Analysis
-
max time kernel
116s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-06-2022 07:26
Static task
static1
Behavioral task
behavioral1
Sample
0b757d38d347d1f763f59ab7f0423ae8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0b757d38d347d1f763f59ab7f0423ae8.exe
Resource
win10v2004-20220414-en
General
-
Target
0b757d38d347d1f763f59ab7f0423ae8.exe
-
Size
406KB
-
MD5
0b757d38d347d1f763f59ab7f0423ae8
-
SHA1
fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
-
SHA256
2105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
-
SHA512
0b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
Malware Config
Extracted
redline
X
194.127.179.35:35180
-
auth_value
76e43cff05002e5f6e3334fa7946e404
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2012-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2012-64-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2012-67-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2012-68-0x000000000041ADAE-mapping.dmp family_redline behavioral1/memory/1332-112-0x000000000041ADAE-mapping.dmp family_redline behavioral1/memory/1852-135-0x000000000041ADAE-mapping.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
WinRar Activator.exechromedrivers32.exechromedrivers32.exepid process 776 WinRar Activator.exe 380 chromedrivers32.exe 1840 chromedrivers32.exe -
Loads dropped DLL 3 IoCs
Processes:
taskeng.exepid process 1688 taskeng.exe 1688 taskeng.exe 1688 taskeng.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
0b757d38d347d1f763f59ab7f0423ae8.exechromedrivers32.exechromedrivers32.exedescription pid process target process PID 1032 set thread context of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 380 set thread context of 1332 380 chromedrivers32.exe vbc.exe PID 1840 set thread context of 1852 1840 chromedrivers32.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 688 2012 WerFault.exe vbc.exe 1340 1332 WerFault.exe vbc.exe 1252 1852 WerFault.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2024 schtasks.exe 1524 schtasks.exe 1552 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0b757d38d347d1f763f59ab7f0423ae8.exepid process 1032 0b757d38d347d1f763f59ab7f0423ae8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WinRar Activator.exedescription pid process Token: SeDebugPrivilege 776 WinRar Activator.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0b757d38d347d1f763f59ab7f0423ae8.execmd.exevbc.exetaskeng.exechromedrivers32.execmd.exevbc.exechromedrivers32.execmd.exedescription pid process target process PID 1032 wrote to memory of 988 1032 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 1032 wrote to memory of 988 1032 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 1032 wrote to memory of 988 1032 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 988 wrote to memory of 2024 988 cmd.exe schtasks.exe PID 988 wrote to memory of 2024 988 cmd.exe schtasks.exe PID 988 wrote to memory of 2024 988 cmd.exe schtasks.exe PID 1032 wrote to memory of 1964 1032 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 1032 wrote to memory of 1964 1032 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 1032 wrote to memory of 1964 1032 0b757d38d347d1f763f59ab7f0423ae8.exe cmd.exe PID 1032 wrote to memory of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1032 wrote to memory of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1032 