Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:53
Static task
static1
Behavioral task
behavioral1
Sample
0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe
Resource
win10v2004-20230220-en
General
-
Target
0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe
-
Size
659KB
-
MD5
806e1d690300e1d892090a6bb5c66cd9
-
SHA1
a3230e4e4315634fca3b2ac4dee4f7b8815682f5
-
SHA256
0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f
-
SHA512
9f09d33765e9ddf9969656affb0f2c72209a430c7a4e2f77694ea18b9fe31233f76647f5d8e7ae0df1d19b87287d24969e8891f8b20ed524e9cc73eff659c23d
-
SSDEEP
12288:oMrCy90UEVyIDvoIk2wPG4JUAAmYu/MZSqpeIGX6Fcx:KyIFrk3G4JlIEqpaKFA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro0187.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0187.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0187.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/992-163-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-168-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-173-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-177-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-181-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-188-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1912-191-0x0000000004B10000-0x0000000004B20000-memory.dmp family_redline behavioral1/memory/992-197-0x0000000004AC0000-0x0000000004AD0000-memory.dmp family_redline behavioral1/memory/992-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-220-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-224-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/992-226-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un654325.exepro0187.exepro0187.exequ9574.exesi161231.exepid process 1000 un654325.exe 4228 pro0187.exe 1912 pro0187.exe 992 qu9574.exe 5080 si161231.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro0187.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0187.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un654325.exe0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un654325.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un654325.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro0187.exedescription pid process target process PID 4228 set thread context of 1912 4228 pro0187.exe pro0187.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4444 992 WerFault.exe qu9574.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro0187.exequ9574.exesi161231.exepid process 1912 pro0187.exe 1912 pro0187.exe 992 qu9574.exe 992 qu9574.exe 5080 si161231.exe 5080 si161231.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
qu9574.exepro0187.exesi161231.exedescription pid process Token: SeDebugPrivilege 992 qu9574.exe Token: SeDebugPrivilege 1912 pro0187.exe Token: SeDebugPrivilege 5080 si161231.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exeun654325.exepro0187.exedescription pid process target process PID 4708 wrote to memory of 1000 4708 0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe un654325.exe PID 4708 wrote to memory of 1000 4708 0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe un654325.exe PID 4708 wrote to memory of 1000 4708 0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe un654325.exe PID 1000 wrote to memory of 4228 1000 un654325.exe pro0187.exe PID 1000 wrote to memory of 4228 1000 un654325.exe pro0187.exe PID 1000 wrote to memory of 4228 1000 un654325.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 4228 wrote to memory of 1912 4228 pro0187.exe pro0187.exe PID 1000 wrote to memory of 992 1000 un654325.exe qu9574.exe PID 1000 wrote to memory of 992 1000 un654325.exe qu9574.exe PID 1000 wrote to memory of 992 1000 un654325.exe qu9574.exe PID 4708 wrote to memory of 5080 4708 0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe si161231.exe PID 4708 wrote to memory of 5080 4708 0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe si161231.exe PID 4708 wrote to memory of 5080 4708 0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe si161231.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe"C:\Users\Admin\AppData\Local\Temp\0024abddfd0dbef9da1c519048919b30c732aa9b05d84964490c8dd62022d54f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un654325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un654325.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0187.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0187.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9574.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9574.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 12964⤵
- Program crash
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161231.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161231.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 992 -ip 9921⤵PID:3832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161231.exeFilesize
175KB
MD5d4ed3dac94de88e91f508ed08c173040
SHA103f0a8ed38e7cc1a70535e34ec6d6a3e2d5c50c0
SHA256bb2da0fb7dcd1b084a1b8cbd5d61109014dc87f4287ef110019c9694f043d716
SHA5122c766f063ee2603985ac253d3414f1ddb0cfbde437ab814bead4c87319a861905ff15e87ab47be62f68280ce7c026bd1c644253ad792d4274e023a3fc7b2e4b3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161231.exeFilesize
175KB
MD5d4ed3dac94de88e91f508ed08c173040
SHA103f0a8ed38e7cc1a70535e34ec6d6a3e2d5c50c0
SHA256bb2da0fb7dcd1b084a1b8cbd5d61109014dc87f4287ef110019c9694f043d716
SHA5122c766f063ee2603985ac253d3414f1ddb0cfbde437ab814bead4c87319a861905ff15e87ab47be62f68280ce7c026bd1c644253ad792d4274e023a3fc7b2e4b3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un654325.exeFilesize
517KB
MD53627189aad6b823299fcf6c5234efbd4
SHA127542c0c5240cbe2718d423b457c0b07a0da1b54
SHA25694d3685cf8630ce725332dc27744c8c13ef20dcbbf62df25293419227809368b
SHA512838caf23e32e7ce19d5c6a0bbf8271fa34b7293fc263af0bdc81d3cf0fcfe4b354be3d06ba77ca4d91c64c747621baef60c285746f33a11ae9d38491945bd527
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un654325.exeFilesize
517KB
MD53627189aad6b823299fcf6c5234efbd4
SHA127542c0c5240cbe2718d423b457c0b07a0da1b54
SHA25694d3685cf8630ce725332dc27744c8c13ef20dcbbf62df25293419227809368b
SHA512838caf23e32e7ce19d5c6a0bbf8271fa34b7293fc263af0bdc81d3cf0fcfe4b354be3d06ba77ca4d91c64c747621baef60c285746f33a11ae9d38491945bd527
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0187.exeFilesize
237KB
MD5ab9c753850d330fe062993d6c519c07f
SHA161d9e9f16579a9330ae60cc7933b81edd8f417a6
SHA25664676514f71917f827de6782ecacf303ae019c9cb12cdf26786208dfb41652ad
SHA512b7c4298d6fef0704313045c23e2ae89bcbf77f352c98f94f95bfe9f114a385f211f9befb6e6338b3a36584818a717e0b0dac1986a00760535cc43fad9a4bc08b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0187.exeFilesize
237KB
MD5ab9c753850d330fe062993d6c519c07f
SHA161d9e9f16579a9330ae60cc7933b81edd8f417a6
SHA25664676514f71917f827de6782ecacf303ae019c9cb12cdf26786208dfb41652ad
SHA512b7c4298d6fef0704313045c23e2ae89bcbf77f352c98f94f95bfe9f114a385f211f9befb6e6338b3a36584818a717e0b0dac1986a00760535cc43fad9a4bc08b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0187.exeFilesize
237KB
MD5ab9c753850d330fe062993d6c519c07f
SHA161d9e9f16579a9330ae60cc7933b81edd8f417a6
SHA25664676514f71917f827de6782ecacf303ae019c9cb12cdf26786208dfb41652ad
SHA512b7c4298d6fef0704313045c23e2ae89bcbf77f352c98f94f95bfe9f114a385f211f9befb6e6338b3a36584818a717e0b0dac1986a00760535cc43fad9a4bc08b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9574.exeFilesize
294KB
MD5aeeec3b3396e9ba9f9b6808531b1e580
SHA1c55dc2f59a7dc41687e244d23795c30619bd2759
SHA256f728c5cb0c0a0957d75242f18d1bd36c19651287676da976d27abdac401e0fe6
SHA512390ec887d898eb07f85f197b21d878f62ec5b236d4dd8b4d6f3876a930570957b6d3cf525a828334b0cec2264652eb8f1656437f921c009f6d2edf45c39d7c4c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9574.exeFilesize
294KB
MD5aeeec3b3396e9ba9f9b6808531b1e580
SHA1c55dc2f59a7dc41687e244d23795c30619bd2759
SHA256f728c5cb0c0a0957d75242f18d1bd36c19651287676da976d27abdac401e0fe6
SHA512390ec887d898eb07f85f197b21d878f62ec5b236d4dd8b4d6f3876a930570957b6d3cf525a828334b0cec2264652eb8f1656437f921c009f6d2edf45c39d7c4c
-
memory/992-198-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-1110-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/992-1123-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/992-1122-0x0000000006D80000-0x0000000006DD0000-memory.dmpFilesize
320KB
-
memory/992-1121-0x0000000006D00000-0x0000000006D76000-memory.dmpFilesize
472KB
-
memory/992-1116-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/992-163-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-1115-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/992-1114-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/992-164-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-168-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-1112-0x0000000006680000-0x0000000006BAC000-memory.dmpFilesize
5.2MB
-
memory/992-173-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-1111-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/992-1109-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/992-177-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-181-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-1105-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/992-184-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-1104-0x0000000005A40000-0x0000000005A7C000-memory.dmpFilesize
240KB
-
memory/992-188-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-1103-0x00000000059E0000-0x00000000059F2000-memory.dmpFilesize
72KB
-
memory/992-192-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-194-0x0000000002000000-0x000000000204B000-memory.dmpFilesize
300KB
-
memory/992-1102-0x00000000058A0000-0x00000000059AA000-memory.dmpFilesize
1.0MB
-
memory/992-1101-0x0000000005200000-0x0000000005818000-memory.dmpFilesize
6.1MB
-
memory/992-197-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/992-226-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-200-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/992-224-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-204-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-203-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/992-208-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-220-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-216-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/992-212-0x0000000004A80000-0x0000000004ABF000-memory.dmpFilesize
252KB
-
memory/1912-152-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1912-211-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-215-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-223-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-172-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-202-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-151-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1912-196-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-191-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/1912-190-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-186-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-169-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-1108-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/1912-176-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-219-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-207-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-180-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-1113-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/1912-162-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-165-0x0000000002500000-0x0000000002512000-memory.dmpFilesize
72KB
-
memory/1912-161-0x0000000004B20000-0x00000000050C4000-memory.dmpFilesize
5.6MB
-
memory/1912-1120-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1912-160-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/1912-159-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/1912-158-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1912-148-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4228-150-0x0000000000530000-0x000000000055E000-memory.dmpFilesize
184KB
-
memory/5080-1129-0x0000000000B50000-0x0000000000B82000-memory.dmpFilesize
200KB
-
memory/5080-1130-0x0000000005720000-0x0000000005730000-memory.dmpFilesize
64KB