Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:59
Static task
static1
Behavioral task
behavioral1
Sample
9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe
Resource
win10v2004-20230220-en
General
-
Target
9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe
-
Size
660KB
-
MD5
f65f9af4291db9f7fb5c372f456b9fea
-
SHA1
0035ff92981afd0756581ce00ec46c031cfb0d2b
-
SHA256
9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca
-
SHA512
aeb8c9c10a64209257fce95e39b3d9de3ab9bee8f9d9cea4a26e51248f96fea69873040678e301d7a1c47f32f3570a5dc952bd48445f46c679af868694af48a1
-
SSDEEP
12288:vMrDy90H55kapuaHV8L/IGfpBDl1nmowHb+8bXdQxZSM19HGl615vwuTX0:MygGQ8LQkBDzmZM14svw8X0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro4339.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4339.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4339.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1800-161-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-164-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-169-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-174-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-179-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-184-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-187-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-192-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-195-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-200-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-204-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-208-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-212-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-216-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-221-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-224-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-226-0x0000000002520000-0x000000000255F000-memory.dmp family_redline behavioral1/memory/1800-1112-0x0000000004D90000-0x0000000004DA0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un949285.exepro4339.exepro4339.exequ7777.exesi056641.exepid process 2084 un949285.exe 4756 pro4339.exe 1420 pro4339.exe 1800 qu7777.exe 916 si056641.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro4339.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4339.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exeun949285.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un949285.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un949285.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro4339.exedescription pid process target process PID 4756 set thread context of 1420 4756 pro4339.exe pro4339.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3284 1800 WerFault.exe qu7777.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro4339.exequ7777.exesi056641.exepid process 1420 pro4339.exe 1420 pro4339.exe 1800 qu7777.exe 1800 qu7777.exe 916 si056641.exe 916 si056641.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro4339.exequ7777.exesi056641.exedescription pid process Token: SeDebugPrivilege 1420 pro4339.exe Token: SeDebugPrivilege 1800 qu7777.exe Token: SeDebugPrivilege 916 si056641.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exeun949285.exepro4339.exedescription pid process target process PID 1916 wrote to memory of 2084 1916 9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe un949285.exe PID 1916 wrote to memory of 2084 1916 9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe un949285.exe PID 1916 wrote to memory of 2084 1916 9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe un949285.exe PID 2084 wrote to memory of 4756 2084 un949285.exe pro4339.exe PID 2084 wrote to memory of 4756 2084 un949285.exe pro4339.exe PID 2084 wrote to memory of 4756 2084 un949285.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 4756 wrote to memory of 1420 4756 pro4339.exe pro4339.exe PID 2084 wrote to memory of 1800 2084 un949285.exe qu7777.exe PID 2084 wrote to memory of 1800 2084 un949285.exe qu7777.exe PID 2084 wrote to memory of 1800 2084 un949285.exe qu7777.exe PID 1916 wrote to memory of 916 1916 9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe si056641.exe PID 1916 wrote to memory of 916 1916 9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe si056641.exe PID 1916 wrote to memory of 916 1916 9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe si056641.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe"C:\Users\Admin\AppData\Local\Temp\9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949285.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949285.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7777.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7777.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 13324⤵
- Program crash
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056641.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056641.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1800 -ip 18001⤵PID:4852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056641.exeFilesize
175KB
MD53dda93128b9aa16d4d999e97a1ff5402
SHA1bd8a541114e1fab1f1eab4d4c9b1ad2f330b4b6f
SHA256aeef0057eb90ec8ae22a6b238886e251fc679806d7ad3b3c2864ee16d2c6a0bc
SHA51252edd686d9ea42739bf1cd324fd27822cec0c3170d072cfe505fd0e8fd9bca295bb92b5c84f380d5813b996f49dad9b19c9235d962c8acb0c795e6875f90bf4e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056641.exeFilesize
175KB
MD53dda93128b9aa16d4d999e97a1ff5402
SHA1bd8a541114e1fab1f1eab4d4c9b1ad2f330b4b6f
SHA256aeef0057eb90ec8ae22a6b238886e251fc679806d7ad3b3c2864ee16d2c6a0bc
SHA51252edd686d9ea42739bf1cd324fd27822cec0c3170d072cfe505fd0e8fd9bca295bb92b5c84f380d5813b996f49dad9b19c9235d962c8acb0c795e6875f90bf4e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949285.exeFilesize
517KB
MD59f94ec5a302e1b529e60fdf9f9b32af5
SHA12f949fadca2e725f7eccee7ad68b067f5dce81ef
SHA2563ab4f90770e4f12fcdcac21d19bd4f922c327f6352dde0f112b0b426bee53700
SHA512383cf846a0c44fc405199ee92cf35a650c26ff398c1b7fe2362ecf20cfa4391d59d8dda89b36dc7af721a75566f69fcd2efa4381eab5910db3a0480c17a3c93f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949285.exeFilesize
517KB
MD59f94ec5a302e1b529e60fdf9f9b32af5
SHA12f949fadca2e725f7eccee7ad68b067f5dce81ef
SHA2563ab4f90770e4f12fcdcac21d19bd4f922c327f6352dde0f112b0b426bee53700
SHA512383cf846a0c44fc405199ee92cf35a650c26ff398c1b7fe2362ecf20cfa4391d59d8dda89b36dc7af721a75566f69fcd2efa4381eab5910db3a0480c17a3c93f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exeFilesize
237KB
MD59854d0989447afcec67726c8aa10c383
SHA103b2f465e89345a999f571683829059a461d633e
SHA256823027b4da9c9f313f9984619c9c0d273c495ef5c5b8ff5f3c5c4a19d3c2ff09
SHA51276d600683396db90328df8b0d4908bc0bec0faac181fd5d5a484024082437583edf19e8e4761b753491eedbaf801c0581eee6710ea8675be75dc611032474d23
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exeFilesize
237KB
MD59854d0989447afcec67726c8aa10c383
SHA103b2f465e89345a999f571683829059a461d633e
SHA256823027b4da9c9f313f9984619c9c0d273c495ef5c5b8ff5f3c5c4a19d3c2ff09
SHA51276d600683396db90328df8b0d4908bc0bec0faac181fd5d5a484024082437583edf19e8e4761b753491eedbaf801c0581eee6710ea8675be75dc611032474d23
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exeFilesize
237KB
MD59854d0989447afcec67726c8aa10c383
SHA103b2f465e89345a999f571683829059a461d633e
SHA256823027b4da9c9f313f9984619c9c0d273c495ef5c5b8ff5f3c5c4a19d3c2ff09
SHA51276d600683396db90328df8b0d4908bc0bec0faac181fd5d5a484024082437583edf19e8e4761b753491eedbaf801c0581eee6710ea8675be75dc611032474d23
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7777.exeFilesize
294KB
MD5760889ae7ad9a80f055cb92b899cda35
SHA12235c66e276c92b6c1692a93c9c35953b3229557
SHA25698b493b17e7cf401f446423cd761f5f4517122420174f5f23b63e91e911f25e1
SHA512316a8d5737fd3fcacd99129abbe49e261c0f1f9cadd1c6961f661bbc14b8fed05c065ab2efc893f676cda59c0e84af3cc92152da862c084431a9f9126ece5e49
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7777.exeFilesize
294KB
MD5760889ae7ad9a80f055cb92b899cda35
SHA12235c66e276c92b6c1692a93c9c35953b3229557
SHA25698b493b17e7cf401f446423cd761f5f4517122420174f5f23b63e91e911f25e1
SHA512316a8d5737fd3fcacd99129abbe49e261c0f1f9cadd1c6961f661bbc14b8fed05c065ab2efc893f676cda59c0e84af3cc92152da862c084431a9f9126ece5e49
-
memory/916-1132-0x00000000053A0000-0x00000000053B0000-memory.dmpFilesize
64KB
-
memory/916-1131-0x00000000007E0000-0x0000000000812000-memory.dmpFilesize
200KB
-
memory/1420-203-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-157-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1420-148-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1420-150-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1420-151-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1420-163-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-170-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-1122-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1420-172-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/1420-177-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-1115-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/1420-1113-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/1420-165-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/1420-160-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-178-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/1420-1111-0x0000000004AA0000-0x0000000004AB0000-memory.dmpFilesize
64KB
-
memory/1420-1108-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1420-222-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-183-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-215-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-188-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-219-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-159-0x0000000004AB0000-0x0000000005054000-memory.dmpFilesize
5.6MB
-
memory/1420-191-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-196-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-211-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-199-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1420-207-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/1800-212-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-1109-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/1800-200-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-208-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-195-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-192-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-216-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-187-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-184-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-221-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-175-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/1800-224-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-226-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-1101-0x0000000005350000-0x0000000005968000-memory.dmpFilesize
6.1MB
-
memory/1800-1102-0x0000000005970000-0x0000000005A7A000-memory.dmpFilesize
1.0MB
-
memory/1800-1103-0x00000000028A0000-0x00000000028B2000-memory.dmpFilesize
72KB
-
memory/1800-1104-0x0000000004D10000-0x0000000004D4C000-memory.dmpFilesize
240KB
-
memory/1800-1105-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/1800-181-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/1800-204-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-1110-0x00000000063A0000-0x0000000006432000-memory.dmpFilesize
584KB
-
memory/1800-1112-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/1800-179-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-168-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/1800-1114-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/1800-174-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-1116-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/1800-1117-0x00000000064B0000-0x0000000006672000-memory.dmpFilesize
1.8MB
-
memory/1800-1118-0x0000000006680000-0x0000000006BAC000-memory.dmpFilesize
5.2MB
-
memory/1800-169-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-1123-0x0000000004D90000-0x0000000004DA0000-memory.dmpFilesize
64KB
-
memory/1800-1124-0x0000000007140000-0x00000000071B6000-memory.dmpFilesize
472KB
-
memory/1800-1125-0x00000000071C0000-0x0000000007210000-memory.dmpFilesize
320KB
-
memory/1800-164-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-161-0x0000000002520000-0x000000000255F000-memory.dmpFilesize
252KB
-
memory/1800-162-0x0000000000630000-0x000000000067B000-memory.dmpFilesize
300KB
-
memory/4756-152-0x0000000000550000-0x000000000057E000-memory.dmpFilesize
184KB