Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09-04-2023 20:13
Static task
static1
General
-
Target
8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe
-
Size
924KB
-
MD5
9070b31a4ea6570216ee5d0758f05cc4
-
SHA1
a0431611f84591448c34c83aed8503295e4103f7
-
SHA256
8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380
-
SHA512
6aaa0ea5b73ed0337bf5a1c6175c023924e1fdaf158f30f123f5b2b4fe0b934e5aa5022787cdcffd92b7d29fd7f7a4878f2e18fae591b894e9930f15682a6942
-
SSDEEP
24576:myrHSY7ddQdW5rLOQx+Nl4yJ920CyR2XT:1eyddd5vcNZ920CyR2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pr034014.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr034014.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr034014.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr034014.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr034014.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr034014.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4968-185-0x0000000002460000-0x00000000024A6000-memory.dmp family_redline behavioral1/memory/4968-186-0x0000000004F50000-0x0000000004F94000-memory.dmp family_redline behavioral1/memory/4968-187-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-188-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-193-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-196-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-198-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-200-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-202-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-204-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-206-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-208-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-210-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-212-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-214-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-216-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-218-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-220-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-222-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/4968-224-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
un828037.exeun664006.exepr034014.exequ036143.exerk969312.exesi859876.exepid process 1840 un828037.exe 3592 un664006.exe 3788 pr034014.exe 4968 qu036143.exe 4424 rk969312.exe 4420 si859876.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr034014.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr034014.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr034014.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un828037.exeun664006.exe8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un828037.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un828037.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un664006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un664006.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4140 4420 WerFault.exe si859876.exe 4072 4420 WerFault.exe si859876.exe 4164 4420 WerFault.exe si859876.exe 5020 4420 WerFault.exe si859876.exe 1020 4420 WerFault.exe si859876.exe 2144 4420 WerFault.exe si859876.exe 2056 4420 WerFault.exe si859876.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr034014.exequ036143.exerk969312.exepid process 3788 pr034014.exe 3788 pr034014.exe 4968 qu036143.exe 4968 qu036143.exe 4424 rk969312.exe 4424 rk969312.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr034014.exequ036143.exerk969312.exedescription pid process Token: SeDebugPrivilege 3788 pr034014.exe Token: SeDebugPrivilege 4968 qu036143.exe Token: SeDebugPrivilege 4424 rk969312.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exeun828037.exeun664006.exedescription pid process target process PID 3272 wrote to memory of 1840 3272 8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe un828037.exe PID 3272 wrote to memory of 1840 3272 8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe un828037.exe PID 3272 wrote to memory of 1840 3272 8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe un828037.exe PID 1840 wrote to memory of 3592 1840 un828037.exe un664006.exe PID 1840 wrote to memory of 3592 1840 un828037.exe un664006.exe PID 1840 wrote to memory of 3592 1840 un828037.exe un664006.exe PID 3592 wrote to memory of 3788 3592 un664006.exe pr034014.exe PID 3592 wrote to memory of 3788 3592 un664006.exe pr034014.exe PID 3592 wrote to memory of 3788 3592 un664006.exe pr034014.exe PID 3592 wrote to memory of 4968 3592 un664006.exe qu036143.exe PID 3592 wrote to memory of 4968 3592 un664006.exe qu036143.exe PID 3592 wrote to memory of 4968 3592 un664006.exe qu036143.exe PID 1840 wrote to memory of 4424 1840 un828037.exe rk969312.exe PID 1840 wrote to memory of 4424 1840 un828037.exe rk969312.exe PID 1840 wrote to memory of 4424 1840 un828037.exe rk969312.exe PID 3272 wrote to memory of 4420 3272 8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe si859876.exe PID 3272 wrote to memory of 4420 3272 8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe si859876.exe PID 3272 wrote to memory of 4420 3272 8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe si859876.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe"C:\Users\Admin\AppData\Local\Temp\8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828037.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828037.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un664006.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un664006.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr034014.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr034014.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu036143.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu036143.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk969312.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk969312.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859876.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859876.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 6163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 6963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 8363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 8163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 8803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 8683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 10683⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859876.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859876.exeFilesize
226KB
MD5d8c3f20eef4f33bd865589859629bf41
SHA13590244f8774ff4ac4e3c54cdbb149363fd9dc7d
SHA2562883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f
SHA51252b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828037.exeFilesize
662KB
MD56b1ea6ff0d8ea57d8a19824a3e058d5b
SHA1687e4d90972009d5a50b2108eafc92095dcb92cb
SHA256fdc1cc32111a5a5d8d66607a6b9653e2a210079bd3bfc792f25b3225b1b6cf99
SHA512f3d1b99b4230c6d59b296a7f2bc15626e4656dfa51316fda28ed56e4ab738a51474e7428cc0fd372cbbf9729cd6293ec5673a997b70731b679ac1b61d1cc2a87
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828037.exeFilesize
662KB
MD56b1ea6ff0d8ea57d8a19824a3e058d5b
SHA1687e4d90972009d5a50b2108eafc92095dcb92cb
SHA256fdc1cc32111a5a5d8d66607a6b9653e2a210079bd3bfc792f25b3225b1b6cf99
SHA512f3d1b99b4230c6d59b296a7f2bc15626e4656dfa51316fda28ed56e4ab738a51474e7428cc0fd372cbbf9729cd6293ec5673a997b70731b679ac1b61d1cc2a87
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk969312.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk969312.exeFilesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un664006.exeFilesize
520KB
MD57805db28b0270a95daed5acee84afee9
SHA1b4cd1d091c69aa773f16b6fa633cee071b4064b6
SHA256a97ba6bdfa9811ccf56574890d3b4913474d2f7d4739c37b6292db3aa6da8da7
SHA512a08d0e44bdf852b095de8c29b5a1c4016a86e3ca3a9d9daa4befa1be001a325ca5ae810c3f35683fdf1429609dbaeb1335687c84bda5cdd6a402bdd4bc32ccb9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un664006.exeFilesize
520KB
MD57805db28b0270a95daed5acee84afee9
SHA1b4cd1d091c69aa773f16b6fa633cee071b4064b6
SHA256a97ba6bdfa9811ccf56574890d3b4913474d2f7d4739c37b6292db3aa6da8da7
SHA512a08d0e44bdf852b095de8c29b5a1c4016a86e3ca3a9d9daa4befa1be001a325ca5ae810c3f35683fdf1429609dbaeb1335687c84bda5cdd6a402bdd4bc32ccb9
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr034014.exeFilesize
235KB
MD5fcd7931c929cfd4e18f73cb8e303a297
SHA102f4a18e3351958e9622ca8a8ca8fee88d52231b
SHA256a0ea29164fef27e7ee56b052634e55a801ad45e513dccf3a6d094f7f1065de3a
SHA5123f3f2ba7bab27b1a446bb612b63d10654785829b792af48a313812294fe0dfd53358265316a0bfc43c18e36f8b2a3a898629b54e1a98b0c3d018feb65451523b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr034014.exeFilesize
235KB
MD5fcd7931c929cfd4e18f73cb8e303a297
SHA102f4a18e3351958e9622ca8a8ca8fee88d52231b
SHA256a0ea29164fef27e7ee56b052634e55a801ad45e513dccf3a6d094f7f1065de3a
SHA5123f3f2ba7bab27b1a446bb612b63d10654785829b792af48a313812294fe0dfd53358265316a0bfc43c18e36f8b2a3a898629b54e1a98b0c3d018feb65451523b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu036143.exeFilesize
292KB
MD5a4ad8f2ffc07da2ed47860bf27d2c085
SHA1b262ecb138aaf6a97b7dda1e1d17d0dccf233da7
SHA256f4d7379bd67271ef53ab43d0507ac6098d452280b1465e737e21475316f6ee3c
SHA5128696aa5a62d1aa72285770652462bab8d41ff20c91aa291fdc90de99ae471be1738c14c0db90238e5a9cfb28a65b450e6fe4731dbbfb5adcc55eb66c5e6798cc
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu036143.exeFilesize
292KB
MD5a4ad8f2ffc07da2ed47860bf27d2c085
SHA1b262ecb138aaf6a97b7dda1e1d17d0dccf233da7
SHA256f4d7379bd67271ef53ab43d0507ac6098d452280b1465e737e21475316f6ee3c
SHA5128696aa5a62d1aa72285770652462bab8d41ff20c91aa291fdc90de99ae471be1738c14c0db90238e5a9cfb28a65b450e6fe4731dbbfb5adcc55eb66c5e6798cc
-
memory/3788-155-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-165-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-147-0x0000000004D50000-0x0000000004D60000-memory.dmpFilesize
64KB
-
memory/3788-148-0x0000000004D50000-0x0000000004D60000-memory.dmpFilesize
64KB
-
memory/3788-149-0x0000000004D50000-0x0000000004D60000-memory.dmpFilesize
64KB
-
memory/3788-150-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-151-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-153-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-145-0x0000000002220000-0x0000000002238000-memory.dmpFilesize
96KB
-
memory/3788-157-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-159-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-161-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-163-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-146-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/3788-167-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-169-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-171-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-173-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-177-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-175-0x0000000002220000-0x0000000002232000-memory.dmpFilesize
72KB
-
memory/3788-178-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/3788-180-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/3788-143-0x00000000009D0000-0x00000000009EA000-memory.dmpFilesize
104KB
-
memory/3788-144-0x0000000004D60000-0x000000000525E000-memory.dmpFilesize
5.0MB
-
memory/4420-1127-0x0000000000580000-0x00000000005BB000-memory.dmpFilesize
236KB
-
memory/4424-1119-0x00000000004C0000-0x00000000004F2000-memory.dmpFilesize
200KB
-
memory/4424-1121-0x0000000004DD0000-0x0000000004E1B000-memory.dmpFilesize
300KB
-
memory/4424-1120-0x00000000050A0000-0x00000000050B0000-memory.dmpFilesize
64KB
-
memory/4968-192-0x00000000024F0000-0x0000000002500000-memory.dmpFilesize
64KB
-
memory/4968-194-0x00000000024F0000-0x0000000002500000-memory.dmpFilesize
64KB
-
memory/4968-193-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-196-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-191-0x00000000024F0000-0x0000000002500000-memory.dmpFilesize
64KB
-
memory/4968-198-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-200-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-202-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-204-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-206-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-208-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-210-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-212-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-214-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-216-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-218-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-220-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-222-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-224-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-1097-0x0000000004FD0000-0x00000000055D6000-memory.dmpFilesize
6.0MB
-
memory/4968-1098-0x0000000005660000-0x000000000576A000-memory.dmpFilesize
1.0MB
-
memory/4968-1099-0x00000000057A0000-0x00000000057B2000-memory.dmpFilesize
72KB
-
memory/4968-1100-0x00000000057C0000-0x00000000057FE000-memory.dmpFilesize
248KB
-
memory/4968-1101-0x0000000005910000-0x000000000595B000-memory.dmpFilesize
300KB
-
memory/4968-1102-0x00000000024F0000-0x0000000002500000-memory.dmpFilesize
64KB
-
memory/4968-1104-0x0000000005AA0000-0x0000000005B06000-memory.dmpFilesize
408KB
-
memory/4968-1105-0x00000000024F0000-0x0000000002500000-memory.dmpFilesize
64KB
-
memory/4968-1106-0x00000000024F0000-0x0000000002500000-memory.dmpFilesize
64KB
-
memory/4968-1107-0x00000000024F0000-0x0000000002500000-memory.dmpFilesize
64KB
-
memory/4968-1108-0x0000000006040000-0x00000000060D2000-memory.dmpFilesize
584KB
-
memory/4968-1109-0x0000000006250000-0x0000000006412000-memory.dmpFilesize
1.8MB
-
memory/4968-1110-0x0000000006420000-0x000000000694C000-memory.dmpFilesize
5.2MB
-
memory/4968-188-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-189-0x00000000005F0000-0x000000000063B000-memory.dmpFilesize
300KB
-
memory/4968-187-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/4968-186-0x0000000004F50000-0x0000000004F94000-memory.dmpFilesize
272KB
-
memory/4968-185-0x0000000002460000-0x00000000024A6000-memory.dmpFilesize
280KB
-
memory/4968-1111-0x0000000006B70000-0x0000000006BE6000-memory.dmpFilesize
472KB
-
memory/4968-1112-0x0000000006C00000-0x0000000006C50000-memory.dmpFilesize
320KB
-
memory/4968-1113-0x00000000024F0000-0x0000000002500000-memory.dmpFilesize
64KB