Analysis
-
max time kernel
53s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-03-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
Resource
win10-20230220-en
General
-
Target
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe
-
Size
654KB
-
MD5
a7fc0799d32fba70ad5fd50778666e70
-
SHA1
6b342562e4b060cdc45fc2445b2ad4077f12d082
-
SHA256
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0
-
SHA512
d78022ac0ffb3accea8f372d96cfd3e3c9912b59dedc7594b3ce269b4874446add9375230d6d763c37758b4e8339639cce200f67079c4cb7bfc7a03edf7e1b46
-
SSDEEP
12288:8MrLy90vtknEZYQVYQLzv2arMPxCq3yG37mQk3r+aIS2k:3yaBZlVYgvxrMPvj318+lS2k
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
Processes:
tkrI81aS53.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tkrI81aS53.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 23 IoCs
Processes:
resource yara_rule behavioral2/memory/4776-181-0x0000000002090000-0x00000000020D6000-memory.dmp family_redline behavioral2/memory/4776-182-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral2/memory/4776-183-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-186-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-184-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-188-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-190-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-192-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-194-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-197-0x0000000004BF0000-0x0000000004C00000-memory.dmp family_redline behavioral2/memory/4776-198-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-202-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-201-0x0000000004BF0000-0x0000000004C00000-memory.dmp family_redline behavioral2/memory/4776-206-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-204-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-208-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-210-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-212-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-214-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-216-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-218-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-220-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral2/memory/4776-1104-0x0000000004BF0000-0x0000000004C00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ykrj86yy99.exetkrI81aS53.exeukSy39Sw39.exexkor78Mv29.exepid process 2548 ykrj86yy99.exe 3004 tkrI81aS53.exe 4776 ukSy39Sw39.exe 3628 xkor78Mv29.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tkrI81aS53.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features tkrI81aS53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" tkrI81aS53.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exeykrj86yy99.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ykrj86yy99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ykrj86yy99.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
tkrI81aS53.exeukSy39Sw39.exexkor78Mv29.exepid process 3004 tkrI81aS53.exe 3004 tkrI81aS53.exe 4776 ukSy39Sw39.exe 4776 ukSy39Sw39.exe 3628 xkor78Mv29.exe 3628 xkor78Mv29.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tkrI81aS53.exeukSy39Sw39.exexkor78Mv29.exedescription pid process Token: SeDebugPrivilege 3004 tkrI81aS53.exe Token: SeDebugPrivilege 4776 ukSy39Sw39.exe Token: SeDebugPrivilege 3628 xkor78Mv29.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exeykrj86yy99.exedescription pid process target process PID 2484 wrote to memory of 2548 2484 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe ykrj86yy99.exe PID 2484 wrote to memory of 2548 2484 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe ykrj86yy99.exe PID 2484 wrote to memory of 2548 2484 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe ykrj86yy99.exe PID 2548 wrote to memory of 3004 2548 ykrj86yy99.exe tkrI81aS53.exe PID 2548 wrote to memory of 3004 2548 ykrj86yy99.exe tkrI81aS53.exe PID 2548 wrote to memory of 3004 2548 ykrj86yy99.exe tkrI81aS53.exe PID 2548 wrote to memory of 4776 2548 ykrj86yy99.exe ukSy39Sw39.exe PID 2548 wrote to memory of 4776 2548 ykrj86yy99.exe ukSy39Sw39.exe PID 2548 wrote to memory of 4776 2548 ykrj86yy99.exe ukSy39Sw39.exe PID 2484 wrote to memory of 3628 2484 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe xkor78Mv29.exe PID 2484 wrote to memory of 3628 2484 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe xkor78Mv29.exe PID 2484 wrote to memory of 3628 2484 0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe xkor78Mv29.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe"C:\Users\Admin\AppData\Local\Temp\0f4ead3d2d7252dbd5f7f634a32831287e207ae933bb3b868f387e7364afcde0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exeFilesize
175KB
MD5a4e95ed385c90a7c64c64969288e953a
SHA1369284ca4c20d42eb975f16d2cce2f41eb0838bc
SHA2565cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532
SHA5123748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xkor78Mv29.exeFilesize
175KB
MD5a4e95ed385c90a7c64c64969288e953a
SHA1369284ca4c20d42eb975f16d2cce2f41eb0838bc
SHA2565cc58e3a6e92a6b49984b3b66a3c6029982968ffc32bf98a73886cce23746532
SHA5123748857026bc1c1b643783add2a97ebd701af2fc754c64b9d75488dc0c25dfc662480ee6f4034338628121a0a8a8cd0eff107bf06bfc148acce005134b651d1c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exeFilesize
510KB
MD5a5e528d280a33c17fb7c7326e79463b1
SHA19219b69ba6675f1c25e126e7ca26c96488c3db64
SHA2569b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e
SHA512c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ykrj86yy99.exeFilesize
510KB
MD5a5e528d280a33c17fb7c7326e79463b1
SHA19219b69ba6675f1c25e126e7ca26c96488c3db64
SHA2569b9192b0c88708447c9833b103f5bf8e3fd9b842f2ffbbae02575161af637e9e
SHA512c0333f07275dec05a7cf1030e98f6da7626f95dc6c2c77423e3fdc6342e373e3a387d490dda5d8a69ae5027ddd568d84cae6cc7fa5fd44e4df66ce39ead9f58e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exeFilesize
306KB
MD5dd96910ebcd391990c3c0e402f9ec86c
SHA1cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd
SHA2564affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541
SHA512f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkrI81aS53.exeFilesize
306KB
MD5dd96910ebcd391990c3c0e402f9ec86c
SHA1cc9b7cd8a44db8ad7c208c225d196c11f0c4b8cd
SHA2564affbd332223ac9c7e583bb0bd8004461c13a910a0a6390ad40e3be357ea6541
SHA512f1aaef515729474a41d937935e303d4bce30398088e872aa07fadd56ed4acb224fc4130a4424311f6ecd137ba0c863e7628785498f9ace5539942aea01250c2c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exeFilesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ukSy39Sw39.exeFilesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359
-
memory/3004-136-0x0000000000850000-0x000000000086A000-memory.dmpFilesize
104KB
-
memory/3004-137-0x0000000004BE0000-0x00000000050DE000-memory.dmpFilesize
5.0MB
-
memory/3004-138-0x00000000022A0000-0x00000000022B8000-memory.dmpFilesize
96KB
-
memory/3004-139-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/3004-140-0x0000000000820000-0x0000000000830000-memory.dmpFilesize
64KB
-
memory/3004-142-0x0000000000820000-0x0000000000830000-memory.dmpFilesize
64KB
-
memory/3004-141-0x0000000000820000-0x0000000000830000-memory.dmpFilesize
64KB
-
memory/3004-143-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-144-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-146-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-148-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-150-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-152-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-154-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-156-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-158-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-160-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-162-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-164-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-166-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-168-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-170-0x00000000022A0000-0x00000000022B2000-memory.dmpFilesize
72KB
-
memory/3004-171-0x0000000000400000-0x0000000000590000-memory.dmpFilesize
1.6MB
-
memory/3004-172-0x0000000000820000-0x0000000000830000-memory.dmpFilesize
64KB
-
memory/3004-173-0x0000000000820000-0x0000000000830000-memory.dmpFilesize
64KB
-
memory/3004-174-0x0000000000820000-0x0000000000830000-memory.dmpFilesize
64KB
-
memory/3004-176-0x0000000000400000-0x0000000000590000-memory.dmpFilesize
1.6MB
-
memory/3628-1115-0x0000000000800000-0x0000000000832000-memory.dmpFilesize
200KB
-
memory/3628-1117-0x0000000005380000-0x0000000005390000-memory.dmpFilesize
64KB
-
memory/3628-1116-0x0000000005240000-0x000000000528B000-memory.dmpFilesize
300KB
-
memory/4776-183-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-216-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-184-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-188-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-190-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-192-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-195-0x0000000000470000-0x00000000004BB000-memory.dmpFilesize
300KB
-
memory/4776-194-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-197-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/4776-198-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-202-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-199-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/4776-201-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/4776-206-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-204-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-208-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-210-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-212-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-214-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-186-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-218-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-220-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/4776-1093-0x0000000005100000-0x0000000005706000-memory.dmpFilesize
6.0MB
-
memory/4776-1094-0x0000000005710000-0x000000000581A000-memory.dmpFilesize
1.0MB
-
memory/4776-1095-0x0000000004B20000-0x0000000004B32000-memory.dmpFilesize
72KB
-
memory/4776-1096-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/4776-1097-0x0000000004B40000-0x0000000004B7E000-memory.dmpFilesize
248KB
-
memory/4776-1098-0x0000000004B90000-0x0000000004BDB000-memory.dmpFilesize
300KB
-
memory/4776-1100-0x0000000005A50000-0x0000000005AB6000-memory.dmpFilesize
408KB
-
memory/4776-1101-0x0000000006110000-0x00000000061A2000-memory.dmpFilesize
584KB
-
memory/4776-1103-0x00000000061F0000-0x00000000063B2000-memory.dmpFilesize
1.8MB
-
memory/4776-1104-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/4776-1102-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/4776-1105-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/4776-1106-0x00000000063E0000-0x000000000690C000-memory.dmpFilesize
5.2MB
-
memory/4776-182-0x0000000004A90000-0x0000000004AD4000-memory.dmpFilesize
272KB
-
memory/4776-181-0x0000000002090000-0x00000000020D6000-memory.dmpFilesize
280KB
-
memory/4776-1107-0x0000000007D00000-0x0000000007D76000-memory.dmpFilesize
472KB
-
memory/4776-1108-0x0000000007D80000-0x0000000007DD0000-memory.dmpFilesize
320KB
-
memory/4776-1109-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB