Analysis
-
max time kernel
27s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 18:26
Behavioral task
behavioral1
Sample
ca627643bb7b7b47e9a5df13b9e3965d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ca627643bb7b7b47e9a5df13b9e3965d.exe
Resource
win10v2004-20231215-en
General
-
Target
ca627643bb7b7b47e9a5df13b9e3965d.exe
-
Size
38KB
-
MD5
ca627643bb7b7b47e9a5df13b9e3965d
-
SHA1
c2628970d91a3170c169074849ac6e9f1e0a8bbc
-
SHA256
9371ca0ca0eb53e4f9359d9a98eaf6230e59da36630eb798e8bed18643026544
-
SHA512
4e305286fc33b0b7c91f4fc8385bd2e9306c69ad98157113255c1505eeb8bb6aaf9b27b1afd0dbd2daaedde4b6b79b0d4ff9654376b90bf817157e894badfc72
-
SSDEEP
768:3E45SLnQpEhOB/hAGflc5xOXhr7gvexzv36:3E4EqEhOPNfqStgvexzv3
Malware Config
Extracted
smokeloader
2022
http://185.215.113.68/fks/index.php
Extracted
smokeloader
up3
Extracted
redline
LiveTraffic
20.79.30.95:13856
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2792-256-0x0000000000400000-0x0000000000490000-memory.dmp family_redline behavioral1/memory/2792-257-0x0000000000400000-0x0000000000490000-memory.dmp family_redline behavioral1/memory/2792-260-0x0000000000400000-0x0000000000490000-memory.dmp family_redline behavioral1/memory/2792-266-0x0000000000400000-0x0000000000490000-memory.dmp family_redline behavioral1/memory/2792-263-0x0000000000400000-0x0000000000490000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Deletes itself 1 IoCs
Processes:
pid process 1204 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2396 2668 WerFault.exe InstallSetup8.exe 1664 2572 WerFault.exe tuc4.tmp 1440 2396 WerFault.exe WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ca627643bb7b7b47e9a5df13b9e3965d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ca627643bb7b7b47e9a5df13b9e3965d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ca627643bb7b7b47e9a5df13b9e3965d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ca627643bb7b7b47e9a5df13b9e3965d.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2584 schtasks.exe 1796 schtasks.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 404 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ca627643bb7b7b47e9a5df13b9e3965d.exepid process 1652 ca627643bb7b7b47e9a5df13b9e3965d.exe 1652 ca627643bb7b7b47e9a5df13b9e3965d.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ca627643bb7b7b47e9a5df13b9e3965d.exepid process 1652 ca627643bb7b7b47e9a5df13b9e3965d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca627643bb7b7b47e9a5df13b9e3965d.exe"C:\Users\Admin\AppData\Local\Temp\ca627643bb7b7b47e9a5df13b9e3965d.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E9D2.exeC:\Users\Admin\AppData\Local\Temp\E9D2.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exe"C:\Users\Admin\AppData\Local\Temp\tuc4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-36MHK.tmp\tuc4.tmp"C:\Users\Admin\AppData\Local\Temp\is-36MHK.tmp\tuc4.tmp" /SL5="$30144,7884275,54272,C:\Users\Admin\AppData\Local\Temp\tuc4.exe"3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 234⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 235⤵
-
C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe"C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe" -i4⤵
-
C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe"C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe" -s4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 4324⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\etopt.exe"C:\Users\Admin\AppData\Local\Temp\etopt.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 7883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 5204⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe1⤵
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231230182735.log C:\Windows\Logs\CBS\CbsPersist_20231230182735.cab1⤵
-
C:\Users\Admin\AppData\Local\Temp\F345.exeC:\Users\Admin\AppData\Local\Temp\F345.exe1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"1⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"2⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes3⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe2⤵
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f3⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"3⤵
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll3⤵
-
C:\Users\Admin\AppData\Local\Temp\nsy4F3.tmp.exeC:\Users\Admin\AppData\Local\Temp\nsy4F3.tmp.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\5CE1.exeC:\Users\Admin\AppData\Local\Temp\5CE1.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\3me15i19779ku99_1.exe/suac3⤵
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\SysWOW64\regedit.exe"4⤵
- Runs regedit.exe
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\3ME15I~1.EXE" /RL HIGHEST4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\64A0.exeC:\Users\Admin\AppData\Local\Temp\64A0.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
203KB
MD5b9e2c6259a8621790dd0b2b02ba5164f
SHA16711819a0efbed28971b68ff532864a49808aa4b
SHA2563999ad29300db10bf2690b7040812d2555a82c78635dabcc2c10a0b0e576b69f
SHA5125e3dff142552c29d188f6c18979c628d0c169abf13f3f9ca80dd88209e7e81280324867dc44a672321355d96d66adec1e9b46dd446d52221b55f4b1a74d2615c
-
C:\Users\Admin\AppData\Local\Temp\E9D2.exeFilesize
68KB
MD57ce334575abc19016bbb2b65aa030361
SHA15c24bf0f3c7cc7929211ff53179684e778c60fe2
SHA2561dda6e0f48107f791154749c594ac235a89588d9ebb240172c4d943742d30d75
SHA512da768cb62fb5eb593376a87ac887df0803f87abdbdb949cfbfa139d0f4f5b533f40d34e7f25d11f5d94da895cce4c781241b89108dc8b60050757c45fb953a62
-
C:\Users\Admin\AppData\Local\Temp\E9D2.exeFilesize
100KB
MD57f01faf10aee5edcce605477b005dadb
SHA1a6461b45b3bc9c5e9877a757ea5ce2098c7573a3
SHA256b0107c15228a39b1c1fd053f1e268322b32a3054e5ed88801db26c2387838799
SHA5125846c6e66952a7863c55f2598f19d449957fa2efcd1c416d4d25fb10ae3ecca701c54482f69d48c9bd495240b240520d81536cfac80c97404fe143de76a9e0e4
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exeFilesize
413KB
MD52f2cad14b71d4774b7abb87cc57eb0ca
SHA1a1f2ed7449eefba78bb148a957e868fc614ad81f
SHA256e708bb81147226a792a65d15128e2d6926e27ef6d579b66d02bf6bd54847da70
SHA512ad13d1bd453a71ae910ffd824360dd9aeb15f464cfeee924e36247c9ce87a8c1f5ccf4328ef4d90e57a023cc6d71b26678476058ae63353fdf4a7b9309a2a878
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exeFilesize
283KB
MD52d24e3baa2a16e47bee10e91381e6391
SHA1013b59b2cd69e93694196dfb34fddc8684cfd619
SHA256ff2e975c649d66476c48ac9fe64455eb0727fede676d000728d09d62d2dc6db4
SHA512be515895b29390e1c9c44620f7b18c8ae57d08627b8bbf7484b551ccf079011f95baa78e71c1a2a6280b544dd06444b509b7c9ba126b525d813afd68010b03e7
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exeFilesize
91KB
MD5c3de680103edb5fd8055c7a63a23c023
SHA17b95eb3a57268c57c3073617f1beab14d0a3052d
SHA2562a69d51aa08b7d32277aa65d06a6eaab6ee3423ae761bcfb94b46cea3e8a5c39
SHA512af914b5f140eeda1206a793e25932c4d6c02435c7b35f5cfaef5b01ef40783a13dbe866540e25c7ff0a73004915457fd5bb6f6bbf4ee25eb5c54740f2de84eef
-
\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
245KB
MD516fd13b097893a85d3fbc36987cf1002
SHA11b9d8df9cf509736c5e9d9e9cba7fb4fdd95a142
SHA2564735352ce557beea4daa94e813cf27fe904a5399cc630518f1d558917ef7de9a
SHA5126b418713a0355487eabb2cad3cecba763435217ab292c08b29285c3d40268e7004999cf023df0c6cb9f948c4b47a8c5796d9fdb3c174b33fc6418704c67976da
-
\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
475KB
MD5ee288c3dfd4b8656e1b7c6c84f12a2ee
SHA107d245a313b4dd34457a9082c6d6bfad7c41bb4e
SHA2564c2e1b88f68830de64da7441fe967cdc93ec37b7b39eb1858efdf5b7297dca40
SHA5123f3f6a6e204846f2ab577283ca8f52541fddc381ee881b6a1bbe65b54517aeeebd20c37c8ba7c894d808967bffa749aa07a12f1d031fc4f2bd616d9e57714833
-
memory/552-537-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/552-497-0x0000000000D60000-0x0000000000D6C000-memory.dmpFilesize
48KB
-
memory/552-487-0x0000000077960000-0x0000000077AE1000-memory.dmpFilesize
1.5MB
-
memory/552-496-0x0000000077960000-0x0000000077AE1000-memory.dmpFilesize
1.5MB
-
memory/552-498-0x00000000000F0000-0x00000000001B4000-memory.dmpFilesize
784KB
-
memory/552-535-0x0000000077960000-0x0000000077AE1000-memory.dmpFilesize
1.5MB
-
memory/552-491-0x00000000000F0000-0x00000000001B4000-memory.dmpFilesize
784KB
-
memory/552-488-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/552-503-0x0000000000D10000-0x0000000000D11000-memory.dmpFilesize
4KB
-
memory/552-541-0x00000000000F0000-0x00000000001B4000-memory.dmpFilesize
784KB
-
memory/560-532-0x00000000777D1000-0x00000000777D2000-memory.dmpFilesize
4KB
-
memory/1040-323-0x0000000002670000-0x0000000002A68000-memory.dmpFilesize
4.0MB
-
memory/1040-282-0x0000000002670000-0x0000000002A68000-memory.dmpFilesize
4.0MB
-
memory/1040-289-0x0000000002670000-0x0000000002A68000-memory.dmpFilesize
4.0MB
-
memory/1040-321-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/1040-291-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/1204-526-0x00000000777D1000-0x00000000777D2000-memory.dmpFilesize
4KB
-
memory/1204-1-0x0000000002E20000-0x0000000002E36000-memory.dmpFilesize
88KB
-
memory/1204-277-0x0000000002F00000-0x0000000002F16000-memory.dmpFilesize
88KB
-
memory/1280-155-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/1280-347-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/1280-361-0x0000000000400000-0x0000000000965000-memory.dmpFilesize
5.4MB
-
memory/1524-463-0x0000000000990000-0x0000000000A90000-memory.dmpFilesize
1024KB
-
memory/1524-306-0x0000000000220000-0x000000000023C000-memory.dmpFilesize
112KB
-
memory/1524-305-0x0000000000990000-0x0000000000A90000-memory.dmpFilesize
1024KB
-
