Analysis
-
max time kernel
187s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:53
Static task
static1
Behavioral task
behavioral1
Sample
a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe
Resource
win10v2004-20230915-en
General
-
Target
a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe
-
Size
1.1MB
-
MD5
1df6580a995989ea0cb8d5c35ff737e2
-
SHA1
ebbfb339b894138c10c542fcfabb4b26e21fae3b
-
SHA256
a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf
-
SHA512
a488bb387610ec56b1716ecb7fd8d3d6f272617df9ea2325c43d620355ceed5514cea5cda18cf0e7023bde733493e23cf2f37a7f66fd0a0b85e56101c136bf48
-
SSDEEP
24576:8yCEH2Pui4A+s/ob83ocv8lP2CnRd/3ci53Vxlx:r72r4A+6s8YhP2GRd9VVn
Malware Config
Extracted
redline
lunka
77.91.124.55:19071
-
auth_value
8284484633d18d383ea4ff83c0af43ca
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3692-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3692-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3692-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3692-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exe family_mystic C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exe family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
Processes:
x6821480.exex5073654.exex3665401.exeg2690086.exeh7885283.exei0691084.exej2320570.exek4804205.exepid process 2988 x6821480.exe 3768 x5073654.exe 4984 x3665401.exe 3144 g2690086.exe 5112 h7885283.exe 5096 i0691084.exe 2184 j2320570.exe 4784 k4804205.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exex6821480.exex5073654.exex3665401.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6821480.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5073654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3665401.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
g2690086.exej2320570.exedescription pid process target process PID 3144 set thread context of 3692 3144 g2690086.exe AppLaunch.exe PID 2184 set thread context of 3800 2184 j2320570.exe AppLaunch.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4172 3692 WerFault.exe AppLaunch.exe 3900 3144 WerFault.exe g2690086.exe 868 5112 WerFault.exe h7885283.exe 3048 2184 WerFault.exe j2320570.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exex6821480.exex5073654.exex3665401.exeg2690086.exej2320570.exedescription pid process target process PID 4380 wrote to memory of 2988 4380 a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe x6821480.exe PID 4380 wrote to memory of 2988 4380 a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe x6821480.exe PID 4380 wrote to memory of 2988 4380 a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe x6821480.exe PID 2988 wrote to memory of 3768 2988 x6821480.exe x5073654.exe PID 2988 wrote to memory of 3768 2988 x6821480.exe x5073654.exe PID 2988 wrote to memory of 3768 2988 x6821480.exe x5073654.exe PID 3768 wrote to memory of 4984 3768 x5073654.exe x3665401.exe PID 3768 wrote to memory of 4984 3768 x5073654.exe x3665401.exe PID 3768 wrote to memory of 4984 3768 x5073654.exe x3665401.exe PID 4984 wrote to memory of 3144 4984 x3665401.exe g2690086.exe PID 4984 wrote to memory of 3144 4984 x3665401.exe g2690086.exe PID 4984 wrote to memory of 3144 4984 x3665401.exe g2690086.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 3144 wrote to memory of 3692 3144 g2690086.exe AppLaunch.exe PID 4984 wrote to memory of 5112 4984 x3665401.exe h7885283.exe PID 4984 wrote to memory of 5112 4984 x3665401.exe h7885283.exe PID 4984 wrote to memory of 5112 4984 x3665401.exe h7885283.exe PID 3768 wrote to memory of 5096 3768 x5073654.exe i0691084.exe PID 3768 wrote to memory of 5096 3768 x5073654.exe i0691084.exe PID 3768 wrote to memory of 5096 3768 x5073654.exe i0691084.exe PID 2988 wrote to memory of 2184 2988 x6821480.exe j2320570.exe PID 2988 wrote to memory of 2184 2988 x6821480.exe j2320570.exe PID 2988 wrote to memory of 2184 2988 x6821480.exe j2320570.exe PID 2184 wrote to memory of 3800 2184 j2320570.exe AppLaunch.exe PID 2184 wrote to memory of 3800 2184 j2320570.exe AppLaunch.exe PID 2184 wrote to memory of 3800 2184 j2320570.exe AppLaunch.exe PID 2184 wrote to memory of 3800 2184 j2320570.exe AppLaunch.exe PID 2184 wrote to memory of 3800 2184 j2320570.exe AppLaunch.exe PID 2184 wrote to memory of 3800 2184 j2320570.exe AppLaunch.exe PID 2184 wrote to memory of 3800 2184 j2320570.exe AppLaunch.exe PID 2184 wrote to memory of 3800 2184 j2320570.exe AppLaunch.exe PID 4380 wrote to memory of 4784 4380 a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe k4804205.exe PID 4380 wrote to memory of 4784 4380 a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe k4804205.exe PID 4380 wrote to memory of 4784 4380 a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe k4804205.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe"C:\Users\Admin\AppData\Local\Temp\a1385fd741828c261356775c020f6bb10b2b8926069dbeedf53985d42707d8bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6821480.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6821480.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5073654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5073654.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3665401.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3665401.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2690086.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2690086.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 5407⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 1406⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885283.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885283.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 9286⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2320570.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2320570.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 1564⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4804205.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4804205.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3692 -ip 36921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5112 -ip 51121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2184 -ip 21841⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4804205.exeFilesize
22KB
MD52be3a9657fa722ccbc54af753d7cae10
SHA168b2cccae59b9b4312f48db41c4849adbd3531bf
SHA256b4b2ea34d9cce16fb144ef6fff26df4a059ce6d818f25aed609d904667925e0a
SHA512d0275387576bdeeddaccc835e11fe8dcca2d159bf93fb263c1545254d31584fce040057973cfc1db7c5ba1d1e459d50f635c751bb3d22b16e475ba74baf079c0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4804205.exeFilesize
22KB
MD52be3a9657fa722ccbc54af753d7cae10
SHA168b2cccae59b9b4312f48db41c4849adbd3531bf
SHA256b4b2ea34d9cce16fb144ef6fff26df4a059ce6d818f25aed609d904667925e0a
SHA512d0275387576bdeeddaccc835e11fe8dcca2d159bf93fb263c1545254d31584fce040057973cfc1db7c5ba1d1e459d50f635c751bb3d22b16e475ba74baf079c0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6821480.exeFilesize
1.0MB
MD5eff3282f20178ce92e2f236a9652733d
SHA140f6801700aae2d528852886036e81aefc054390
SHA256c5673cc3c3ae9790389381ff1ea25c980c3e9c4c812634b8f9442224de70c95b
SHA512b449c5c27131a5e2308dd99da78694af892b3cff622483e30d344c858535a6159a02ae1dff2096c6f3b761179df90b98ebe6d5d3f94a7150811f498b6034da01
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6821480.exeFilesize
1.0MB
MD5eff3282f20178ce92e2f236a9652733d
SHA140f6801700aae2d528852886036e81aefc054390
SHA256c5673cc3c3ae9790389381ff1ea25c980c3e9c4c812634b8f9442224de70c95b
SHA512b449c5c27131a5e2308dd99da78694af892b3cff622483e30d344c858535a6159a02ae1dff2096c6f3b761179df90b98ebe6d5d3f94a7150811f498b6034da01
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2320570.exeFilesize
1.0MB
MD5c65830f5657d1c658deab65834c83ba0
SHA199ab355e37a62d2f57489b36a3ced883b069cfdd
SHA25621b3d740640d36442d97bef8ae3b479a2654b58f0771d7abf074a35870298e6c
SHA51219b87d8c0967f50647077befba15d1b40d3023d15fe3a3f3ce15c6b835ce30fb8c3f8ffd9a005871de10a6b36eaa1891466a6b6a94a234edb345f0884f3be7f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2320570.exeFilesize
1.0MB
MD5c65830f5657d1c658deab65834c83ba0
SHA199ab355e37a62d2f57489b36a3ced883b069cfdd
SHA25621b3d740640d36442d97bef8ae3b479a2654b58f0771d7abf074a35870298e6c
SHA51219b87d8c0967f50647077befba15d1b40d3023d15fe3a3f3ce15c6b835ce30fb8c3f8ffd9a005871de10a6b36eaa1891466a6b6a94a234edb345f0884f3be7f0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5073654.exeFilesize
675KB
MD51ff91772fbc577fcbc22adc0698cb32b
SHA1ca0f6e413565cc9821531fec29022bde7a7b13c4
SHA2567bf0d15d752e939973883010a6ceea5accfde4a68aa4efd02a5b857c3d26d40b
SHA5125ec7ffaa8b8db26f02dd499224812850ead59318b7b58c18fdc751f38ec471fe66b5a9f49ef016af889504c24d2a1a36638007746ed7985ebf8c5ad742e66b63
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5073654.exeFilesize
675KB
MD51ff91772fbc577fcbc22adc0698cb32b
SHA1ca0f6e413565cc9821531fec29022bde7a7b13c4
SHA2567bf0d15d752e939973883010a6ceea5accfde4a68aa4efd02a5b857c3d26d40b
SHA5125ec7ffaa8b8db26f02dd499224812850ead59318b7b58c18fdc751f38ec471fe66b5a9f49ef016af889504c24d2a1a36638007746ed7985ebf8c5ad742e66b63
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exeFilesize
141KB
MD5aad4251df3f423defe0de4aeef8295f0
SHA1bc9ed4c3ac7f073a51768ab06210be9f339a988d
SHA2569c0af5c15653e4ba72ca4de7eea32713cb0212fc0e92efffdf45de3fa8fd0927
SHA5120c9838fbca875c653c9b300776a8cd1a2a63f68b6d155a178911ec470b8d81f7ddb122a0c6cbc4502c7e8757f1ff4a346a9f3856abcfebfbcaeef8df675a7d65
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0691084.exeFilesize
141KB
MD5aad4251df3f423defe0de4aeef8295f0
SHA1bc9ed4c3ac7f073a51768ab06210be9f339a988d
SHA2569c0af5c15653e4ba72ca4de7eea32713cb0212fc0e92efffdf45de3fa8fd0927
SHA5120c9838fbca875c653c9b300776a8cd1a2a63f68b6d155a178911ec470b8d81f7ddb122a0c6cbc4502c7e8757f1ff4a346a9f3856abcfebfbcaeef8df675a7d65
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3665401.exeFilesize
509KB
MD5db6340dc329f7a3ca138eea77cb68d3c
SHA1c46a6d5522656915dd5a989da8015da34b6defde
SHA256aa9cfad00fbe9449865cdbd51e72f6c736ecb57f385fa046e9ffcca8eddbd051
SHA512cf2c2727fb4a1a71e70caf41282336a80104402392e51376eb282beafbe68c85da8eb01d11263e3ce2084d9cf6b4332dc0e2209929ac2ae152f28c582116e057
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3665401.exeFilesize
509KB
MD5db6340dc329f7a3ca138eea77cb68d3c
SHA1c46a6d5522656915dd5a989da8015da34b6defde
SHA256aa9cfad00fbe9449865cdbd51e72f6c736ecb57f385fa046e9ffcca8eddbd051
SHA512cf2c2727fb4a1a71e70caf41282336a80104402392e51376eb282beafbe68c85da8eb01d11263e3ce2084d9cf6b4332dc0e2209929ac2ae152f28c582116e057
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2690086.exeFilesize
1016KB
MD5689c0e063648a337b2dfa98ec0f6b348
SHA1ab820d06a740b02554fbe56718fc412dc0e598c0
SHA2568b5e36ac7e0f5b4da3aa68da48b0961ab22a93ebde31d0f562462766bba27bc2
SHA512afbd2693f58f980bdb8490ec840816788aedc903c407dc36226054b1215631d42955906f16309d0d139c375e798ad5e8f700aeae43331c880942b87aa8e76263
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2690086.exeFilesize
1016KB
MD5689c0e063648a337b2dfa98ec0f6b348
SHA1ab820d06a740b02554fbe56718fc412dc0e598c0
SHA2568b5e36ac7e0f5b4da3aa68da48b0961ab22a93ebde31d0f562462766bba27bc2
SHA512afbd2693f58f980bdb8490ec840816788aedc903c407dc36226054b1215631d42955906f16309d0d139c375e798ad5e8f700aeae43331c880942b87aa8e76263
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885283.exeFilesize
174KB
MD596eb40acc2a9e29a292ed822d7684e26
SHA12e9fd8b338ff579f46ec76b7fc5bf840eeb3fcd4
SHA25666ba5d890bda13ed0966c9ac9ae5506b455c2a0a059a882053d6fc7f32ef65f9
SHA512ec2b1b7231e54c5100ae2013e107c0a22576aedd56642c440c58b5b0720b73c5953fe981ac5426531547192a731b83f99fc6fe31d227da67687aeeb38c3d91a2
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885283.exeFilesize
174KB
MD596eb40acc2a9e29a292ed822d7684e26
SHA12e9fd8b338ff579f46ec76b7fc5bf840eeb3fcd4
SHA25666ba5d890bda13ed0966c9ac9ae5506b455c2a0a059a882053d6fc7f32ef65f9
SHA512ec2b1b7231e54c5100ae2013e107c0a22576aedd56642c440c58b5b0720b73c5953fe981ac5426531547192a731b83f99fc6fe31d227da67687aeeb38c3d91a2
-
memory/3692-28-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3692-32-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3692-29-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3692-30-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3800-45-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3800-55-0x000000000AA60000-0x000000000AA72000-memory.dmpFilesize
72KB
-
memory/3800-46-0x0000000073780000-0x0000000073F30000-memory.dmpFilesize
7.7MB
-
memory/3800-47-0x0000000073780000-0x0000000073F30000-memory.dmpFilesize
7.7MB
-
memory/3800-58-0x0000000005100000-0x0000000005110000-memory.dmpFilesize
64KB
-
memory/3800-57-0x000000000AC40000-0x000000000AC8C000-memory.dmpFilesize
304KB
-
memory/3800-51-0x00000000050E0000-0x00000000050E6000-memory.dmpFilesize
24KB
-
memory/3800-52-0x000000000AD30000-0x000000000B348000-memory.dmpFilesize
6.1MB
-
memory/3800-53-0x000000000AB30000-0x000000000AC3A000-memory.dmpFilesize
1.0MB
-
memory/3800-54-0x0000000005100000-0x0000000005110000-memory.dmpFilesize
64KB
-
memory/3800-56-0x000000000AAC0000-0x000000000AAFC000-memory.dmpFilesize
240KB
-
memory/5112-38-0x0000000073C20000-0x00000000743D0000-memory.dmpFilesize
7.7MB
-
memory/5112-37-0x0000000073C20000-0x00000000743D0000-memory.dmpFilesize
7.7MB
-
memory/5112-36-0x0000000000C60000-0x0000000000C90000-memory.dmpFilesize
192KB