Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 11:40
Static task
static1
Behavioral task
behavioral1
Sample
4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe
Resource
win10v2004-20230220-en
General
-
Target
4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe
-
Size
1011KB
-
MD5
94cc7ca058f0b33c9496a6de7650beda
-
SHA1
23bcc7fa3bf698edf5e26f41a8f22646039eb1a9
-
SHA256
4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a
-
SHA512
17cebbc051705eb6f1b1a90ca8a9bf7ccbd8c6ce9d8b4e62cd961c6ef8c0b1b237a5896e2bcba1c8926df2f1265bc3864a90e1f8162330126bbb46c2a7668279
-
SSDEEP
24576:JyVIW200fzL3eE5SVKpKtHe7C8NsNs14kLdeaXd+yuxWIkXp7L:88LoVuKACGsNs1VLkat+yWWd
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Processes:
bus1817.execor7480.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus1817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus1817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus1817.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor7480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor7480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor7480.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bus1817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus1817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus1817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor7480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor7480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor7480.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1960-212-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-211-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-214-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-216-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-218-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-220-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-222-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-224-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-226-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-228-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-230-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-232-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-234-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-236-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-238-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-240-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-242-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1960-244-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
kino9865.exekino2302.exekino7318.exebus1817.execor7480.exedAG50s96.exepid process 1508 kino9865.exe 4408 kino2302.exe 1084 kino7318.exe 1296 bus1817.exe 608 cor7480.exe 1960 dAG50s96.exe -
Processes:
cor7480.exebus1817.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor7480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor7480.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus1817.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kino2302.exekino7318.exe4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exekino9865.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kino2302.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino7318.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kino7318.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino9865.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino9865.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kino2302.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5008 608 WerFault.exe cor7480.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bus1817.execor7480.exepid process 1296 bus1817.exe 1296 bus1817.exe 608 cor7480.exe 608 cor7480.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bus1817.execor7480.exedAG50s96.exedescription pid process Token: SeDebugPrivilege 1296 bus1817.exe Token: SeDebugPrivilege 608 cor7480.exe Token: SeDebugPrivilege 1960 dAG50s96.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exekino9865.exekino2302.exekino7318.exedescription pid process target process PID 1336 wrote to memory of 1508 1336 4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe kino9865.exe PID 1336 wrote to memory of 1508 1336 4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe kino9865.exe PID 1336 wrote to memory of 1508 1336 4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe kino9865.exe PID 1508 wrote to memory of 4408 1508 kino9865.exe kino2302.exe PID 1508 wrote to memory of 4408 1508 kino9865.exe kino2302.exe PID 1508 wrote to memory of 4408 1508 kino9865.exe kino2302.exe PID 4408 wrote to memory of 1084 4408 kino2302.exe kino7318.exe PID 4408 wrote to memory of 1084 4408 kino2302.exe kino7318.exe PID 4408 wrote to memory of 1084 4408 kino2302.exe kino7318.exe PID 1084 wrote to memory of 1296 1084 kino7318.exe bus1817.exe PID 1084 wrote to memory of 1296 1084 kino7318.exe bus1817.exe PID 1084 wrote to memory of 608 1084 kino7318.exe cor7480.exe PID 1084 wrote to memory of 608 1084 kino7318.exe cor7480.exe PID 1084 wrote to memory of 608 1084 kino7318.exe cor7480.exe PID 4408 wrote to memory of 1960 4408 kino2302.exe dAG50s96.exe PID 4408 wrote to memory of 1960 4408 kino2302.exe dAG50s96.exe PID 4408 wrote to memory of 1960 4408 kino2302.exe dAG50s96.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe"C:\Users\Admin\AppData\Local\Temp\4bcc7fbfd0c76ac955452334538d09fe4f64b3d19369991c5e1eef209619c99a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9865.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2302.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2302.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7318.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7318.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1817.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1817.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7480.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7480.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 10846⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAG50s96.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAG50s96.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 608 -ip 6081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9865.exeFilesize
828KB
MD59a7d65d95e5bb2cec6e0b5e44578950b
SHA10baae8820388a07fd09d953ba93848422a39c0b7
SHA256621b72834c87acc196876065e6565b594ac5a4cbe9f010758153bcc87a2b1feb
SHA5126b22eef7b22654b1ca1cd32149f25db332b4dcc9742f3833fe1a4e28b715b9e46fe2ba652b70a1eacccca78bc2e9f58d468af0d390b9001286969fa6ebc5ee3a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino9865.exeFilesize
828KB
MD59a7d65d95e5bb2cec6e0b5e44578950b
SHA10baae8820388a07fd09d953ba93848422a39c0b7
SHA256621b72834c87acc196876065e6565b594ac5a4cbe9f010758153bcc87a2b1feb
SHA5126b22eef7b22654b1ca1cd32149f25db332b4dcc9742f3833fe1a4e28b715b9e46fe2ba652b70a1eacccca78bc2e9f58d468af0d390b9001286969fa6ebc5ee3a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2302.exeFilesize
686KB
MD576bb21b7e16a95ab9e940a1aa9cd6f1d
SHA10ffe8dee23d344213838e780600538f9ab7736bf
SHA256872b371d582e298ff81a60a362447a7c30794cc707bcb843470f55f858fba5e0
SHA51297d5e45f6bec101e2b79efb142853f33487ee6cd113a8a4b8a6f7c7639e77dd5ce18218573870d39db8bfe1d4e820cda5fe416f61be5a4833246dff64ba7c4d5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2302.exeFilesize
686KB
MD576bb21b7e16a95ab9e940a1aa9cd6f1d
SHA10ffe8dee23d344213838e780600538f9ab7736bf
SHA256872b371d582e298ff81a60a362447a7c30794cc707bcb843470f55f858fba5e0
SHA51297d5e45f6bec101e2b79efb142853f33487ee6cd113a8a4b8a6f7c7639e77dd5ce18218573870d39db8bfe1d4e820cda5fe416f61be5a4833246dff64ba7c4d5
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAG50s96.exeFilesize
356KB
MD5f5381cacb0d920df32a8dc3e081b770a
SHA1a8cc722dbda7c4b776452f7dfba070034ef4ef71
SHA256341dc6646c22502c5e8e1505cb8857848914c1368a5c8826ab0349eff732ad30
SHA512b53c581e5126559b61db8f1e0401f62d5e4101fb1962e238b449866d6184a9e7fde86a1a4462eb4f66c44babc086a6070f0047111b70760f785c68f7bfa9b59a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dAG50s96.exeFilesize
356KB
MD5f5381cacb0d920df32a8dc3e081b770a
SHA1a8cc722dbda7c4b776452f7dfba070034ef4ef71
SHA256341dc6646c22502c5e8e1505cb8857848914c1368a5c8826ab0349eff732ad30
SHA512b53c581e5126559b61db8f1e0401f62d5e4101fb1962e238b449866d6184a9e7fde86a1a4462eb4f66c44babc086a6070f0047111b70760f785c68f7bfa9b59a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7318.exeFilesize
340KB
MD5e1a13c901e59807a5fb3eea1e45ad325
SHA131f4edde97303c5a1375a0ced02e74902dc92ddf
SHA256e10390bae166284a69189533b35e7bd53f97546b1d74a4243850d7c68677bdd4
SHA512d4859e698c1062f653b543d4c60f0f5d81866c6313b70b79563beadb75a9e6709d3d9f874abe16872963c62a4acbfb1e6290251b0f8007929ebf59052df8172f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7318.exeFilesize
340KB
MD5e1a13c901e59807a5fb3eea1e45ad325
SHA131f4edde97303c5a1375a0ced02e74902dc92ddf
SHA256e10390bae166284a69189533b35e7bd53f97546b1d74a4243850d7c68677bdd4
SHA512d4859e698c1062f653b543d4c60f0f5d81866c6313b70b79563beadb75a9e6709d3d9f874abe16872963c62a4acbfb1e6290251b0f8007929ebf59052df8172f
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1817.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1817.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7480.exeFilesize
298KB
MD5efbdbc88da968cf4a0237ab84bf5c792
SHA1e03c772e2100056b64b5e22751cc4dfd8f3c638e
SHA2563ab0235da27297677aaaf5b21b3e75016b8ca586ddb2add4fc2e7206232a7a8f
SHA5126e255232587f29e8980676bd93a722bfa3eefc9ada5c23708d712962d84ac12d8c4e34144b641980f3ed1ba963b66cc28e00f9c12709c94c866b7300ba4e1fee
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor7480.exeFilesize
298KB
MD5efbdbc88da968cf4a0237ab84bf5c792
SHA1e03c772e2100056b64b5e22751cc4dfd8f3c638e
SHA2563ab0235da27297677aaaf5b21b3e75016b8ca586ddb2add4fc2e7206232a7a8f
SHA5126e255232587f29e8980676bd93a722bfa3eefc9ada5c23708d712962d84ac12d8c4e34144b641980f3ed1ba963b66cc28e00f9c12709c94c866b7300ba4e1fee
-
memory/608-167-0x00000000073B0000-0x0000000007954000-memory.dmpFilesize
5.6MB
-
memory/608-168-0x0000000002D70000-0x0000000002D9D000-memory.dmpFilesize
180KB
-
memory/608-170-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-172-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-169-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/608-171-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/608-175-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-174-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/608-177-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-179-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-181-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-183-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-185-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-187-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-189-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-191-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-193-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-195-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-197-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-199-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/608-200-0x0000000000400000-0x0000000002B79000-memory.dmpFilesize
39.5MB
-
memory/608-201-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/608-203-0x0000000000400000-0x0000000002B79000-memory.dmpFilesize
39.5MB
-
memory/1296-161-0x00000000003F0000-0x00000000003FA000-memory.dmpFilesize
40KB
-
memory/1960-208-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/1960-209-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB
-
memory/1960-210-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB
-
memory/1960-212-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-211-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-214-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-216-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-218-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-220-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-222-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-224-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-226-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-228-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-230-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-232-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-234-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-236-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-238-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-240-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-242-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-244-0x0000000004D40000-0x0000000004D7E000-memory.dmpFilesize
248KB
-
memory/1960-261-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB
-
memory/1960-1118-0x00000000078B0000-0x0000000007EC8000-memory.dmpFilesize
6.1MB
-
memory/1960-1119-0x0000000007ED0000-0x0000000007FDA000-memory.dmpFilesize
1.0MB
-
memory/1960-1120-0x0000000004F40000-0x0000000004F52000-memory.dmpFilesize
72KB
-
memory/1960-1121-0x0000000004F60000-0x0000000004F9C000-memory.dmpFilesize
240KB
-
memory/1960-1122-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB
-
memory/1960-1124-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB
-
memory/1960-1125-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB
-
memory/1960-1126-0x0000000004950000-0x0000000004960000-memory.dmpFilesize
64KB