Analysis
-
max time kernel
130s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:10
Static task
static1
Behavioral task
behavioral1
Sample
06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe
Resource
win10v2004-20230220-en
General
-
Target
06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe
-
Size
659KB
-
MD5
3be01d58c1838c5ff35b38742e317588
-
SHA1
1feabc87e2f7e59f62430abf1af43ab0b48d0f7d
-
SHA256
06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803
-
SHA512
566939c3ef6711d38993bf9fffa34cee8cdac1e84c18a74d37af937913e7793b9cea0fc65c697831e0eae8b5f6dbfd892b47537ee22d467e23d3deac69579cce
-
SSDEEP
12288:cMr0y90bkADc9NjiX2JUAx/kZSqpdIrB65y/PI5A6Gb:QyY2I2JlFqpSw5xA6+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro6101.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6101.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3792-177-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-179-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-182-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-187-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-191-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-196-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-202-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-206-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-209-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-211-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-213-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-215-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-219-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-221-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-217-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-223-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/3792-225-0x0000000002630000-0x000000000266F000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un412707.exepro6101.exepro6101.exequ6798.exesi689084.exepid process 2332 un412707.exe 1156 pro6101.exe 1352 pro6101.exe 3792 qu6798.exe 3728 si689084.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6101.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6101.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exeun412707.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un412707.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un412707.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro6101.exedescription pid process target process PID 1156 set thread context of 1352 1156 pro6101.exe pro6101.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3932 3792 WerFault.exe qu6798.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6101.exequ6798.exesi689084.exepid process 1352 pro6101.exe 1352 pro6101.exe 3792 qu6798.exe 3792 qu6798.exe 3728 si689084.exe 3728 si689084.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6101.exequ6798.exesi689084.exedescription pid process Token: SeDebugPrivilege 1352 pro6101.exe Token: SeDebugPrivilege 3792 qu6798.exe Token: SeDebugPrivilege 3728 si689084.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exeun412707.exepro6101.exedescription pid process target process PID 5044 wrote to memory of 2332 5044 06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe un412707.exe PID 5044 wrote to memory of 2332 5044 06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe un412707.exe PID 5044 wrote to memory of 2332 5044 06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe un412707.exe PID 2332 wrote to memory of 1156 2332 un412707.exe pro6101.exe PID 2332 wrote to memory of 1156 2332 un412707.exe pro6101.exe PID 2332 wrote to memory of 1156 2332 un412707.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 1156 wrote to memory of 1352 1156 pro6101.exe pro6101.exe PID 2332 wrote to memory of 3792 2332 un412707.exe qu6798.exe PID 2332 wrote to memory of 3792 2332 un412707.exe qu6798.exe PID 2332 wrote to memory of 3792 2332 un412707.exe qu6798.exe PID 5044 wrote to memory of 3728 5044 06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe si689084.exe PID 5044 wrote to memory of 3728 5044 06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe si689084.exe PID 5044 wrote to memory of 3728 5044 06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe si689084.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe"C:\Users\Admin\AppData\Local\Temp\06219e8183bfcaa25bbeb6de8544763285c605dc502ff28c4b41009d24095803.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un412707.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un412707.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6101.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6101.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6101.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6101.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6798.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6798.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 19524⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si689084.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si689084.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3792 -ip 37921⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si689084.exeFilesize
175KB
MD58725cdaaed0e24551bb25a6860defdf9
SHA145ddb25cfcd15a4bddfc0619779a4cdfdfdfd8bd
SHA2561017a71fb40e16461ae631462fafb02335b44be329805fa4cace620c4186e8f2
SHA5120da23a60c959e8683dae4ddd03bb8cc8fcad1a52f5dce7564ab257aeb11a9a2fb829c72efa9ed5d3e1d50d001be8464440679f6e43afb1fa8e1b017c6a736f57
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si689084.exeFilesize
175KB
MD58725cdaaed0e24551bb25a6860defdf9
SHA145ddb25cfcd15a4bddfc0619779a4cdfdfdfd8bd
SHA2561017a71fb40e16461ae631462fafb02335b44be329805fa4cace620c4186e8f2
SHA5120da23a60c959e8683dae4ddd03bb8cc8fcad1a52f5dce7564ab257aeb11a9a2fb829c72efa9ed5d3e1d50d001be8464440679f6e43afb1fa8e1b017c6a736f57
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un412707.exeFilesize
517KB
MD5c58968c9a5254081840fac2d7ffffea6
SHA1aa1ab68c1c7df667c0b8f8e693846022c375c326
SHA25636b292c744bc361d11f91362312e4d7903a4c7b4c6c1ed0bbfabea1aaa215ad6
SHA512e9bf452e2a4705234d38f26acae52747a43884d685bae8cf342fd1ea7ae881232f90912a2311b4a953dcac38de08dc50adf76fdd805afb04ae3781fdc6feb322
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un412707.exeFilesize
517KB
MD5c58968c9a5254081840fac2d7ffffea6
SHA1aa1ab68c1c7df667c0b8f8e693846022c375c326
SHA25636b292c744bc361d11f91362312e4d7903a4c7b4c6c1ed0bbfabea1aaa215ad6
SHA512e9bf452e2a4705234d38f26acae52747a43884d685bae8cf342fd1ea7ae881232f90912a2311b4a953dcac38de08dc50adf76fdd805afb04ae3781fdc6feb322
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6101.exeFilesize
237KB
MD55333929790fdb6f6e2a00c1d66572c07
SHA12a7fc57e4edc4e75fbcdf3757ef73ec82365468f
SHA256f22f30336db88137094b2548451621251db50d7cd3346aeb1453a6bdcbb865ff
SHA512c810d1c5243de71cfdd0e28fae4738e22728de632dc005144546a390ae048f771ea331866fca7c3d8b51e4aa6671670b3e5a88eb9e4a2f05093c4ce748c9064b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6101.exeFilesize
237KB
MD55333929790fdb6f6e2a00c1d66572c07
SHA12a7fc57e4edc4e75fbcdf3757ef73ec82365468f
SHA256f22f30336db88137094b2548451621251db50d7cd3346aeb1453a6bdcbb865ff
SHA512c810d1c5243de71cfdd0e28fae4738e22728de632dc005144546a390ae048f771ea331866fca7c3d8b51e4aa6671670b3e5a88eb9e4a2f05093c4ce748c9064b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6101.exeFilesize
237KB
MD55333929790fdb6f6e2a00c1d66572c07
SHA12a7fc57e4edc4e75fbcdf3757ef73ec82365468f
SHA256f22f30336db88137094b2548451621251db50d7cd3346aeb1453a6bdcbb865ff
SHA512c810d1c5243de71cfdd0e28fae4738e22728de632dc005144546a390ae048f771ea331866fca7c3d8b51e4aa6671670b3e5a88eb9e4a2f05093c4ce748c9064b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6798.exeFilesize
294KB
MD56024a3c732d162297e80b4bdce9100ef
SHA131b3d9b4ff770a4b1e333af7e83f738f70bb311d
SHA256ec5ed2e9656b02f3ac1f15087a0c65623f6f7cdc626a6efc4e65c0bc0fee9255
SHA512713de9acd4a98a0020d22aaa618b32d6427ed1009562cf944993730aad40764276af4a3b70d34b9e09990bcbd634f7f8b03361b308575484dad786d6551ed284
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6798.exeFilesize
294KB
MD56024a3c732d162297e80b4bdce9100ef
SHA131b3d9b4ff770a4b1e333af7e83f738f70bb311d
SHA256ec5ed2e9656b02f3ac1f15087a0c65623f6f7cdc626a6efc4e65c0bc0fee9255
SHA512713de9acd4a98a0020d22aaa618b32d6427ed1009562cf944993730aad40764276af4a3b70d34b9e09990bcbd634f7f8b03361b308575484dad786d6551ed284
-
memory/1156-150-0x0000000000600000-0x000000000062E000-memory.dmpFilesize
184KB
-
memory/1352-151-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1352-180-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-158-0x0000000004AE0000-0x0000000005084000-memory.dmpFilesize
5.6MB
-
memory/1352-160-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/1352-161-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/1352-162-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/1352-163-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-164-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-166-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-168-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-170-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-172-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-174-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-159-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1352-207-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-148-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1352-176-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-152-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1352-185-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-203-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-188-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-1117-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/1352-192-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-197-0x0000000004940000-0x0000000004952000-memory.dmpFilesize
72KB
-
memory/1352-1108-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/1352-1107-0x0000000004AD0000-0x0000000004AE0000-memory.dmpFilesize
64KB
-
memory/3728-1128-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/3728-1129-0x0000000004D60000-0x0000000004D70000-memory.dmpFilesize
64KB
-
memory/3792-196-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-202-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-206-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-209-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-195-0x0000000000760000-0x00000000007AB000-memory.dmpFilesize
300KB
-
memory/3792-211-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-213-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-215-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-219-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-221-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-217-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-223-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-225-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-1100-0x0000000005250000-0x0000000005868000-memory.dmpFilesize
6.1MB
-
memory/3792-1101-0x0000000004B80000-0x0000000004C8A000-memory.dmpFilesize
1.0MB
-
memory/3792-1102-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/3792-1103-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/3792-1104-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/3792-198-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/3792-201-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/3792-1109-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/3792-1110-0x0000000006270000-0x0000000006302000-memory.dmpFilesize
584KB
-
memory/3792-1112-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/3792-1113-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/3792-1114-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/3792-191-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-1118-0x0000000006450000-0x00000000064C6000-memory.dmpFilesize
472KB
-
memory/3792-1119-0x00000000064E0000-0x0000000006530000-memory.dmpFilesize
320KB
-
memory/3792-1120-0x0000000006560000-0x0000000006722000-memory.dmpFilesize
1.8MB
-
memory/3792-1121-0x0000000006730000-0x0000000006C5C000-memory.dmpFilesize
5.2MB
-
memory/3792-1122-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/3792-187-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-182-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-179-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB
-
memory/3792-177-0x0000000002630000-0x000000000266F000-memory.dmpFilesize
252KB