Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-05-2023 15:46
Static task
static1
Behavioral task
behavioral1
Sample
54d065d10ad88b6080baff4c9022cefc.exe
Resource
win7-20230220-en
General
-
Target
54d065d10ad88b6080baff4c9022cefc.exe
-
Size
1.1MB
-
MD5
54d065d10ad88b6080baff4c9022cefc
-
SHA1
d9b643436915fea88540eb0fbbf935983250f1ff
-
SHA256
412bd8c4546d08c9c75382080465565edbddc407221934823da9bf4ff123d115
-
SHA512
6b0a1d7e9c6be182cf5d06305ff27923b8919af31ecb724d14a6881582762437364312a90e79ab5c424fd96967b673d5902916d4477f2aa047e83568d498d9c1
-
SSDEEP
24576:IyX3/4SELG+qwIDC/948Y5D8Wfs6u0VPD+9iG2bel8WvelERK:PH/QOXDCl48Yh+6ucPDjG26aie2
Malware Config
Extracted
redline
liza
83.97.73.127:19045
-
auth_value
198e3e9b188d6cfab0a2b0fb100bb7c5
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
z6484949.exez4031288.exeo5085742.exep9397281.exepid process 1992 z6484949.exe 1508 z4031288.exe 1072 o5085742.exe 564 p9397281.exe -
Loads dropped DLL 13 IoCs
Processes:
54d065d10ad88b6080baff4c9022cefc.exez6484949.exez4031288.exeo5085742.exep9397281.exeWerFault.exepid process 324 54d065d10ad88b6080baff4c9022cefc.exe 1992 z6484949.exe 1992 z6484949.exe 1508 z4031288.exe 1508 z4031288.exe 1072 o5085742.exe 1508 z4031288.exe 564 p9397281.exe 396 WerFault.exe 396 WerFault.exe 396 WerFault.exe 396 WerFault.exe 396 WerFault.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
54d065d10ad88b6080baff4c9022cefc.exez6484949.exez4031288.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54d065d10ad88b6080baff4c9022cefc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6484949.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6484949.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4031288.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4031288.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 54d065d10ad88b6080baff4c9022cefc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
o5085742.exedescription pid process target process PID 1072 set thread context of 1012 1072 o5085742.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 396 564 WerFault.exe p9397281.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1012 AppLaunch.exe 1012 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1012 AppLaunch.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
54d065d10ad88b6080baff4c9022cefc.exez6484949.exez4031288.exeo5085742.exep9397281.exedescription pid process target process PID 324 wrote to memory of 1992 324 54d065d10ad88b6080baff4c9022cefc.exe z6484949.exe PID 324 wrote to memory of 1992 324 54d065d10ad88b6080baff4c9022cefc.exe z6484949.exe PID 324 wrote to memory of 1992 324 54d065d10ad88b6080baff4c9022cefc.exe z6484949.exe PID 324 wrote to memory of 1992 324 54d065d10ad88b6080baff4c9022cefc.exe z6484949.exe PID 324 wrote to memory of 1992 324 54d065d10ad88b6080baff4c9022cefc.exe z6484949.exe PID 324 wrote to memory of 1992 324 54d065d10ad88b6080baff4c9022cefc.exe z6484949.exe PID 324 wrote to memory of 1992 324 54d065d10ad88b6080baff4c9022cefc.exe z6484949.exe PID 1992 wrote to memory of 1508 1992 z6484949.exe z4031288.exe PID 1992 wrote to memory of 1508 1992 z6484949.exe z4031288.exe PID 1992 wrote to memory of 1508 1992 z6484949.exe z4031288.exe PID 1992 wrote to memory of 1508 1992 z6484949.exe z4031288.exe PID 1992 wrote to memory of 1508 1992 z6484949.exe z4031288.exe PID 1992 wrote to memory of 1508 1992 z6484949.exe z4031288.exe PID 1992 wrote to memory of 1508 1992 z6484949.exe z4031288.exe PID 1508 wrote to memory of 1072 1508 z4031288.exe o5085742.exe PID 1508 wrote to memory of 1072 1508 z4031288.exe o5085742.exe PID 1508 wrote to memory of 1072 1508 z4031288.exe o5085742.exe PID 1508 wrote to memory of 1072 1508 z4031288.exe o5085742.exe PID 1508 wrote to memory of 1072 1508 z4031288.exe o5085742.exe PID 1508 wrote to memory of 1072 1508 z4031288.exe o5085742.exe PID 1508 wrote to memory of 1072 1508 z4031288.exe o5085742.