Analysis
-
max time kernel
54s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-03-2023 22:20
Static task
static1
Behavioral task
behavioral1
Sample
5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe
Resource
win10-20230220-en
General
-
Target
5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe
-
Size
702KB
-
MD5
56884a89323e17c0f19223181210a6ad
-
SHA1
ac78676b5796a8222a3610173a952aaabb47c4c7
-
SHA256
5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3
-
SHA512
bbbc6339f0749d0fa56f367b6b009ca1c2ca809d01f8c06c88ee43c32acf9fc116d45e90c5a3ce0e96666efdaafda6db25333d87bdae14b15f73dbc9d47c88a6
-
SSDEEP
12288:XMrTy90FT3blFiWpdCoXFGtiPaaQ1MAiXbv7Y+ZYeyn0iINvsxf/elyfQFw:cyGBASIoVVkt0iINExf/RB
Malware Config
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Processes:
tkqh86fw69.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tkqh86fw69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tkqh86fw69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tkqh86fw69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tkqh86fw69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tkqh86fw69.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/4320-184-0x00000000047A0000-0x00000000047E6000-memory.dmp family_redline behavioral2/memory/4320-186-0x0000000004E70000-0x0000000004EB4000-memory.dmp family_redline behavioral2/memory/4320-187-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-188-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-190-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-192-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-194-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-196-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-198-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-200-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-202-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-204-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-206-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-210-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-208-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-212-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-214-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-216-0x0000000004E70000-0x0000000004EAE000-memory.dmp family_redline behavioral2/memory/4320-1111-0x0000000004860000-0x0000000004870000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
yksG81MN22.exetkqh86fw69.exeukWg46dN52.exeukWg46dN52.exexkvr98mK72.exepid process 3596 yksG81MN22.exe 2368 tkqh86fw69.exe 2148 ukWg46dN52.exe 4320 ukWg46dN52.exe 4648 xkvr98mK72.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tkqh86fw69.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features tkqh86fw69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" tkqh86fw69.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exeyksG81MN22.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yksG81MN22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" yksG81MN22.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ukWg46dN52.exedescription pid process target process PID 2148 set thread context of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
tkqh86fw69.exexkvr98mK72.exeukWg46dN52.exepid process 2368 tkqh86fw69.exe 2368 tkqh86fw69.exe 4648 xkvr98mK72.exe 4648 xkvr98mK72.exe 4320 ukWg46dN52.exe 4320 ukWg46dN52.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tkqh86fw69.exeukWg46dN52.exexkvr98mK72.exedescription pid process Token: SeDebugPrivilege 2368 tkqh86fw69.exe Token: SeDebugPrivilege 4320 ukWg46dN52.exe Token: SeDebugPrivilege 4648 xkvr98mK72.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exeyksG81MN22.exeukWg46dN52.exedescription pid process target process PID 4104 wrote to memory of 3596 4104 5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe yksG81MN22.exe PID 4104 wrote to memory of 3596 4104 5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe yksG81MN22.exe PID 4104 wrote to memory of 3596 4104 5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe yksG81MN22.exe PID 3596 wrote to memory of 2368 3596 yksG81MN22.exe tkqh86fw69.exe PID 3596 wrote to memory of 2368 3596 yksG81MN22.exe tkqh86fw69.exe PID 3596 wrote to memory of 2368 3596 yksG81MN22.exe tkqh86fw69.exe PID 3596 wrote to memory of 2148 3596 yksG81MN22.exe ukWg46dN52.exe PID 3596 wrote to memory of 2148 3596 yksG81MN22.exe ukWg46dN52.exe PID 3596 wrote to memory of 2148 3596 yksG81MN22.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 2148 wrote to memory of 4320 2148 ukWg46dN52.exe ukWg46dN52.exe PID 4104 wrote to memory of 4648 4104 5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe xkvr98mK72.exe PID 4104 wrote to memory of 4648 4104 5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe xkvr98mK72.exe PID 4104 wrote to memory of 4648 4104 5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe xkvr98mK72.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe"C:\Users\Admin\AppData\Local\Temp\5dff814f55f2ca708d6f0315803516c8218c78fa069b54ec365f69669152e8d3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exeFilesize
176KB
MD54afd2123b8ce9c6c48f34b5940b90f3a
SHA1c23a0eaec67b49e99e2b68f446f79823e2735334
SHA256adc35ca672aa934b10c77035cd3f3e3f3bdae770fc5bad6d57c48c99a6674b93
SHA5124124cffe814f1c2d06d59990479ceca2c9bfefbee7511a3946320afcd2123bf43a312d3a9c3209aa519e4e23d33924d8226e11aee065537e63f4c654e124acd9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkvr98mK72.exeFilesize
176KB
MD54afd2123b8ce9c6c48f34b5940b90f3a
SHA1c23a0eaec67b49e99e2b68f446f79823e2735334
SHA256adc35ca672aa934b10c77035cd3f3e3f3bdae770fc5bad6d57c48c99a6674b93
SHA5124124cffe814f1c2d06d59990479ceca2c9bfefbee7511a3946320afcd2123bf43a312d3a9c3209aa519e4e23d33924d8226e11aee065537e63f4c654e124acd9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exeFilesize
558KB
MD543d0f7d361fe7b18d33efb1d700d60cd
SHA1f6b3f6aa19346385d5a444ad63869a7cfccb582f
SHA256d93d174a102cf5fc8f90ba8a6ae63f2750086c6c55c7c55ade402f4c66ae0062
SHA5121c51b48c9babd7c0b40b824beb99a2ab345f8aaa088f98eab806ebc89ffdffcb575fcd07ec5419f819ff1efb0a210f6de17ef8cac94d355ea358c738670c84b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yksG81MN22.exeFilesize
558KB
MD543d0f7d361fe7b18d33efb1d700d60cd
SHA1f6b3f6aa19346385d5a444ad63869a7cfccb582f
SHA256d93d174a102cf5fc8f90ba8a6ae63f2750086c6c55c7c55ade402f4c66ae0062
SHA5121c51b48c9babd7c0b40b824beb99a2ab345f8aaa088f98eab806ebc89ffdffcb575fcd07ec5419f819ff1efb0a210f6de17ef8cac94d355ea358c738670c84b5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exeFilesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkqh86fw69.exeFilesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exeFilesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exeFilesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukWg46dN52.exeFilesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2
-
memory/2148-177-0x0000000002BE0000-0x0000000002C2C000-memory.dmpFilesize
304KB
-
memory/2368-151-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-165-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-139-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-141-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-143-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-145-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-147-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-149-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-137-0x0000000007220000-0x0000000007230000-memory.dmpFilesize
64KB
-
memory/2368-153-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-155-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-157-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-159-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-138-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-163-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-161-0x0000000007100000-0x0000000007112000-memory.dmpFilesize
72KB
-
memory/2368-166-0x0000000000400000-0x0000000002BC9000-memory.dmpFilesize
39.8MB
-
memory/2368-167-0x0000000007220000-0x0000000007230000-memory.dmpFilesize
64KB
-
memory/2368-168-0x0000000007220000-0x0000000007230000-memory.dmpFilesize
64KB
-
memory/2368-170-0x0000000000400000-0x0000000002BC9000-memory.dmpFilesize
39.8MB
-
memory/2368-136-0x0000000007220000-0x0000000007230000-memory.dmpFilesize
64KB
-
memory/2368-135-0x0000000007220000-0x0000000007230000-memory.dmpFilesize
64KB
-
memory/2368-134-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/2368-133-0x0000000007100000-0x0000000007118000-memory.dmpFilesize
96KB
-
memory/2368-132-0x0000000007230000-0x000000000772E000-memory.dmpFilesize
5.0MB
-
memory/2368-131-0x0000000004840000-0x000000000485A000-memory.dmpFilesize
104KB
-
memory/4320-184-0x00000000047A0000-0x00000000047E6000-memory.dmpFilesize
280KB
-
memory/4320-216-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-1118-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/4320-178-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/4320-186-0x0000000004E70000-0x0000000004EB4000-memory.dmpFilesize
272KB
-
memory/4320-175-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/4320-187-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-188-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-190-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-192-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-194-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-196-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-198-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-200-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-202-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-204-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-206-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-210-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-208-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-212-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-214-0x0000000004E70000-0x0000000004EAE000-memory.dmpFilesize
248KB
-
memory/4320-179-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/4320-1112-0x0000000004860000-0x0000000004870000-memory.dmpFilesize
64KB
-
memory/4320-222-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/4320-1111-0x0000000004860000-0x0000000004870000-memory.dmpFilesize
64KB
-
memory/4320-225-0x0000000004860000-0x0000000004870000-memory.dmpFilesize
64KB
-
memory/4320-1103-0x0000000004860000-0x0000000004870000-memory.dmpFilesize
64KB
-
memory/4320-231-0x0000000004860000-0x0000000004870000-memory.dmpFilesize
64KB
-
memory/4320-227-0x0000000004860000-0x0000000004870000-memory.dmpFilesize
64KB
-
memory/4648-1106-0x0000000005BB0000-0x0000000005C26000-memory.dmpFilesize
472KB
-
memory/4648-233-0x0000000004AD0000-0x0000000004B0E000-memory.dmpFilesize
248KB
-
memory/4648-272-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/4648-228-0x0000000004A30000-0x0000000004A42000-memory.dmpFilesize
72KB
-
memory/4648-1104-0x0000000004DB0000-0x0000000004E16000-memory.dmpFilesize
408KB
-
memory/4648-1105-0x0000000005990000-0x0000000005A22000-memory.dmpFilesize
584KB
-
memory/4648-242-0x0000000004A50000-0x0000000004A9B000-memory.dmpFilesize
300KB
-
memory/4648-1108-0x0000000005B30000-0x0000000005B80000-memory.dmpFilesize
320KB
-
memory/4648-224-0x0000000004B20000-0x0000000004C2A000-memory.dmpFilesize
1.0MB
-
memory/4648-1110-0x0000000006B30000-0x000000000705C000-memory.dmpFilesize
5.2MB
-
memory/4648-1109-0x0000000006430000-0x00000000065F2000-memory.dmpFilesize
1.8MB
-
memory/4648-220-0x0000000004FE0000-0x00000000055E6000-memory.dmpFilesize
6.0MB
-
memory/4648-1113-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/4648-185-0x00000000001D0000-0x0000000000202000-memory.dmpFilesize
200KB