Analysis
-
max time kernel
60s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
F37840944A4FB524B17D6F9C8EF20CE4.exe
Resource
win7-20220715-en
General
-
Target
F37840944A4FB524B17D6F9C8EF20CE4.exe
-
Size
4.9MB
-
MD5
f37840944a4fb524b17d6f9c8ef20ce4
-
SHA1
d1269e6ed28e04d4e977ca35ba8264191aa1a9c3
-
SHA256
bdd0e54346507ed5f33f4ef7f1261ce899764c64ec7eb0b2d722e509fc3b7b3a
-
SHA512
7cb39fb8e22c126e8132a75bab82297bd9176839546060a686f6540bab7405bcb4671dd41e5a2903e2d45894c0a111866a3fa95287cce4d175c627b0e9b7ca0c
Malware Config
Extracted
redline
allsup
193.150.103.38:18410
-
auth_value
e46711734d1a10599f62ed229e676578
Extracted
redline
top1
pemararslava.xyz:80
-
auth_value
e3ff30d1ffe0ffdb11211b351a0179a1
Extracted
redline
Lyla29.07
185.215.113.216:21921
-
auth_value
ce5605b2c036c2c3b7bdfb23dcf5f5a2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/124784-150-0x0000000000F90000-0x0000000000FB0000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
5992MGKM7BG2970.exeH3IM01BH0GH52KB.exeH3IM01BH0GH52KB.exe2C88I3L78BIAI2M.exe2C88I3L78BIAI2M.exeM342BE0JAACC5EC.exepid process 4044 5992MGKM7BG2970.exe 85548 H3IM01BH0GH52KB.exe 124784 H3IM01BH0GH52KB.exe 134372 2C88I3L78BIAI2M.exe 134424 2C88I3L78BIAI2M.exe 134932 M342BE0JAACC5EC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
F37840944A4FB524B17D6F9C8EF20CE4.exeH3IM01BH0GH52KB.exe5992MGKM7BG2970.exe2C88I3L78BIAI2M.exedescription pid process target process PID 3824 set thread context of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 85548 set thread context of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 4044 set thread context of 134308 4044 5992MGKM7BG2970.exe AppLaunch.exe PID 134372 set thread context of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
M342BE0JAACC5EC.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Internet Explorer\IESettingSync M342BE0JAACC5EC.exe Set value (int) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" M342BE0JAACC5EC.exe Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch M342BE0JAACC5EC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" M342BE0JAACC5EC.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
AppLaunch.exeH3IM01BH0GH52KB.exe2C88I3L78BIAI2M.exepid process 134308 AppLaunch.exe 134308 AppLaunch.exe 124784 H3IM01BH0GH52KB.exe 134424 2C88I3L78BIAI2M.exe 134424 2C88I3L78BIAI2M.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AppLaunch.exeH3IM01BH0GH52KB.exe2C88I3L78BIAI2M.exedescription pid process Token: SeDebugPrivilege 134308 AppLaunch.exe Token: SeDebugPrivilege 124784 H3IM01BH0GH52KB.exe Token: SeDebugPrivilege 134424 2C88I3L78BIAI2M.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
M342BE0JAACC5EC.exepid process 134932 M342BE0JAACC5EC.exe 134932 M342BE0JAACC5EC.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
F37840944A4FB524B17D6F9C8EF20CE4.exeF37840944A4FB524B17D6F9C8EF20CE4.exeH3IM01BH0GH52KB.exe5992MGKM7BG2970.exe2C88I3L78BIAI2M.exedescription pid process target process PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 3824 wrote to memory of 4624 3824 F37840944A4FB524B17D6F9C8EF20CE4.exe F37840944A4FB524B17D6F9C8EF20CE4.exe PID 4624 wrote to memory of 4044 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe 5992MGKM7BG2970.exe PID 4624 wrote to memory of 4044 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe 5992MGKM7BG2970.exe PID 4624 wrote to memory of 4044 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe 5992MGKM7BG2970.exe PID 4624 wrote to memory of 85548 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe H3IM01BH0GH52KB.exe PID 4624 wrote to memory of 85548 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe H3IM01BH0GH52KB.exe PID 4624 wrote to memory of 85548 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe H3IM01BH0GH52KB.exe PID 85548 wrote to memory of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 85548 wrote to memory of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 85548 wrote to memory of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 85548 wrote to memory of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 85548 wrote to memory of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 85548 wrote to memory of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 85548 wrote to memory of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 85548 wrote to memory of 124784 85548 H3IM01BH0GH52KB.exe H3IM01BH0GH52KB.exe PID 4044 wrote to memory of 134308 4044 5992MGKM7BG2970.exe AppLaunch.exe PID 4044 wrote to memory of 134308 4044 5992MGKM7BG2970.exe AppLaunch.exe PID 4044 wrote to memory of 134308 4044 5992MGKM7BG2970.exe AppLaunch.exe PID 4044 wrote to memory of 134308 4044 5992MGKM7BG2970.exe AppLaunch.exe PID 4044 wrote to memory of 134308 4044 5992MGKM7BG2970.exe AppLaunch.exe PID 4624 wrote to memory of 134372 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe 2C88I3L78BIAI2M.exe PID 4624 wrote to memory of 134372 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe 2C88I3L78BIAI2M.exe PID 4624 wrote to memory of 134372 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe 2C88I3L78BIAI2M.exe PID 134372 wrote to memory of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe PID 134372 wrote to memory of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe PID 134372 wrote to memory of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe PID 134372 wrote to memory of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe PID 134372 wrote to memory of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe PID 134372 wrote to memory of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe PID 134372 wrote to memory of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe PID 134372 wrote to memory of 134424 134372 2C88I3L78BIAI2M.exe 2C88I3L78BIAI2M.exe PID 4624 wrote to memory of 134932 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe M342BE0JAACC5EC.exe PID 4624 wrote to memory of 134932 4624 F37840944A4FB524B17D6F9C8EF20CE4.exe M342BE0JAACC5EC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\F37840944A4FB524B17D6F9C8EF20CE4.exe"C:\Users\Admin\AppData\Local\Temp\F37840944A4FB524B17D6F9C8EF20CE4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\F37840944A4FB524B17D6F9C8EF20CE4.exe"C:\Users\Admin\AppData\Local\Temp\F37840944A4FB524B17D6F9C8EF20CE4.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5992MGKM7BG2970.exe"C:\Users\Admin\AppData\Local\Temp\5992MGKM7BG2970.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe"C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe"C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe"C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe"C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\M342BE0JAACC5EC.exehttps://iplogger.org/1x5az73⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2C88I3L78BIAI2M.exe.logFilesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\H3IM01BH0GH52KB.exe.logFilesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exeFilesize
2.0MB
MD52eef072591fa615c5a3e8762076210d2
SHA19d1346230f5d49439bfa5556f9cd35fc2466217b
SHA2564cc07d33c48084395ed0c7ffcaf9549d9cbe961b7e9c33ef546826cbe3b94817
SHA512325f695ebef428c80371c1d1ddf7bbbab71df12c3a695972c38efdb687d1b9f358736832055337fc834a703b5479faba408f5e57d18d8aba5725ac89513118a6
-
C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exeFilesize
2.0MB
MD52eef072591fa615c5a3e8762076210d2
SHA19d1346230f5d49439bfa5556f9cd35fc2466217b
SHA2564cc07d33c48084395ed0c7ffcaf9549d9cbe961b7e9c33ef546826cbe3b94817
SHA512325f695ebef428c80371c1d1ddf7bbbab71df12c3a695972c38efdb687d1b9f358736832055337fc834a703b5479faba408f5e57d18d8aba5725ac89513118a6
-
C:\Users\Admin\AppData\Local\Temp\2C88I3L78BIAI2M.exeFilesize
2.0MB
MD52eef072591fa615c5a3e8762076210d2
SHA19d1346230f5d49439bfa5556f9cd35fc2466217b
SHA2564cc07d33c48084395ed0c7ffcaf9549d9cbe961b7e9c33ef546826cbe3b94817
SHA512325f695ebef428c80371c1d1ddf7bbbab71df12c3a695972c38efdb687d1b9f358736832055337fc834a703b5479faba408f5e57d18d8aba5725ac89513118a6
-
C:\Users\Admin\AppData\Local\Temp\5992MGKM7BG2970.exeFilesize
1.2MB
MD5610f45e860890aa17b10d76892abf71b
SHA15e9ed4e242e469bd1a833880a7cdeb2d34cbc993
SHA256234c66dc304dd9fc71382a6db667adf012235c189b23c849b902b94fb8446e07
SHA512ae6efe6dc11a1ff767b87ba64bc9db209514c6ad640d6932218850d7c946cdf26ac8f7adb15ffa573df4ccf2643b01b9806830695561a6fc883f39c441a837be
-
C:\Users\Admin\AppData\Local\Temp\5992MGKM7BG2970.exeFilesize
1.2MB
MD5610f45e860890aa17b10d76892abf71b
SHA15e9ed4e242e469bd1a833880a7cdeb2d34cbc993
SHA256234c66dc304dd9fc71382a6db667adf012235c189b23c849b902b94fb8446e07
SHA512ae6efe6dc11a1ff767b87ba64bc9db209514c6ad640d6932218850d7c946cdf26ac8f7adb15ffa573df4ccf2643b01b9806830695561a6fc883f39c441a837be
-
C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exeFilesize
5.4MB
MD5ac46ec2d34d137b39cdde96e804d6128
SHA12ab4df67e4223b5c08776d5dbc246f461f88d204
SHA25674258ee714848100e986b7524913f65fec36e60f24c25f295b985c3314ed4167
SHA512bcc9c789d7733a2bb63c427a2bedbd649d20674664278bf22bbbde5bd57a62aa5c779cfa31377c428c8307bcb0c48c0f58d991d50411eb49a51d2f46fc31c16c
-
C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exeFilesize
5.4MB
MD5ac46ec2d34d137b39cdde96e804d6128
SHA12ab4df67e4223b5c08776d5dbc246f461f88d204
SHA25674258ee714848100e986b7524913f65fec36e60f24c25f295b985c3314ed4167
SHA512bcc9c789d7733a2bb63c427a2bedbd649d20674664278bf22bbbde5bd57a62aa5c779cfa31377c428c8307bcb0c48c0f58d991d50411eb49a51d2f46fc31c16c
-
C:\Users\Admin\AppData\Local\Temp\H3IM01BH0GH52KB.exeFilesize
5.4MB
MD5ac46ec2d34d137b39cdde96e804d6128
SHA12ab4df67e4223b5c08776d5dbc246f461f88d204
SHA25674258ee714848100e986b7524913f65fec36e60f24c25f295b985c3314ed4167
SHA512bcc9c789d7733a2bb63c427a2bedbd649d20674664278bf22bbbde5bd57a62aa5c779cfa31377c428c8307bcb0c48c0f58d991d50411eb49a51d2f46fc31c16c
-
C:\Users\Admin\AppData\Local\Temp\M342BE0JAACC5EC.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\M342BE0JAACC5EC.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
memory/3824-130-0x0000000000F30000-0x0000000001449000-memory.dmpFilesize
5.1MB
-
memory/4044-142-0x0000000000000000-mapping.dmp
-
memory/4624-141-0x0000000000B00000-0x0000000000B33000-memory.dmpFilesize
204KB
-
memory/4624-132-0x0000000000B00000-0x0000000000B33000-memory.dmpFilesize
204KB
-
memory/4624-137-0x0000000000B00000-0x0000000000B33000-memory.dmpFilesize
204KB
-
memory/4624-131-0x0000000000000000-mapping.dmp
-
memory/85548-145-0x0000000000000000-mapping.dmp
-
memory/85548-148-0x0000000000640000-0x0000000000BC8000-memory.dmpFilesize
5.5MB
-
memory/124784-149-0x0000000000000000-mapping.dmp
-
memory/124784-178-0x00000000080C0000-0x0000000008110000-memory.dmpFilesize
320KB
-
memory/124784-150-0x0000000000F90000-0x0000000000FB0000-memory.dmpFilesize
128KB
-
memory/124784-165-0x0000000005550000-0x000000000565A000-memory.dmpFilesize
1.0MB
-
memory/124784-163-0x0000000005980000-0x0000000005F98000-memory.dmpFilesize
6.1MB
-
memory/134308-164-0x0000000004920000-0x0000000004932000-memory.dmpFilesize
72KB
-
memory/134308-175-0x0000000006070000-0x000000000608E000-memory.dmpFilesize
120KB
-
memory/134308-153-0x0000000000000000-mapping.dmp
-
memory/134308-154-0x0000000000180000-0x000000000019E000-memory.dmpFilesize
120KB
-
memory/134308-170-0x0000000004980000-0x00000000049BC000-memory.dmpFilesize
240KB
-
memory/134308-171-0x0000000005CA0000-0x0000000005D06000-memory.dmpFilesize
408KB
-
memory/134308-172-0x00000000063D0000-0x0000000006974000-memory.dmpFilesize
5.6MB
-
memory/134308-173-0x0000000005F10000-0x0000000005FA2000-memory.dmpFilesize
584KB
-
memory/134308-174-0x0000000005FB0000-0x0000000006026000-memory.dmpFilesize
472KB
-
memory/134308-177-0x00000000074A0000-0x00000000079CC000-memory.dmpFilesize
5.2MB
-
memory/134308-176-0x0000000006DA0000-0x0000000006F62000-memory.dmpFilesize
1.8MB
-
memory/134372-159-0x0000000000000000-mapping.dmp
-
memory/134372-162-0x0000000000A00000-0x0000000000C1B000-memory.dmpFilesize
2.1MB
-
memory/134424-166-0x0000000000000000-mapping.dmp
-
memory/134424-167-0x0000000000DE0000-0x0000000000DFE000-memory.dmpFilesize
120KB
-
memory/134932-179-0x0000000000000000-mapping.dmp
-
memory/134932-182-0x0000020DAFE20000-0x0000020DAFE26000-memory.dmpFilesize
24KB
-
memory/134932-183-0x00007FFCF2E40000-0x00007FFCF3901000-memory.dmpFilesize
10.8MB
-
memory/134932-185-0x00000215CD860000-0x00000215CE006000-memory.dmpFilesize
7.6MB
-
memory/134932-186-0x00007FFCF2E40000-0x00007FFCF3901000-memory.dmpFilesize
10.8MB