Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 18:25
Static task
static1
Behavioral task
behavioral1
Sample
e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe
Resource
win10v2004-20230220-en
General
-
Target
e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe
-
Size
659KB
-
MD5
9b3e0d626aadef57bafc6e659ab9e56d
-
SHA1
4b7ff59a3ab1f6e945e718669ae4feb4efe05824
-
SHA256
e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b
-
SHA512
109e52953ef488f49a375a5e03ee0f16a12868a092493f479566488471520238593b552aa2d34609f3127dd7947f861acee6cc9824057b792335b12e2da5b1cc
-
SSDEEP
12288:UMray90UlxnMtIBIZzsayn+lsVZSwP2Vvp6+3P:GypYlhwPW4+3P
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3187.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3187.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/636-161-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-162-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-166-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-175-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-170-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-181-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-188-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-194-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-197-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-201-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-205-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-209-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-212-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-217-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-222-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-224-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/636-226-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un778004.exepro3187.exepro3187.exequ0812.exesi739325.exepid process 3372 un778004.exe 5024 pro3187.exe 2132 pro3187.exe 636 qu0812.exe 988 si739325.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3187.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3187.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3187.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exeun778004.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un778004.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un778004.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro3187.exedescription pid process target process PID 5024 set thread context of 2132 5024 pro3187.exe pro3187.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4900 636 WerFault.exe qu0812.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3187.exequ0812.exesi739325.exepid process 2132 pro3187.exe 2132 pro3187.exe 636 qu0812.exe 636 qu0812.exe 988 si739325.exe 988 si739325.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
qu0812.exepro3187.exesi739325.exedescription pid process Token: SeDebugPrivilege 636 qu0812.exe Token: SeDebugPrivilege 2132 pro3187.exe Token: SeDebugPrivilege 988 si739325.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exeun778004.exepro3187.exedescription pid process target process PID 3388 wrote to memory of 3372 3388 e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe un778004.exe PID 3388 wrote to memory of 3372 3388 e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe un778004.exe PID 3388 wrote to memory of 3372 3388 e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe un778004.exe PID 3372 wrote to memory of 5024 3372 un778004.exe pro3187.exe PID 3372 wrote to memory of 5024 3372 un778004.exe pro3187.exe PID 3372 wrote to memory of 5024 3372 un778004.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 5024 wrote to memory of 2132 5024 pro3187.exe pro3187.exe PID 3372 wrote to memory of 636 3372 un778004.exe qu0812.exe PID 3372 wrote to memory of 636 3372 un778004.exe qu0812.exe PID 3372 wrote to memory of 636 3372 un778004.exe qu0812.exe PID 3388 wrote to memory of 988 3388 e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe si739325.exe PID 3388 wrote to memory of 988 3388 e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe si739325.exe PID 3388 wrote to memory of 988 3388 e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe si739325.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe"C:\Users\Admin\AppData\Local\Temp\e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778004.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0812.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0812.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 14804⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739325.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 636 -ip 6361⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739325.exeFilesize
175KB
MD58f9516389ef45e1c5bfdfea69a83c624
SHA15c0b69cfce1d33680dc23934026039cdb7d67c3c
SHA25635ed48c4696dca5545031cb9ac3e74236a6aad78796bc0f1942562049031a073
SHA5121867b0eab71aa8ceb688f6842d7a01f121f3dae32564c7655e21c6ece0412e42565e09018a89e6d5b2c8f8f4973f8263340292808b3ff19fa63636f95ede93c6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739325.exeFilesize
175KB
MD58f9516389ef45e1c5bfdfea69a83c624
SHA15c0b69cfce1d33680dc23934026039cdb7d67c3c
SHA25635ed48c4696dca5545031cb9ac3e74236a6aad78796bc0f1942562049031a073
SHA5121867b0eab71aa8ceb688f6842d7a01f121f3dae32564c7655e21c6ece0412e42565e09018a89e6d5b2c8f8f4973f8263340292808b3ff19fa63636f95ede93c6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778004.exeFilesize
517KB
MD5068c9a9265502bc4411e0400556124d7
SHA10e40559a270d33f8d931cae8d4d0a11925ea0720
SHA256cb5033ac4185d7fc418ef06aae71faaa15cecd29e4bf6d57891c494439a73ea8
SHA5128ad44bf62f0942208e236ccf6d020b2d45e12061ed573853e35efe971b7d5d7a75068ad445d3b94076e677ad1293b5397f54528e0f4a9c2ef84f7e17c24b7913
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778004.exeFilesize
517KB
MD5068c9a9265502bc4411e0400556124d7
SHA10e40559a270d33f8d931cae8d4d0a11925ea0720
SHA256cb5033ac4185d7fc418ef06aae71faaa15cecd29e4bf6d57891c494439a73ea8
SHA5128ad44bf62f0942208e236ccf6d020b2d45e12061ed573853e35efe971b7d5d7a75068ad445d3b94076e677ad1293b5397f54528e0f4a9c2ef84f7e17c24b7913
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exeFilesize
237KB
MD5b06fdfd9fcb5e7575c5b02c70ecaa089
SHA117bc4ee9531171e02fdfa08d58230401467b03cb
SHA256ed2f8b42879a75b2a19ddb6c1a6ac9bd76b019e0052948687b99c81485702db7
SHA5128f6cfd406f338a0771e92e1d5438d9ea282d8129272c41a90ab296dc301bf0f959c87fc97d5a2263ef092a71a0b8fcbe6565754c3af0b43d9677f305e9211833
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exeFilesize
237KB
MD5b06fdfd9fcb5e7575c5b02c70ecaa089
SHA117bc4ee9531171e02fdfa08d58230401467b03cb
SHA256ed2f8b42879a75b2a19ddb6c1a6ac9bd76b019e0052948687b99c81485702db7
SHA5128f6cfd406f338a0771e92e1d5438d9ea282d8129272c41a90ab296dc301bf0f959c87fc97d5a2263ef092a71a0b8fcbe6565754c3af0b43d9677f305e9211833
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exeFilesize
237KB
MD5b06fdfd9fcb5e7575c5b02c70ecaa089
SHA117bc4ee9531171e02fdfa08d58230401467b03cb
SHA256ed2f8b42879a75b2a19ddb6c1a6ac9bd76b019e0052948687b99c81485702db7
SHA5128f6cfd406f338a0771e92e1d5438d9ea282d8129272c41a90ab296dc301bf0f959c87fc97d5a2263ef092a71a0b8fcbe6565754c3af0b43d9677f305e9211833
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0812.exeFilesize
294KB
MD5dc7a2d424a0c4443906e10b25172491d
SHA13aa6de0d38a07c15679c1e1f9c1a1b4d959270e0
SHA256f1ea2624c2dd19266c0052bd68bd295e914d3b73418a6377910c4e059c38cf9b
SHA512cae0a4ffb1b2e1a2a25ff5531ee3f64ac9235e2dcb06a3634301c8ebaea3d25cbb0d8fa0a04f662832babaeae24d66976729652be233c9b6660994267c4cc5d5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0812.exeFilesize
294KB
MD5dc7a2d424a0c4443906e10b25172491d
SHA13aa6de0d38a07c15679c1e1f9c1a1b4d959270e0
SHA256f1ea2624c2dd19266c0052bd68bd295e914d3b73418a6377910c4e059c38cf9b
SHA512cae0a4ffb1b2e1a2a25ff5531ee3f64ac9235e2dcb06a3634301c8ebaea3d25cbb0d8fa0a04f662832babaeae24d66976729652be233c9b6660994267c4cc5d5
-
memory/636-175-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1105-0x00000000025C0000-0x00000000025D0000-memory.dmpFilesize
64KB
-
memory/636-222-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1123-0x00000000066D0000-0x0000000006892000-memory.dmpFilesize
1.8MB
-
memory/636-161-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1122-0x00000000025C0000-0x00000000025D0000-memory.dmpFilesize
64KB
-
memory/636-1121-0x0000000006640000-0x0000000006690000-memory.dmpFilesize
320KB
-
memory/636-162-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-166-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-224-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1120-0x00000000065B0000-0x0000000006626000-memory.dmpFilesize
472KB
-
memory/636-1115-0x00000000025C0000-0x00000000025D0000-memory.dmpFilesize
64KB
-
memory/636-1114-0x00000000025C0000-0x00000000025D0000-memory.dmpFilesize
64KB
-
memory/636-217-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1110-0x0000000006260000-0x00000000062F2000-memory.dmpFilesize
584KB
-
memory/636-170-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-181-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1109-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/636-183-0x0000000000610000-0x000000000065B000-memory.dmpFilesize
300KB
-
memory/636-1124-0x00000000068A0000-0x0000000006DCC000-memory.dmpFilesize
5.2MB
-
memory/636-186-0x00000000025C0000-0x00000000025D0000-memory.dmpFilesize
64KB
-
memory/636-188-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/636-189-0x00000000025C0000-0x00000000025D0000-memory.dmpFilesize
64KB
-
memory/636-192-0x00000000025C0000-0x00000000025D0000-memory.dmpFilesize
64KB
-
memory/636-194-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1103-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/636-197-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1102-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/636-201-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-1101-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/636-226-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-205-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-209-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/636-212-0x0000000005080000-0x00000000050BF000-memory.dmpFilesize
252KB
-
memory/988-1131-0x00000000050D0000-0x00000000050E0000-memory.dmpFilesize
64KB
-
memory/988-1130-0x00000000004B0000-0x00000000004E2000-memory.dmpFilesize
200KB
-
memory/2132-167-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-1111-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/2132-214-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-221-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-210-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-206-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-202-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-198-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-193-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-187-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-182-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-1108-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2132-180-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/2132-173-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/2132-1112-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/2132-218-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-1113-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/2132-176-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-177-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/2132-1119-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2132-171-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-163-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-160-0x0000000004A90000-0x0000000004AA2000-memory.dmpFilesize
72KB
-
memory/2132-159-0x0000000004C20000-0x00000000051C4000-memory.dmpFilesize
5.6MB
-
memory/2132-157-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2132-152-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2132-151-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2132-148-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/5024-150-0x00000000005E0000-0x000000000060E000-memory.dmpFilesize
184KB