Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 07:04
Static task
static1
Behavioral task
behavioral1
Sample
c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe
Resource
win10v2004-20230220-en
General
-
Target
c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe
-
Size
1.1MB
-
MD5
622b266b1e29dc459b9a97f0341cf6d9
-
SHA1
c856cf21867f3ddbb7ed38a2f961b8424eae472c
-
SHA256
c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755
-
SHA512
316876cdb6a2a97ae4fd965a888b79f076dc92736e2d9c2c236889aac89c0259267a80fec852f98819667ae77bb3d7ce88dd79c66b65654d3b678ba1f3332939
-
SSDEEP
24576:+yLjpZxck7mzcHP5fAWzQ1j/YZw4z4H73G:NDH7ScH7Z
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Signatures
-
Processes:
o4141883.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o4141883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o4141883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o4141883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o4141883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o4141883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o4141883.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
Processes:
z1578886.exez8496343.exeo4141883.exep1678892.exer6037784.exer6037784.exes1308547.exes1308547.exepid process 4912 z1578886.exe 4200 z8496343.exe 2388 o4141883.exe 1784 p1678892.exe 1068 r6037784.exe 2244 r6037784.exe 3380 s1308547.exe 556 s1308547.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
o4141883.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o4141883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o4141883.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
z8496343.exec9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exez1578886.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8496343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8496343.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1578886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1578886.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
r6037784.exes1308547.exedescription pid process target process PID 1068 set thread context of 2244 1068 r6037784.exe r6037784.exe PID 3380 set thread context of 556 3380 s1308547.exe s1308547.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2404 1784 WerFault.exe p1678892.exe 4024 556 WerFault.exe s1308547.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
o4141883.exer6037784.exepid process 2388 o4141883.exe 2388 o4141883.exe 2244 r6037784.exe 2244 r6037784.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
o4141883.exer6037784.exes1308547.exer6037784.exedescription pid process Token: SeDebugPrivilege 2388 o4141883.exe Token: SeDebugPrivilege 1068 r6037784.exe Token: SeDebugPrivilege 3380 s1308547.exe Token: SeDebugPrivilege 2244 r6037784.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
s1308547.exepid process 556 s1308547.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exez1578886.exez8496343.exer6037784.exes1308547.exedescription pid process target process PID 2076 wrote to memory of 4912 2076 c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe z1578886.exe PID 2076 wrote to memory of 4912 2076 c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe z1578886.exe PID 2076 wrote to memory of 4912 2076 c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe z1578886.exe PID 4912 wrote to memory of 4200 4912 z1578886.exe z8496343.exe PID 4912 wrote to memory of 4200 4912 z1578886.exe z8496343.exe PID 4912 wrote to memory of 4200 4912 z1578886.exe z8496343.exe PID 4200 wrote to memory of 2388 4200 z8496343.exe o4141883.exe PID 4200 wrote to memory of 2388 4200 z8496343.exe o4141883.exe PID 4200 wrote to memory of 2388 4200 z8496343.exe o4141883.exe PID 4200 wrote to memory of 1784 4200 z8496343.exe p1678892.exe PID 4200 wrote to memory of 1784 4200 z8496343.exe p1678892.exe PID 4200 wrote to memory of 1784 4200 z8496343.exe p1678892.exe PID 4912 wrote to memory of 1068 4912 z1578886.exe r6037784.exe PID 4912 wrote to memory of 1068 4912 z1578886.exe r6037784.exe PID 4912 wrote to memory of 1068 4912 z1578886.exe r6037784.exe PID 1068 wrote to memory of 2244 1068 r6037784.exe r6037784.exe PID 1068 wrote to memory of 2244 1068 r6037784.exe r6037784.exe PID 1068 wrote to memory of 2244 1068 r6037784.exe r6037784.exe PID 1068 wrote to memory of 2244 1068 r6037784.exe r6037784.exe PID 1068 wrote to memory of 2244 1068 r6037784.exe r6037784.exe PID 1068 wrote to memory of 2244 1068 r6037784.exe r6037784.exe PID 1068 wrote to memory of 2244 1068 r6037784.exe r6037784.exe PID 1068 wrote to memory of 2244 1068 r6037784.exe r6037784.exe PID 2076 wrote to memory of 3380 2076 c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe s1308547.exe PID 2076 wrote to memory of 3380 2076 c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe s1308547.exe PID 2076 wrote to memory of 3380 2076 c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe PID 3380 wrote to memory of 556 3380 s1308547.exe s1308547.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe"C:\Users\Admin\AppData\Local\Temp\c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1578886.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1578886.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8496343.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8496343.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4141883.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4141883.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1678892.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1678892.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 9285⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1784 -ip 17841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 556 -ip 5561⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r6037784.exe.logFilesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exeFilesize
961KB
MD5e43ee94eb427d63aff51caf6cf853246
SHA16b2bd3b4f563a939b8845f784fb4c07c4b3df8a9
SHA256b68b6bccdb475fdd1b8a5f1121caacd9628a4115236828983ae2ddf754474dd7
SHA51286f26117629e39043fd56cfa8c69bec7456350fcdac66cbffc02f2617eb96a5c29d3ea49360fafefe8d598d1c7e2afcad27cbc3ec627f9e1d66711c93a537659
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exeFilesize
961KB
MD5e43ee94eb427d63aff51caf6cf853246
SHA16b2bd3b4f563a939b8845f784fb4c07c4b3df8a9
SHA256b68b6bccdb475fdd1b8a5f1121caacd9628a4115236828983ae2ddf754474dd7
SHA51286f26117629e39043fd56cfa8c69bec7456350fcdac66cbffc02f2617eb96a5c29d3ea49360fafefe8d598d1c7e2afcad27cbc3ec627f9e1d66711c93a537659
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exeFilesize
961KB
MD5e43ee94eb427d63aff51caf6cf853246
SHA16b2bd3b4f563a939b8845f784fb4c07c4b3df8a9
SHA256b68b6bccdb475fdd1b8a5f1121caacd9628a4115236828983ae2ddf754474dd7
SHA51286f26117629e39043fd56cfa8c69bec7456350fcdac66cbffc02f2617eb96a5c29d3ea49360fafefe8d598d1c7e2afcad27cbc3ec627f9e1d66711c93a537659
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1578886.exeFilesize
702KB
MD59936d1f8c2f3d4300908a380b9f50f89
SHA1faca5bb0220d2126cb4e737dc7f0f843044dc806
SHA256c1738ea185ae8c9fe0559d48920acd6d26eb6a1ebf76f99dbbc44fe95f93a6dd
SHA5125aa8d19de1eba65d959c1a63ab0acce51deea0ed7a1a2c46584d95e5a2429736097f5797e5ffe624e298b7a85df7a4dd5efb794456c3814822640939210b39e3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1578886.exeFilesize
702KB
MD59936d1f8c2f3d4300908a380b9f50f89
SHA1faca5bb0220d2126cb4e737dc7f0f843044dc806
SHA256c1738ea185ae8c9fe0559d48920acd6d26eb6a1ebf76f99dbbc44fe95f93a6dd
SHA5125aa8d19de1eba65d959c1a63ab0acce51deea0ed7a1a2c46584d95e5a2429736097f5797e5ffe624e298b7a85df7a4dd5efb794456c3814822640939210b39e3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exeFilesize
904KB
MD59fe14ad07deb3ad083114fb75a61e8be
SHA11a77dd3239349b4b35c81b7b0058fa6ac6b6caf0
SHA2560c7410794e9e167b1b725a4a58a5dfc27b01d1030aaaed1342c15e5805090c7b
SHA51212e601f36a1bfa13839ab691f81ba887064840d7d4945148bb11847e55d91b449b8f75cacfbee26d04a8c2613723efecf32011dfaa56791cc772cca09cd7726c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exeFilesize
904KB
MD59fe14ad07deb3ad083114fb75a61e8be
SHA11a77dd3239349b4b35c81b7b0058fa6ac6b6caf0
SHA2560c7410794e9e167b1b725a4a58a5dfc27b01d1030aaaed1342c15e5805090c7b
SHA51212e601f36a1bfa13839ab691f81ba887064840d7d4945148bb11847e55d91b449b8f75cacfbee26d04a8c2613723efecf32011dfaa56791cc772cca09cd7726c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exeFilesize
904KB
MD59fe14ad07deb3ad083114fb75a61e8be
SHA11a77dd3239349b4b35c81b7b0058fa6ac6b6caf0
SHA2560c7410794e9e167b1b725a4a58a5dfc27b01d1030aaaed1342c15e5805090c7b
SHA51212e601f36a1bfa13839ab691f81ba887064840d7d4945148bb11847e55d91b449b8f75cacfbee26d04a8c2613723efecf32011dfaa56791cc772cca09cd7726c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8496343.exeFilesize
306KB
MD5d6379f14b6e52b25d0b4d75166b95cb5
SHA1ab57b99ac1ec7b5abe0d81715faa7a8310a59e74
SHA25657d43ceccf836b6d6e07e1f31d909927d40b7be0778911a42164f2079473e8e5
SHA5122c7570c0759a180006ebcd0ce4284f74802d505ba97c6a0e0d948588a57a2d9fbc373003bb2cf2ed3aeece832c7b898931d3bac651f182733872740435c54a24
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8496343.exeFilesize
306KB
MD5d6379f14b6e52b25d0b4d75166b95cb5
SHA1ab57b99ac1ec7b5abe0d81715faa7a8310a59e74
SHA25657d43ceccf836b6d6e07e1f31d909927d40b7be0778911a42164f2079473e8e5
SHA5122c7570c0759a180006ebcd0ce4284f74802d505ba97c6a0e0d948588a57a2d9fbc373003bb2cf2ed3aeece832c7b898931d3bac651f182733872740435c54a24
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4141883.exeFilesize
185KB
MD5f12019dafbd39dd4e5fc49c3878738e8
SHA17306369f0c2b0d4cb13cb4656f1da908fd0f3276
SHA25675ba4b28060aa7fc8f3c1f13a2ac55742e139eabf762ee34ad1c49bc0a3b2f73
SHA51241affe693019daa49f7df7d09b792e3bdb0756a8517ae74d10e691e6bd5d25b21a399c3bcd95007bef64f07f41a71524cfe19f639bf04e207d581feaf72cbaee
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4141883.exeFilesize
185KB
MD5f12019dafbd39dd4e5fc49c3878738e8
SHA17306369f0c2b0d4cb13cb4656f1da908fd0f3276
SHA25675ba4b28060aa7fc8f3c1f13a2ac55742e139eabf762ee34ad1c49bc0a3b2f73
SHA51241affe693019daa49f7df7d09b792e3bdb0756a8517ae74d10e691e6bd5d25b21a399c3bcd95007bef64f07f41a71524cfe19f639bf04e207d581feaf72cbaee
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1678892.exeFilesize
145KB
MD5265564779b7e9fdc33bd5287e0bdbeef
SHA13fc4769be741c82a3eb77c0e4c3e34f3cc96c664
SHA25650af197b07f7004cf89e3fc1f203234901e1400eedcceb5ab9325cc961b23b0f
SHA5125c687f41b36f6ceacfd1449c7fb909fac8c082383682e0c04f20457ff8117aeafb1765d015382d1d5396ca859337f414ce754aa949be8254bef57c5a0cd9cfc8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1678892.exeFilesize
145KB
MD5265564779b7e9fdc33bd5287e0bdbeef
SHA13fc4769be741c82a3eb77c0e4c3e34f3cc96c664
SHA25650af197b07f7004cf89e3fc1f203234901e1400eedcceb5ab9325cc961b23b0f
SHA5125c687f41b36f6ceacfd1449c7fb909fac8c082383682e0c04f20457ff8117aeafb1765d015382d1d5396ca859337f414ce754aa949be8254bef57c5a0cd9cfc8
-
memory/556-210-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/556-215-0x0000000000360000-0x0000000000360000-memory.dmp
-
memory/1068-195-0x0000000007680000-0x0000000007690000-memory.dmpFilesize
64KB
-
memory/1068-194-0x0000000000820000-0x0000000000908000-memory.dmpFilesize
928KB
-
memory/1784-190-0x00000000001D0000-0x00000000001FA000-memory.dmpFilesize
168KB
-
memory/2244-205-0x00000000050A0000-0x00000000051AA000-memory.dmpFilesize
1.0MB
-
memory/2244-204-0x0000000005540000-0x0000000005B58000-memory.dmpFilesize
6.1MB
-
memory/2244-220-0x0000000005020000-0x0000000005030000-memory.dmpFilesize
64KB
-
memory/2244-219-0x0000000006810000-0x0000000006860000-memory.dmpFilesize
320KB
-
memory/2244-218-0x0000000006A60000-0x0000000006AD6000-memory.dmpFilesize
472KB
-
memory/2244-217-0x0000000006F90000-0x00000000074BC000-memory.dmpFilesize
5.2MB
-
memory/2244-216-0x0000000006890000-0x0000000006A52000-memory.dmpFilesize
1.8MB
-
memory/2244-214-0x0000000005410000-0x0000000005476000-memory.dmpFilesize
408KB
-
memory/2244-213-0x0000000005370000-0x0000000005402000-memory.dmpFilesize
584KB
-
memory/2244-209-0x00000000051B0000-0x00000000051EC000-memory.dmpFilesize
240KB
-
memory/2244-208-0x0000000005020000-0x0000000005030000-memory.dmpFilesize
64KB
-
memory/2244-206-0x0000000004FD0000-0x0000000004FE2000-memory.dmpFilesize
72KB
-
memory/2244-196-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2388-155-0x0000000002090000-0x00000000020A0000-memory.dmpFilesize
64KB
-
memory/2388-156-0x0000000002090000-0x00000000020A0000-memory.dmpFilesize
64KB
-
memory/2388-159-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-158-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-181-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-163-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-157-0x0000000004920000-0x0000000004EC4000-memory.dmpFilesize
5.6MB
-
memory/2388-165-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-183-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-167-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-169-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-161-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-179-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-171-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-173-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-154-0x0000000002090000-0x00000000020A0000-memory.dmpFilesize
64KB
-
memory/2388-175-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-177-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/2388-185-0x0000000004F20000-0x0000000004F36000-memory.dmpFilesize
88KB
-
memory/3380-207-0x0000000007430000-0x0000000007440000-memory.dmpFilesize
64KB
-
memory/3380-203-0x0000000000580000-0x0000000000676000-memory.dmpFilesize
984KB