Analysis
-
max time kernel
147s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:45
Static task
static1
Behavioral task
behavioral1
Sample
4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe
Resource
win10v2004-20230220-en
General
-
Target
4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe
-
Size
660KB
-
MD5
71b9a24483a3813ac6d24a3633a97fc5
-
SHA1
6d0e5f06cebc7443fe394fe4041639137e46e8df
-
SHA256
4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155
-
SHA512
32d3c68f66fd2e8b442f81ea136cc4342d70dd0fdb7426036f4efa3262416068beb1088b2973d3680b67d5f23f796ab71c6d8ce562cbafc75111e63cc01ebd45
-
SSDEEP
12288:4Mrky90siZlOcHhvJNiu0ky6WtZTvrZShiWjll6eoEhmO:sypiZJYup0vAhiyseoEhmO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro7979.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7979.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2672-162-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-164-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-168-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-171-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-177-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-183-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-189-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-192-0x0000000002510000-0x0000000002520000-memory.dmp family_redline behavioral1/memory/2672-194-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-197-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-200-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-205-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-209-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-213-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-216-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-221-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-224-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2672-226-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un638911.exepro7979.exepro7979.exequ4571.exesi847288.exepid process 2668 un638911.exe 824 pro7979.exe 4384 pro7979.exe 2672 qu4571.exe 3792 si847288.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro7979.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7979.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exeun638911.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un638911.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un638911.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro7979.exedescription pid process target process PID 824 set thread context of 4384 824 pro7979.exe pro7979.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2208 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1136 2672 WerFault.exe qu4571.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro7979.exequ4571.exesi847288.exepid process 4384 pro7979.exe 4384 pro7979.exe 2672 qu4571.exe 2672 qu4571.exe 3792 si847288.exe 3792 si847288.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro7979.exequ4571.exesi847288.exedescription pid process Token: SeDebugPrivilege 4384 pro7979.exe Token: SeDebugPrivilege 2672 qu4571.exe Token: SeDebugPrivilege 3792 si847288.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exeun638911.exepro7979.exedescription pid process target process PID 4920 wrote to memory of 2668 4920 4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe un638911.exe PID 4920 wrote to memory of 2668 4920 4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe un638911.exe PID 4920 wrote to memory of 2668 4920 4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe un638911.exe PID 2668 wrote to memory of 824 2668 un638911.exe pro7979.exe PID 2668 wrote to memory of 824 2668 un638911.exe pro7979.exe PID 2668 wrote to memory of 824 2668 un638911.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 824 wrote to memory of 4384 824 pro7979.exe pro7979.exe PID 2668 wrote to memory of 2672 2668 un638911.exe qu4571.exe PID 2668 wrote to memory of 2672 2668 un638911.exe qu4571.exe PID 2668 wrote to memory of 2672 2668 un638911.exe qu4571.exe PID 4920 wrote to memory of 3792 4920 4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe si847288.exe PID 4920 wrote to memory of 3792 4920 4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe si847288.exe PID 4920 wrote to memory of 3792 4920 4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe si847288.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe"C:\Users\Admin\AppData\Local\Temp\4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638911.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638911.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4571.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4571.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 13284⤵
- Program crash
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si847288.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si847288.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2672 -ip 26721⤵PID:1548
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si847288.exeFilesize
175KB
MD542b23c20e1d5e20de403046dbc1ec480
SHA1a73500c7d55cd223f6614c392aa5904d9efd2b46
SHA256a071aa679adaf7ea0ad621f2c491bf36f9a8797166e50c1b6b14705556ac788f
SHA512904ce52f8e5bde51917e9de27f4c76f09a14c6d99d7ee1aaf75a27ca37c2dc11ff9d20a692aad67e520a87ac6495aeba36d1017994f992924a4a313ae03f4433
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si847288.exeFilesize
175KB
MD542b23c20e1d5e20de403046dbc1ec480
SHA1a73500c7d55cd223f6614c392aa5904d9efd2b46
SHA256a071aa679adaf7ea0ad621f2c491bf36f9a8797166e50c1b6b14705556ac788f
SHA512904ce52f8e5bde51917e9de27f4c76f09a14c6d99d7ee1aaf75a27ca37c2dc11ff9d20a692aad67e520a87ac6495aeba36d1017994f992924a4a313ae03f4433
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638911.exeFilesize
517KB
MD572af93a8341b13c514d11852dd808aaf
SHA1b53d83d6b4dfe348944315a70ac7502967d15886
SHA2567471968a9008ca5405eeb1993798a3316519d40fa47f7d0bb17f3458f4b7d894
SHA512c743170da1e6c285ec3a5d86ebbd028f76439701504a0cb0e8cb75aa5571f6b26c2ffcda713467a5a92d0ef1415a8661c0a750ef84bad911e16aee4b7d261bd6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638911.exeFilesize
517KB
MD572af93a8341b13c514d11852dd808aaf
SHA1b53d83d6b4dfe348944315a70ac7502967d15886
SHA2567471968a9008ca5405eeb1993798a3316519d40fa47f7d0bb17f3458f4b7d894
SHA512c743170da1e6c285ec3a5d86ebbd028f76439701504a0cb0e8cb75aa5571f6b26c2ffcda713467a5a92d0ef1415a8661c0a750ef84bad911e16aee4b7d261bd6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exeFilesize
237KB
MD5115973895bc057510b16613b8c0c94fa
SHA113c4c9b0fd54d51f3c522550b081c4e1873d4a80
SHA256b6e10ab97b9229488c303863d704d4a4f6a1768327ae8c6699be213c28df95a0
SHA512e6d22f6511bccb4ff74dc30e12ebd54de2f4e81b340782dc757a2b1403033c886844f3d0534582c6291a9713b0f0628b10f6f82b0c6f2eb8e96e02705ef6949c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exeFilesize
237KB
MD5115973895bc057510b16613b8c0c94fa
SHA113c4c9b0fd54d51f3c522550b081c4e1873d4a80
SHA256b6e10ab97b9229488c303863d704d4a4f6a1768327ae8c6699be213c28df95a0
SHA512e6d22f6511bccb4ff74dc30e12ebd54de2f4e81b340782dc757a2b1403033c886844f3d0534582c6291a9713b0f0628b10f6f82b0c6f2eb8e96e02705ef6949c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exeFilesize
237KB
MD5115973895bc057510b16613b8c0c94fa
SHA113c4c9b0fd54d51f3c522550b081c4e1873d4a80
SHA256b6e10ab97b9229488c303863d704d4a4f6a1768327ae8c6699be213c28df95a0
SHA512e6d22f6511bccb4ff74dc30e12ebd54de2f4e81b340782dc757a2b1403033c886844f3d0534582c6291a9713b0f0628b10f6f82b0c6f2eb8e96e02705ef6949c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4571.exeFilesize
294KB
MD5643b593e0c56a9d79046c615f9778f8a
SHA182c228b0140aed4d2daaad985b0101949d2cbac7
SHA256969b90de04ca94d10331b64755885b233c44c451ea2e55a5b84535b2de0a17d8
SHA5126f1bf249765160abb599c907776a335f793ba801549cfc9a5df78e83064d79d9b7088e06c66eb0b14a0e965e145993c94968d8f9bd96d10a4bf59f76c47d2f2e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4571.exeFilesize
294KB
MD5643b593e0c56a9d79046c615f9778f8a
SHA182c228b0140aed4d2daaad985b0101949d2cbac7
SHA256969b90de04ca94d10331b64755885b233c44c451ea2e55a5b84535b2de0a17d8
SHA5126f1bf249765160abb599c907776a335f793ba801549cfc9a5df78e83064d79d9b7088e06c66eb0b14a0e965e145993c94968d8f9bd96d10a4bf59f76c47d2f2e
-
memory/824-150-0x0000000000580000-0x00000000005AE000-memory.dmpFilesize
184KB
-
memory/2672-1103-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/2672-213-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-1123-0x00000000068A0000-0x0000000006DCC000-memory.dmpFilesize
5.2MB
-
memory/2672-1122-0x00000000066D0000-0x0000000006892000-memory.dmpFilesize
1.8MB
-
memory/2672-162-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-1121-0x0000000002510000-0x0000000002520000-memory.dmpFilesize
64KB
-
memory/2672-164-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-1120-0x00000000064E0000-0x0000000006530000-memory.dmpFilesize
320KB
-
memory/2672-168-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-1119-0x0000000006450000-0x00000000064C6000-memory.dmpFilesize
472KB
-
memory/2672-1114-0x0000000002510000-0x0000000002520000-memory.dmpFilesize
64KB
-
memory/2672-1113-0x0000000002510000-0x0000000002520000-memory.dmpFilesize
64KB
-
memory/2672-171-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-177-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-1109-0x0000000006270000-0x0000000006302000-memory.dmpFilesize
584KB
-
memory/2672-1108-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/2672-1105-0x0000000002510000-0x0000000002520000-memory.dmpFilesize
64KB
-
memory/2672-182-0x00000000020F0000-0x000000000213B000-memory.dmpFilesize
300KB
-
memory/2672-183-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-185-0x0000000002510000-0x0000000002520000-memory.dmpFilesize
64KB
-
memory/2672-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/2672-189-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-188-0x0000000002510000-0x0000000002520000-memory.dmpFilesize
64KB
-
memory/2672-1102-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/2672-192-0x0000000002510000-0x0000000002520000-memory.dmpFilesize
64KB
-
memory/2672-194-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-197-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-1101-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/2672-200-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-226-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-224-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-205-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-209-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-221-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/2672-216-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/3792-1129-0x0000000000500000-0x0000000000532000-memory.dmpFilesize
200KB
-
memory/3792-1131-0x0000000005110000-0x0000000005120000-memory.dmpFilesize
64KB
-
memory/3792-1130-0x0000000005110000-0x0000000005120000-memory.dmpFilesize
64KB
-
memory/4384-1110-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4384-1112-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4384-206-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-202-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-199-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-193-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-152-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4384-187-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-181-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-179-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4384-176-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4384-158-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4384-1111-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4384-222-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-174-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/4384-175-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-1118-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4384-170-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-165-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-161-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-160-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-159-0x0000000004C60000-0x0000000005204000-memory.dmpFilesize
5.6MB
-
memory/4384-151-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4384-148-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4384-218-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-210-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB
-
memory/4384-215-0x0000000002530000-0x0000000002542000-memory.dmpFilesize
72KB