Analysis
-
max time kernel
34s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 15:50
Behavioral task
behavioral1
Sample
0x000600000002321e-639.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0x000600000002321e-639.exe
Resource
win10v2004-20231215-en
General
-
Target
0x000600000002321e-639.exe
-
Size
38KB
-
MD5
251a04dcae43d733a7beff1724f99fbe
-
SHA1
834cd1e1c218ac4a71003cb3151acb0cff0ef073
-
SHA256
a1e4f033baf6ddddff930d3e0da1020e20bc79cb053b5ab525252778a8c1f06a
-
SHA512
f8177efc94121708127518d7ee8d6fccda2a8b6c6859021646f60d8897ece75c8efaef864d42e31603e8d660b8124c7e33a4a23501b0997faa42eefe4e296786
-
SSDEEP
768:3E45SLnQpEhOB/hAGflc5xOXhr7gvexzv36:3E4EqEhOPNfqStgvexzv3
Malware Config
Extracted
smokeloader
2022
http://185.215.113.68/fks/index.php
Extracted
smokeloader
up3
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
LiveTraffic
20.79.30.95:13856
Extracted
redline
777
195.20.16.103:20440
Signatures
-
Glupteba payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3008-111-0x0000000002F20000-0x000000000380B000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/6128-641-0x0000000000400000-0x0000000000490000-memory.dmp family_redline behavioral2/memory/5768-832-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Deletes itself 1 IoCs
Processes:
pid process 3520 -
Executes dropped EXE 2 IoCs
Processes:
AC7C.exeC6FA.exepid process 1292 AC7C.exe 4924 C6FA.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2160 sc.exe -
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3500 1652 WerFault.exe toolspub2.exe 6016 5500 WerFault.exe explorer.exe 4456 5524 WerFault.exe explorer.exe 5100 2656 WerFault.exe InstallSetup8.exe 4416 2112 WerFault.exe tuc4.exe 4308 4176 WerFault.exe tuc4.tmp 5260 1316 WerFault.exe explorer.exe 5496 5896 WerFault.exe explorer.exe 4968 4736 WerFault.exe explorer.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
0x000600000002321e-639.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x000600000002321e-639.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x000600000002321e-639.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0x000600000002321e-639.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 6064 schtasks.exe 4752 schtasks.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0x000600000002321e-639.exepid process 372 0x000600000002321e-639.exe 372 0x000600000002321e-639.exe 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
0x000600000002321e-639.exepid process 372 0x000600000002321e-639.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
description pid process target process PID 3520 wrote to memory of 1292 3520 AC7C.exe PID 3520 wrote to memory of 1292 3520 AC7C.exe PID 3520 wrote to memory of 1292 3520 AC7C.exe PID 3520 wrote to memory of 4924 3520 C6FA.exe PID 3520 wrote to memory of 4924 3520 C6FA.exe PID 3520 wrote to memory of 4924 3520 C6FA.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000600000002321e-639.exe"C:\Users\Admin\AppData\Local\Temp\0x000600000002321e-639.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\AC7C.exeC:\Users\Admin\AppData\Local\Temp\AC7C.exe1⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
-
C:\ProgramData\Java Updater\9kao179kg.exe/prstb3⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5524 -s 11485⤵
- Program crash
-
C:\ProgramData\Java Updater\9kao179kg.exe/prstb3⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 11485⤵
- Program crash
-
C:\ProgramData\Java Updater\9kao179kg.exe/prstb3⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5896 -s 11485⤵
- Program crash
-
C:\ProgramData\Java Updater\9kao179kg.exe/prstb3⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 10805⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\C6FA.exeC:\Users\Admin\AppData\Local\Temp\C6FA.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exe"C:\Users\Admin\AppData\Local\Temp\tuc4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-POGE2.tmp\tuc4.tmp"C:\Users\Admin\AppData\Local\Temp\is-POGE2.tmp\tuc4.tmp" /SL5="$50208,7884275,54272,C:\Users\Admin\AppData\Local\Temp\tuc4.exe"3⤵
-
C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe"C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe" -i4⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 234⤵
-
C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe"C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe" -s4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 11244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 5163⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\etopt.exe"C:\Users\Admin\AppData\Local\Temp\etopt.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\nsgD499.tmp.exeC:\Users\Admin\AppData\Local\Temp\nsgD499.tmp.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 9963⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 3282⤵
- Program crash
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 231⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1652 -ip 16521⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\F629.exeC:\Users\Admin\AppData\Local\Temp\F629.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\33C0.exeC:\Users\Admin\AppData\Local\Temp\33C0.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 11163⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdater.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\39CC.exeC:\Users\Admin\AppData\Local\Temp\39CC.exe1⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5500 -ip 55001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5524 -ip 55241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2656 -ip 26561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2112 -ip 21121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4176 -ip 41761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1316 -ip 13161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5896 -ip 58961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4736 -ip 47361⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AC7C.exeFilesize
704KB
MD5c90bf3d3631d8409f012e9b9007aa50c
SHA126daf84cb380353da4cb6de36a023459de2f83a8
SHA256f99fd23856936c07c9d51856f22c199630ad3c8e1d41f08a1dbc433624406336
SHA512bc6c89bbb591ed044118821f99c693dea9f0f3af23e5320b0ce5be8d706b373ca26061667ab04a933f34a04dd4038cf35e321ca38b516cbd6f6e0aba7887a0d4
-
C:\Users\Admin\AppData\Local\Temp\AC7C.exeFilesize
44KB
MD5276a168c49b56d271dae8753960cb84b
SHA165a7b5f6c86f1d1651d2ce013600fc8c79b257fb
SHA256f9df2a1b00ff9458a08e909697c1a6943f1310cc7436629c481efdf64b3722bc
SHA5121505e89c388f4f32b90b05a40b01f8c8e9956ceb98d7b2377fd7b3c99915fd171558c5df02b1fa29db9ec3393678f3f8dce4491809952589c6e4ed1b1bac3347
-
C:\Users\Admin\AppData\Local\Temp\C6FA.exeFilesize
92KB
MD5babe614b1f0307680c90b42879efc3f6
SHA138adf3aedef1353ce1057e421d5265f2dc8cf757
SHA2563e19e2459742eb5f41bc0f1478099982ffb3175f4087b2d104528bcfd0172e0b
SHA5127edc1e3e2c64e540ae570eb18a68092757c141098132f90e3eff6a07e2e86c89f625eb89b8b147b810422136cb9b5d58cff69f26504fc99612e7c1621b2664ac
-
C:\Users\Admin\AppData\Local\Temp\C6FA.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/372-0-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/372-2-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1292-247-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/1292-14-0x0000000005AA0000-0x0000000005B3C000-memory.dmpFilesize
624KB
-
memory/1292-12-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/1292-13-0x0000000000D30000-0x00000000010F6000-memory.dmpFilesize
3.8MB
-
memory/1652-560-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1652-75-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1652-91-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1656-164-0x0000000002F30000-0x0000000002F31000-memory.dmpFilesize
4KB
-
memory/1656-245-0x0000000003240000-0x000000000327A000-memory.dmpFilesize
232KB
-
memory/1656-179-0x0000000004350000-0x0000000004F78000-memory.dmpFilesize
12.2MB
-
memory/1656-123-0x0000000010000000-0x000000001001B000-memory.dmpFilesize
108KB
-
memory/1808-531-0x0000000007290000-0x00000000072AA000-memory.dmpFilesize
104KB
-
memory/1808-540-0x0000000070E40000-0x0000000071194000-memory.dmpFilesize
3.3MB
-
memory/1808-871-0x0000000000010000-0x000000000006D000-memory.dmpFilesize
372KB
-
memory/1808-875-0x0000000002140000-0x00000000021A6000-memory.dmpFilesize
408KB
-
memory/1808-569-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/1808-564-0x0000000007700000-0x000000000771A000-memory.dmpFilesize
104KB
-
memory/1808-565-0x0000000007650000-0x0000000007658000-memory.dmpFilesize
32KB
-
memory/1808-563-0x0000000007610000-0x0000000007624000-memory.dmpFilesize
80KB
-
memory/1808-562-0x0000000007600000-0x000000000760E000-memory.dmpFilesize
56KB
-
memory/1808-537-0x000000007F800000-0x000000007F810000-memory.dmpFilesize
64KB
-
memory/1808-559-0x00000000075C0000-0x00000000075D1000-memory.dmpFilesize
68KB
-
memory/1808-494-0x00000000025A0000-0x00000000025D6000-memory.dmpFilesize
216KB
-
memory/1808-497-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1808-498-0x00000000051E0000-0x0000000005808000-memory.dmpFilesize
6.2MB
-
memory/1808-496-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1808-495-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/1808-500-0x0000000005810000-0x0000000005876000-memory.dmpFilesize
408KB
-
memory/1808-506-0x00000000058F0000-0x0000000005956000-memory.dmpFilesize
408KB
-
memory/1808-511-0x0000000005A60000-0x0000000005DB4000-memory.dmpFilesize
3.3MB
-
memory/1808-499-0x0000000004F20000-0x0000000004F42000-memory.dmpFilesize
136KB
-
memory/1808-512-0x0000000005EC0000-0x0000000005EDE000-memory.dmpFilesize
120KB
-
memory/1808-513-0x0000000005F00000-0x0000000005F4C000-memory.dmpFilesize
304KB
-
memory/1808-514-0x0000000006300000-0x0000000006344000-memory.dmpFilesize
272KB
-
memory/1808-558-0x0000000007660000-0x00000000076F6000-memory.dmpFilesize
600KB
-
memory/1808-538-0x0000000007450000-0x0000000007482000-memory.dmpFilesize
200KB
-
memory/1808-539-0x00000000719C0000-0x0000000071A0C000-memory.dmpFilesize
304KB
-
memory/1808-550-0x0000000007490000-0x00000000074AE000-memory.dmpFilesize
120KB
-
memory/1808-529-0x0000000007210000-0x0000000007286000-memory.dmpFilesize
472KB
-
memory/1808-555-0x00000000075A0000-0x00000000075AA000-memory.dmpFilesize
40KB
-
memory/1808-530-0x0000000007910000-0x0000000007F8A000-memory.dmpFilesize
6.5MB
-
memory/1808-554-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1808-552-0x00000000074B0000-0x0000000007553000-memory.dmpFilesize
652KB
-
memory/2112-551-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2112-72-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2508-527-0x00000000008E0000-0x00000000008FC000-memory.dmpFilesize
112KB
-
memory/2508-528-0x0000000000400000-0x0000000000854000-memory.dmpFilesize
4.3MB
-
memory/2508-866-0x0000000000400000-0x0000000000854000-memory.dmpFilesize
4.3MB
-
memory/2508-526-0x0000000000900000-0x0000000000A00000-memory.dmpFilesize
1024KB
-
memory/2508-806-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/3008-111-0x0000000002F20000-0x000000000380B000-memory.dmpFilesize
8.9MB
-
memory/3008-135-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/3008-553-0x0000000002B20000-0x0000000002F1C000-memory.dmpFilesize
4.0MB
-
memory/3008-579-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/3008-87-0x0000000002B20000-0x0000000002F1C000-memory.dmpFilesize
4.0MB
-
memory/3520-534-0x0000000002A40000-0x0000000002A56000-memory.dmpFilesize
88KB
-
memory/3520-1-0x00000000029B0000-0x00000000029C6000-memory.dmpFilesize
88KB
-
memory/3832-525-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/3832-613-0x0000000000400000-0x0000000000965000-memory.dmpFilesize
5.4MB
-
memory/3832-61-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/4132-73-0x0000000000490000-0x0000000000499000-memory.dmpFilesize
36KB
-
memory/4132-69-0x0000000000620000-0x0000000000720000-memory.dmpFilesize
1024KB
-
memory/4176-578-0x0000000000550000-0x0000000000551000-memory.dmpFilesize
4KB
-
memory/4176-108-0x0000000000550000-0x0000000000551000-memory.dmpFilesize
4KB
-
memory/4176-616-0x0000000000400000-0x00000000004BC000-memory.dmpFilesize
752KB
-
memory/4484-572-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/4484-568-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/4648-867-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/4924-19-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/4924-20-0x0000000000390000-0x000000000166E000-memory.dmpFilesize
18.9MB
-
memory/4924-109-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/5292-765-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/5292-580-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/5292-577-0x0000000002AB0000-0x0000000002EB2000-memory.dmpFilesize
4.0MB
-
memory/5308-766-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/5392-594-0x000000007FC80000-0x000000007FC90000-memory.dmpFilesize
64KB
-
memory/5392-595-0x0000000071210000-0x000000007125C000-memory.dmpFilesize
304KB
-
memory/5392-593-0x0000000006380000-0x00000000063CC000-memory.dmpFilesize
304KB
-
memory/5392-581-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/5392-582-0x0000000002D10000-0x0000000002D20000-memory.dmpFilesize
64KB
-
memory/5392-583-0x0000000002D10000-0x0000000002D20000-memory.dmpFilesize
64KB
-
memory/5768-832-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/6032-642-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB
-
memory/6032-638-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB
-
memory/6128-641-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB