Analysis
-
max time kernel
22s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 13:36
Behavioral task
behavioral1
Sample
bf0cbdb53bbd724bb231f0b6958edfc4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bf0cbdb53bbd724bb231f0b6958edfc4.exe
Resource
win10v2004-20231215-en
General
-
Target
bf0cbdb53bbd724bb231f0b6958edfc4.exe
-
Size
38KB
-
MD5
bf0cbdb53bbd724bb231f0b6958edfc4
-
SHA1
d825f3d47987356477f6a1d916a0e34cb581ecc5
-
SHA256
41d04caed8474ba34136c1e831cd345086a4fd4259557ec16f9c4cc99fb603cb
-
SHA512
5073f5f04c954de70247254e1983939c330fa95f11e1d36f615f52a9649e77f8ffa93269ba19b7a734f4528ad5907b3e960414a54ee442dd1e1a70365af1358e
-
SSDEEP
768:3E45SLnQpEhOB/hAGflc5xOXhr7gvexzv36:3E4EqEhOPNfqStgvexzv3
Malware Config
Extracted
smokeloader
2022
http://185.215.113.68/fks/index.php
Extracted
smokeloader
up3
Extracted
stealc
http://5.42.66.58
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2424-271-0x0000000000DD0000-0x0000000000E64000-memory.dmp family_zgrat_v1 -
Glupteba payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/3044-117-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3044-107-0x0000000002BB0000-0x000000000349B000-memory.dmp family_glupteba behavioral1/memory/3044-321-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3044-322-0x0000000002BB0000-0x000000000349B000-memory.dmp family_glupteba behavioral1/memory/2888-330-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2888-339-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/284-344-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Deletes itself 1 IoCs
Processes:
pid process 1372 -
Modifies file permissions 1 TTPs 1 IoCs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 api.ipify.org 59 api.2ip.ua 60 api.2ip.ua 78 api.2ip.ua -
Modifies boot configuration data using bcdedit 1 IoCs
Processes:
bcdedit.exepid process 2728 bcdedit.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1480 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 936 2512 WerFault.exe InstallSetup8.exe 944 1624 WerFault.exe 5nd4Ss2.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
bf0cbdb53bbd724bb231f0b6958edfc4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bf0cbdb53bbd724bb231f0b6958edfc4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bf0cbdb53bbd724bb231f0b6958edfc4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bf0cbdb53bbd724bb231f0b6958edfc4.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1212 schtasks.exe 1788 schtasks.exe 2128 schtasks.exe 1764 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 856 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bf0cbdb53bbd724bb231f0b6958edfc4.exepid process 1712 bf0cbdb53bbd724bb231f0b6958edfc4.exe 1712 bf0cbdb53bbd724bb231f0b6958edfc4.exe 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 1372 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
bf0cbdb53bbd724bb231f0b6958edfc4.exepid process 1712 bf0cbdb53bbd724bb231f0b6958edfc4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf0cbdb53bbd724bb231f0b6958edfc4.exe"C:\Users\Admin\AppData\Local\Temp\bf0cbdb53bbd724bb231f0b6958edfc4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\9F4D.exeC:\Users\Admin\AppData\Local\Temp\9F4D.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exe"C:\Users\Admin\AppData\Local\Temp\tuc4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-4JI0T.tmp\tuc4.tmp"C:\Users\Admin\AppData\Local\Temp\is-4JI0T.tmp\tuc4.tmp" /SL5="$3009A,7884275,54272,C:\Users\Admin\AppData\Local\Temp\tuc4.exe"3⤵
-
C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe"C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe" -i4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 234⤵
-
C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe"C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe" -s4⤵
-
C:\Users\Admin\AppData\Local\Temp\etopt.exe"C:\Users\Admin\AppData\Local\Temp\etopt.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 17003⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\A863.exeC:\Users\Admin\AppData\Local\Temp\A863.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\nsjAC88.tmp.exeC:\Users\Admin\AppData\Local\Temp\nsjAC88.tmp.exe1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsjAC88.tmp.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231228133651.log C:\Windows\Logs\CBS\CbsPersist_20231228133651.cab1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 231⤵
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"1⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"2⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe2⤵
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f3⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll3⤵
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F3⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe1⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 11⤵
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3DA0.bat" "1⤵
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 11⤵
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3F18.bat" "1⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 51⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\CF66.exeC:\Users\Admin\AppData\Local\Temp\CF66.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\CF66.exeC:\Users\Admin\AppData\Local\Temp\CF66.exe2⤵
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\b639337e-cfbc-4ef8-8c74-4df5d04fcfbd" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\CF66.exe"C:\Users\Admin\AppData\Local\Temp\CF66.exe" --Admin IsNotAutoStart IsNotTask3⤵
-
C:\Users\Admin\AppData\Local\Temp\CF66.exe"C:\Users\Admin\AppData\Local\Temp\CF66.exe" --Admin IsNotAutoStart IsNotTask4⤵
-
C:\Users\Admin\AppData\Local\Temp\EA8.exeC:\Users\Admin\AppData\Local\Temp\EA8.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wU2OO20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wU2OO20.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ly9zQ56.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ly9zQ56.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5nd4Ss2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5nd4Ss2.exe4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 25245⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Ij1626.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Ij1626.exe1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://facebook.com/login2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://accounts.google.com/2⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:21⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:275457 /prefetch:21⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:636 CREDAT:275457 /prefetch:21⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST1⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST1⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9F4D.exeFilesize
898KB
MD52f66500ad94d44bff11722294312a7c2
SHA1960728651c893924d25af3962712a29f985b9acd
SHA2566f22bdedbb8da280f2db284748ef1763f37964a463212c41fe849ee889d81bb7
SHA51247ac161edf88bc93a501ff526f1857a82674d1b033942c15dba6d907f68cbd6c7c00a9abe48a7c2ec2abe435940d5f660c80d1b8062effd8d25af6dbe7d17357
-
C:\Users\Admin\AppData\Local\Temp\9F4D.exeFilesize
382KB
MD54684301f599a651fc89942c537a657d2
SHA1e846865b3230a5a8194a4c50ddf20fbfc22e601f
SHA256ceb7999279ff782f8b027c3eb57e18bf0de2bf2bfc58e217533f46e9065961cd
SHA512147935a6c0addd7e5c9ae53fae1edcaa8aa2cb30ca446cf95ac404825f95f4a005202314cc64abb4121377bdfc358f1661260e8c4e729f580cd4e6e54c06abc2
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exeFilesize
2.2MB
MD531f42479194700f598c22ea83fa196c1
SHA10552ca7766283d7add7c06312ecb5e858d3a2ea0
SHA256098b76a1d654efe963b1d6167dc77d34627b8488d742c49bfb70e8d70b1755a7
SHA512afc83e94dc92453312a4d24193b0d3c17cf37644a5cf25b2c934f27d58968c41a5b176de12c2c5c5c8c1d2fbdb57d235a5073fe304f6b12e11a40e2cb52ee836
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exeFilesize
283KB
MD52d24e3baa2a16e47bee10e91381e6391
SHA1013b59b2cd69e93694196dfb34fddc8684cfd619
SHA256ff2e975c649d66476c48ac9fe64455eb0727fede676d000728d09d62d2dc6db4
SHA512be515895b29390e1c9c44620f7b18c8ae57d08627b8bbf7484b551ccf079011f95baa78e71c1a2a6280b544dd06444b509b7c9ba126b525d813afd68010b03e7
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exeFilesize
893KB
MD5cf432fdb478afabdc58519ea24ac6f1d
SHA19cf66febf6602eea19418984664aaa66c9e74336
SHA256e8bd81bc706d6b328c18518c5e09929db5b944d10ac5f9671df1e74b47686873
SHA512ff3476fb03dc4773ed4e22b2add27662e72309e5977a34fa6a300e56ac910fcd2537b355b1f32802d288c47f9abbdc0fb6c42078b52932f2414798e76ffda2f5
-
\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
2.4MB
MD5354f222846544fa8d33f70a7915b4cd3
SHA1f2b08f2a2d4a90fae69521935eb523a18940f086
SHA2563c75d941500cd2d2b4d54c21b105051021048583030f85bedbb832269af1fd40
SHA512ad8edd23a1847be3ab6d5a367cfe93614603a7689b8d0250162bb682410c89a63ab83126c58c1f17a0be509f0e72e4f467e89817697d84da42004ac5c286bb4b
-
\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
1.9MB
MD5687fdbf83586de43fdb608d582904c40
SHA10b27069322547528a86db9b7ee8c8709514843db
SHA256c62c45ed8bf58e8457d75527e0d0657a5e323c115337b22933325316d1a30dc5
SHA5128d2f4b9ad9a40649cdb6da51efc96ab71cc75daf0fe5661c3ac043fa0c9c694b6d6c43c9ea66f9416c7ef92d80895ef2e1a8007485f8e59fba88158ad01386a7
-
memory/284-344-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/284-343-0x00000000027B0000-0x0000000002BA8000-memory.dmpFilesize
4.0MB
-
memory/284-524-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/284-341-0x00000000027B0000-0x0000000002BA8000-memory.dmpFilesize
4.0MB
-
memory/448-535-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/448-538-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/764-138-0x00000000043A0000-0x0000000004FC8000-memory.dmpFilesize
12.2MB
-
memory/764-204-0x0000000000470000-0x00000000004AA000-memory.dmpFilesize
232KB
-
memory/764-114-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/764-109-0x0000000010000000-0x000000001001B000-memory.dmpFilesize
108KB
-
memory/1124-847-0x0000000012900000-0x00000000129A2000-memory.dmpFilesize
648KB
-
memory/1124-908-0x0000000012900000-0x00000000129A2000-memory.dmpFilesize
648KB
-
memory/1372-323-0x0000000004100000-0x0000000004116000-memory.dmpFilesize
88KB
-
memory/1372-1-0x0000000002E70000-0x0000000002E86000-memory.dmpFilesize
88KB
-
memory/1620-1281-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1624-973-0x0000000000F80000-0x0000000000F90000-memory.dmpFilesize
64KB
-
memory/1624-910-0x00000000003F0000-0x000000000084E000-memory.dmpFilesize
4.4MB
-
memory/1624-911-0x00000000013A0000-0x00000000017FE000-memory.dmpFilesize
4.4MB
-
memory/1624-912-0x00000000003F0000-0x000000000084E000-memory.dmpFilesize
4.4MB
-
memory/1640-316-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1640-61-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1660-536-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/1660-561-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/1712-0-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1712-2-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1824-856-0x0000000000220000-0x00000000002B2000-memory.dmpFilesize
584KB
-
memory/1824-857-0x00000000004D0000-0x00000000005EB000-memory.dmpFilesize
1.1MB
-
memory/1828-358-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1828-367-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1872-113-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1872-89-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1872-87-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1872-324-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2012-342-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2012-118-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2104-123-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2104-349-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2424-272-0x0000000072300000-0x00000000729EE000-memory.dmpFilesize
6.9MB
-
memory/2424-293-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/2424-273-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/2424-274-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/2424-271-0x0000000000DD0000-0x0000000000E64000-memory.dmpFilesize
592KB
-
memory/2424-296-0x0000000072300000-0x00000000729EE000-memory.dmpFilesize
6.9MB
-
memory/2472-319-0x0000000000400000-0x000000000062E000-memory.dmpFilesize
2.2MB
-
memory/2472-317-0x00000000006A0000-0x00000000007A0000-memory.dmpFilesize
1024KB
-
memory/2472-318-0x00000000002A0000-0x00000000002BC000-memory.dmpFilesize
112KB
-
memory/2472-809-0x00000000006A0000-0x00000000007A0000-memory.dmpFilesize
1024KB
-
memory/2472-509-0x00000000006A0000-0x00000000007A0000-memory.dmpFilesize
1024KB
-
memory/2472-510-0x0000000000400000-0x000000000062E000-memory.dmpFilesize
2.2MB
-
memory/2472-377-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/2472-810-0x0000000000400000-0x000000000062E000-memory.dmpFilesize
2.2MB
-
memory/2480-70-0x00000000002A0000-0x00000000002A9000-memory.dmpFilesize
36KB
-
memory/2480-69-0x00000000004C0000-0x00000000005C0000-memory.dmpFilesize
1024KB
-
memory/2492-375-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/2492-359-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/2532-1273-0x00000000004D0000-0x0000000000562000-memory.dmpFilesize
584KB
-
memory/2688-297-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2688-275-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2688-277-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2688-457-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2688-284-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2688-290-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2688-295-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2688-292-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2688-288-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2688-286-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2700-916-0x0000000002CB0000-0x0000000002CF0000-memory.dmpFilesize
256KB
-
memory/2700-931-0x000000006BD80000-0x000000006C32B000-memory.dmpFilesize
5.7MB
-
memory/2700-915-0x000000006BD80000-0x000000006C32B000-memory.dmpFilesize
5.7MB
-
memory/2708-92-0x0000000074480000-0x0000000074B6E000-memory.dmpFilesize
6.9MB
-
memory/2708-28-0x0000000000B40000-0x0000000001E1E000-memory.dmpFilesize
18.9MB
-
memory/2708-27-0x0000000074480000-0x0000000074B6E000-memory.dmpFilesize
6.9MB
-
memory/2748-909-0x0000000002A00000-0x0000000002E5E000-memory.dmpFilesize
4.4MB
-
memory/2812-1255-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2812-862-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2888-340-0x00000000025F0000-0x00000000029E8000-memory.dmpFilesize
4.0MB
-
memory/2888-339-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/2888-330-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/2888-327-0x00000000025F0000-0x00000000029E8000-memory.dmpFilesize
4.0MB
-
memory/2888-329-0x00000000025F0000-0x00000000029E8000-memory.dmpFilesize
4.0MB
-
memory/3044-322-0x0000000002BB0000-0x000000000349B000-memory.dmpFilesize
8.9MB
-
memory/3044-107-0x0000000002BB0000-0x000000000349B000-memory.dmpFilesize
8.9MB
-
memory/3044-117-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/3044-82-0x00000000027B0000-0x0000000002BA8000-memory.dmpFilesize
4.0MB
-
memory/3044-321-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/3044-68-0x00000000027B0000-0x0000000002BA8000-memory.dmpFilesize
4.0MB