Analysis
-
max time kernel
142s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:41
Static task
static1
Behavioral task
behavioral1
Sample
a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe
Resource
win10v2004-20230220-en
General
-
Target
a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe
-
Size
659KB
-
MD5
374819e5e27853be4d0bcf5e64ae4985
-
SHA1
42ed1c9572d4b9107c40e5899c714dd0136d5d90
-
SHA256
a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5
-
SHA512
112c9b1b014a5aa811e844f9b0099b7eb382ca4ebb180cbe89873b7792166a779e33ebd24063f650f14d8a916c0af57a29f786728d25c3c00e8b73bacaba62cd
-
SSDEEP
12288:RMr7y90ct44qLt86FkIUwP3GJ4ZSdiqvtE6ehu:2yBtbqL/FkInP2RdiOTehu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1034.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1034.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1034.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1820-173-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-175-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-179-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-182-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-186-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-190-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-194-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-198-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-203-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-207-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-212-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-216-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-218-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-220-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-222-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-224-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-226-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/1820-1119-0x00000000026A0000-0x00000000026B0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un362651.exepro1034.exepro1034.exequ8684.exesi793783.exepid process 116 un362651.exe 508 pro1034.exe 3992 pro1034.exe 1820 qu8684.exe 2456 si793783.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1034.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1034.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1034.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exeun362651.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un362651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un362651.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro1034.exedescription pid process target process PID 508 set thread context of 3992 508 pro1034.exe pro1034.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4156 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1092 1820 WerFault.exe qu8684.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1034.exequ8684.exesi793783.exepid process 3992 pro1034.exe 3992 pro1034.exe 1820 qu8684.exe 1820 qu8684.exe 2456 si793783.exe 2456 si793783.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1034.exequ8684.exesi793783.exedescription pid process Token: SeDebugPrivilege 3992 pro1034.exe Token: SeDebugPrivilege 1820 qu8684.exe Token: SeDebugPrivilege 2456 si793783.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exeun362651.exepro1034.exedescription pid process target process PID 1912 wrote to memory of 116 1912 a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe un362651.exe PID 1912 wrote to memory of 116 1912 a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe un362651.exe PID 1912 wrote to memory of 116 1912 a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe un362651.exe PID 116 wrote to memory of 508 116 un362651.exe pro1034.exe PID 116 wrote to memory of 508 116 un362651.exe pro1034.exe PID 116 wrote to memory of 508 116 un362651.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 508 wrote to memory of 3992 508 pro1034.exe pro1034.exe PID 116 wrote to memory of 1820 116 un362651.exe qu8684.exe PID 116 wrote to memory of 1820 116 un362651.exe qu8684.exe PID 116 wrote to memory of 1820 116 un362651.exe qu8684.exe PID 1912 wrote to memory of 2456 1912 a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe si793783.exe PID 1912 wrote to memory of 2456 1912 a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe si793783.exe PID 1912 wrote to memory of 2456 1912 a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe si793783.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe"C:\Users\Admin\AppData\Local\Temp\a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362651.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362651.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8684.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 13324⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si793783.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si793783.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1820 -ip 18201⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si793783.exeFilesize
175KB
MD5e99b0bf9385aa456481e8c6662c9c85a
SHA1c87ad7b6526cffeaee5a94b7cde9ed115eb0dd10
SHA2566cac2d7f16969148e1204208ee5fa4e878f98ae484828c9ad71b944fa6fc37db
SHA51228554ee316ea219aea4e8f3f37a0d19507cb8d0a2e940f70cf743ae5bafd69899ee421e3803beb0683138545533c0a63442584f0cef8e6f6aa294021ad6c6221
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si793783.exeFilesize
175KB
MD5e99b0bf9385aa456481e8c6662c9c85a
SHA1c87ad7b6526cffeaee5a94b7cde9ed115eb0dd10
SHA2566cac2d7f16969148e1204208ee5fa4e878f98ae484828c9ad71b944fa6fc37db
SHA51228554ee316ea219aea4e8f3f37a0d19507cb8d0a2e940f70cf743ae5bafd69899ee421e3803beb0683138545533c0a63442584f0cef8e6f6aa294021ad6c6221
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362651.exeFilesize
517KB
MD5c8bf20ff5426b4fb3dc90dac7987a7d2
SHA10465ef57550ffd8f7dc239af723d402bd1b8b027
SHA256842670f754e47dc89a6bb03b90e1ec2042547791b4bf2c70fcc118ac88a82694
SHA512872d69f08bebb80bec820b8a960f10dc4f76aaf49028b32d9efbaf2be15e9e5382374ed18561868e91578092988fdb37baafb72e7fb33953c50c4aae41d33f2b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362651.exeFilesize
517KB
MD5c8bf20ff5426b4fb3dc90dac7987a7d2
SHA10465ef57550ffd8f7dc239af723d402bd1b8b027
SHA256842670f754e47dc89a6bb03b90e1ec2042547791b4bf2c70fcc118ac88a82694
SHA512872d69f08bebb80bec820b8a960f10dc4f76aaf49028b32d9efbaf2be15e9e5382374ed18561868e91578092988fdb37baafb72e7fb33953c50c4aae41d33f2b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exeFilesize
237KB
MD5163492bbf07168cf55b0a8306e558ba5
SHA1aafb940b7b6f5c9429e818db6a623205e333242c
SHA25670a18e0451767b282efcadb14e5c74bea1abcbc3862c494f5c21272865732a4c
SHA512281beb1a102292684b0565c0d97affacc828f22195424cd4345f1cc591413dd856f4074643d7eab0f3d2d65e70322de054677c547f0dda316fc881d2904ed93b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exeFilesize
237KB
MD5163492bbf07168cf55b0a8306e558ba5
SHA1aafb940b7b6f5c9429e818db6a623205e333242c
SHA25670a18e0451767b282efcadb14e5c74bea1abcbc3862c494f5c21272865732a4c
SHA512281beb1a102292684b0565c0d97affacc828f22195424cd4345f1cc591413dd856f4074643d7eab0f3d2d65e70322de054677c547f0dda316fc881d2904ed93b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exeFilesize
237KB
MD5163492bbf07168cf55b0a8306e558ba5
SHA1aafb940b7b6f5c9429e818db6a623205e333242c
SHA25670a18e0451767b282efcadb14e5c74bea1abcbc3862c494f5c21272865732a4c
SHA512281beb1a102292684b0565c0d97affacc828f22195424cd4345f1cc591413dd856f4074643d7eab0f3d2d65e70322de054677c547f0dda316fc881d2904ed93b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8684.exeFilesize
294KB
MD5004b1a7b0504f0881ca5722e670e2009
SHA1f46235e7ed37ba18928de458bc398ec8a58ba93e
SHA2566c04eab97b0fbf03c3ce4f33c488f48f9eaa490cce2dbb1e2d1385ad55321669
SHA5122270ec987cf422b53f77e128499cd96743e2bc83af2708484a4fde334c57bccfe8b772815e773ca9755b4f3edf886c0e0a72c84b29027a55d1d1956a375bbae8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8684.exeFilesize
294KB
MD5004b1a7b0504f0881ca5722e670e2009
SHA1f46235e7ed37ba18928de458bc398ec8a58ba93e
SHA2566c04eab97b0fbf03c3ce4f33c488f48f9eaa490cce2dbb1e2d1385ad55321669
SHA5122270ec987cf422b53f77e128499cd96743e2bc83af2708484a4fde334c57bccfe8b772815e773ca9755b4f3edf886c0e0a72c84b29027a55d1d1956a375bbae8
-
memory/508-151-0x0000000002100000-0x000000000212E000-memory.dmpFilesize
184KB
-
memory/1820-1103-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/1820-208-0x0000000000620000-0x000000000066B000-memory.dmpFilesize
300KB
-
memory/1820-1124-0x00000000026A0000-0x00000000026B0000-memory.dmpFilesize
64KB
-
memory/1820-1123-0x0000000006630000-0x0000000006B5C000-memory.dmpFilesize
5.2MB
-
memory/1820-1122-0x0000000006450000-0x0000000006612000-memory.dmpFilesize
1.8MB
-
memory/1820-1121-0x00000000026A0000-0x00000000026B0000-memory.dmpFilesize
64KB
-
memory/1820-1120-0x00000000026A0000-0x00000000026B0000-memory.dmpFilesize
64KB
-
memory/1820-1119-0x00000000026A0000-0x00000000026B0000-memory.dmpFilesize
64KB
-
memory/1820-1114-0x00000000063E0000-0x0000000006430000-memory.dmpFilesize
320KB
-
memory/1820-1113-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/1820-1112-0x0000000006260000-0x00000000062F2000-memory.dmpFilesize
584KB
-
memory/1820-173-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-175-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-1109-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/1820-179-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-1105-0x00000000026A0000-0x00000000026B0000-memory.dmpFilesize
64KB
-
memory/1820-182-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/1820-186-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-1102-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/1820-190-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-1101-0x0000000005100000-0x0000000005718000-memory.dmpFilesize
6.1MB
-
memory/1820-226-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-224-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-194-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-198-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-222-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-203-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-207-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-220-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-212-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-218-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-211-0x00000000026A0000-0x00000000026B0000-memory.dmpFilesize
64KB
-
memory/1820-216-0x00000000050C0000-0x00000000050FF000-memory.dmpFilesize
252KB
-
memory/1820-215-0x00000000026A0000-0x00000000026B0000-memory.dmpFilesize
64KB
-
memory/1820-213-0x00000000026A0000-0x00000000026B0000-memory.dmpFilesize
64KB
-
memory/2456-1130-0x0000000000220000-0x0000000000252000-memory.dmpFilesize
200KB
-
memory/2456-1131-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/3992-1111-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3992-210-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-158-0x0000000004C60000-0x0000000005204000-memory.dmpFilesize
5.6MB
-
memory/3992-193-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-189-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-185-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-152-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3992-172-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-181-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-1108-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3992-176-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-1110-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3992-196-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-200-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-159-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3992-166-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-1118-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3992-164-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-163-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-162-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3992-161-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3992-168-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-160-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3992-150-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3992-148-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3992-204-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/3992-170-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB