Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 18:31
Static task
static1
Behavioral task
behavioral1
Sample
bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe
Resource
win10v2004-20230220-en
General
-
Target
bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe
-
Size
1.1MB
-
MD5
a3e444c321fd9235a9559a1776cc5c88
-
SHA1
a5a975a094eba5185aa58cd0964386f174890c3d
-
SHA256
bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49
-
SHA512
e043efc95a8761b49829c4d7400a2869efb8eb2f472e0c30b5d89bd40c9b1c32ee5589aee2767ef6b218b994ddcb2fdd843cbf6700970ff90740b7af899d53d1
-
SSDEEP
24576:Zy54jzHvEhSdRlYO5LqzCpkqlFvViA3ySCjrp0nphHNWH:M4DEsjY8qzCpkqlTiA3yS869I
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Signatures
-
Processes:
o0838919.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o0838919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o0838919.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o0838919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o0838919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o0838919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o0838919.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
Processes:
z6821605.exez1924202.exeo0838919.exep8814458.exer8336394.exer8336394.exes5915211.exes5915211.exes5915211.exepid process 3824 z6821605.exe 1556 z1924202.exe 1268 o0838919.exe 4972 p8814458.exe 5060 r8336394.exe 2792 r8336394.exe 724 s5915211.exe 4056 s5915211.exe 772 s5915211.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
o0838919.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o0838919.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o0838919.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exez6821605.exez1924202.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6821605.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6821605.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1924202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1924202.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
r8336394.exes5915211.exedescription pid process target process PID 5060 set thread context of 2792 5060 r8336394.exe r8336394.exe PID 724 set thread context of 772 724 s5915211.exe s5915211.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1348 4972 WerFault.exe p8814458.exe 2232 772 WerFault.exe s5915211.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
o0838919.exer8336394.exepid process 1268 o0838919.exe 1268 o0838919.exe 2792 r8336394.exe 2792 r8336394.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
o0838919.exer8336394.exes5915211.exer8336394.exedescription pid process Token: SeDebugPrivilege 1268 o0838919.exe Token: SeDebugPrivilege 5060 r8336394.exe Token: SeDebugPrivilege 724 s5915211.exe Token: SeDebugPrivilege 2792 r8336394.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
s5915211.exepid process 772 s5915211.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exez6821605.exez1924202.exer8336394.exes5915211.exedescription pid process target process PID 1808 wrote to memory of 3824 1808 bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe z6821605.exe PID 1808 wrote to memory of 3824 1808 bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe z6821605.exe PID 1808 wrote to memory of 3824 1808 bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe z6821605.exe PID 3824 wrote to memory of 1556 3824 z6821605.exe z1924202.exe PID 3824 wrote to memory of 1556 3824 z6821605.exe z1924202.exe PID 3824 wrote to memory of 1556 3824 z6821605.exe z1924202.exe PID 1556 wrote to memory of 1268 1556 z1924202.exe o0838919.exe PID 1556 wrote to memory of 1268 1556 z1924202.exe o0838919.exe PID 1556 wrote to memory of 1268 1556 z1924202.exe o0838919.exe PID 1556 wrote to memory of 4972 1556 z1924202.exe p8814458.exe PID 1556 wrote to memory of 4972 1556 z1924202.exe p8814458.exe PID 1556 wrote to memory of 4972 1556 z1924202.exe p8814458.exe PID 3824 wrote to memory of 5060 3824 z6821605.exe r8336394.exe PID 3824 wrote to memory of 5060 3824 z6821605.exe r8336394.exe PID 3824 wrote to memory of 5060 3824 z6821605.exe r8336394.exe PID 5060 wrote to memory of 2792 5060 r8336394.exe r8336394.exe PID 5060 wrote to memory of 2792 5060 r8336394.exe r8336394.exe PID 5060 wrote to memory of 2792 5060 r8336394.exe r8336394.exe PID 5060 wrote to memory of 2792 5060 r8336394.exe r8336394.exe PID 5060 wrote to memory of 2792 5060 r8336394.exe r8336394.exe PID 5060 wrote to memory of 2792 5060 r8336394.exe r8336394.exe PID 5060 wrote to memory of 2792 5060 r8336394.exe r8336394.exe PID 5060 wrote to memory of 2792 5060 r8336394.exe r8336394.exe PID 1808 wrote to memory of 724 1808 bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe s5915211.exe PID 1808 wrote to memory of 724 1808 bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe s5915211.exe PID 1808 wrote to memory of 724 1808 bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe s5915211.exe PID 724 wrote to memory of 4056 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 4056 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 4056 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 4056 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe PID 724 wrote to memory of 772 724 s5915211.exe s5915211.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe"C:\Users\Admin\AppData\Local\Temp\bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6821605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6821605.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924202.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924202.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0838919.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0838919.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8814458.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8814458.exe4⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 9285⤵
- Program crash
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe3⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 124⤵
- Program crash
PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4972 -ip 49721⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 772 -ip 7721⤵PID:2072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r8336394.exe.logFilesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exeFilesize
961KB
MD5956379c5c365761e4c802d99cec8f0a1
SHA1f4345e01ecc36df452cda5728c7aa6c38f0cb444
SHA256a22566972b71f6c4180324c24580f87cd9d0dd2ada59bef4da88669d53f8358c
SHA5124576b706d1041ace1edf035cc27738268d051d37dd39f06ab1ca0b42e8f18bde36aa3258957efd155ef24a896a28ce217521cda00ffbe47c1a5e15d5abecd0ac
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exeFilesize
961KB
MD5956379c5c365761e4c802d99cec8f0a1
SHA1f4345e01ecc36df452cda5728c7aa6c38f0cb444
SHA256a22566972b71f6c4180324c24580f87cd9d0dd2ada59bef4da88669d53f8358c
SHA5124576b706d1041ace1edf035cc27738268d051d37dd39f06ab1ca0b42e8f18bde36aa3258957efd155ef24a896a28ce217521cda00ffbe47c1a5e15d5abecd0ac
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exeFilesize
961KB
MD5956379c5c365761e4c802d99cec8f0a1
SHA1f4345e01ecc36df452cda5728c7aa6c38f0cb444
SHA256a22566972b71f6c4180324c24580f87cd9d0dd2ada59bef4da88669d53f8358c
SHA5124576b706d1041ace1edf035cc27738268d051d37dd39f06ab1ca0b42e8f18bde36aa3258957efd155ef24a896a28ce217521cda00ffbe47c1a5e15d5abecd0ac
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exeFilesize
961KB
MD5956379c5c365761e4c802d99cec8f0a1
SHA1f4345e01ecc36df452cda5728c7aa6c38f0cb444
SHA256a22566972b71f6c4180324c24580f87cd9d0dd2ada59bef4da88669d53f8358c
SHA5124576b706d1041ace1edf035cc27738268d051d37dd39f06ab1ca0b42e8f18bde36aa3258957efd155ef24a896a28ce217521cda00ffbe47c1a5e15d5abecd0ac
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6821605.exeFilesize
702KB
MD547a5e61a5043e6fefb729decdd58f325
SHA115c106a33b533e6d6245aacf9b03bd53a6d6884b
SHA256fc0b7f9abdd019dd374b15c3305ed686554ed14874114234524b7ccc38538b06
SHA5120b64d9e13689b1a9f107c7977d63adc3734f026be7fcbd94fc95c1cad87abff2e93154295a95704a16e2a318d7a5fa26f9e8aa6298c5aa3239527d8a85bde799
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6821605.exeFilesize
702KB
MD547a5e61a5043e6fefb729decdd58f325
SHA115c106a33b533e6d6245aacf9b03bd53a6d6884b
SHA256fc0b7f9abdd019dd374b15c3305ed686554ed14874114234524b7ccc38538b06
SHA5120b64d9e13689b1a9f107c7977d63adc3734f026be7fcbd94fc95c1cad87abff2e93154295a95704a16e2a318d7a5fa26f9e8aa6298c5aa3239527d8a85bde799
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exeFilesize
904KB
MD5f94ec4a4e67d1257b07b45abaa1090b5
SHA16e36f82a37ec0af39464b1f005687370b62050d6
SHA256785ffd1c2db552557b294a70fb8a2187b774cac1b47f482e1789b8c002afff30
SHA512b1375a3f5486b4a21cf20ae97f05cf7e95d524e53b8555ff6f4f3022498192470e12a29e8d1a12c7317c8d0c98fd8466730a2ddb132330b553ef7d0109f7e629
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exeFilesize
904KB
MD5f94ec4a4e67d1257b07b45abaa1090b5
SHA16e36f82a37ec0af39464b1f005687370b62050d6
SHA256785ffd1c2db552557b294a70fb8a2187b774cac1b47f482e1789b8c002afff30
SHA512b1375a3f5486b4a21cf20ae97f05cf7e95d524e53b8555ff6f4f3022498192470e12a29e8d1a12c7317c8d0c98fd8466730a2ddb132330b553ef7d0109f7e629
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exeFilesize
904KB
MD5f94ec4a4e67d1257b07b45abaa1090b5
SHA16e36f82a37ec0af39464b1f005687370b62050d6
SHA256785ffd1c2db552557b294a70fb8a2187b774cac1b47f482e1789b8c002afff30
SHA512b1375a3f5486b4a21cf20ae97f05cf7e95d524e53b8555ff6f4f3022498192470e12a29e8d1a12c7317c8d0c98fd8466730a2ddb132330b553ef7d0109f7e629
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924202.exeFilesize
306KB
MD5ef6fb5670c7e65b15e2832333fe25ae7
SHA142fb9f913012ee4e6231e670b5b65ad182ff8c6e
SHA2565fbc81637284c876c1a8fd270e2d67338e82f3ef85ad174e5623224e7118248a
SHA5125a6cc5c549f7038300d0d4595f00b31996974367015cf3edc14fc3fb08424d6ba2bc432f14b2702fdba0c013aadd3a3e8cd199fd1823eec0d8d7e2b4c581bb84
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924202.exeFilesize
306KB
MD5ef6fb5670c7e65b15e2832333fe25ae7
SHA142fb9f913012ee4e6231e670b5b65ad182ff8c6e
SHA2565fbc81637284c876c1a8fd270e2d67338e82f3ef85ad174e5623224e7118248a
SHA5125a6cc5c549f7038300d0d4595f00b31996974367015cf3edc14fc3fb08424d6ba2bc432f14b2702fdba0c013aadd3a3e8cd199fd1823eec0d8d7e2b4c581bb84
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0838919.exeFilesize
184KB
MD5a5df408c6e0485b2a91bf8357fd2b4a1
SHA16f63202577450c0b702508bcb820db760a3831f7
SHA256d73092a4be110dc36fb1593e2a089b5758175c080894ecc964d16a3363a966bc
SHA512ce3166f2051acd6ebb5a609e292c13f843d65094b26429dfa1d62cf4e5931071b16a9b959a5d5ccca6d0e7b15359eb76941a17cf9d3e17358d0509d519d9c900
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0838919.exeFilesize
184KB
MD5a5df408c6e0485b2a91bf8357fd2b4a1
SHA16f63202577450c0b702508bcb820db760a3831f7
SHA256d73092a4be110dc36fb1593e2a089b5758175c080894ecc964d16a3363a966bc
SHA512ce3166f2051acd6ebb5a609e292c13f843d65094b26429dfa1d62cf4e5931071b16a9b959a5d5ccca6d0e7b15359eb76941a17cf9d3e17358d0509d519d9c900
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8814458.exeFilesize
145KB
MD5bbf6aeb0afa97e2b71cc1ea537242a88
SHA18de88940114300c8922b57004cd8a85d243e3bf2
SHA256ceecaa29c38748b532a77b70966d5e2d1117cebe26633cfc32dc3d83e892ae2b
SHA512a3a0941e84e68a2cc201bf3ec88159e53f28c128723a15bc5e8aad166d23cba6d5d5924fc0cfe8bd7379145b28a2baeaa5666ae855b72a96c18577bb6e89e348
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8814458.exeFilesize
145KB
MD5bbf6aeb0afa97e2b71cc1ea537242a88
SHA18de88940114300c8922b57004cd8a85d243e3bf2
SHA256ceecaa29c38748b532a77b70966d5e2d1117cebe26633cfc32dc3d83e892ae2b
SHA512a3a0941e84e68a2cc201bf3ec88159e53f28c128723a15bc5e8aad166d23cba6d5d5924fc0cfe8bd7379145b28a2baeaa5666ae855b72a96c18577bb6e89e348
-
memory/724-205-0x0000000000740000-0x0000000000836000-memory.dmpFilesize
984KB
-
memory/724-208-0x00000000074A0000-0x00000000074B0000-memory.dmpFilesize
64KB
-
memory/772-213-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/772-220-0x00000000003E0000-0x00000000003E0000-memory.dmp
-
memory/1268-165-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-171-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-181-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-183-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-185-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-186-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/1268-187-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/1268-177-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-175-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-154-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/1268-173-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-158-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-156-0x0000000004C90000-0x0000000005234000-memory.dmpFilesize
5.6MB
-
memory/1268-155-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/1268-157-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/1268-169-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-167-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-163-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-159-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-161-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/1268-179-0x0000000004AC0000-0x0000000004AD6000-memory.dmpFilesize
88KB
-
memory/2792-211-0x0000000005BE0000-0x0000000005BF0000-memory.dmpFilesize
64KB
-
memory/2792-218-0x00000000072B0000-0x0000000007472000-memory.dmpFilesize
1.8MB
-
memory/2792-209-0x00000000058D0000-0x00000000058E2000-memory.dmpFilesize
72KB
-
memory/2792-210-0x0000000005930000-0x000000000596C000-memory.dmpFilesize
240KB
-
memory/2792-206-0x0000000005E20000-0x0000000006438000-memory.dmpFilesize
6.1MB
-
memory/2792-198-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2792-222-0x0000000006C10000-0x0000000006C60000-memory.dmpFilesize
320KB
-
memory/2792-221-0x0000000006B90000-0x0000000006C06000-memory.dmpFilesize
472KB
-
memory/2792-216-0x0000000005C60000-0x0000000005CC6000-memory.dmpFilesize
408KB
-
memory/2792-217-0x0000000006830000-0x00000000068C2000-memory.dmpFilesize
584KB
-
memory/2792-207-0x00000000059A0000-0x0000000005AAA000-memory.dmpFilesize
1.0MB
-
memory/2792-219-0x00000000079B0000-0x0000000007EDC000-memory.dmpFilesize
5.2MB
-
memory/4972-192-0x0000000000160000-0x000000000018A000-memory.dmpFilesize
168KB
-
memory/5060-196-0x0000000000930000-0x0000000000A18000-memory.dmpFilesize
928KB
-
memory/5060-197-0x0000000007730000-0x0000000007740000-memory.dmpFilesize
64KB