memory/1524-385-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/1524-464-0x0000000000400000-0x0000000000855000-memory.dmpFilesize
4.3MB
-
memory/1524-308-0x0000000000400000-0x0000000000855000-memory.dmpFilesize
4.3MB
-
memory/1652-2-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1652-0-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1660-57-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1660-79-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1660-61-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1660-279-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1672-515-0x0000000000840000-0x0000000000DD6000-memory.dmpFilesize
5.6MB
-
memory/1736-265-0x0000000072320000-0x0000000072A0E000-memory.dmpFilesize
6.9MB
-
memory/1736-250-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/1736-252-0x0000000072320000-0x0000000072A0E000-memory.dmpFilesize
6.9MB
-
memory/1736-253-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/1736-249-0x0000000000CB0000-0x0000000000D50000-memory.dmpFilesize
640KB
-
memory/1736-255-0x0000000004B60000-0x0000000004BA0000-memory.dmpFilesize
256KB
-
memory/1952-533-0x0000000077780000-0x0000000077929000-memory.dmpFilesize
1.7MB
-
memory/1952-542-0x00000000004A0000-0x00000000004A6000-memory.dmpFilesize
24KB
-
memory/1952-333-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1952-348-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/2140-47-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2140-290-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2188-326-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/2188-482-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/2188-324-0x0000000002740000-0x0000000002B38000-memory.dmpFilesize
4.0MB
-
memory/2188-322-0x0000000002740000-0x0000000002B38000-memory.dmpFilesize
4.0MB
-
memory/2244-60-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/2244-59-0x0000000000580000-0x0000000000680000-memory.dmpFilesize
1024KB
-
memory/2488-548-0x000000007798D000-0x000000007798E000-memory.dmpFilesize
4KB
-
memory/2488-550-0x0000000003F30000-0x0000000003FF4000-memory.dmpFilesize
784KB
-
memory/2488-111-0x0000000010000000-0x000000001001B000-memory.dmpFilesize
108KB
-
memory/2488-222-0x00000000027D0000-0x000000000280A000-memory.dmpFilesize
232KB
-
memory/2488-164-0x00000000042D0000-0x0000000004EF8000-memory.dmpFilesize
12.2MB
-
memory/2488-116-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/2556-358-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/2556-355-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/2572-360-0x0000000000400000-0x00000000004BC000-memory.dmpFilesize
752KB
-
memory/2572-87-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2572-325-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2732-72-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/2732-14-0x0000000000370000-0x000000000164E000-memory.dmpFilesize
18.9MB
-
memory/2732-13-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/2792-254-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/2792-539-0x0000000005200000-0x00000000052C4000-memory.dmpFilesize
784KB
-
memory/2792-251-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/2792-256-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/2792-540-0x00000000009F0000-0x00000000009FC000-memory.dmpFilesize
48KB
-
memory/2792-257-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/2792-258-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2792-260-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/2792-266-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/2792-263-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/2972-67-0x0000000002760000-0x0000000002B58000-memory.dmpFilesize
4.0MB
-
memory/2972-112-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/2972-276-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/2972-288-0x0000000002B60000-0x000000000344B000-memory.dmpFilesize
8.9MB
-
memory/2972-52-0x0000000002760000-0x0000000002B58000-memory.dmpFilesize
4.0MB
-
memory/2972-73-0x0000000002B60000-0x000000000344B000-memory.dmpFilesize
8.9MB
-
memory/3024-484-0x0000000000310000-0x0000000000376000-memory.dmpFilesize
408KB
-
memory/3024-483-0x0000000077970000-0x0000000077971000-memory.dmpFilesize
4KB
-
memory/3024-481-0x0000000000590000-0x000000000059C000-memory.dmpFilesize
48KB
-
memory/3024-480-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/3024-478-0x0000000000290000-0x0000000000296000-memory.dmpFilesize
24KB
-
memory/3024-479-0x00000000002A0000-0x00000000002AD000-memory.dmpFilesize
52KB
-
memory/3024-502-0x0000000000310000-0x0000000000376000-memory.dmpFilesize
408KB
-
memory/3024-476-0x0000000000310000-0x0000000000376000-memory.dmpFilesize
408KB
-
memory/3024-504-0x0000000000290000-0x0000000000296000-memory.dmpFilesize
24KB