Analysis
-
max time kernel
96s -
max time network
146s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
05-07-2022 16:59
Static task
static1
Behavioral task
behavioral1
Sample
ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe
Resource
win10-20220414-en
General
-
Target
ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe
-
Size
2.4MB
-
MD5
6fd9f3590d136a30f43079ffedcc7913
-
SHA1
ef43a3dcc0664994ccbb4574606a2b783972d744
-
SHA256
ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb
-
SHA512
508185655378eec8d1d34fa23dce970907467cee530bb8f6100bbe871320ea2471e24a85f1e001b04301a9a5dbeb7bfad19050d6d3efa4cb2bfb35ef6cc89e4c
Malware Config
Extracted
redline
141.95.140.173:33470
-
auth_value
6d9508e5573e656e0dc3c4c5f8526d8e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
crypton.exeupdator.exewinlogon.exewinlogon.exepid process 4596 crypton.exe 104040 updator.exe 9484 winlogon.exe 9648 winlogon.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\updator.exe upx C:\Users\Admin\AppData\Local\Temp\updator.exe upx behavioral1/memory/104040-547-0x0000000000AA0000-0x0000000000AD9000-memory.dmp upx behavioral1/memory/104040-729-0x0000000000AA0000-0x0000000000AD9000-memory.dmp upx C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe upx C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe upx behavioral1/memory/9484-762-0x0000000000CC0000-0x0000000000CF9000-memory.dmp upx C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe upx behavioral1/memory/9648-784-0x0000000000CC0000-0x0000000000CF9000-memory.dmp upx behavioral1/memory/9648-796-0x0000000000CC0000-0x0000000000CF9000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
updator.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce updator.exe Set value (str) \REGISTRY\USER\S-1-5-21-3578829114-180201921-3281645608-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CompPkgSrv = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" updator.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exeAppLaunch.execrypton.exedescription pid process target process PID 3480 set thread context of 214952 3480 ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe AppLaunch.exe PID 214952 set thread context of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 set thread context of 215028 214952 AppLaunch.exe AppLaunch.exe PID 4596 set thread context of 8664 4596 crypton.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 215008 AppLaunch.exe 215008 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 215028 AppLaunch.exe Token: SeDebugPrivilege 215008 AppLaunch.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exeAppLaunch.exeAppLaunch.execrypton.exeupdator.exedescription pid process target process PID 3480 wrote to memory of 214952 3480 ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe AppLaunch.exe PID 3480 wrote to memory of 214952 3480 ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe AppLaunch.exe PID 3480 wrote to memory of 214952 3480 ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe AppLaunch.exe PID 3480 wrote to memory of 214952 3480 ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe AppLaunch.exe PID 3480 wrote to memory of 214952 3480 ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe AppLaunch.exe PID 214952 wrote to memory of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215008 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215028 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215028 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215028 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215028 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215028 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215028 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215028 214952 AppLaunch.exe AppLaunch.exe PID 214952 wrote to memory of 215028 214952 AppLaunch.exe AppLaunch.exe PID 215028 wrote to memory of 4596 215028 AppLaunch.exe crypton.exe PID 215028 wrote to memory of 4596 215028 AppLaunch.exe crypton.exe PID 215028 wrote to memory of 4596 215028 AppLaunch.exe crypton.exe PID 215028 wrote to memory of 104040 215028 AppLaunch.exe updator.exe PID 215028 wrote to memory of 104040 215028 AppLaunch.exe updator.exe PID 215028 wrote to memory of 104040 215028 AppLaunch.exe updator.exe PID 4596 wrote to memory of 8664 4596 crypton.exe AppLaunch.exe PID 4596 wrote to memory of 8664 4596 crypton.exe AppLaunch.exe PID 4596 wrote to memory of 8664 4596 crypton.exe AppLaunch.exe PID 4596 wrote to memory of 8664 4596 crypton.exe AppLaunch.exe PID 4596 wrote to memory of 8664 4596 crypton.exe AppLaunch.exe PID 104040 wrote to memory of 9096 104040 updator.exe schtasks.exe PID 104040 wrote to memory of 9096 104040 updator.exe schtasks.exe PID 104040 wrote to memory of 9096 104040 updator.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe"C:\Users\Admin\AppData\Local\Temp\ca3e3737fe4408b3a4b5362a12ffb59c96f7c8e722d047196b559d7f1bd0debb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\crypton.exe"C:\Users\Admin\AppData\Local\Temp\crypton.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\updator.exe"C:\Users\Admin\AppData\Local\Temp\updator.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "CompPkgSrv" /tr C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe /f5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeC:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeC:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.logFilesize
847B
MD5808e884c00533a9eb0e13e64960d9c3a
SHA1279d05181fc6179a12df1a669ff5d8b64c1380ae
SHA2562f6a0aab99b1c228a6642f44f8992646ce84c5a2b3b9941b6cf1f2badf67bdd6
SHA5129489bdb2ffdfeef3c52edcfe9b34c6688eba53eb86075e0564df1cd474723c86b5b5aedc12df1ff5fc12cf97bd1e3cf9701ff61dc4ce90155d70e9ccfd0fc299
-
C:\Users\Admin\AppData\Local\Temp\crypton.exeFilesize
3.3MB
MD54fddb0fb46c2d951db20eca9a3b1c296
SHA122b17e95712be0586272e742acb183d3a28d2e05
SHA2568350c0a227f79ef1a94da8e8bf95a4bc7cd3b590d0dcf78cc6da7236a5cdd1c5
SHA512ce471181a1dfd9195c2afc49b844ca5b8e809bae64d1715cf85d2f5e1050b6838cc0274d053bc27b9fd30e4ee9558a2aa1297b322d07f41ee1c5d6475020a168
-
C:\Users\Admin\AppData\Local\Temp\crypton.exeFilesize
3.3MB
MD54fddb0fb46c2d951db20eca9a3b1c296
