Analysis
-
max time kernel
22s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2023 18:35
Static task
static1
Behavioral task
behavioral1
Sample
d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe
Resource
win10v2004-20230220-en
General
-
Target
d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe
-
Size
1.1MB
-
MD5
99cffc50dc9723da1447dad74d857869
-
SHA1
c11f5cc74573bf88f94850971325aa403710999d
-
SHA256
d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c
-
SHA512
ac21cba6a8c952b1f9ddb366fe7e093a4370ccbf7b65f79c44b7bdeb3afd785af528566be5adaf6e9d762d6238e82c58ea75ab8ce64c3c1957dd1ea792664926
-
SSDEEP
24576:gyOWoswTawkf4d4xXN1ohn2O5Rrh9lEAdZ:nr2Mf4ixjOrrbiAd
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Signatures
-
Processes:
o6773488.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6773488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6773488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6773488.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o6773488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6773488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6773488.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z7042802.exez6454129.exeo6773488.exep1280462.exepid process 1752 z7042802.exe 988 z6454129.exe 1488 o6773488.exe 1600 p1280462.exe -
Loads dropped DLL 13 IoCs
Processes:
d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exez7042802.exez6454129.exeo6773488.exep1280462.exeWerFault.exepid process 2028 d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe 1752 z7042802.exe 1752 z7042802.exe 988 z6454129.exe 988 z6454129.exe 1488 o6773488.exe 988 z6454129.exe 1600 p1280462.exe 1984 WerFault.exe 1984 WerFault.exe 1984 WerFault.exe 1984 WerFault.exe 1984 WerFault.exe -
Processes:
o6773488.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features o6773488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6773488.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exez7042802.exez6454129.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7042802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7042802.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6454129.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6454129.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1984 1600 WerFault.exe p1280462.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
o6773488.exepid process 1488 o6773488.exe 1488 o6773488.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
o6773488.exedescription pid process Token: SeDebugPrivilege 1488 o6773488.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exez7042802.exez6454129.exep1280462.exedescription pid process target process PID 2028 wrote to memory of 1752 2028 d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe z7042802.exe PID 2028 wrote to memory of 1752 2028 d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe z7042802.exe PID 2028 wrote to memory of 1752 2028 d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe z7042802.exe PID 2028 wrote to memory of 1752 2028 d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe z7042802.exe PID 2028 wrote to memory of 1752 2028 d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe z7042802.exe PID 2028 wrote to memory of 1752 2028 d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe z7042802.exe PID 2028 wrote to memory of 1752 2028 d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe z7042802.exe PID 1752 wrote to memory of 988 1752 z7042802.exe z6454129.exe PID 1752 wrote to memory of 988 1752 z7042802.exe z6454129.exe PID 1752 wrote to memory of 988 1752 z7042802.exe z6454129.exe PID 1752 wrote to memory of 988 1752 z7042802.exe z6454129.exe PID 1752 wrote to memory of 988 1752 z7042802.exe z6454129.exe PID 1752 wrote to memory of 988 1752 z7042802.exe z6454129.exe PID 1752 wrote to memory of 988 1752 z7042802.exe z6454129.exe PID 988 wrote to memory of 1488 988 z6454129.exe o6773488.exe PID 988 wrote to memory of 1488 988 z6454129.exe o6773488.exe PID 988 wrote to memory of 1488 988 z6454129.exe o6773488.exe PID 988 wrote to memory of 1488 988 z6454129.exe o6773488.exe PID 988 wrote to memory of 1488 988 z6454129.exe o6773488.exe PID 988 wrote to memory of 1488 988 z6454129.exe o6773488.exe PID 988 wrote to memory of 1488 988 z6454129.exe o6773488.exe PID 988 wrote to memory of 1600 988 z6454129.exe p1280462.exe PID 988 wrote to memory of 1600 988 z6454129.exe p1280462.exe PID 988 wrote to memory of 1600 988 z6454129.exe p1280462.exe PID 988 wrote to memory of 1600 988 z6454129.exe p1280462.exe PID 988 wrote to memory of 1600 988 z6454129.exe p1280462.exe PID 988 wrote to memory of 1600 988 z6454129.exe p1280462.exe PID 988 wrote to memory of 1600 988 z6454129.exe p1280462.exe PID 1600 wrote to memory of 1984 1600 p1280462.exe WerFault.exe PID 1600 wrote to memory of 1984 1600 p1280462.exe WerFault.exe PID 1600 wrote to memory of 1984 1600 p1280462.exe WerFault.exe PID 1600 wrote to memory of 1984 1600 p1280462.exe WerFault.exe PID 1600 wrote to memory of 1984 1600 p1280462.exe WerFault.exe PID 1600 wrote to memory of 1984 1600 p1280462.exe WerFault.exe PID 1600 wrote to memory of 1984 1600 p1280462.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe"C:\Users\Admin\AppData\Local\Temp\d89994b944d7f411b207f0d39b39f5310b6c8bae77561fb48a30c71449fc559c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7042802.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7042802.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6454129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6454129.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6773488.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6773488.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 6405⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7042802.exeFilesize
702KB
MD529e4f24a93d126f59c0a32b9b6e6eb2e
SHA1f0b8e26922d47c880416be94003ebc641839cb28
SHA256b48bfaeedc90a8e1d9139e17109dcffceafe58efcafc3d895a133f662f21140d
SHA5121343b6aee57722b480b3818becea1a5cd8e9546fb974229145f634beffe394723c655995eca433593b1eac0c7fbd07cc921f64c3ed305f0839e3e671fe404e31
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7042802.exeFilesize
702KB
MD529e4f24a93d126f59c0a32b9b6e6eb2e
SHA1f0b8e26922d47c880416be94003ebc641839cb28
SHA256b48bfaeedc90a8e1d9139e17109dcffceafe58efcafc3d895a133f662f21140d
SHA5121343b6aee57722b480b3818becea1a5cd8e9546fb974229145f634beffe394723c655995eca433593b1eac0c7fbd07cc921f64c3ed305f0839e3e671fe404e31
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6454129.exeFilesize
306KB
MD55f57a80555cbcc8747ae59985ad4994f
SHA11c90d79976125670cfd0bbcd7f145d618080a248
SHA256d9ddfde7fe2ab93491f1e21f0c1245e05f7537ef9b7ed27348bc533c3d3de79c
SHA512596497b1731d5c8c9cf24b1c6c6ea0f622d3ed4abc33a0fb1d5e87f72a6d125f54bab3596e52a669869486239797dae0eb885427a8e08e0bedae216adddaa363
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6454129.exeFilesize
306KB
MD55f57a80555cbcc8747ae59985ad4994f
SHA11c90d79976125670cfd0bbcd7f145d618080a248
SHA256d9ddfde7fe2ab93491f1e21f0c1245e05f7537ef9b7ed27348bc533c3d3de79c
SHA512596497b1731d5c8c9cf24b1c6c6ea0f622d3ed4abc33a0fb1d5e87f72a6d125f54bab3596e52a669869486239797dae0eb885427a8e08e0bedae216adddaa363
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6773488.exeFilesize
185KB
MD53846fea70c0bdc16a08efd53d014db29
SHA14743f19c4509c641d068da1f3bd9d9cef9489777
SHA256ace17bb3b601702dd6911a1015d353d1d4ba3ef42aa61d635709b99611488d6c
SHA51279d2f308c1b352316efbef09072f8fa9c407dc1affa3c8eb03f590069398595a919863d17743f9c738065c357c49361d4f1b4d7f1e44f17792151047dd596b98
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6773488.exeFilesize
185KB
MD53846fea70c0bdc16a08efd53d014db29
SHA14743f19c4509c641d068da1f3bd9d9cef9489777
SHA256ace17bb3b601702dd6911a1015d353d1d4ba3ef42aa61d635709b99611488d6c
SHA51279d2f308c1b352316efbef09072f8fa9c407dc1affa3c8eb03f590069398595a919863d17743f9c738065c357c49361d4f1b4d7f1e44f17792151047dd596b98
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7042802.exeFilesize
702KB
MD529e4f24a93d126f59c0a32b9b6e6eb2e
SHA1f0b8e26922d47c880416be94003ebc641839cb28
SHA256b48bfaeedc90a8e1d9139e17109dcffceafe58efcafc3d895a133f662f21140d
SHA5121343b6aee57722b480b3818becea1a5cd8e9546fb974229145f634beffe394723c655995eca433593b1eac0c7fbd07cc921f64c3ed305f0839e3e671fe404e31
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7042802.exeFilesize
702KB
MD529e4f24a93d126f59c0a32b9b6e6eb2e
SHA1f0b8e26922d47c880416be94003ebc641839cb28
SHA256b48bfaeedc90a8e1d9139e17109dcffceafe58efcafc3d895a133f662f21140d
SHA5121343b6aee57722b480b3818becea1a5cd8e9546fb974229145f634beffe394723c655995eca433593b1eac0c7fbd07cc921f64c3ed305f0839e3e671fe404e31
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6454129.exeFilesize
306KB
MD55f57a80555cbcc8747ae59985ad4994f
SHA11c90d79976125670cfd0bbcd7f145d618080a248
SHA256d9ddfde7fe2ab93491f1e21f0c1245e05f7537ef9b7ed27348bc533c3d3de79c
SHA512596497b1731d5c8c9cf24b1c6c6ea0f622d3ed4abc33a0fb1d5e87f72a6d125f54bab3596e52a669869486239797dae0eb885427a8e08e0bedae216adddaa363
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6454129.exeFilesize
306KB
MD55f57a80555cbcc8747ae59985ad4994f
SHA11c90d79976125670cfd0bbcd7f145d618080a248
SHA256d9ddfde7fe2ab93491f1e21f0c1245e05f7537ef9b7ed27348bc533c3d3de79c
SHA512596497b1731d5c8c9cf24b1c6c6ea0f622d3ed4abc33a0fb1d5e87f72a6d125f54bab3596e52a669869486239797dae0eb885427a8e08e0bedae216adddaa363
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6773488.exeFilesize
185KB
MD53846fea70c0bdc16a08efd53d014db29
SHA14743f19c4509c641d068da1f3bd9d9cef9489777
SHA256ace17bb3b601702dd6911a1015d353d1d4ba3ef42aa61d635709b99611488d6c
SHA51279d2f308c1b352316efbef09072f8fa9c407dc1affa3c8eb03f590069398595a919863d17743f9c738065c357c49361d4f1b4d7f1e44f17792151047dd596b98
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6773488.exeFilesize
185KB
MD53846fea70c0bdc16a08efd53d014db29
SHA14743f19c4509c641d068da1f3bd9d9cef9489777
SHA256ace17bb3b601702dd6911a1015d353d1d4ba3ef42aa61d635709b99611488d6c
SHA51279d2f308c1b352316efbef09072f8fa9c407dc1affa3c8eb03f590069398595a919863d17743f9c738065c357c49361d4f1b4d7f1e44f17792151047dd596b98
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1280462.exeFilesize
145KB
MD5a2500426cadfd5b3de777b8b7f0f2e45
SHA13ec3cf5c69a84b0f10e74942b6b1971907c85b7a
SHA25613a30adf2973469fa023efe2cd20e70eb5eed52bffac01889661d947c4616ff7
SHA512be216c061b89094f2adafdf916335af3adc310daa3a652be661b1422f1c42b68b98264d77f73cc127eb0e95d281a96da1926bbdf90043667f4c84a3646a8255f
-
memory/1488-99-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-115-0x0000000004980000-0x00000000049C0000-memory.dmpFilesize
256KB
-
memory/1488-103-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-105-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-107-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-109-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-111-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-113-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-114-0x0000000004980000-0x00000000049C0000-memory.dmpFilesize
256KB
-
memory/1488-101-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-97-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-95-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-93-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-91-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-84-0x0000000000B00000-0x0000000000B1E000-memory.dmpFilesize
120KB
-
memory/1488-89-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-86-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-87-0x0000000000B20000-0x0000000000B36000-memory.dmpFilesize
88KB
-
memory/1488-85-0x0000000000B20000-0x0000000000B3C000-memory.dmpFilesize
112KB
-
memory/1600-122-0x00000000011C0000-0x00000000011EA000-memory.dmpFilesize
168KB