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1072 wrote to memory of 1012 1072 o5085742.exe AppLaunch.exe PID 1508 wrote to memory of 564 1508 z4031288.exe p9397281.exe PID 1508 wrote to memory of 564 1508 z4031288.exe p9397281.exe PID 1508 wrote to memory of 564 1508 z4031288.exe p9397281.exe PID 1508 wrote to memory of 564 1508 z4031288.exe p9397281.exe PID 1508 wrote to memory of 564 1508 z4031288.exe p9397281.exe PID 1508 wrote to memory of 564 1508 z4031288.exe p9397281.exe PID 1508 wrote to memory of 564 1508 z4031288.exe p9397281.exe PID 564 wrote to memory of 396 564 p9397281.exe WerFault.exe PID 564 wrote to memory of 396 564 p9397281.exe WerFault.exe PID 564 wrote to memory of 396 564 p9397281.exe WerFault.exe PID 564 wrote to memory of 396 564 p9397281.exe WerFault.exe PID 564 wrote to memory of 396 564 p9397281.exe WerFault.exe PID 564 wrote to memory of 396 564 p9397281.exe WerFault.exe PID 564 wrote to memory of 396 564 p9397281.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54d065d10ad88b6080baff4c9022cefc.exe"C:\Users\Admin\AppData\Local\Temp\54d065d10ad88b6080baff4c9022cefc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6484949.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6484949.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4031288.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4031288.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5085742.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5085742.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 6405⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6484949.exeFilesize
633KB
MD56104c26c196b413e34a8f4a5c303a62a
SHA13b73e5a0777a9d2779d1226d80aef74ae51d81c0
SHA2567306c69f2e476dac34aaa796dcca6d50cbdf9982300a4bee4a23dce55d592092
SHA512bb25ac6275c228f3a8bf758671ecd20493192f7300e325a16b0a3089a8934a57b701b62a5d54df067c8e382cae6f20e908b3ca99c1f6633a20ee906926cf20f5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6484949.exeFilesize
633KB
MD56104c26c196b413e34a8f4a5c303a62a
SHA13b73e5a0777a9d2779d1226d80aef74ae51d81c0
SHA2567306c69f2e476dac34aaa796dcca6d50cbdf9982300a4bee4a23dce55d592092
SHA512bb25ac6275c228f3a8bf758671ecd20493192f7300e325a16b0a3089a8934a57b701b62a5d54df067c8e382cae6f20e908b3ca99c1f6633a20ee906926cf20f5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4031288.exeFilesize
290KB
MD5d64ea07bdf47411bafff772dc11190a9
SHA1cd1cac7e66cad8fd76a181183c75ec15ddea403b
SHA256c2712442440ea937f5f580521e73f3abeb7dc86d2a192bc1c5c73c85386cb5db
SHA512cae62601fae30d4447ace4afa0d11a05ce9c5a743ed58caeeb3ca8d1070ae8e52d22c67cd5c424b904f1ac7c4e89fb549aa2aca5c666f1eed352f1583eb6b2b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4031288.exeFilesize
290KB
MD5d64ea07bdf47411bafff772dc11190a9
SHA1cd1cac7e66cad8fd76a181183c75ec15ddea403b
SHA256c2712442440ea937f5f580521e73f3abeb7dc86d2a192bc1c5c73c85386cb5db
SHA512cae62601fae30d4447ace4afa0d11a05ce9c5a743ed58caeeb3ca8d1070ae8e52d22c67cd5c424b904f1ac7c4e89fb549aa2aca5c666f1eed352f1583eb6b2b4
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5085742.exeFilesize
192KB
MD50760146c33f530ec514c32449ab1a485
SHA1df6f72201279e5f8bc998baa8f191fdc056b310c
SHA256be04b7b0d8c1c2c1420dde99efaa91b563ce08eb3fa502b6b31414d16f7760c0
SHA512af60f75110279981506c45a1067b90ac10da08bd3c22b0941687013c313825e1ff04e2bc16f2cfb577ae0603fa220ca4dc7693b52eb7aac7bcd5e106c3008165
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5085742.exeFilesize
192KB
MD50760146c33f530ec514c32449ab1a485
SHA1df6f72201279e5f8bc998baa8f191fdc056b310c
SHA256be04b7b0d8c1c2c1420dde99efaa91b563ce08eb3fa502b6b31414d16f7760c0
SHA512af60f75110279981506c45a1067b90ac10da08bd3c22b0941687013c313825e1ff04e2bc16f2cfb577ae0603fa220ca4dc7693b52eb7aac7bcd5e106c3008165
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6484949.exeFilesize
633KB
MD56104c26c196b413e34a8f4a5c303a62a
SHA13b73e5a0777a9d2779d1226d80aef74ae51d81c0
SHA2567306c69f2e476dac34aaa796dcca6d50cbdf9982300a4bee4a23dce55d592092
SHA512bb25ac6275c228f3a8bf758671ecd20493192f7300e325a16b0a3089a8934a57b701b62a5d54df067c8e382cae6f20e908b3ca99c1f6633a20ee906926cf20f5
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6484949.exeFilesize
633KB
MD56104c26c196b413e34a8f4a5c303a62a
SHA13b73e5a0777a9d2779d1226d80aef74ae51d81c0
SHA2567306c69f2e476dac34aaa796dcca6d50cbdf9982300a4bee4a23dce55d592092
SHA512bb25ac6275c228f3a8bf758671ecd20493192f7300e325a16b0a3089a8934a57b701b62a5d54df067c8e382cae6f20e908b3ca99c1f6633a20ee906926cf20f5
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4031288.exeFilesize
290KB
MD5d64ea07bdf47411bafff772dc11190a9
SHA1cd1cac7e66cad8fd76a181183c75ec15ddea403b
SHA256c2712442440ea937f5f580521e73f3abeb7dc86d2a192bc1c5c73c85386cb5db
SHA512cae62601fae30d4447ace4afa0d11a05ce9c5a743ed58caeeb3ca8d1070ae8e52d22c67cd5c424b904f1ac7c4e89fb549aa2aca5c666f1eed352f1583eb6b2b4
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4031288.exeFilesize
290KB
MD5d64ea07bdf47411bafff772dc11190a9
SHA1cd1cac7e66cad8fd76a181183c75ec15ddea403b
SHA256c2712442440ea937f5f580521e73f3abeb7dc86d2a192bc1c5c73c85386cb5db
SHA512cae62601fae30d4447ace4afa0d11a05ce9c5a743ed58caeeb3ca8d1070ae8e52d22c67cd5c424b904f1ac7c4e89fb549aa2aca5c666f1eed352f1583eb6b2b4
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5085742.exeFilesize
192KB
MD50760146c33f530ec514c32449ab1a485
SHA1df6f72201279e5f8bc998baa8f191fdc056b310c
SHA256be04b7b0d8c1c2c1420dde99efaa91b563ce08eb3fa502b6b31414d16f7760c0
SHA512af60f75110279981506c45a1067b90ac10da08bd3c22b0941687013c313825e1ff04e2bc16f2cfb577ae0603fa220ca4dc7693b52eb7aac7bcd5e106c3008165
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5085742.exeFilesize
192KB
MD50760146c33f530ec514c32449ab1a485
SHA1df6f72201279e5f8bc998baa8f191fdc056b310c
SHA256be04b7b0d8c1c2c1420dde99efaa91b563ce08eb3fa502b6b31414d16f7760c0
SHA512af60f75110279981506c45a1067b90ac10da08bd3c22b0941687013c313825e1ff04e2bc16f2cfb577ae0603fa220ca4dc7693b52eb7aac7bcd5e106c3008165
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9397281.exeFilesize
168KB
MD5c3c296cb3893a69a2baf56b48a1757cc
SHA1a00f8f3046596566420e7eb35775e9a14dfdb0fe
SHA2567b31c87f4d543a9afb4f4c932216927a005bfac0681f7e51843fd553c9a0333b
SHA51277bb7bbeafec4d424d69b5f3f460d4ca844f49e89693821205a609d6d315c72a066e1b5b12a8b405bde7fde5cf19af24a14eac26ddd367358e6234242fc049e1
-
memory/564-100-0x0000000000F10000-0x0000000000F3E000-memory.dmpFilesize
184KB
-
memory/1012-85-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1012-93-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1012-92-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1012-90-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1012-86-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB