c0e08a822ba4574421cf7ce38b63fb5cb268d8a335e2ada2d0d80
-
C:\Users\Admin\AppData\Local\Temp\Kplubxjiptganhbubzyqedcratbuild (4).exeFilesize
797KB
MD54a42db55ac5a11c8e33ca17d26b815fd
SHA1feae8594bd646974b6bbfddf238c07adc306724a
SHA256de827e6c87dc9cc432a88ad110e469fedec378dde5db08a1125f0b1c81d43fa1
SHA512da527ec42e4f9e95742d25a1e5a8e1f1fb620b58ae9215a83375f37282608203e3c350b92d2c0e08a822ba4574421cf7ce38b63fb5cb268d8a335e2ada2d0d80
-
C:\Users\Admin\AppData\Roaming\shiawseFilesize
264KB
MD55028754736b592a4ea2be83eb8351e2e
SHA123dd444f6a05c07bb7fdd4a74417683199055283
SHA2561d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19
SHA51263e3bf3bcf9369719f2c86cbbf3f22f802b77498db1ac47961f1865b99e0c600f50a23ab63e555b0f4c091d327bcc8e2e8fd997c515c29e2f33c79460c7539de
-
C:\Users\Admin\AppData\Roaming\shiawseFilesize
264KB
MD55028754736b592a4ea2be83eb8351e2e
SHA123dd444f6a05c07bb7fdd4a74417683199055283
SHA2561d2baaf9bf7cad310fdc1d7d171f5967f9b1c51bf277bde74b351cad1c45af19
SHA51263e3bf3bcf9369719f2c86cbbf3f22f802b77498db1ac47961f1865b99e0c600f50a23ab63e555b0f4c091d327bcc8e2e8fd997c515c29e2f33c79460c7539de
-
memory/768-220-0x0000000000DF0000-0x0000000000DFD000-memory.dmpFilesize
52KB
-
memory/768-204-0x0000000000150000-0x000000000015B000-memory.dmpFilesize
44KB
-
memory/768-203-0x0000000000150000-0x000000000015B000-memory.dmpFilesize
44KB
-
memory/968-199-0x0000000007590000-0x00000000075F6000-memory.dmpFilesize
408KB
-
memory/968-190-0x0000000003520000-0x0000000003530000-memory.dmpFilesize
64KB
-
memory/968-182-0x0000000006350000-0x00000000063A0000-memory.dmpFilesize
320KB
-
memory/968-214-0x0000000003520000-0x0000000003530000-memory.dmpFilesize
64KB
-
memory/968-175-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1056-158-0x00000000006F0000-0x00000000006FF000-memory.dmpFilesize
60KB
-
memory/1056-157-0x0000000001260000-0x000000000126B000-memory.dmpFilesize
44KB
-
memory/1056-154-0x00000000006F0000-0x00000000006FF000-memory.dmpFilesize
60KB
-
memory/1056-211-0x0000000001260000-0x000000000126B000-memory.dmpFilesize
44KB
-
memory/1060-227-0x0000000000400000-0x0000000000705000-memory.dmpFilesize
3.0MB
-
memory/1172-162-0x0000000005B00000-0x0000000005B10000-memory.dmpFilesize
64KB
-
memory/1172-213-0x0000000005B00000-0x0000000005B10000-memory.dmpFilesize
64KB
-
memory/1172-160-0x0000000001200000-0x0000000001209000-memory.dmpFilesize
36KB
-
memory/1172-163-0x0000000001200000-0x0000000001209000-memory.dmpFilesize
36KB
-
memory/1932-136-0x0000000000400000-0x0000000000705000-memory.dmpFilesize
3.0MB
-
memory/1932-134-0x00000000008A0000-0x00000000008A9000-memory.dmpFilesize
36KB
-
memory/2096-218-0x0000000000720000-0x000000000072B000-memory.dmpFilesize
44KB
-
memory/2096-201-0x0000000000720000-0x000000000072B000-memory.dmpFilesize
44KB
-
memory/2096-202-0x0000000000DF0000-0x0000000000DFD000-memory.dmpFilesize
52KB
-
memory/2096-200-0x0000000000DF0000-0x0000000000DFD000-memory.dmpFilesize
52KB
-
memory/2680-151-0x0000000001260000-0x000000000126B000-memory.dmpFilesize
44KB
-
memory/2680-210-0x00000000008A0000-0x00000000008A9000-memory.dmpFilesize
36KB
-
memory/2680-155-0x00000000008A0000-0x00000000008A9000-memory.dmpFilesize
36KB
-
memory/2680-156-0x0000000001260000-0x000000000126B000-memory.dmpFilesize
44KB
-
memory/3284-224-0x0000000002B20000-0x0000000002B36000-memory.dmpFilesize
88KB
-
memory/3284-135-0x0000000002D60000-0x0000000002D76000-memory.dmpFilesize
88KB
-
memory/3308-195-0x0000000000D70000-0x0000000000D97000-memory.dmpFilesize
156KB
-
memory/3308-216-0x0000000000D70000-0x0000000000D97000-memory.dmpFilesize
156KB
-
memory/3308-196-0x0000000000760000-0x0000000000769000-memory.dmpFilesize
36KB
-
memory/3308-194-0x0000000000760000-0x0000000000769000-memory.dmpFilesize
36KB
-
memory/3464-197-0x0000000000720000-0x000000000072B000-memory.dmpFilesize
44KB
-
memory/3464-217-0x0000000000760000-0x0000000000769000-memory.dmpFilesize
36KB
-
memory/3464-198-0x0000000000720000-0x000000000072B000-memory.dmpFilesize
44KB
-
memory/3576-209-0x0000000000710000-0x0000000000790000-memory.dmpFilesize
512KB
-
memory/3576-212-0x0000000000F90000-0x0000000000FA0000-memory.dmpFilesize
64KB
-
memory/3644-171-0x0000000001200000-0x0000000001209000-memory.dmpFilesize
36KB
-
memory/3644-166-0x0000000000B40000-0x0000000000B4C000-memory.dmpFilesize
48KB
-
memory/3644-172-0x0000000000B40000-0x0000000000B4C000-memory.dmpFilesize
48KB
-
memory/3816-192-0x0000000000D70000-0x0000000000D97000-memory.dmpFilesize
156KB
-
memory/3816-215-0x0000000003520000-0x0000000003530000-memory.dmpFilesize
64KB
-
memory/3816-191-0x0000000003520000-0x0000000003530000-memory.dmpFilesize
64KB
-
memory/3816-180-0x0000000000D70000-0x0000000000D97000-memory.dmpFilesize
156KB
-
memory/3964-152-0x0000000005F70000-0x0000000006514000-memory.dmpFilesize
5.6MB
-
memory/3964-153-0x00000000058A0000-0x0000000005932000-memory.dmpFilesize
584KB
-
memory/3964-164-0x00000000076F0000-0x0000000007712000-memory.dmpFilesize
136KB
-
memory/3964-150-0x0000000000B60000-0x0000000000ECC000-memory.dmpFilesize
3.4MB
-
memory/3964-159-0x0000000005940000-0x000000000594A000-memory.dmpFilesize
40KB
-
memory/3964-161-0x0000000005B00000-0x0000000005B10000-memory.dmpFilesize
64KB