Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 21:51
Static task
static1
General
-
Target
01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe
-
Size
789KB
-
MD5
8670ba73af0cbdebfd6589698e3eeb4f
-
SHA1
e26a6d4279e1812574c5e059a86fd7a2056b0d9c
-
SHA256
01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e
-
SHA512
15028fba64f6b8d7843ded764141d06d8baceb9110bc729d204ee9657d87b06c6a4c7ea303dbf7095b49eb737817747a5a81f25a63eb2bbf80193cbd14a4b3ff
-
SSDEEP
24576:wyztkmc8DR+I5kjwvlxfN6TZXnnbNHHWp:3ztkT+4wvlx0nR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
it649112.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it649112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it649112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it649112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it649112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it649112.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4936-147-0x00000000021E0000-0x0000000002226000-memory.dmp family_redline behavioral1/memory/4936-152-0x0000000002700000-0x0000000002744000-memory.dmp family_redline behavioral1/memory/4936-153-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-154-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-156-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-158-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-160-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-162-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-164-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-166-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-168-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-170-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-172-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-174-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-176-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-178-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-180-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-182-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-184-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-186-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-188-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-190-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-192-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-194-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-196-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-198-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-200-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-202-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-204-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-206-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-208-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-210-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-212-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-214-0x0000000002700000-0x000000000273F000-memory.dmp family_redline behavioral1/memory/4936-216-0x0000000002700000-0x000000000273F000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
ziOv5598.exeziFc6855.exeit649112.exejr121192.exekp476029.exelr630025.exepid process 4100 ziOv5598.exe 3532 ziFc6855.exe 3500 it649112.exe 4936 jr121192.exe 4792 kp476029.exe 3640 lr630025.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it649112.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it649112.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exeziOv5598.exeziFc6855.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOv5598.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOv5598.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziFc6855.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziFc6855.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3676 3640 WerFault.exe lr630025.exe 3972 3640 WerFault.exe lr630025.exe 4716 3640 WerFault.exe lr630025.exe 2632 3640 WerFault.exe lr630025.exe 4896 3640 WerFault.exe lr630025.exe 2352 3640 WerFault.exe lr630025.exe 5036 3640 WerFault.exe lr630025.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it649112.exejr121192.exekp476029.exepid process 3500 it649112.exe 3500 it649112.exe 4936 jr121192.exe 4936 jr121192.exe 4792 kp476029.exe 4792 kp476029.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
it649112.exejr121192.exekp476029.exedescription pid process Token: SeDebugPrivilege 3500 it649112.exe Token: SeDebugPrivilege 4936 jr121192.exe Token: SeDebugPrivilege 4792 kp476029.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exeziOv5598.exeziFc6855.exedescription pid process target process PID 996 wrote to memory of 4100 996 01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe ziOv5598.exe PID 996 wrote to memory of 4100 996 01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe ziOv5598.exe PID 996 wrote to memory of 4100 996 01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe ziOv5598.exe PID 4100 wrote to memory of 3532 4100 ziOv5598.exe ziFc6855.exe PID 4100 wrote to memory of 3532 4100 ziOv5598.exe ziFc6855.exe PID 4100 wrote to memory of 3532 4100 ziOv5598.exe ziFc6855.exe PID 3532 wrote to memory of 3500 3532 ziFc6855.exe it649112.exe PID 3532 wrote to memory of 3500 3532 ziFc6855.exe it649112.exe PID 3532 wrote to memory of 4936 3532 ziFc6855.exe jr121192.exe PID 3532 wrote to memory of 4936 3532 ziFc6855.exe jr121192.exe PID 3532 wrote to memory of 4936 3532 ziFc6855.exe jr121192.exe PID 4100 wrote to memory of 4792 4100 ziOv5598.exe kp476029.exe PID 4100 wrote to memory of 4792 4100 ziOv5598.exe kp476029.exe PID 4100 wrote to memory of 4792 4100 ziOv5598.exe kp476029.exe PID 996 wrote to memory of 3640 996 01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe lr630025.exe PID 996 wrote to memory of 3640 996 01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe lr630025.exe PID 996 wrote to memory of 3640 996 01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe lr630025.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe"C:\Users\Admin\AppData\Local\Temp\01d450f80fda3d1b79bbe074e8eea4ed4182814bf1a64433615dad840b9c1c6e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOv5598.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOv5598.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFc6855.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFc6855.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it649112.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it649112.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr121192.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr121192.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp476029.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp476029.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr630025.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr630025.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 6243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 7043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 8403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 8523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 8803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 8363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 10683⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr630025.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr630025.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOv5598.exeFilesize
524KB
MD53fe6b3202677a6f8bb17655dd6a2814e
SHA100001802a7360b60c7a4153a2898a2e57bc97458
SHA25664bd379172a239e359dab8a174e3b80356e56e04831f7adc53be6605e825f72c
SHA512bfc12aa93a4935ac92affd31c2879f8416e6351411438735acb12ec3bf2c4cd37f05c5c3079ae2d19d10d37bcc99ff223d09c6874d760e22e4474898a33dcfa5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOv5598.exeFilesize
524KB
MD53fe6b3202677a6f8bb17655dd6a2814e
SHA100001802a7360b60c7a4153a2898a2e57bc97458
SHA25664bd379172a239e359dab8a174e3b80356e56e04831f7adc53be6605e825f72c
SHA512bfc12aa93a4935ac92affd31c2879f8416e6351411438735acb12ec3bf2c4cd37f05c5c3079ae2d19d10d37bcc99ff223d09c6874d760e22e4474898a33dcfa5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp476029.exeFilesize
176KB
MD5230e545337d56399fd448df0a1545998
SHA19a868e222ef216e2e0f75715466d410616897455
SHA256d1570713130ad10343b02596f050c7ad4502a41c1cd6826bf95684b597491526
SHA512688a1e7eca63dbf23d69b751df85bb2387ec91062ae7776b8322192ce606e0c6f244b5a6d1026a89456966bb0c3f6f1f37d0168c29b4330c5b636ddbeed25822
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp476029.exeFilesize
176KB
MD5230e545337d56399fd448df0a1545998
SHA19a868e222ef216e2e0f75715466d410616897455
SHA256d1570713130ad10343b02596f050c7ad4502a41c1cd6826bf95684b597491526
SHA512688a1e7eca63dbf23d69b751df85bb2387ec91062ae7776b8322192ce606e0c6f244b5a6d1026a89456966bb0c3f6f1f37d0168c29b4330c5b636ddbeed25822
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFc6855.exeFilesize
382KB
MD5a7e05ead7b81b96a35bccfa2ef399a04
SHA13ca859ff34e705d87d4ee77c9502384627930231
SHA256b142503b239e3da034f0b51054a5711a742d85682bb0f8e45187343da19407dc
SHA512546470a3b4295297b1a9c7245f0d53ec3a68859841ce01d449333a343d6d4d518863ebdf4e3f2c84e26524a8737266775c7c91cf4a423970089ebd1f29a4e2d5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziFc6855.exeFilesize
382KB
MD5a7e05ead7b81b96a35bccfa2ef399a04
SHA13ca859ff34e705d87d4ee77c9502384627930231
SHA256b142503b239e3da034f0b51054a5711a742d85682bb0f8e45187343da19407dc
SHA512546470a3b4295297b1a9c7245f0d53ec3a68859841ce01d449333a343d6d4d518863ebdf4e3f2c84e26524a8737266775c7c91cf4a423970089ebd1f29a4e2d5
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it649112.exeFilesize
11KB
MD595adaa75d1f251936ef35c401701d559
SHA18b0dc7ca1519fed449e31a232c526c0a16d4a28b
SHA25685b68d17305f0b85c547597acaefe5be746ac4be199c9c0ef74bb2ed16aaf9b5
SHA512dfbda53315891e655b6f9ee107055f06e33fdab03a613514f3f68726a33a77633554c9f280f4c1a0e6aafbf238968c5550f70cfd436dcc3501844a17ae94cc84
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it649112.exeFilesize
11KB
MD595adaa75d1f251936ef35c401701d559
SHA18b0dc7ca1519fed449e31a232c526c0a16d4a28b
SHA25685b68d17305f0b85c547597acaefe5be746ac4be199c9c0ef74bb2ed16aaf9b5
SHA512dfbda53315891e655b6f9ee107055f06e33fdab03a613514f3f68726a33a77633554c9f280f4c1a0e6aafbf238968c5550f70cfd436dcc3501844a17ae94cc84
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr121192.exeFilesize
297KB
MD523cc6c126e551d7a38cf232edeedfd1b
SHA1e9a48b6cbf201f3792d48543b88022f3327e0174
SHA2563a4805da7dd13f54cd97c0795b028005213d8004dae2eb4c7b8e295934036a98
SHA5123b0b235a1343174550cbf7a7cffa7f5a5997a04c04d375b9beba1e82dad2beba9fd72c1fbce8a92906ab0dc85641ff3208858bfd1307542036f3522bd1306136
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr121192.exeFilesize
297KB
MD523cc6c126e551d7a38cf232edeedfd1b
SHA1e9a48b6cbf201f3792d48543b88022f3327e0174
SHA2563a4805da7dd13f54cd97c0795b028005213d8004dae2eb4c7b8e295934036a98
SHA5123b0b235a1343174550cbf7a7cffa7f5a5997a04c04d375b9beba1e82dad2beba9fd72c1fbce8a92906ab0dc85641ff3208858bfd1307542036f3522bd1306136
-
memory/3500-141-0x00000000008C0000-0x00000000008CA000-memory.dmpFilesize
40KB
-
memory/3640-1088-0x00000000005D0000-0x000000000060B000-memory.dmpFilesize
236KB
-
memory/4792-1079-0x00000000008C0000-0x00000000008F2000-memory.dmpFilesize
200KB
-
memory/4792-1080-0x0000000005300000-0x000000000534B000-memory.dmpFilesize
300KB
-
memory/4792-1082-0x0000000005470000-0x0000000005480000-memory.dmpFilesize
64KB
-
memory/4792-1081-0x0000000005470000-0x0000000005480000-memory.dmpFilesize
64KB
-
memory/4936-182-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-204-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-154-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-156-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-158-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-160-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-162-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-164-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-166-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-168-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-170-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-172-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-174-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-176-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-178-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-180-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-152-0x0000000002700000-0x0000000002744000-memory.dmpFilesize
272KB
-
memory/4936-184-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-186-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-188-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-190-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-192-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-194-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-196-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-198-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-200-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-202-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-153-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-206-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-208-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-210-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-212-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-214-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-216-0x0000000002700000-0x000000000273F000-memory.dmpFilesize
252KB
-
memory/4936-1059-0x0000000005110000-0x0000000005716000-memory.dmpFilesize
6.0MB
-
memory/4936-1060-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1.0MB
-
memory/4936-1061-0x00000000058E0000-0x00000000058F2000-memory.dmpFilesize
72KB
-
memory/4936-1062-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4936-1063-0x0000000005900000-0x000000000593E000-memory.dmpFilesize
248KB
-
memory/4936-1064-0x0000000005A50000-0x0000000005A9B000-memory.dmpFilesize
300KB
-
memory/4936-1066-0x0000000005BE0000-0x0000000005C46000-memory.dmpFilesize
408KB
-
memory/4936-1067-0x00000000062A0000-0x0000000006332000-memory.dmpFilesize
584KB
-
memory/4936-1068-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4936-1069-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4936-151-0x0000000004AA0000-0x0000000004F9E000-memory.dmpFilesize
5.0MB
-
memory/4936-150-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4936-149-0x00000000023B0000-0x00000000023C0000-memory.dmpFilesize
64KB
-
memory/4936-148-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/4936-147-0x00000000021E0000-0x0000000002226000-memory.dmpFilesize
280KB
-
memory/4936-1070-0x0000000006380000-0x0000000006542000-memory.dmpFilesize
1.8MB
-
memory/4936-1071-0x0000000006550000-0x0000000006A7C000-memory.dmpFilesize
5.2MB
-
memory/4936-1072-0x0000000006E00000-0x0000000006E76000-memory.dmpFilesize
472KB
-
memory/4936-1073-0x0000000006E80000-0x0000000006ED0000-memory.dmpFilesize
320KB