wrote to memory of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1032 wrote to memory of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1032 wrote to memory of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1032 wrote to memory of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1032 wrote to memory of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1032 wrote to memory of 2012 1032 0b757d38d347d1f763f59ab7f0423ae8.exe vbc.exe PID 1032 wrote to memory of 776 1032 0b757d38d347d1f763f59ab7f0423ae8.exe WinRar Activator.exe PID 1032 wrote to memory of 776 1032 0b757d38d347d1f763f59ab7f0423ae8.exe WinRar Activator.exe PID 1032 wrote to memory of 776 1032 0b757d38d347d1f763f59ab7f0423ae8.exe WinRar Activator.exe PID 2012 wrote to memory of 688 2012 vbc.exe WerFault.exe PID 2012 wrote to memory of 688 2012 vbc.exe WerFault.exe PID 2012 wrote to memory of 688 2012 vbc.exe WerFault.exe PID 2012 wrote to memory of 688 2012 vbc.exe WerFault.exe PID 1688 wrote to memory of 380 1688 taskeng.exe chromedrivers32.exe PID 1688 wrote to memory of 380 1688 taskeng.exe chromedrivers32.exe PID 1688 wrote to memory of 380 1688 taskeng.exe chromedrivers32.exe PID 380 wrote to memory of 1080 380 chromedrivers32.exe cmd.exe PID 380 wrote to memory of 1080 380 chromedrivers32.exe cmd.exe PID 380 wrote to memory of 1080 380 chromedrivers32.exe cmd.exe PID 1080 wrote to memory of 1524 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 1524 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 1524 1080 cmd.exe schtasks.exe PID 380 wrote to memory of 932 380 chromedrivers32.exe cmd.exe PID 380 wrote to memory of 932 380 chromedrivers32.exe cmd.exe PID 380 wrote to memory of 932 380 chromedrivers32.exe cmd.exe PID 380 wrote to memory of 1332 380 chromedrivers32.exe vbc.exe PID 380 wrote to memory of 1332 380 chromedrivers32.exe vbc.exe PID 380 wrote to memory of 1332 380 chromedrivers32.exe vbc.exe PID 380 wrote to memory of 1332 380 chromedrivers32.exe vbc.exe PID 380 wrote to memory of 1332 380 chromedrivers32.exe vbc.exe PID 380 wrote to memory of 1332 380 chromedrivers32.exe vbc.exe PID 380 wrote to memory of 1332 380 chromedrivers32.exe vbc.exe PID 380 wrote to memory of 1332 380 chromedrivers32.exe vbc.exe PID 1332 wrote to memory of 1340 1332 vbc.exe WerFault.exe PID 1332 wrote to memory of 1340 1332 vbc.exe WerFault.exe PID 1332 wrote to memory of 1340 1332 vbc.exe WerFault.exe PID 1332 wrote to memory of 1340 1332 vbc.exe WerFault.exe PID 1688 wrote to memory of 1840 1688 taskeng.exe chromedrivers32.exe PID 1688 wrote to memory of 1840 1688 taskeng.exe chromedrivers32.exe PID 1688 wrote to memory of 1840 1688 taskeng.exe chromedrivers32.exe PID 1840 wrote to memory of 1800 1840 chromedrivers32.exe cmd.exe PID 1840 wrote to memory of 1800 1840 chromedrivers32.exe cmd.exe PID 1840 wrote to memory of 1800 1840 chromedrivers32.exe cmd.exe PID 1800 wrote to memory of 1552 1800 cmd.exe schtasks.exe PID 1800 wrote to memory of 1552 1800 cmd.exe schtasks.exe PID 1800 wrote to memory of 1552 1800 cmd.exe schtasks.exe PID 1840 wrote to memory of 1988 1840 chromedrivers32.exe cmd.exe PID 1840 wrote to memory of 1988 1840 chromedrivers32.exe cmd.exe PID 1840 wrote to memory of 1988 1840 chromedrivers32.exe cmd.exe PID 1840 wrote to memory of 1852 1840 chromedrivers32.exe vbc.exe PID 1840 wrote to memory of 1852 1840 chromedrivers32.exe vbc.exe PID 1840 wrote to memory of 1852 1840 chromedrivers32.exe vbc.exe PID 1840 wrote to memory of 1852 1840 chromedrivers32.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b757d38d347d1f763f59ab7f0423ae8.exe"C:\Users\Admin\AppData\Local\Temp\0b757d38d347d1f763f59ab7f0423ae8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\0b757d38d347d1f763f59ab7f0423ae8.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 1443⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\WinRar Activator.exe"C:\Users\Admin\AppData\Local\Temp\WinRar Activator.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {66D6D7A1-8A2E-4490-9DD5-1A9F37553692} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeC:\Users\Admin\AppData\Roaming\chromedrivers32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 1444⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeC:\Users\Admin\AppData\Roaming\chromedrivers32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\chromedrivers32.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe" "C:\Users\Admin\AppData\Roaming\chromedrivers32.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 1444⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WinRar Activator.exeFilesize
259KB
MD5f385414230d858b00cbe7ffe3daa5928
SHA104f24e4f0bab06e7d58fc39b328baf382dae9cff
SHA256b9ef9b0ae62b70c0ee11f8ff8bc87e2a7b91c2ebbd46af1a29bc5b4119145335
SHA5121f9ad4545b37f2953f1e0f9c9409cc960d7cf30d926c80fb58e92924566d20b3ecf7a971a93f998da105c5e8b36ff5a6b9de46d29a7accd0f96ed9d1c0efb8c2
-
C:\Users\Admin\AppData\Local\Temp\WinRar Activator.exeFilesize
259KB
MD5f385414230d858b00cbe7ffe3daa5928
SHA104f24e4f0bab06e7d58fc39b328baf382dae9cff
SHA256b9ef9b0ae62b70c0ee11f8ff8bc87e2a7b91c2ebbd46af1a29bc5b4119145335
SHA5121f9ad4545b37f2953f1e0f9c9409cc960d7cf30d926c80fb58e92924566d20b3ecf7a971a93f998da105c5e8b36ff5a6b9de46d29a7accd0f96ed9d1c0efb8c2
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
C:\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
\Users\Admin\AppData\Roaming\chromedrivers32.exeFilesize
406KB
MD50b757d38d347d1f763f59ab7f0423ae8
SHA1fcf1b343ab5c7f9ac72fc6c85b3c478c5875f577
SHA2562105710d19c34b91be3a37c24ab4a4835dcdc606c0f2d8b487beb0d24e336124
SHA5120b9661590897256242ddc4ea43d069999e1ddca9d7fed671a6aa31a60f0da4bd820b8bb6c2502fa1b7979dea932375e2363e882e31379935751af1cdf2ce7d94
-
memory/380-115-0x000007FEF39A0000-0x000007FEF43F0000-memory.dmpFilesize
10.3MB
-
memory/380-103-0x000007FEF43F0000-0x000007FEF502F000-memory.dmpFilesize
12.2MB
-
memory/380-101-0x000007FEF5030000-0x000007FEF65B8000-memory.dmpFilesize
21.5MB
-
memory/380-98-0x0000000000FD0000-0x0000000001038000-memory.dmpFilesize
416KB
-
memory/380-104-0x000007FEF39A0000-0x000007FEF43F0000-memory.dmpFilesize
10.3MB
-
memory/380-96-0x0000000000000000-mapping.dmp
-
memory/380-110-0x000007FEED6D0000-0x000007FEEE61D000-memory.dmpFilesize
15.3MB
-
memory/380-113-0x000007FEF5030000-0x000007FEF65B8000-memory.dmpFilesize
21.5MB
-
memory/380-114-0x000007FEF35C0000-0x000007FEF37A8000-memory.dmpFilesize
1.9MB
-
memory/380-116-0x000007FEF43F0000-0x000007FEF502F000-memory.dmpFilesize
12.2MB
-
memory/688-75-0x0000000000000000-mapping.dmp
-
memory/776-72-0x0000000000320000-0x0000000000366000-memory.dmpFilesize
280KB
-
memory/776-87-0x000000001ADA7000-0x000000001ADC6000-memory.dmpFilesize
124KB
-
memory/776-69-0x0000000000000000-mapping.dmp
-
memory/776-92-0x000007FEF5030000-0x000007FEF65B8000-memory.dmpFilesize
21.5MB
-
memory/776-78-0x000007FEFBE51000-0x000007FEFBE53000-memory.dmpFilesize
8KB
-
memory/776-79-0x000007FEF43F0000-0x000007FEF502F000-memory.dmpFilesize
12.2MB
-
memory/776-80-0x000007FEF39A0000-0x000007FEF43F0000-memory.dmpFilesize
10.3MB
-
memory/776-81-0x000007FEF35C0000-0x000007FEF37A8000-memory.dmpFilesize
1.9MB
-
memory/776-82-0x000007FEED6D0000-0x000007FEEE61D000-memory.dmpFilesize
15.3MB
-
memory/776-83-0x000007FEF5030000-0x000007FEF65B8000-memory.dmpFilesize
21.5MB
-
memory/776-84-0x000007FEF3870000-0x000007FEF399A000-memory.dmpFilesize
1.2MB
-
memory/776-85-0x000007FEF2D30000-0x000007FEF35BC000-memory.dmpFilesize
8.5MB
-
memory/776-86-0x0000000000280000-0x000000000028A000-memory.dmpFilesize
40KB
-
memory/776-91-0x000007FEED6D0000-0x000007FEEE61D000-memory.dmpFilesize
15.3MB
-
memory/776-90-0x000007FEF35C0000-0x000007FEF37A8000-memory.dmpFilesize
1.9MB
-
memory/776-89-0x000007FEF43F0000-0x000007FEF502F000-memory.dmpFilesize
12.2MB
-
memory/932-102-0x0000000000000000-mapping.dmp
-
memory/988-56-0x0000000000000000-mapping.dmp
-
memory/1032-88-0x000007FEEE620000-0x000007FEEF56D000-memory.dmpFilesize
15.3MB
-
memory/1032-77-0x000007FEEE620000-0x000007FEEF56D000-memory.dmpFilesize
15.3MB
-
memory/1032-73-0x000007FEF43F0000-0x000007FEF502F000-memory.dmpFilesize
12.2MB
-
memory/1032-54-0x00000000009D0000-0x0000000000A38000-memory.dmpFilesize
416KB
-
memory/1032-76-0x000007FEF5030000-0x000007FEF65B8000-memory.dmpFilesize
21.5MB
-
memory/1032-55-0x000007FEF5030000-0x000007FEF65B8000-memory.dmpFilesize
21.5MB
-
memory/1032-66-0x000007FEF37B0000-0x000007FEF3998000-memory.dmpFilesize
1.9MB
-
memory/1032-74-0x000007FEF39A0000-0x000007FEF43F0000-memory.dmpFilesize
10.3MB
-
memory/1032-58-0x000007FEF39A0000-0x000007FEF43F0000-memory.dmpFilesize
10.3MB
-
memory/1032-65-0x000007FEF43F0000-0x000007FEF502F000-memory.dmpFilesize
12.2MB
-
memory/1080-99-0x0000000000000000-mapping.dmp
-
memory/1252-137-0x0000000000000000-mapping.dmp
-
memory/1332-112-0x000000000041ADAE-mapping.dmp
-
memory/1340-117-0x0000000000000000-mapping.dmp
-
memory/1524-100-0x0000000000000000-mapping.dmp
-
memory/1552-122-0x0000000000000000-mapping.dmp
-
memory/1800-121-0x0000000000000000-mapping.dmp
-
memory/1840-133-0x000007FEED6D0000-0x000007FEEE61D000-memory.dmpFilesize
15.3MB
-
memory/1840-124-0x000007FEF5030000-0x000007FEF65B8000-memory.dmpFilesize
21.5MB
-
memory/1840-132-0x000007FEF35C0000-0x000007FEF37A8000-memory.dmpFilesize
1.9MB
-
memory/1840-136-0x000007FEF5030000-0x000007FEF65B8000-memory.dmpFilesize
21.5MB
-
memory/1840-131-0x000007FEF39A0000-0x000007FEF43F0000-memory.dmpFilesize
10.3MB
-
memory/1840-130-0x000007FEF43F0000-0x000007FEF502F000-memory.dmpFilesize
12.2MB
-
memory/1840-119-0x0000000000000000-mapping.dmp
-
memory/1852-135-0x000000000041ADAE-mapping.dmp
-
memory/1964-59-0x0000000000000000-mapping.dmp
-
memory/1988-123-0x0000000000000000-mapping.dmp
-
memory/2012-68-0x000000000041ADAE-mapping.dmp
-
memory/2012-67-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2012-64-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2012-60-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2012-61-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2012-63-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2024-57-0x0000000000000000-mapping.dmp