SHA122b17e95712be0586272e742acb183d3a28d2e05
SHA2568350c0a227f79ef1a94da8e8bf95a4bc7cd3b590d0dcf78cc6da7236a5cdd1c5
SHA512ce471181a1dfd9195c2afc49b844ca5b8e809bae64d1715cf85d2f5e1050b6838cc0274d053bc27b9fd30e4ee9558a2aa1297b322d07f41ee1c5d6475020a168
-
C:\Users\Admin\AppData\Local\Temp\updator.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Local\Temp\updator.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
C:\Users\Admin\AppData\Roaming\WindowsFolder\winlogon.exeFilesize
96KB
MD5d217c2a5f59c25ae90f29a54d13b21f2
SHA1cda28aca60ae2aafb132b7e66b9de310a22604ee
SHA2565f5ddb7f5934fc851903768ea0911a87b6278e0927169974f8442db9b0d1ca9a
SHA51294c9e81934b9b2f3c98e267bcdd288d5fd81a1b2d155d1496fc5e9a8cff7e4c44871eb01963af653b62b605df89b7a0e6a3d71360c95cd1c60455a6819c5b352
-
memory/3480-121-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/3480-123-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/3480-122-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/3480-120-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/3480-119-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/3480-118-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/3480-117-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/3480-116-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/4596-477-0x0000000000000000-mapping.dmp
-
memory/8664-568-0x0000000000429223-mapping.dmp
-
memory/9096-648-0x0000000000000000-mapping.dmp
-
memory/9484-762-0x0000000000CC0000-0x0000000000CF9000-memory.dmpFilesize
228KB
-
memory/9648-784-0x0000000000CC0000-0x0000000000CF9000-memory.dmpFilesize
228KB
-
memory/9648-796-0x0000000000CC0000-0x0000000000CF9000-memory.dmpFilesize
228KB
-
memory/104040-547-0x0000000000AA0000-0x0000000000AD9000-memory.dmpFilesize
228KB
-
memory/104040-520-0x0000000000000000-mapping.dmp
-
memory/104040-729-0x0000000000AA0000-0x0000000000AD9000-memory.dmpFilesize
228KB
-
memory/214952-135-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/214952-134-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/214952-131-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/214952-133-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/214952-132-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/214952-130-0x00000000004011D4-mapping.dmp
-
memory/214952-124-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/215008-164-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-136-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/215008-160-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-162-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-151-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-165-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-149-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-169-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-172-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-145-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-553-0x000000000B330000-0x000000000B85C000-memory.dmpFilesize
5.2MB
-
memory/215008-167-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-550-0x000000000AC30000-0x000000000ADF2000-memory.dmpFilesize
1.8MB
-
memory/215008-143-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-141-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-139-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-528-0x000000000A260000-0x000000000A2B0000-memory.dmpFilesize
320KB
-
memory/215008-138-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-137-0x000000000041789E-mapping.dmp
-
memory/215008-157-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-180-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-182-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-184-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-186-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-185-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-183-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-181-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-178-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-176-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-174-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215008-240-0x00000000095D0000-0x0000000009BD6000-memory.dmpFilesize
6.0MB
-
memory/215008-241-0x0000000006B10000-0x0000000006B22000-memory.dmpFilesize
72KB
-
memory/215008-244-0x00000000090D0000-0x00000000091DA000-memory.dmpFilesize
1.0MB
-
memory/215008-250-0x0000000009000000-0x000000000903E000-memory.dmpFilesize
248KB
-
memory/215008-267-0x0000000009040000-0x000000000908B000-memory.dmpFilesize
300KB
-
memory/215008-290-0x0000000009320000-0x0000000009386000-memory.dmpFilesize
408KB
-
memory/215008-298-0x0000000009E60000-0x0000000009ED6000-memory.dmpFilesize
472KB
-
memory/215008-299-0x0000000009FC0000-0x000000000A052000-memory.dmpFilesize
584KB
-
memory/215008-300-0x000000000A560000-0x000000000AA5E000-memory.dmpFilesize
5.0MB
-
memory/215008-305-0x0000000009FA0000-0x0000000009FBE000-memory.dmpFilesize
120KB
-
memory/215028-144-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-179-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-177-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-175-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-173-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-159-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-161-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-163-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-166-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-170-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-171-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-168-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-156-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-155-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-150-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-152-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-148-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-142-0x0000000000402CCE-mapping.dmp
-
memory/215028-146-0x0000000077CD0000-0x0000000077E5E000-memory.dmpFilesize
1.6MB
-
memory/215028-140-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB