Analysis
-
max time kernel
147s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10-04-2023 20:47
Static task
static1
General
-
Target
112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe
-
Size
939KB
-
MD5
7e6381465d2766364e69b43264a028d1
-
SHA1
d7c1cba3f6deb6a8cd1c4fe4dfa82bbe8b40526a
-
SHA256
112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4
-
SHA512
08e9c08a8a6865da0c57d58c15ac16964907afb78c6c8c5e8ce91649bce5c41d4b05743c90eb90b69219f3f804e49dfc9b8f5dfc7f2b5ca8e19510eac02d2cd9
-
SSDEEP
12288:/Mrgy90Hat0dwVh0enTDzs+93zJQNRCK7rZfIqjV4oZmuaZ7gcM23T2nST1m76ZR:nyYdwVecT8+93zm/CIZfIqkqSTYATd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Signatures
-
Processes:
pr610589.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr610589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr610589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr610589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr610589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr610589.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1444-184-0x0000000002170000-0x00000000021B6000-memory.dmp family_redline behavioral1/memory/1444-185-0x0000000004F80000-0x0000000004FC4000-memory.dmp family_redline behavioral1/memory/1444-186-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-187-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-189-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-191-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-193-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-198-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-201-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-203-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-205-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-207-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-209-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-211-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-213-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-217-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-215-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-219-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-221-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/1444-223-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
un375220.exeun713642.exepr610589.exequ654552.exerk921339.exesi174887.exepid process 1848 un375220.exe 4380 un713642.exe 4396 pr610589.exe 1444 qu654552.exe 3628 rk921339.exe 1356 si174887.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr610589.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr610589.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr610589.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exeun375220.exeun713642.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un375220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un375220.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un713642.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un713642.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1516 1356 WerFault.exe si174887.exe 4472 1356 WerFault.exe si174887.exe 4524 1356 WerFault.exe si174887.exe 4428 1356 WerFault.exe si174887.exe 3440 1356 WerFault.exe si174887.exe 3036 1356 WerFault.exe si174887.exe 3256 1356 WerFault.exe si174887.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr610589.exequ654552.exerk921339.exepid process 4396 pr610589.exe 4396 pr610589.exe 1444 qu654552.exe 1444 qu654552.exe 3628 rk921339.exe 3628 rk921339.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pr610589.exequ654552.exerk921339.exedescription pid process Token: SeDebugPrivilege 4396 pr610589.exe Token: SeDebugPrivilege 1444 qu654552.exe Token: SeDebugPrivilege 3628 rk921339.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exeun375220.exeun713642.exedescription pid process target process PID 3536 wrote to memory of 1848 3536 112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe un375220.exe PID 3536 wrote to memory of 1848 3536 112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe un375220.exe PID 3536 wrote to memory of 1848 3536 112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe un375220.exe PID 1848 wrote to memory of 4380 1848 un375220.exe un713642.exe PID 1848 wrote to memory of 4380 1848 un375220.exe un713642.exe PID 1848 wrote to memory of 4380 1848 un375220.exe un713642.exe PID 4380 wrote to memory of 4396 4380 un713642.exe pr610589.exe PID 4380 wrote to memory of 4396 4380 un713642.exe pr610589.exe PID 4380 wrote to memory of 4396 4380 un713642.exe pr610589.exe PID 4380 wrote to memory of 1444 4380 un713642.exe qu654552.exe PID 4380 wrote to memory of 1444 4380 un713642.exe qu654552.exe PID 4380 wrote to memory of 1444 4380 un713642.exe qu654552.exe PID 1848 wrote to memory of 3628 1848 un375220.exe rk921339.exe PID 1848 wrote to memory of 3628 1848 un375220.exe rk921339.exe PID 1848 wrote to memory of 3628 1848 un375220.exe rk921339.exe PID 3536 wrote to memory of 1356 3536 112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe si174887.exe PID 3536 wrote to memory of 1356 3536 112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe si174887.exe PID 3536 wrote to memory of 1356 3536 112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe si174887.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe"C:\Users\Admin\AppData\Local\Temp\112b98541698cf9b24dacd46a9822e6312909c107e5e969753402ab53a4294c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un375220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un375220.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un713642.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un713642.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr610589.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr610589.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu654552.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu654552.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk921339.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk921339.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174887.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 6283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 7003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 8003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 8043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 8803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 8883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 10723⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174887.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174887.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un375220.exeFilesize
674KB
MD57a352394adc8aa567d53f2298c69db51
SHA1e92b31e4cf996ea907d9ab0ec3d535b7549db970
SHA256e24e6d7a2b72959443213cbaa5aeff6454cecf8c46e0a835479c4664d5f09afc
SHA51217d26ec077e843be2fb69680df0faf83184d502f933b751c448c7835e3e7d483296d40ebc53e21cfd1636171aa09ba90491d2108a698a80ec42ac75fd54d931f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un375220.exeFilesize
674KB
MD57a352394adc8aa567d53f2298c69db51
SHA1e92b31e4cf996ea907d9ab0ec3d535b7549db970
SHA256e24e6d7a2b72959443213cbaa5aeff6454cecf8c46e0a835479c4664d5f09afc
SHA51217d26ec077e843be2fb69680df0faf83184d502f933b751c448c7835e3e7d483296d40ebc53e21cfd1636171aa09ba90491d2108a698a80ec42ac75fd54d931f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk921339.exeFilesize
169KB
MD5097a30374d79160b16c51c060174d674
SHA1dae5a6504f714c739d1ecabcb18fe6938cebde12
SHA256ccd709edcdbdf1b46bd585179843c2bf6bc1e08697ab3e46b9546554fb20e32d
SHA51277de00afe0910aa013baa8087a7c7fb012e696c103d821c0310051dd9be314af10f16767b88173a63e117a371e3cd7e555fccb57cc530a165ea87aef4f92dd7d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk921339.exeFilesize
169KB
MD5097a30374d79160b16c51c060174d674
SHA1dae5a6504f714c739d1ecabcb18fe6938cebde12
SHA256ccd709edcdbdf1b46bd585179843c2bf6bc1e08697ab3e46b9546554fb20e32d
SHA51277de00afe0910aa013baa8087a7c7fb012e696c103d821c0310051dd9be314af10f16767b88173a63e117a371e3cd7e555fccb57cc530a165ea87aef4f92dd7d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un713642.exeFilesize
520KB
MD56fbca9d85355f2f11e2c4e590072bc3d
SHA1dec59dc1db1a12eb2375a14d6780e71d2128f3c3
SHA2566b1a0ef861025a164e866e3fb5d5b1be2ed836d008a1c2e940ffd23b6c0d6d04
SHA512258c2b1be6db20a010af5693109610e6eb4652030d4f56f5897b777cb24cd08bdb0e343c1d733c59b8757f057505b66748cf2816e08f5e07c538412bb4ac2285
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un713642.exeFilesize
520KB
MD56fbca9d85355f2f11e2c4e590072bc3d
SHA1dec59dc1db1a12eb2375a14d6780e71d2128f3c3
SHA2566b1a0ef861025a164e866e3fb5d5b1be2ed836d008a1c2e940ffd23b6c0d6d04
SHA512258c2b1be6db20a010af5693109610e6eb4652030d4f56f5897b777cb24cd08bdb0e343c1d733c59b8757f057505b66748cf2816e08f5e07c538412bb4ac2285
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr610589.exeFilesize
239KB
MD53f96f5296376773c6a460c36d3a039d4
SHA10653f8caea7025dfecc78ff05f4c375f478f6571
SHA25605040e0b28f4791e0c78f265f317dc135471a5f5d27bf19463c6f745f679fc89
SHA512bd3b01d9422637610219c289589864528b78b5d3319bec19da4555d1f2d11830825208b87c9db04d0e3ce39d184a6ea5d161b652a84f816ca039047c2fab5768
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr610589.exeFilesize
239KB
MD53f96f5296376773c6a460c36d3a039d4
SHA10653f8caea7025dfecc78ff05f4c375f478f6571
SHA25605040e0b28f4791e0c78f265f317dc135471a5f5d27bf19463c6f745f679fc89
SHA512bd3b01d9422637610219c289589864528b78b5d3319bec19da4555d1f2d11830825208b87c9db04d0e3ce39d184a6ea5d161b652a84f816ca039047c2fab5768
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu654552.exeFilesize
297KB
MD5dece3d43df88e7270ec7fe58e058c083
SHA1d2b700eb8a82905bd9e8da6a853167c62be255a8
SHA2565e7fa0efce4f725ba72a99bd64c70f315e3cbccdf6b7d85955957070b2631ea8
SHA5120cf109d4d9d9ae4645cd65f38f4ffd80f8bf5ac70ff24e95b9ea5bc6b1a80d52b08cc0336a8ca8c9d62c6a44d1c1cc79730059d42b30c1b8c1803a6b516f92b0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu654552.exeFilesize
297KB
MD5dece3d43df88e7270ec7fe58e058c083
SHA1d2b700eb8a82905bd9e8da6a853167c62be255a8
SHA2565e7fa0efce4f725ba72a99bd64c70f315e3cbccdf6b7d85955957070b2631ea8
SHA5120cf109d4d9d9ae4645cd65f38f4ffd80f8bf5ac70ff24e95b9ea5bc6b1a80d52b08cc0336a8ca8c9d62c6a44d1c1cc79730059d42b30c1b8c1803a6b516f92b0
-
memory/1356-1127-0x00000000004B0000-0x00000000004EB000-memory.dmpFilesize
236KB
-
memory/1444-1100-0x0000000005910000-0x000000000595B000-memory.dmpFilesize
300KB
-
memory/1444-1102-0x0000000005AA0000-0x0000000005B06000-memory.dmpFilesize
408KB
-
memory/1444-1112-0x0000000007F60000-0x0000000007FB0000-memory.dmpFilesize
320KB
-
memory/1444-1111-0x0000000007EE0000-0x0000000007F56000-memory.dmpFilesize
472KB
-
memory/1444-1110-0x00000000077D0000-0x0000000007CFC000-memory.dmpFilesize
5.2MB
-
memory/1444-1109-0x0000000007600000-0x00000000077C2000-memory.dmpFilesize
1.8MB
-
memory/1444-1108-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/1444-1107-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/1444-1106-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/1444-1105-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/1444-1104-0x0000000006160000-0x00000000061F2000-memory.dmpFilesize
584KB
-
memory/1444-1101-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/1444-1099-0x00000000057C0000-0x00000000057FE000-memory.dmpFilesize
248KB
-
memory/1444-1098-0x00000000057A0000-0x00000000057B2000-memory.dmpFilesize
72KB
-
memory/1444-1097-0x0000000005660000-0x000000000576A000-memory.dmpFilesize
1.0MB
-
memory/1444-1096-0x0000000004FD0000-0x00000000055D6000-memory.dmpFilesize
6.0MB
-
memory/1444-223-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-221-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-219-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-215-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-217-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-213-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-184-0x0000000002170000-0x00000000021B6000-memory.dmpFilesize
280KB
-
memory/1444-185-0x0000000004F80000-0x0000000004FC4000-memory.dmpFilesize
272KB
-
memory/1444-186-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-187-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-189-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-191-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-194-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/1444-195-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/1444-193-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-199-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/1444-198-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-197-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/1444-201-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-203-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-205-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-207-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-209-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/1444-211-0x0000000004F80000-0x0000000004FBF000-memory.dmpFilesize
252KB
-
memory/3628-1118-0x0000000000630000-0x0000000000660000-memory.dmpFilesize
192KB
-
memory/3628-1121-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/3628-1120-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/3628-1119-0x0000000000E70000-0x0000000000E76000-memory.dmpFilesize
24KB
-
memory/4396-163-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-157-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-174-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/4396-173-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-171-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-169-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-144-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/4396-167-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-147-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-165-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-145-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/4396-161-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-159-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-175-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/4396-155-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-153-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-151-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-149-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-143-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/4396-142-0x0000000002260000-0x0000000002278000-memory.dmpFilesize
96KB
-
memory/4396-176-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/4396-177-0x0000000004C20000-0x0000000004C30000-memory.dmpFilesize
64KB
-
memory/4396-179-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/4396-146-0x0000000002260000-0x0000000002272000-memory.dmpFilesize
72KB
-
memory/4396-141-0x0000000004C30000-0x000000000512E000-memory.dmpFilesize
5.0MB
-
memory/4396-140-0x00000000020C0000-0x00000000020DA000-memory.dmpFilesize
104KB
-
memory/4396-139-0x00000000004B0000-0x00000000004DD000-memory.dmpFilesize
180KB