Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2023 02:42
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230221-en
General
-
Target
file.exe
-
Size
1000KB
-
MD5
83ef65a424e1baf1d7b861acec54ecb4
-
SHA1
9273c6cd941d801626ac0f35ae687cab0055e208
-
SHA256
199c2d8e24c0cc919d0400773938ed3cca76860e7be93b5d1f2f8ee12004a5f7
-
SHA512
55b9478928ca32d400eab67aec7c1c337a47d188a04fa89c989fc35e5ba107776e29b1d03bceed6ffd193515e6f84430b1256c1b2476799858038df6ca6d4085
-
SSDEEP
12288:xCAtA8KIiEVqjmG09laoIqLtTmAGiDd4CT7s6Z46E2W0aBjbaxZAj0VQTj7nO62z:htAIi0/9EoTJmIDKgWWa5axZfVQTl
Malware Config
Extracted
redline
top
83.97.73.124:53
-
auth_value
053e5ccc53982413753b68419138b23a
Extracted
redline
Lyla1906
94.130.176.65:13400
-
auth_value
5c6d9077ba684b0add99731765896e7e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
DE9F1DPM6O9MO3D.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DE9F1DPM6O9MO3D.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DE9F1DPM6O9MO3D.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DE9F1DPM6O9MO3D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DE9F1DPM6O9MO3D.exe -
Executes dropped EXE 4 IoCs
Processes:
9AP7AL6FMFM5NPI.exeP38BE87EJO20F1O.exeDE9F1DPM6O9MO3D.exe6C4A51J1LQIHOBP.exepid process 4720 9AP7AL6FMFM5NPI.exe 1952 P38BE87EJO20F1O.exe 3760 DE9F1DPM6O9MO3D.exe 4760 6C4A51J1LQIHOBP.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exe themida behavioral2/memory/3760-180-0x0000000000F10000-0x000000000158C000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exe themida -
Unexpected DNS network traffic destination 17 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 Destination IP 83.97.73.124 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
DE9F1DPM6O9MO3D.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" DE9F1DPM6O9MO3D.exe -
Processes:
DE9F1DPM6O9MO3D.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DE9F1DPM6O9MO3D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
DE9F1DPM6O9MO3D.exepid process 3760 DE9F1DPM6O9MO3D.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
file.exe9AP7AL6FMFM5NPI.exeP38BE87EJO20F1O.exedescription pid process target process PID 748 set thread context of 792 748 file.exe RegSvcs.exe PID 4720 set thread context of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 1952 set thread context of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
6C4A51J1LQIHOBP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 6C4A51J1LQIHOBP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 6C4A51J1LQIHOBP.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\IESettingSync 6C4A51J1LQIHOBP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 6C4A51J1LQIHOBP.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
file.exeDE9F1DPM6O9MO3D.exeRegSvcs.exeRegSvcs.exepid process 748 file.exe 748 file.exe 3760 DE9F1DPM6O9MO3D.exe 3760 DE9F1DPM6O9MO3D.exe 3636 RegSvcs.exe 3636 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
file.exeDE9F1DPM6O9MO3D.exe9AP7AL6FMFM5NPI.exeP38BE87EJO20F1O.exeRegSvcs.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 748 file.exe Token: SeDebugPrivilege 3760 DE9F1DPM6O9MO3D.exe Token: SeDebugPrivilege 4720 9AP7AL6FMFM5NPI.exe Token: SeDebugPrivilege 1952 P38BE87EJO20F1O.exe Token: SeDebugPrivilege 3636 RegSvcs.exe Token: SeDebugPrivilege 1568 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
6C4A51J1LQIHOBP.exepid process 4760 6C4A51J1LQIHOBP.exe 4760 6C4A51J1LQIHOBP.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
file.exeRegSvcs.exe9AP7AL6FMFM5NPI.exeP38BE87EJO20F1O.exedescription pid process target process PID 748 wrote to memory of 3816 748 file.exe RegSvcs.exe PID 748 wrote to memory of 3816 748 file.exe RegSvcs.exe PID 748 wrote to memory of 3816 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 748 wrote to memory of 792 748 file.exe RegSvcs.exe PID 792 wrote to memory of 4720 792 RegSvcs.exe 9AP7AL6FMFM5NPI.exe PID 792 wrote to memory of 4720 792 RegSvcs.exe 9AP7AL6FMFM5NPI.exe PID 792 wrote to memory of 4720 792 RegSvcs.exe 9AP7AL6FMFM5NPI.exe PID 792 wrote to memory of 1952 792 RegSvcs.exe P38BE87EJO20F1O.exe PID 792 wrote to memory of 1952 792 RegSvcs.exe P38BE87EJO20F1O.exe PID 792 wrote to memory of 1952 792 RegSvcs.exe P38BE87EJO20F1O.exe PID 792 wrote to memory of 3760 792 RegSvcs.exe DE9F1DPM6O9MO3D.exe PID 792 wrote to memory of 3760 792 RegSvcs.exe DE9F1DPM6O9MO3D.exe PID 792 wrote to memory of 3760 792 RegSvcs.exe DE9F1DPM6O9MO3D.exe PID 792 wrote to memory of 4760 792 RegSvcs.exe 6C4A51J1LQIHOBP.exe PID 792 wrote to memory of 4760 792 RegSvcs.exe 6C4A51J1LQIHOBP.exe PID 4720 wrote to memory of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 4720 wrote to memory of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 4720 wrote to memory of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 4720 wrote to memory of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 4720 wrote to memory of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 4720 wrote to memory of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 4720 wrote to memory of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 4720 wrote to memory of 1568 4720 9AP7AL6FMFM5NPI.exe RegSvcs.exe PID 1952 wrote to memory of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe PID 1952 wrote to memory of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe PID 1952 wrote to memory of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe PID 1952 wrote to memory of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe PID 1952 wrote to memory of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe PID 1952 wrote to memory of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe PID 1952 wrote to memory of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe PID 1952 wrote to memory of 3636 1952 P38BE87EJO20F1O.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9AP7AL6FMFM5NPI.exe"C:\Users\Admin\AppData\Local\Temp\9AP7AL6FMFM5NPI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\P38BE87EJO20F1O.exe"C:\Users\Admin\AppData\Local\Temp\P38BE87EJO20F1O.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exe"C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6C4A51J1LQIHOBP.exehttps://iplogger.com/12qaJ43⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6C4A51J1LQIHOBP.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\6C4A51J1LQIHOBP.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\9AP7AL6FMFM5NPI.exeFilesize
602KB
MD53f8f5177e8907b126f2575b67aea9db1
SHA130ac43a9c6dd799441519db56a14bf1a0e2b5bab
SHA256712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326
SHA5121537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398
-
C:\Users\Admin\AppData\Local\Temp\9AP7AL6FMFM5NPI.exeFilesize
602KB
MD53f8f5177e8907b126f2575b67aea9db1
SHA130ac43a9c6dd799441519db56a14bf1a0e2b5bab
SHA256712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326
SHA5121537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398
-
C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exeFilesize
2.5MB
MD56375b46cec76be55885593736cd40270
SHA132f7c3c53ab7403ae7e8488f6b93e2fdda39f9ba
SHA256933722fac65bb4de9beeab946469fb6ba42c187a2ada644f781098320b6770b4
SHA512a2a659f3dbcb085037ec1363bc96b2787cdea2929d47075dd2aba1e87e8f1c246ce01dadb24b503dc121864ecaac2f92d18602e0352c434a49c8bdb49f11ccd6
-
C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exeFilesize
2.5MB
MD56375b46cec76be55885593736cd40270
SHA132f7c3c53ab7403ae7e8488f6b93e2fdda39f9ba
SHA256933722fac65bb4de9beeab946469fb6ba42c187a2ada644f781098320b6770b4
SHA512a2a659f3dbcb085037ec1363bc96b2787cdea2929d47075dd2aba1e87e8f1c246ce01dadb24b503dc121864ecaac2f92d18602e0352c434a49c8bdb49f11ccd6
-
C:\Users\Admin\AppData\Local\Temp\P38BE87EJO20F1O.exeFilesize
556KB
MD52d1dffc690133c02a27ac0e2d7c03039
SHA155424f59ddc9483a15754b92594fc29bdf8736f3
SHA256c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693
SHA5128a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55
-
C:\Users\Admin\AppData\Local\Temp\P38BE87EJO20F1O.exeFilesize
556KB
MD52d1dffc690133c02a27ac0e2d7c03039
SHA155424f59ddc9483a15754b92594fc29bdf8736f3
SHA256c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693
SHA5128a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55
-
memory/748-143-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-141-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-149-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-151-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-153-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-155-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-157-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-159-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-134-0x0000000005660000-0x00000000056FC000-memory.dmpFilesize
624KB
-
memory/748-135-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-136-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-138-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-145-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-147-0x0000000005630000-0x0000000005645000-memory.dmpFilesize
84KB
-
memory/748-133-0x0000000000C00000-0x0000000000D00000-memory.dmpFilesize
1024KB
-
memory/748-139-0x0000000005860000-0x0000000005870000-memory.dmpFilesize
64KB
-
memory/792-193-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/792-164-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/792-163-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/792-201-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/792-162-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/792-160-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/1568-244-0x0000000005880000-0x0000000005892000-memory.dmpFilesize
72KB
-
memory/1568-247-0x0000000005910000-0x000000000594C000-memory.dmpFilesize
240KB
-
memory/1568-239-0x00000000059E0000-0x0000000005AEA000-memory.dmpFilesize
1.0MB
-
memory/1568-237-0x0000000005EF0000-0x0000000006508000-memory.dmpFilesize
6.1MB
-
memory/1568-228-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1952-174-0x00000000003E0000-0x0000000000470000-memory.dmpFilesize
576KB
-
memory/1952-245-0x0000000004E40000-0x0000000004E50000-memory.dmpFilesize
64KB
-
memory/3636-275-0x0000000005390000-0x00000000053F6000-memory.dmpFilesize
408KB
-
memory/3636-273-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/3636-283-0x0000000006D10000-0x0000000006D60000-memory.dmpFilesize
320KB
-
memory/3636-280-0x00000000061B0000-0x00000000061CE000-memory.dmpFilesize
120KB
-
memory/3636-279-0x0000000007040000-0x000000000756C000-memory.dmpFilesize
5.2MB
-
memory/3636-278-0x00000000062A0000-0x0000000006462000-memory.dmpFilesize
1.8MB
-
memory/3636-277-0x0000000006050000-0x00000000060C6000-memory.dmpFilesize
472KB
-
memory/3636-274-0x0000000005050000-0x0000000005060000-memory.dmpFilesize
64KB
-
memory/3760-180-0x0000000000F10000-0x000000000158C000-memory.dmpFilesize
6.5MB
-
memory/3760-187-0x00000000061A0000-0x0000000006744000-memory.dmpFilesize
5.6MB
-
memory/3760-192-0x0000000005E90000-0x0000000005E9A000-memory.dmpFilesize
40KB
-
memory/3760-282-0x00000000053A0000-0x00000000053B0000-memory.dmpFilesize
64KB
-
memory/3760-190-0x0000000005CF0000-0x0000000005D82000-memory.dmpFilesize
584KB
-
memory/3760-185-0x00000000053A0000-0x00000000053B0000-memory.dmpFilesize
64KB
-
memory/3760-281-0x0000000000F10000-0x000000000158C000-memory.dmpFilesize
6.5MB
-
memory/3760-179-0x0000000000F10000-0x000000000158C000-memory.dmpFilesize
6.5MB
-
memory/4720-169-0x00000000009A0000-0x0000000000A3C000-memory.dmpFilesize
624KB
-
memory/4760-202-0x000002D0819C0000-0x000002D0819C6000-memory.dmpFilesize
24KB
-
memory/4760-235-0x000002D083650000-0x000002D083660000-memory.dmpFilesize
64KB
-
memory/4760-236-0x000002D083650000-0x000002D083660000-memory.dmpFilesize
64KB
-
memory/4760-238-0x000002D89E560000-0x000002D89ED06000-memory.dmpFilesize
7.6MB
-
memory/4760-243-0x000002D083650000-0x000002D083660000-memory.dmpFilesize
64KB
-
memory/4760-203-0x000002D083650000-0x000002D083660000-memory.dmpFilesize
64KB