Analysis
-
max time kernel
102s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:22
Static task
static1
Behavioral task
behavioral1
Sample
570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe
Resource
win10v2004-20230220-en
General
-
Target
570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe
-
Size
659KB
-
MD5
79e8c53e0f6c262af86d950ce1c5f0d0
-
SHA1
0f5bec8fde71a80c05f95d3a9e363757c5642c32
-
SHA256
570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3
-
SHA512
ca3400dc5f31322bf27c1628636acd23f5c0db87c06e7f37d1c92c1da509217ef8c5db7ecac683c66087d44ec4bb4d5b704778878862de1aa8a41a53e37854a1
-
SSDEEP
12288:8MrKy90GBGozHfGVj/ySbc/ohJUApYFZSCMtuXI6+oOTB:GyRBGg+PbckJlDCMkf+oOd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1514.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1514.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1514.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4288-162-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-164-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-168-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-172-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-178-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-184-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-190-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-193-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-197-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-201-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-205-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-213-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-217-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-209-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-221-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-223-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4288-225-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un712834.exepro1514.exepro1514.exequ7037.exesi931115.exepid process 564 un712834.exe 4884 pro1514.exe 3776 pro1514.exe 4288 qu7037.exe 1332 si931115.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1514.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1514.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exeun712834.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un712834.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un712834.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro1514.exedescription pid process target process PID 4884 set thread context of 3776 4884 pro1514.exe pro1514.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4508 4288 WerFault.exe qu7037.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1514.exequ7037.exesi931115.exepid process 3776 pro1514.exe 3776 pro1514.exe 4288 qu7037.exe 4288 qu7037.exe 1332 si931115.exe 1332 si931115.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1514.exequ7037.exesi931115.exedescription pid process Token: SeDebugPrivilege 3776 pro1514.exe Token: SeDebugPrivilege 4288 qu7037.exe Token: SeDebugPrivilege 1332 si931115.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exeun712834.exepro1514.exedescription pid process target process PID 3012 wrote to memory of 564 3012 570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe un712834.exe PID 3012 wrote to memory of 564 3012 570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe un712834.exe PID 3012 wrote to memory of 564 3012 570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe un712834.exe PID 564 wrote to memory of 4884 564 un712834.exe pro1514.exe PID 564 wrote to memory of 4884 564 un712834.exe pro1514.exe PID 564 wrote to memory of 4884 564 un712834.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 4884 wrote to memory of 3776 4884 pro1514.exe pro1514.exe PID 564 wrote to memory of 4288 564 un712834.exe qu7037.exe PID 564 wrote to memory of 4288 564 un712834.exe qu7037.exe PID 564 wrote to memory of 4288 564 un712834.exe qu7037.exe PID 3012 wrote to memory of 1332 3012 570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe si931115.exe PID 3012 wrote to memory of 1332 3012 570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe si931115.exe PID 3012 wrote to memory of 1332 3012 570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe si931115.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe"C:\Users\Admin\AppData\Local\Temp\570b3b528d32058ef18f58d44af7c2b1f92687f65f8232cd59c19b79177aabb3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712834.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712834.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7037.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7037.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 13364⤵
- Program crash
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931115.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931115.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4288 -ip 42881⤵PID:4484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931115.exeFilesize
175KB
MD570b7b0f46a0b4be17513b402c2f0695e
SHA1866b69f5e7f5b2a4d3d24688e21858e6368f2457
SHA256294d4b25761a395f13b964ce50633f9e5198d4df5436f041a803fcf4bdab4e3e
SHA512bf7ed473dfbd73be4ef7d4da379f06709c2824d9db8b7a4024581b260fd6a73f745ea809a6c6f8765928b790d03c2b42948c477f2aeb7def04eeee0408458c89
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931115.exeFilesize
175KB
MD570b7b0f46a0b4be17513b402c2f0695e
SHA1866b69f5e7f5b2a4d3d24688e21858e6368f2457
SHA256294d4b25761a395f13b964ce50633f9e5198d4df5436f041a803fcf4bdab4e3e
SHA512bf7ed473dfbd73be4ef7d4da379f06709c2824d9db8b7a4024581b260fd6a73f745ea809a6c6f8765928b790d03c2b42948c477f2aeb7def04eeee0408458c89
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712834.exeFilesize
517KB
MD559d2898cd3bc25d44febd299ea99b940
SHA1a1a69aec5399edbe430d1876d4ec98a250a5c5fa
SHA256e20d2dce43905ebc34441df58c5581185fbce2db46300bf60d38a96e16b9e55a
SHA5123de3be8bc31a7880d1d7775659f5c79df3ab391ef013954435566f904c8742061c0fe71d4c75ade030fa6f26b7c0a766694c80df2a6758e00266b69797cbc5e7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712834.exeFilesize
517KB
MD559d2898cd3bc25d44febd299ea99b940
SHA1a1a69aec5399edbe430d1876d4ec98a250a5c5fa
SHA256e20d2dce43905ebc34441df58c5581185fbce2db46300bf60d38a96e16b9e55a
SHA5123de3be8bc31a7880d1d7775659f5c79df3ab391ef013954435566f904c8742061c0fe71d4c75ade030fa6f26b7c0a766694c80df2a6758e00266b69797cbc5e7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exeFilesize
237KB
MD513252c4117375ddcb3c4f338b32f03d2
SHA11798ee1d507b79aaa0eea18a7056bc73bddf780e
SHA2565e3406d442cdbba18893ae81dd4607481bd61c6d2abdf575053a4f446ff304dc
SHA51245ed43f02daca5ea796cc6d32d9a59092531f9a082ae126f786e96bc0905d5ef02d911c7a0c180b5d98333516128a8abbb1b2a19ec4421b90fba85b9f1130137
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exeFilesize
237KB
MD513252c4117375ddcb3c4f338b32f03d2
SHA11798ee1d507b79aaa0eea18a7056bc73bddf780e
SHA2565e3406d442cdbba18893ae81dd4607481bd61c6d2abdf575053a4f446ff304dc
SHA51245ed43f02daca5ea796cc6d32d9a59092531f9a082ae126f786e96bc0905d5ef02d911c7a0c180b5d98333516128a8abbb1b2a19ec4421b90fba85b9f1130137
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exeFilesize
237KB
MD513252c4117375ddcb3c4f338b32f03d2
SHA11798ee1d507b79aaa0eea18a7056bc73bddf780e
SHA2565e3406d442cdbba18893ae81dd4607481bd61c6d2abdf575053a4f446ff304dc
SHA51245ed43f02daca5ea796cc6d32d9a59092531f9a082ae126f786e96bc0905d5ef02d911c7a0c180b5d98333516128a8abbb1b2a19ec4421b90fba85b9f1130137
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7037.exeFilesize
294KB
MD5d4b4763441c08ee741fdac9181db8801
SHA1a47a329ff41d3e2eeaba949b37ab74ad61b260d9
SHA2569290abd9a1c49b8a47234534da44db921dcd8eefe75a7807c3be9282e58331f4
SHA51289d19274ee91a6e6807017a93a1b39ef5e158734455050c048e41e972f7ff8ebe43e3775e1c05e43ef0fe48893f49f8bfc3d8dfe1eb609dfd97c2ae4c7fec117
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7037.exeFilesize
294KB
MD5d4b4763441c08ee741fdac9181db8801
SHA1a47a329ff41d3e2eeaba949b37ab74ad61b260d9
SHA2569290abd9a1c49b8a47234534da44db921dcd8eefe75a7807c3be9282e58331f4
SHA51289d19274ee91a6e6807017a93a1b39ef5e158734455050c048e41e972f7ff8ebe43e3775e1c05e43ef0fe48893f49f8bfc3d8dfe1eb609dfd97c2ae4c7fec117
-
memory/1332-1130-0x00000000052B0000-0x00000000052C0000-memory.dmpFilesize
64KB
-
memory/1332-1129-0x00000000006B0000-0x00000000006E2000-memory.dmpFilesize
200KB
-
memory/3776-200-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-203-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-160-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-161-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-148-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3776-151-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3776-152-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3776-169-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-165-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-1118-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3776-174-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/3776-173-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-179-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-177-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/3776-1111-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/3776-180-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/3776-159-0x0000000004C90000-0x0000000005234000-memory.dmpFilesize
5.6MB
-
memory/3776-1110-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/3776-1109-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/3776-220-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-191-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-215-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-211-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-196-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-208-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-185-0x0000000002630000-0x0000000002642000-memory.dmpFilesize
72KB
-
memory/3776-158-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4288-183-0x0000000002110000-0x000000000215B000-memory.dmpFilesize
300KB
-
memory/4288-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmpFilesize
240KB
-
memory/4288-205-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-197-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-189-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4288-213-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-217-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-193-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-209-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-190-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-221-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-223-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-225-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-1100-0x0000000005240000-0x0000000005858000-memory.dmpFilesize
6.1MB
-
memory/4288-1101-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/4288-1102-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/4288-1103-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4288-201-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-1107-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/4288-1108-0x00000000063B0000-0x0000000006442000-memory.dmpFilesize
584KB
-
memory/4288-186-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4288-184-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-178-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-1112-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4288-1113-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4288-1114-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4288-172-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-1119-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4288-1120-0x0000000006600000-0x00000000067C2000-memory.dmpFilesize
1.8MB
-
memory/4288-1121-0x00000000067D0000-0x0000000006CFC000-memory.dmpFilesize
5.2MB
-
memory/4288-1122-0x0000000007FD0000-0x0000000008046000-memory.dmpFilesize
472KB
-
memory/4288-1123-0x0000000008050000-0x00000000080A0000-memory.dmpFilesize
320KB
-
memory/4288-168-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-164-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4288-162-0x0000000004AB0000-0x0000000004AEF000-memory.dmpFilesize
252KB
-
memory/4884-150-0x00000000005D0000-0x00000000005FE000-memory.dmpFilesize
184KB