Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03-04-2023 19:13
Static task
static1
Behavioral task
behavioral1
Sample
01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe
Resource
win10-20230220-en
General
-
Target
01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe
-
Size
660KB
-
MD5
147ab28a6555ebe95b37990a25604353
-
SHA1
a0b141ab49ae9f0947ba6533f1349c3f956a2d84
-
SHA256
01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344
-
SHA512
2f6e99f151e5927164eafedeee590176f297d4060ff174258dcf38887b3e7789a3afca049bd70da16da7543eae94ae1fe43afca013655a92783fd3476fcd7e41
-
SSDEEP
12288:NMrYy90TiVuzviVSJDl1nWoXHbtP6rwxLTZSKucPJl6mJ:hyazzC2DslKuYsmJ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
pro1676.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1676.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2740-149-0x0000000000900000-0x0000000000946000-memory.dmp family_redline behavioral1/memory/2740-152-0x0000000002640000-0x0000000002684000-memory.dmp family_redline behavioral1/memory/2740-162-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-160-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-165-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-169-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-172-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-177-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-181-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-185-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-189-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-193-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-197-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-202-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-206-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-205-0x0000000004BF0000-0x0000000004C00000-memory.dmp family_redline behavioral1/memory/2740-211-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-214-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-216-0x0000000002640000-0x000000000267F000-memory.dmp family_redline behavioral1/memory/2740-218-0x0000000002640000-0x000000000267F000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
Processes:
un726645.exepro1676.exepro1676.exequ9288.exesi772471.exepid process 2112 un726645.exe 5008 pro1676.exe 3528 pro1676.exe 2740 qu9288.exe 4568 si772471.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro1676.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1676.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1676.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exeun726645.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un726645.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un726645.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pro1676.exedescription pid process target process PID 5008 set thread context of 3528 5008 pro1676.exe pro1676.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro1676.exequ9288.exesi772471.exepid process 3528 pro1676.exe 3528 pro1676.exe 2740 qu9288.exe 2740 qu9288.exe 4568 si772471.exe 4568 si772471.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro1676.exequ9288.exesi772471.exedescription pid process Token: SeDebugPrivilege 3528 pro1676.exe Token: SeDebugPrivilege 2740 qu9288.exe Token: SeDebugPrivilege 4568 si772471.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exeun726645.exepro1676.exedescription pid process target process PID 2900 wrote to memory of 2112 2900 01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe un726645.exe PID 2900 wrote to memory of 2112 2900 01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe un726645.exe PID 2900 wrote to memory of 2112 2900 01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe un726645.exe PID 2112 wrote to memory of 5008 2112 un726645.exe pro1676.exe PID 2112 wrote to memory of 5008 2112 un726645.exe pro1676.exe PID 2112 wrote to memory of 5008 2112 un726645.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 5008 wrote to memory of 3528 5008 pro1676.exe pro1676.exe PID 2112 wrote to memory of 2740 2112 un726645.exe qu9288.exe PID 2112 wrote to memory of 2740 2112 un726645.exe qu9288.exe PID 2112 wrote to memory of 2740 2112 un726645.exe qu9288.exe PID 2900 wrote to memory of 4568 2900 01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe si772471.exe PID 2900 wrote to memory of 4568 2900 01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe si772471.exe PID 2900 wrote to memory of 4568 2900 01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe si772471.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe"C:\Users\Admin\AppData\Local\Temp\01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9288.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9288.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772471.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772471.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772471.exeFilesize
175KB
MD5f778d58be40e87599296d78180579ce5
SHA1df7f503c94dbb6bbd69bab8a46defb6fc004f50f
SHA256ee033fba5b4727d3a911fc98cf128539c7b24f3c634ee9e2049cb4017a32b0c4
SHA512ace1a3885adf94490bfaa6f6f4e10b55088e2a4ca74c5c0e213d9cedf3963346dc429b9d9037342c0eb7bfb6313bd01b54cc05589df3ae7ee11c58c13ae57c55
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772471.exeFilesize
175KB
MD5f778d58be40e87599296d78180579ce5
SHA1df7f503c94dbb6bbd69bab8a46defb6fc004f50f
SHA256ee033fba5b4727d3a911fc98cf128539c7b24f3c634ee9e2049cb4017a32b0c4
SHA512ace1a3885adf94490bfaa6f6f4e10b55088e2a4ca74c5c0e213d9cedf3963346dc429b9d9037342c0eb7bfb6313bd01b54cc05589df3ae7ee11c58c13ae57c55
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726645.exeFilesize
517KB
MD5ce78c73b645dd3e1b8ee6696eec4a646
SHA142c8088bee89d99a4717b68aff635b8cb65966ff
SHA256232d6a9024df185b12ebd6a979c3a0525f427e16ac5028e38c8e53e0122db666
SHA512a41dfac057b5e159a0977323a5cbced9ccd54358977da3cf0da738c2cd46f7520641e0c88649ca0f5c9775926a76da2f5ddcda419d75da71292441bac80a641f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726645.exeFilesize
517KB
MD5ce78c73b645dd3e1b8ee6696eec4a646
SHA142c8088bee89d99a4717b68aff635b8cb65966ff
SHA256232d6a9024df185b12ebd6a979c3a0525f427e16ac5028e38c8e53e0122db666
SHA512a41dfac057b5e159a0977323a5cbced9ccd54358977da3cf0da738c2cd46f7520641e0c88649ca0f5c9775926a76da2f5ddcda419d75da71292441bac80a641f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exeFilesize
237KB
MD55fc3ea42379cf1a677dee37bec32ffb8
SHA1fde22e5a795d6108caf903848ec1c5b1e4731876
SHA2561ca29c515798ea1a94adfc8077e938ef94f93882ac3f918cf0ed279e02d811c2
SHA51269f5331af1064a6d4b6c55fe9830b3b3c85542218fb90c76083851d61227d0a07f2bca0b5688f60b5371e31e88181a6f32214dd72746b92020e99457a1ad70bb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exeFilesize
237KB
MD55fc3ea42379cf1a677dee37bec32ffb8
SHA1fde22e5a795d6108caf903848ec1c5b1e4731876
SHA2561ca29c515798ea1a94adfc8077e938ef94f93882ac3f918cf0ed279e02d811c2
SHA51269f5331af1064a6d4b6c55fe9830b3b3c85542218fb90c76083851d61227d0a07f2bca0b5688f60b5371e31e88181a6f32214dd72746b92020e99457a1ad70bb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exeFilesize
237KB
MD55fc3ea42379cf1a677dee37bec32ffb8
SHA1fde22e5a795d6108caf903848ec1c5b1e4731876
SHA2561ca29c515798ea1a94adfc8077e938ef94f93882ac3f918cf0ed279e02d811c2
SHA51269f5331af1064a6d4b6c55fe9830b3b3c85542218fb90c76083851d61227d0a07f2bca0b5688f60b5371e31e88181a6f32214dd72746b92020e99457a1ad70bb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9288.exeFilesize
294KB
MD502a892d16119f07471f435ba8c9c1e96
SHA15100f106e8fc6e3c159ecede1724116c896f73b4
SHA2565c83588a617cb2814e7c48f68163d9faf4a50eca146a797c175095142d176cbf
SHA512ce3d2df3f4e4f2daab4ee8586eed1c9e4f63862d1d52b0a16e4c165ad04fc20461cf7f319948b0073d7f7b6846c71e271bbd658947c9d279847dd8392e19084c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9288.exeFilesize
294KB
MD502a892d16119f07471f435ba8c9c1e96
SHA15100f106e8fc6e3c159ecede1724116c896f73b4
SHA2565c83588a617cb2814e7c48f68163d9faf4a50eca146a797c175095142d176cbf
SHA512ce3d2df3f4e4f2daab4ee8586eed1c9e4f63862d1d52b0a16e4c165ad04fc20461cf7f319948b0073d7f7b6846c71e271bbd658947c9d279847dd8392e19084c
-
memory/2740-162-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-165-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-1113-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/2740-1112-0x0000000006560000-0x0000000006A8C000-memory.dmpFilesize
5.2MB
-
memory/2740-1111-0x0000000006390000-0x0000000006552000-memory.dmpFilesize
1.8MB
-
memory/2740-1106-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/2740-149-0x0000000000900000-0x0000000000946000-memory.dmpFilesize
280KB
-
memory/2740-1105-0x0000000005670000-0x00000000056D6000-memory.dmpFilesize
408KB
-
memory/2740-152-0x0000000002640000-0x0000000002684000-memory.dmpFilesize
272KB
-
memory/2740-1115-0x0000000006D40000-0x0000000006D90000-memory.dmpFilesize
320KB
-
memory/2740-1104-0x00000000055D0000-0x0000000005662000-memory.dmpFilesize
584KB
-
memory/2740-155-0x00000000004C0000-0x000000000050B000-memory.dmpFilesize
300KB
-
memory/2740-156-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/2740-202-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-1103-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/2740-160-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-1102-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/2740-158-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/2740-1097-0x0000000005450000-0x000000000549B000-memory.dmpFilesize
300KB
-
memory/2740-1114-0x0000000006CC0000-0x0000000006D36000-memory.dmpFilesize
472KB
-
memory/2740-169-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-1096-0x0000000005310000-0x000000000534E000-memory.dmpFilesize
248KB
-
memory/2740-1095-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/2740-172-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-177-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-1094-0x0000000005200000-0x000000000530A000-memory.dmpFilesize
1.0MB
-
memory/2740-181-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-1093-0x0000000005810000-0x0000000005E16000-memory.dmpFilesize
6.0MB
-
memory/2740-185-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-218-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-216-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-189-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-214-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-193-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-211-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-197-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/2740-205-0x0000000004BF0000-0x0000000004C00000-memory.dmpFilesize
64KB
-
memory/2740-206-0x0000000002640000-0x000000000267F000-memory.dmpFilesize
252KB
-
memory/3528-154-0x0000000004970000-0x0000000004980000-memory.dmpFilesize
64KB
-
memory/3528-1100-0x0000000004970000-0x0000000004980000-memory.dmpFilesize
64KB
-
memory/3528-199-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-209-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-196-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-192-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-188-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-212-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-184-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-180-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-176-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-173-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-168-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-157-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-1101-0x0000000004970000-0x0000000004980000-memory.dmpFilesize
64KB
-
memory/3528-203-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-159-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-164-0x0000000004900000-0x0000000004912000-memory.dmpFilesize
72KB
-
memory/3528-151-0x0000000004970000-0x0000000004980000-memory.dmpFilesize
64KB
-
memory/3528-153-0x0000000004970000-0x0000000004980000-memory.dmpFilesize
64KB
-
memory/3528-150-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3528-1110-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3528-148-0x0000000004900000-0x0000000004918000-memory.dmpFilesize
96KB
-
memory/3528-147-0x0000000004980000-0x0000000004E7E000-memory.dmpFilesize
5.0MB
-
memory/3528-146-0x0000000004860000-0x000000000487A000-memory.dmpFilesize
104KB
-
memory/3528-141-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3528-139-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3528-136-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4568-1121-0x0000000000950000-0x0000000000982000-memory.dmpFilesize
200KB
-
memory/4568-1122-0x0000000005390000-0x00000000053DB000-memory.dmpFilesize
300KB
-
memory/4568-1123-0x00000000054A0000-0x00000000054B0000-memory.dmpFilesize
64KB
-
memory/5008-137-0x00000000001D0000-0x00000000001FE000-memory.dmpFilesize
184KB