Analysis
-
max time kernel
53s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
29-05-2023 19:48
Static task
static1
Behavioral task
behavioral1
Sample
0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe
Resource
win10-20230220-en
General
-
Target
0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe
-
Size
1.0MB
-
MD5
1d8d742b93374e16cbed4c8c771852da
-
SHA1
4207f27f8e96d5ca9fcd64a31593dfe7bf329f3b
-
SHA256
0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c
-
SHA512
26805be67dc064186530dfc041700d68a0a5c001a04c41e09ec89a9995dd31cd4490d9acef17d150b2e71d42130d761117e11c8d7bd8995f7e28c60a991f2d5a
-
SSDEEP
24576:TyoEx6qI4yj031G7VJJcFifCUA/qbJqRzRSQd0Ytdm7k8+OE:mzx5m44jJriqbgzR3Xv8Z
Malware Config
Extracted
redline
lizsa
83.97.73.127:19045
-
auth_value
44b0b71b36e78465dbdebb4ecfb78b77
Extracted
redline
metro
83.97.73.127:19045
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
Processes:
z6701710.exez5387932.exeo1547593.exep4225729.exer0874095.exes2102314.exes2102314.exes2102314.exepid process 2544 z6701710.exe 2604 z5387932.exe 4372 o1547593.exe 4132 p4225729.exe 5056 r0874095.exe 748 s2102314.exe 4708 s2102314.exe 4856 s2102314.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exez6701710.exez5387932.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6701710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6701710.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5387932.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5387932.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
o1547593.exer0874095.exes2102314.exedescription pid process target process PID 4372 set thread context of 4764 4372 o1547593.exe AppLaunch.exe PID 5056 set thread context of 5096 5056 r0874095.exe AppLaunch.exe PID 748 set thread context of 4856 748 s2102314.exe s2102314.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4448 4856 WerFault.exe s2102314.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
AppLaunch.exep4225729.exeAppLaunch.exepid process 4764 AppLaunch.exe 4764 AppLaunch.exe 4132 p4225729.exe 4132 p4225729.exe 5096 AppLaunch.exe 5096 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AppLaunch.exep4225729.exes2102314.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4764 AppLaunch.exe Token: SeDebugPrivilege 4132 p4225729.exe Token: SeDebugPrivilege 748 s2102314.exe Token: SeDebugPrivilege 5096 AppLaunch.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exez6701710.exez5387932.exeo1547593.exer0874095.exes2102314.exedescription pid process target process PID 2484 wrote to memory of 2544 2484 0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe z6701710.exe PID 2484 wrote to memory of 2544 2484 0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe z6701710.exe PID 2484 wrote to memory of 2544 2484 0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe z6701710.exe PID 2544 wrote to memory of 2604 2544 z6701710.exe z5387932.exe PID 2544 wrote to memory of 2604 2544 z6701710.exe z5387932.exe PID 2544 wrote to memory of 2604 2544 z6701710.exe z5387932.exe PID 2604 wrote to memory of 4372 2604 z5387932.exe o1547593.exe PID 2604 wrote to memory of 4372 2604 z5387932.exe o1547593.exe PID 2604 wrote to memory of 4372 2604 z5387932.exe o1547593.exe PID 4372 wrote to memory of 4764 4372 o1547593.exe AppLaunch.exe PID 4372 wrote to memory of 4764 4372 o1547593.exe AppLaunch.exe PID 4372 wrote to memory of 4764 4372 o1547593.exe AppLaunch.exe PID 4372 wrote to memory of 4764 4372 o1547593.exe AppLaunch.exe PID 4372 wrote to memory of 4764 4372 o1547593.exe AppLaunch.exe PID 2604 wrote to memory of 4132 2604 z5387932.exe p4225729.exe PID 2604 wrote to memory of 4132 2604 z5387932.exe p4225729.exe PID 2604 wrote to memory of 4132 2604 z5387932.exe p4225729.exe PID 2544 wrote to memory of 5056 2544 z6701710.exe r0874095.exe PID 2544 wrote to memory of 5056 2544 z6701710.exe r0874095.exe PID 2544 wrote to memory of 5056 2544 z6701710.exe r0874095.exe PID 5056 wrote to memory of 5096 5056 r0874095.exe AppLaunch.exe PID 5056 wrote to memory of 5096 5056 r0874095.exe AppLaunch.exe PID 5056 wrote to memory of 5096 5056 r0874095.exe AppLaunch.exe PID 5056 wrote to memory of 5096 5056 r0874095.exe AppLaunch.exe PID 5056 wrote to memory of 5096 5056 r0874095.exe AppLaunch.exe PID 2484 wrote to memory of 748 2484 0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe s2102314.exe PID 2484 wrote to memory of 748 2484 0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe s2102314.exe PID 2484 wrote to memory of 748 2484 0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe s2102314.exe PID 748 wrote to memory of 4708 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4708 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4708 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4708 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe PID 748 wrote to memory of 4856 748 s2102314.exe s2102314.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe"C:\Users\Admin\AppData\Local\Temp\0f07d2670e82f839956921cf904d51a3c98dbbf2c49658ed58c3863f9e3d105c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701710.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5387932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5387932.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1547593.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1547593.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4225729.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4225729.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0874095.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0874095.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 244⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.logFilesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exeFilesize
964KB
MD59f1aca229894077d71b0328c62d1d4b9
SHA1e4164b80949e20f2e838de1574fc86cb06e3b546
SHA25696a468862820c7c9ddca61579ef0881c6b9c6e04114953c9d65ee928757d4154
SHA512e46b49287660691dd66da71d0aa32e26e25b892825928a58ecfbdbc1ef30747f352856243f4b14bce99d4d7dd9d8a90b7d288ccc027350f8b239934cbb1b2468
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exeFilesize
964KB
MD59f1aca229894077d71b0328c62d1d4b9
SHA1e4164b80949e20f2e838de1574fc86cb06e3b546
SHA25696a468862820c7c9ddca61579ef0881c6b9c6e04114953c9d65ee928757d4154
SHA512e46b49287660691dd66da71d0aa32e26e25b892825928a58ecfbdbc1ef30747f352856243f4b14bce99d4d7dd9d8a90b7d288ccc027350f8b239934cbb1b2468
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exeFilesize
964KB
MD59f1aca229894077d71b0328c62d1d4b9
SHA1e4164b80949e20f2e838de1574fc86cb06e3b546
SHA25696a468862820c7c9ddca61579ef0881c6b9c6e04114953c9d65ee928757d4154
SHA512e46b49287660691dd66da71d0aa32e26e25b892825928a58ecfbdbc1ef30747f352856243f4b14bce99d4d7dd9d8a90b7d288ccc027350f8b239934cbb1b2468
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2102314.exeFilesize
964KB
MD59f1aca229894077d71b0328c62d1d4b9
SHA1e4164b80949e20f2e838de1574fc86cb06e3b546
SHA25696a468862820c7c9ddca61579ef0881c6b9c6e04114953c9d65ee928757d4154
SHA512e46b49287660691dd66da71d0aa32e26e25b892825928a58ecfbdbc1ef30747f352856243f4b14bce99d4d7dd9d8a90b7d288ccc027350f8b239934cbb1b2468
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701710.exeFilesize
617KB
MD56c2db9d00c8b374d4e498de5ed7db5a9
SHA1e47378658b0018843bb037218fc3fb2c14d11547
SHA25654ab029f921a3c3cb05514a8d84125e042d70690ab50cffbcc7b5f9e3ef8c0f0
SHA5123d81f958f45f2774e1a926c1a2b2395c90aa4141d35b7517f7fb61218b693a2a46bbc58f548e138f79faa5a408e005eab7a62e464d4546e673d9a2f44c613f41
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701710.exeFilesize
617KB
MD56c2db9d00c8b374d4e498de5ed7db5a9
SHA1e47378658b0018843bb037218fc3fb2c14d11547
SHA25654ab029f921a3c3cb05514a8d84125e042d70690ab50cffbcc7b5f9e3ef8c0f0
SHA5123d81f958f45f2774e1a926c1a2b2395c90aa4141d35b7517f7fb61218b693a2a46bbc58f548e138f79faa5a408e005eab7a62e464d4546e673d9a2f44c613f41
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0874095.exeFilesize
321KB
MD56eeb89d92dc64f3386540ecf964056dc
SHA12bc8c3e5f5dc402ab745efbf958218cb78055aa4
SHA25628eb8aab79cdbce6472b08ebaeb817bd4e8b6ac61aa255c0d8aef7d5696103a0
SHA51212134939e0329cbff809a30a4481b6b667c4d84033e8cda0e0878fc1917589bd653e472538a5d9829477e5892d7fbe4f71713d133be396515879c1abcb33e118
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0874095.exeFilesize
321KB
MD56eeb89d92dc64f3386540ecf964056dc
SHA12bc8c3e5f5dc402ab745efbf958218cb78055aa4
SHA25628eb8aab79cdbce6472b08ebaeb817bd4e8b6ac61aa255c0d8aef7d5696103a0
SHA51212134939e0329cbff809a30a4481b6b667c4d84033e8cda0e0878fc1917589bd653e472538a5d9829477e5892d7fbe4f71713d133be396515879c1abcb33e118
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5387932.exeFilesize
282KB
MD5e8fe72eb9ca628ab79d3d418309163f3
SHA1b2fb3eaac5e1ecae0228d53811d1436e7a4018be
SHA25609b4160d057b6616eae4697ef62ae1354b71625684569e3db3a338236ca6e4ad
SHA5128d71b9ab0a424fe973379fee5a5656b576a0a11455ebb733e09b46dba94ce64fc7861864b5fc574c769b18af6f7cf8ba117e24695b974bcb8ce2a1b4d645c7bf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5387932.exeFilesize
282KB
MD5e8fe72eb9ca628ab79d3d418309163f3
SHA1b2fb3eaac5e1ecae0228d53811d1436e7a4018be
SHA25609b4160d057b6616eae4697ef62ae1354b71625684569e3db3a338236ca6e4ad
SHA5128d71b9ab0a424fe973379fee5a5656b576a0a11455ebb733e09b46dba94ce64fc7861864b5fc574c769b18af6f7cf8ba117e24695b974bcb8ce2a1b4d645c7bf
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1547593.exeFilesize
164KB
MD54c8edfcd02efc65314527bf30e6d0b32
SHA1b5621c30c5cad0aa07aa08aee098a3cebc91bf16
SHA256c104bde71a6e4703c8751c491468c47b1cb3c70576a97387840ced2c5de639ea
SHA512a93941a53792bee7d00e88a7b7d543f8f18108c0a2cb3187f8ddbaf6dbd4c16bf32ec015a3d71ce208765c0cc28b29a2c8d7a268a5192892c2ed63011eec1edd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1547593.exeFilesize
164KB
MD54c8edfcd02efc65314527bf30e6d0b32
SHA1b5621c30c5cad0aa07aa08aee098a3cebc91bf16
SHA256c104bde71a6e4703c8751c491468c47b1cb3c70576a97387840ced2c5de639ea
SHA512a93941a53792bee7d00e88a7b7d543f8f18108c0a2cb3187f8ddbaf6dbd4c16bf32ec015a3d71ce208765c0cc28b29a2c8d7a268a5192892c2ed63011eec1edd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4225729.exeFilesize
168KB
MD5b34ca35d3be555bebcb5c9e3579f71ce
SHA1b9128c715cd78608607347bf869418405846c6e3
SHA25699f0f69d9e2e0e9b2a251d00b44f9a406640568a579449aae587fc23a1f2153a
SHA51230f0cccf6478b1a873e1c60df7a96c8562085c04d7e6d02b893294f69bef8f193703caded91700f7d1f90dc8444c284bdc259125ec61344066586f26da3324fb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4225729.exeFilesize
168KB
MD5b34ca35d3be555bebcb5c9e3579f71ce
SHA1b9128c715cd78608607347bf869418405846c6e3
SHA25699f0f69d9e2e0e9b2a251d00b44f9a406640568a579449aae587fc23a1f2153a
SHA51230f0cccf6478b1a873e1c60df7a96c8562085c04d7e6d02b893294f69bef8f193703caded91700f7d1f90dc8444c284bdc259125ec61344066586f26da3324fb
-
memory/748-211-0x0000000007970000-0x0000000007980000-memory.dmpFilesize
64KB
-
memory/748-209-0x0000000000A80000-0x0000000000B78000-memory.dmpFilesize
992KB
-
memory/4132-171-0x000000000A5A0000-0x000000000A632000-memory.dmpFilesize
584KB
-
memory/4132-159-0x000000000A160000-0x000000000A19E000-memory.dmpFilesize
248KB
-
memory/4132-172-0x000000000A500000-0x000000000A566000-memory.dmpFilesize
408KB
-
memory/4132-173-0x000000000B5F0000-0x000000000BAEE000-memory.dmpFilesize
5.0MB
-
memory/4132-174-0x000000000B290000-0x000000000B2E0000-memory.dmpFilesize
320KB
-
memory/4132-189-0x000000000BAF0000-0x000000000BCB2000-memory.dmpFilesize
1.8MB
-
memory/4132-190-0x000000000C1F0000-0x000000000C71C000-memory.dmpFilesize
5.2MB
-
memory/4132-191-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4132-161-0x000000000A2F0000-0x000000000A33B000-memory.dmpFilesize
300KB
-
memory/4132-160-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4132-154-0x0000000000290000-0x00000000002BE000-memory.dmpFilesize
184KB
-
memory/4132-170-0x000000000A480000-0x000000000A4F6000-memory.dmpFilesize
472KB
-
memory/4132-158-0x000000000A100000-0x000000000A112000-memory.dmpFilesize
72KB
-
memory/4132-157-0x000000000A1E0000-0x000000000A2EA000-memory.dmpFilesize
1.0MB
-
memory/4132-156-0x000000000A6E0000-0x000000000ACE6000-memory.dmpFilesize
6.0MB
-
memory/4132-155-0x0000000002550000-0x0000000002556000-memory.dmpFilesize
24KB
-
memory/4764-143-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4856-218-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4856-221-0x00000000003E0000-0x00000000003E0000-memory.dmp
-
memory/5096-212-0x00000000097C0000-0x00000000097D0000-memory.dmpFilesize
64KB
-
memory/5096-210-0x0000000005790000-0x0000000005796000-memory.dmpFilesize
24KB
-
memory/5096-197-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB