Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 10:57
Static task
static1
Behavioral task
behavioral1
Sample
c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe
Resource
win10v2004-20230220-en
General
-
Target
c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe
-
Size
489KB
-
MD5
245f5a964e1907ef7625387d2af74fa1
-
SHA1
5160d53d0040f22772594a38333ef0701f723c97
-
SHA256
c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218
-
SHA512
7f69f8c08e319e9a61b6436346b4d5b278f99c0a2cecc36db46ea5dd2b2203fd05ec38c746e27f686f8db26854f03c2160850e234bd8b9b0026d71075c27ed0b
-
SSDEEP
12288:KMr6y900bKUM2Sh7bDLkMUN5KDel3bfne7utjKO4k:UypmhrHLFw80Te7utok
Malware Config
Extracted
redline
lada
217.196.96.101:4132
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
Processes:
o2860382.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o2860382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o2860382.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o2860382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o2860382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o2860382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o2860382.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s8428940.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s8428940.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 6 IoCs
Processes:
z7443267.exeo2860382.exer1911737.exes8428940.exeoneetx.exeoneetx.exepid process 3296 z7443267.exe 2120 o2860382.exe 4688 r1911737.exe 4944 s8428940.exe 1424 oneetx.exe 3580 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1772 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
o2860382.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o2860382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o2860382.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
z7443267.exec56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7443267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7443267.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
o2860382.exer1911737.exepid process 2120 o2860382.exe 2120 o2860382.exe 4688 r1911737.exe 4688 r1911737.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
o2860382.exer1911737.exedescription pid process Token: SeDebugPrivilege 2120 o2860382.exe Token: SeDebugPrivilege 4688 r1911737.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
s8428940.exepid process 4944 s8428940.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exez7443267.exes8428940.exeoneetx.exedescription pid process target process PID 3584 wrote to memory of 3296 3584 c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe z7443267.exe PID 3584 wrote to memory of 3296 3584 c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe z7443267.exe PID 3584 wrote to memory of 3296 3584 c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe z7443267.exe PID 3296 wrote to memory of 2120 3296 z7443267.exe o2860382.exe PID 3296 wrote to memory of 2120 3296 z7443267.exe o2860382.exe PID 3296 wrote to memory of 2120 3296 z7443267.exe o2860382.exe PID 3296 wrote to memory of 4688 3296 z7443267.exe r1911737.exe PID 3296 wrote to memory of 4688 3296 z7443267.exe r1911737.exe PID 3296 wrote to memory of 4688 3296 z7443267.exe r1911737.exe PID 3584 wrote to memory of 4944 3584 c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe s8428940.exe PID 3584 wrote to memory of 4944 3584 c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe s8428940.exe PID 3584 wrote to memory of 4944 3584 c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe s8428940.exe PID 4944 wrote to memory of 1424 4944 s8428940.exe oneetx.exe PID 4944 wrote to memory of 1424 4944 s8428940.exe oneetx.exe PID 4944 wrote to memory of 1424 4944 s8428940.exe oneetx.exe PID 1424 wrote to memory of 2792 1424 oneetx.exe schtasks.exe PID 1424 wrote to memory of 2792 1424 oneetx.exe schtasks.exe PID 1424 wrote to memory of 2792 1424 oneetx.exe schtasks.exe PID 1424 wrote to memory of 1772 1424 oneetx.exe rundll32.exe PID 1424 wrote to memory of 1772 1424 oneetx.exe rundll32.exe PID 1424 wrote to memory of 1772 1424 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe"C:\Users\Admin\AppData\Local\Temp\c56fe33f51e7075d00ec8f9d4bae4891e1920de9bd4b350e914c44e39be9c218.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7443267.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7443267.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2860382.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2860382.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1911737.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1911737.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8428940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8428940.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeFilesize
231KB
MD54304926efd963e41a5004acec0de3544
SHA194c32f7f8c40e59d5fa786e032f49c6bf011de27
SHA2562cfd880924488f43206435bbd5b5f6be8224348187c9abea78b2cd887617d603
SHA512371ddb86bd1c01bbc022b0baf0fa72376bab6b2e7e1eb42efcc13e9fbabf91435b066c077ceb3652f7ae39275e37e9005c278df61b48a16b706214a04a9d86e0
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeFilesize
231KB
MD54304926efd963e41a5004acec0de3544
SHA194c32f7f8c40e59d5fa786e032f49c6bf011de27
SHA2562cfd880924488f43206435bbd5b5f6be8224348187c9abea78b2cd887617d603
SHA512371ddb86bd1c01bbc022b0baf0fa72376bab6b2e7e1eb42efcc13e9fbabf91435b066c077ceb3652f7ae39275e37e9005c278df61b48a16b706214a04a9d86e0
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeFilesize
231KB
MD54304926efd963e41a5004acec0de3544
SHA194c32f7f8c40e59d5fa786e032f49c6bf011de27
SHA2562cfd880924488f43206435bbd5b5f6be8224348187c9abea78b2cd887617d603
SHA512371ddb86bd1c01bbc022b0baf0fa72376bab6b2e7e1eb42efcc13e9fbabf91435b066c077ceb3652f7ae39275e37e9005c278df61b48a16b706214a04a9d86e0
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeFilesize
231KB
MD54304926efd963e41a5004acec0de3544
SHA194c32f7f8c40e59d5fa786e032f49c6bf011de27
SHA2562cfd880924488f43206435bbd5b5f6be8224348187c9abea78b2cd887617d603
SHA512371ddb86bd1c01bbc022b0baf0fa72376bab6b2e7e1eb42efcc13e9fbabf91435b066c077ceb3652f7ae39275e37e9005c278df61b48a16b706214a04a9d86e0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8428940.exeFilesize
231KB
MD54304926efd963e41a5004acec0de3544
SHA194c32f7f8c40e59d5fa786e032f49c6bf011de27
SHA2562cfd880924488f43206435bbd5b5f6be8224348187c9abea78b2cd887617d603
SHA512371ddb86bd1c01bbc022b0baf0fa72376bab6b2e7e1eb42efcc13e9fbabf91435b066c077ceb3652f7ae39275e37e9005c278df61b48a16b706214a04a9d86e0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8428940.exeFilesize
231KB
MD54304926efd963e41a5004acec0de3544
SHA194c32f7f8c40e59d5fa786e032f49c6bf011de27
SHA2562cfd880924488f43206435bbd5b5f6be8224348187c9abea78b2cd887617d603
SHA512371ddb86bd1c01bbc022b0baf0fa72376bab6b2e7e1eb42efcc13e9fbabf91435b066c077ceb3652f7ae39275e37e9005c278df61b48a16b706214a04a9d86e0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7443267.exeFilesize
307KB
MD54004f511d327172eae41fdea7e7c0ac7
SHA1bfd85c0eef8b3af1badcbecdafcff50bb458fe12
SHA256166f6d483805428959f650a02e3717e2d55cef70c33e10b75926a4e5d51c9b44
SHA512e6865f140391031cdccbc11a147203927ff29aece0aa1da827af5b43aef6d8ae7480c6143d36263ecbe29334e557300928584761a14412c9a0bfdac8acb48574
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7443267.exeFilesize
307KB
MD54004f511d327172eae41fdea7e7c0ac7
SHA1bfd85c0eef8b3af1badcbecdafcff50bb458fe12
SHA256166f6d483805428959f650a02e3717e2d55cef70c33e10b75926a4e5d51c9b44
SHA512e6865f140391031cdccbc11a147203927ff29aece0aa1da827af5b43aef6d8ae7480c6143d36263ecbe29334e557300928584761a14412c9a0bfdac8acb48574
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2860382.exeFilesize
177KB
MD50e5da80d38ab680857addb1e54531dad
SHA159c4adcc6ba9fc3fab1ab9f229f417da94dbb257
SHA2564fc2f2689e37a60587cc9f304accd0b8f9d8ae9aaa4703228872c094d8d4697f
SHA512b8407a2b7d288836568d4124ca6ee268647f728852c26d4cf46ab2efb8a7d3165255ab3bfe3ae6f01cc7ab1893fc486959557cfe8032709f8bf24c4920aac8b0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2860382.exeFilesize
177KB
MD50e5da80d38ab680857addb1e54531dad
SHA159c4adcc6ba9fc3fab1ab9f229f417da94dbb257
SHA2564fc2f2689e37a60587cc9f304accd0b8f9d8ae9aaa4703228872c094d8d4697f
SHA512b8407a2b7d288836568d4124ca6ee268647f728852c26d4cf46ab2efb8a7d3165255ab3bfe3ae6f01cc7ab1893fc486959557cfe8032709f8bf24c4920aac8b0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1911737.exeFilesize
168KB
MD53268f6d63fc4768c6a0e98681d6d7926
SHA10bf3ad94d4db8d184ef217ab6e41b2f3c6c85218
SHA256eef32a8ca5c462fc42de97b9fc66787ddfc5cc2a390e7ddf95e60afaa3472471
SHA5126981937b41e6759fe1bb10655b7b3baa1ebb2fe027b44824aeac2aae8a542a596c72cbd47799f556ea00e5cfb90dc5bc3e2022df98c59b479945c5a4d9952036
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1911737.exeFilesize
168KB
MD53268f6d63fc4768c6a0e98681d6d7926
SHA10bf3ad94d4db8d184ef217ab6e41b2f3c6c85218
SHA256eef32a8ca5c462fc42de97b9fc66787ddfc5cc2a390e7ddf95e60afaa3472471
SHA5126981937b41e6759fe1bb10655b7b3baa1ebb2fe027b44824aeac2aae8a542a596c72cbd47799f556ea00e5cfb90dc5bc3e2022df98c59b479945c5a4d9952036
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/2120-172-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-154-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-160-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-162-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-164-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-166-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-168-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-170-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-156-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-174-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-176-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-178-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-179-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/2120-180-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/2120-181-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/2120-147-0x00000000049E0000-0x0000000004F84000-memory.dmpFilesize
5.6MB
-
memory/2120-148-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/2120-150-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/2120-149-0x00000000049D0000-0x00000000049E0000-memory.dmpFilesize
64KB
-
memory/2120-151-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-152-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/2120-158-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/4688-189-0x000000000A7C0000-0x000000000A7D2000-memory.dmpFilesize
72KB
-
memory/4688-194-0x000000000AB50000-0x000000000ABE2000-memory.dmpFilesize
584KB
-
memory/4688-195-0x000000000B390000-0x000000000B3F6000-memory.dmpFilesize
408KB
-
memory/4688-192-0x00000000052C0000-0x00000000052D0000-memory.dmpFilesize
64KB
-
memory/4688-191-0x000000000A820000-0x000000000A85C000-memory.dmpFilesize
240KB
-
memory/4688-190-0x00000000052C0000-0x00000000052D0000-memory.dmpFilesize
64KB
-
memory/4688-193-0x0000000005350000-0x00000000053C6000-memory.dmpFilesize
472KB
-
memory/4688-188-0x000000000A890000-0x000000000A99A000-memory.dmpFilesize
1.0MB
-
memory/4688-187-0x000000000AD70000-0x000000000B388000-memory.dmpFilesize
6.1MB
-
memory/4688-186-0x0000000000A50000-0x0000000000A80000-memory.dmpFilesize
192KB
-
memory/4688-196-0x000000000C0C0000-0x000000000C282000-memory.dmpFilesize
1.8MB
-
memory/4688-197-0x000000000C7C0000-0x000000000CCEC000-memory.dmpFilesize
5.2MB
-
memory/4688-198-0x000000000BEF0000-0x000000000BF40000-memory.dmpFilesize
320KB