Analysis
-
max time kernel
55s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 18:09
Static task
static1
Behavioral task
behavioral1
Sample
d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe
Resource
win10-20230220-en
General
-
Target
d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe
-
Size
660KB
-
MD5
dd1bf08edc3a881d7ed769bd0df185e0
-
SHA1
752ff03e7bd305e83844c31c0288c91db2b279d9
-
SHA256
d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65
-
SHA512
3b78584a0d46beeecce9f3498aef6e22a1983fc7e27d1080f40014631ba691ad2ce730512754f8e07770b61f317aa0c4ab86b254bfb75b1a5baef44c96964864
-
SSDEEP
12288:cMrWy905p1IC6KUo7QoqDXXsbWZSFGqh+l6ZbZv:aymrIC6KrRFGTsb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro3543.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3543.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2500-146-0x0000000004890000-0x00000000048D6000-memory.dmp family_redline behavioral1/memory/2500-149-0x0000000004F50000-0x0000000004F94000-memory.dmp family_redline behavioral1/memory/2500-153-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-155-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-159-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-163-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-167-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-173-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-179-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-183-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-188-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-191-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-195-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-199-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-203-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-205-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-207-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-211-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline behavioral1/memory/2500-209-0x0000000004F50000-0x0000000004F8F000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un560710.exepro3543.exepro3543.exequ9850.exesi449755.exepid process 2240 un560710.exe 4596 pro3543.exe 4924 pro3543.exe 2500 qu9850.exe 3084 si449755.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3543.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3543.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
un560710.exed4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un560710.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un560710.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro3543.exedescription pid process target process PID 4596 set thread context of 4924 4596 pro3543.exe pro3543.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3543.exequ9850.exesi449755.exepid process 4924 pro3543.exe 4924 pro3543.exe 2500 qu9850.exe 2500 qu9850.exe 3084 si449755.exe 3084 si449755.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3543.exequ9850.exesi449755.exedescription pid process Token: SeDebugPrivilege 4924 pro3543.exe Token: SeDebugPrivilege 2500 qu9850.exe Token: SeDebugPrivilege 3084 si449755.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exeun560710.exepro3543.exedescription pid process target process PID 3704 wrote to memory of 2240 3704 d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe un560710.exe PID 3704 wrote to memory of 2240 3704 d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe un560710.exe PID 3704 wrote to memory of 2240 3704 d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe un560710.exe PID 2240 wrote to memory of 4596 2240 un560710.exe pro3543.exe PID 2240 wrote to memory of 4596 2240 un560710.exe pro3543.exe PID 2240 wrote to memory of 4596 2240 un560710.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 4596 wrote to memory of 4924 4596 pro3543.exe pro3543.exe PID 2240 wrote to memory of 2500 2240 un560710.exe qu9850.exe PID 2240 wrote to memory of 2500 2240 un560710.exe qu9850.exe PID 2240 wrote to memory of 2500 2240 un560710.exe qu9850.exe PID 3704 wrote to memory of 3084 3704 d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe si449755.exe PID 3704 wrote to memory of 3084 3704 d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe si449755.exe PID 3704 wrote to memory of 3084 3704 d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe si449755.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe"C:\Users\Admin\AppData\Local\Temp\d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un560710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un560710.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9850.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9850.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449755.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449755.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449755.exeFilesize
175KB
MD54d6fbea168ccc60e30a19f30d1eabf5b
SHA1efed3dcfa77956e2918054948c54945b891e2bad
SHA2564e252c53f013e8cabe8b31575e0355800a6fc4d22065618fca2b761874f46536
SHA5128096f1fcf8192479862341c433717e6b9eeb5b28c3a30c36f1488d1ff56005ed93593d31c7cb73c164b215f4b0aab9040a13b1296efbfbde89d85ea0460f6b14
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449755.exeFilesize
175KB
MD54d6fbea168ccc60e30a19f30d1eabf5b
SHA1efed3dcfa77956e2918054948c54945b891e2bad
SHA2564e252c53f013e8cabe8b31575e0355800a6fc4d22065618fca2b761874f46536
SHA5128096f1fcf8192479862341c433717e6b9eeb5b28c3a30c36f1488d1ff56005ed93593d31c7cb73c164b215f4b0aab9040a13b1296efbfbde89d85ea0460f6b14
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un560710.exeFilesize
517KB
MD5d4431b66f2b0d7a8c9a46ab728aa6d3b
SHA1c039c2180e65dcf5c76661f0a2b6015362a9bc98
SHA256bc15a5513086e6f85ca95584a42c4bf058c1683e49b3daf4086b0a3533c2158c
SHA512d554e7378f8f7b84e7f994a62b066f5b02cab22a8336aa35cd3f7bee60d3c76f6027f0f25b7a89d39d4adbac327c0efad32502d2a427dfa0e0cf85ebfb830091
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un560710.exeFilesize
517KB
MD5d4431b66f2b0d7a8c9a46ab728aa6d3b
SHA1c039c2180e65dcf5c76661f0a2b6015362a9bc98
SHA256bc15a5513086e6f85ca95584a42c4bf058c1683e49b3daf4086b0a3533c2158c
SHA512d554e7378f8f7b84e7f994a62b066f5b02cab22a8336aa35cd3f7bee60d3c76f6027f0f25b7a89d39d4adbac327c0efad32502d2a427dfa0e0cf85ebfb830091
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exeFilesize
237KB
MD5e0dc6ced04b5a422e95f75193b52a411
SHA13d7f90a0c6697e65d9c33b6e8c227425f475bd1b
SHA25611381703ffcf00ddc4eaf1890701c8035a6554cfad3d6d6c9b49e573c84deac5
SHA512b46bbcf8f0af13ea7835af54ebf6b79b5238745e026541fb2c101b18f8b56eef23c4e85819a15bddd216751195bcf789841d04faa2753dafebdbc3ed82ed1dac
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exeFilesize
237KB
MD5e0dc6ced04b5a422e95f75193b52a411
SHA13d7f90a0c6697e65d9c33b6e8c227425f475bd1b
SHA25611381703ffcf00ddc4eaf1890701c8035a6554cfad3d6d6c9b49e573c84deac5
SHA512b46bbcf8f0af13ea7835af54ebf6b79b5238745e026541fb2c101b18f8b56eef23c4e85819a15bddd216751195bcf789841d04faa2753dafebdbc3ed82ed1dac
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exeFilesize
237KB
MD5e0dc6ced04b5a422e95f75193b52a411
SHA13d7f90a0c6697e65d9c33b6e8c227425f475bd1b
SHA25611381703ffcf00ddc4eaf1890701c8035a6554cfad3d6d6c9b49e573c84deac5
SHA512b46bbcf8f0af13ea7835af54ebf6b79b5238745e026541fb2c101b18f8b56eef23c4e85819a15bddd216751195bcf789841d04faa2753dafebdbc3ed82ed1dac
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9850.exeFilesize
294KB
MD5e5e4149b42dc21ac954161c3534bd193
SHA144ca531d32726ef9f31e1d424d0af9a938ae91b0
SHA25624982efc4939b629abd2dbfe9fbd687d29b56cb9731ea99b05744c3d55fbbea6
SHA51225c1dace53598026b32e25f01d96f220401b12da55981637f898340051847e6220170a1cac5fe64b0661a450308553a18823240886e2bbcf5c02e37b18c40f18
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9850.exeFilesize
294KB
MD5e5e4149b42dc21ac954161c3534bd193
SHA144ca531d32726ef9f31e1d424d0af9a938ae91b0
SHA25624982efc4939b629abd2dbfe9fbd687d29b56cb9731ea99b05744c3d55fbbea6
SHA51225c1dace53598026b32e25f01d96f220401b12da55981637f898340051847e6220170a1cac5fe64b0661a450308553a18823240886e2bbcf5c02e37b18c40f18
-
memory/2500-171-0x0000000000590000-0x00000000005DB000-memory.dmpFilesize
300KB
-
memory/2500-1090-0x00000000051B0000-0x00000000051EE000-memory.dmpFilesize
248KB
-
memory/2500-1107-0x0000000006750000-0x0000000006C7C000-memory.dmpFilesize
5.2MB
-
memory/2500-1106-0x0000000006580000-0x0000000006742000-memory.dmpFilesize
1.8MB
-
memory/2500-1105-0x0000000006410000-0x0000000006460000-memory.dmpFilesize
320KB
-
memory/2500-1104-0x0000000006380000-0x00000000063F6000-memory.dmpFilesize
472KB
-
memory/2500-1103-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/2500-146-0x0000000004890000-0x00000000048D6000-memory.dmpFilesize
280KB
-
memory/2500-1097-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/2500-149-0x0000000004F50000-0x0000000004F94000-memory.dmpFilesize
272KB
-
memory/2500-1098-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/2500-153-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-155-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-1096-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/2500-1095-0x0000000006170000-0x0000000006202000-memory.dmpFilesize
584KB
-
memory/2500-159-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-1094-0x0000000005490000-0x00000000054F6000-memory.dmpFilesize
408KB
-
memory/2500-1091-0x0000000005300000-0x000000000534B000-memory.dmpFilesize
300KB
-
memory/2500-163-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-1089-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/2500-167-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-1088-0x0000000005190000-0x00000000051A2000-memory.dmpFilesize
72KB
-
memory/2500-173-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-177-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/2500-1087-0x0000000005050000-0x000000000515A000-memory.dmpFilesize
1.0MB
-
memory/2500-179-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-1086-0x00000000055E0000-0x0000000005BE6000-memory.dmpFilesize
6.0MB
-
memory/2500-180-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/2500-174-0x0000000004940000-0x0000000004950000-memory.dmpFilesize
64KB
-
memory/2500-209-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-183-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-211-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-188-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-191-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-207-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-195-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-205-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-203-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/2500-199-0x0000000004F50000-0x0000000004F8F000-memory.dmpFilesize
252KB
-
memory/3084-1115-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/3084-1114-0x0000000004CB0000-0x0000000004CFB000-memory.dmpFilesize
300KB
-
memory/3084-1113-0x0000000000270000-0x00000000002A2000-memory.dmpFilesize
200KB
-
memory/4596-134-0x00000000001D0000-0x00000000001FE000-memory.dmpFilesize
184KB
-
memory/4924-154-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-148-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-181-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-175-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-169-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-166-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-135-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4924-162-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-158-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-151-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-201-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-185-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-147-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-1102-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4924-145-0x0000000004900000-0x0000000004918000-memory.dmpFilesize
96KB
-
memory/4924-144-0x00000000049A0000-0x0000000004E9E000-memory.dmpFilesize
5.0MB
-
memory/4924-143-0x0000000004990000-0x00000000049A0000-memory.dmpFilesize
64KB
-
memory/4924-142-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4924-141-0x0000000000850000-0x000000000086A000-memory.dmpFilesize
104KB
-
memory/4924-133-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4924-131-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4924-190-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-194-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/4924-197-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB