Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
25-09-2021 08:39
Static task
static1
General
-
Target
905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe
-
Size
123KB
-
MD5
0d5553e4a19d544d104aa8bbee6b1b29
-
SHA1
fd330dcbfe8fe69974e393c2bc82c85d5f454247
-
SHA256
905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327
-
SHA512
ee6ac8cd9b10b320b738b6aa0793f103145cea1636f546efa0fce1593ea199b6bb248675755ccb84bdda5f5f4ede5cf9e53ab0e5a59e706d16585f192da500d7
Malware Config
Extracted
smokeloader
2020
http://naghenrietti1.top/
http://kimballiett2.top/
http://xadriettany3.top/
http://jebeccallis4.top/
http://nityanneron5.top/
http://umayaniela6.top/
http://lynettaram7.top/
http://sadineyalas8.top/
http://geenaldencia9.top/
http://aradysiusep10.top/
Extracted
redline
135.181.142.223:30397
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/4348-133-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/4348-134-0x000000000041C5CE-mapping.dmp family_redline behavioral1/memory/4348-143-0x00000000050C0000-0x00000000056C6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
E1CB.exeE537.exeufgifsvE537.exeE1CB.exeFDF0.exeufgifsvpid process 3536 E1CB.exe 3420 E537.exe 4376 ufgifsv 4348 E537.exe 4624 E1CB.exe 4504 FDF0.exe 772 ufgifsv -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
FDF0.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FDF0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FDF0.exe -
Deletes itself 1 IoCs
Processes:
pid process 3048 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\FDF0.exe themida C:\Users\Admin\AppData\Local\Temp\FDF0.exe themida behavioral1/memory/4504-162-0x0000000000A00000-0x0000000000A01000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
FDF0.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FDF0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
FDF0.exepid process 4504 FDF0.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exeE537.exeE1CB.exeufgifsvdescription pid process target process PID 3704 set thread context of 4164 3704 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe PID 3420 set thread context of 4348 3420 E537.exe E537.exe PID 3536 set thread context of 4624 3536 E1CB.exe E1CB.exe PID 4376 set thread context of 772 4376 ufgifsv ufgifsv -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exeE1CB.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E1CB.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E1CB.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E1CB.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exepid process 4164 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 4164 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3048 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exeE1CB.exepid process 4164 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 4624 E1CB.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
E537.exeFDF0.exedescription pid process Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 4348 E537.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 4504 FDF0.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exeE537.exeE1CB.exeufgifsvdescription pid process target process PID 3704 wrote to memory of 4164 3704 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe PID 3704 wrote to memory of 4164 3704 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe PID 3704 wrote to memory of 4164 3704 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe PID 3704 wrote to memory of 4164 3704 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe PID 3704 wrote to memory of 4164 3704 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe PID 3704 wrote to memory of 4164 3704 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe 905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe PID 3048 wrote to memory of 3536 3048 E1CB.exe PID 3048 wrote to memory of 3536 3048 E1CB.exe PID 3048 wrote to memory of 3536 3048 E1CB.exe PID 3048 wrote to memory of 3420 3048 E537.exe PID 3048 wrote to memory of 3420 3048 E537.exe PID 3048 wrote to memory of 3420 3048 E537.exe PID 3420 wrote to memory of 4348 3420 E537.exe E537.exe PID 3420 wrote to memory of 4348 3420 E537.exe E537.exe PID 3420 wrote to memory of 4348 3420 E537.exe E537.exe PID 3420 wrote to memory of 4348 3420 E537.exe E537.exe PID 3420 wrote to memory of 4348 3420 E537.exe E537.exe PID 3420 wrote to memory of 4348 3420 E537.exe E537.exe PID 3420 wrote to memory of 4348 3420 E537.exe E537.exe PID 3420 wrote to memory of 4348 3420 E537.exe E537.exe PID 3536 wrote to memory of 4624 3536 E1CB.exe E1CB.exe PID 3536 wrote to memory of 4624 3536 E1CB.exe E1CB.exe PID 3536 wrote to memory of 4624 3536 E1CB.exe E1CB.exe PID 3536 wrote to memory of 4624 3536 E1CB.exe E1CB.exe PID 3536 wrote to memory of 4624 3536 E1CB.exe E1CB.exe PID 3536 wrote to memory of 4624 3536 E1CB.exe E1CB.exe PID 3048 wrote to memory of 4504 3048 FDF0.exe PID 3048 wrote to memory of 4504 3048 FDF0.exe PID 3048 wrote to memory of 4504 3048 FDF0.exe PID 4376 wrote to memory of 772 4376 ufgifsv ufgifsv PID 4376 wrote to memory of 772 4376 ufgifsv ufgifsv PID 4376 wrote to memory of 772 4376 ufgifsv ufgifsv PID 4376 wrote to memory of 772 4376 ufgifsv ufgifsv PID 4376 wrote to memory of 772 4376 ufgifsv ufgifsv PID 4376 wrote to memory of 772 4376 ufgifsv ufgifsv
Processes
-
C:\Users\Admin\AppData\Local\Temp\905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe"C:\Users\Admin\AppData\Local\Temp\905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe"C:\Users\Admin\AppData\Local\Temp\905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E1CB.exeC:\Users\Admin\AppData\Local\Temp\E1CB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E1CB.exeC:\Users\Admin\AppData\Local\Temp\E1CB.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E537.exeC:\Users\Admin\AppData\Local\Temp\E537.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E537.exeC:\Users\Admin\AppData\Local\Temp\E537.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\ufgifsvC:\Users\Admin\AppData\Roaming\ufgifsv1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\ufgifsvC:\Users\Admin\AppData\Roaming\ufgifsv2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FDF0.exeC:\Users\Admin\AppData\Local\Temp\FDF0.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\E537.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\E1CB.exeMD5
0d5553e4a19d544d104aa8bbee6b1b29
SHA1fd330dcbfe8fe69974e393c2bc82c85d5f454247
SHA256905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327
SHA512ee6ac8cd9b10b320b738b6aa0793f103145cea1636f546efa0fce1593ea199b6bb248675755ccb84bdda5f5f4ede5cf9e53ab0e5a59e706d16585f192da500d7
-
C:\Users\Admin\AppData\Local\Temp\E1CB.exeMD5
0d5553e4a19d544d104aa8bbee6b1b29
SHA1fd330dcbfe8fe69974e393c2bc82c85d5f454247
SHA256905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327
SHA512ee6ac8cd9b10b320b738b6aa0793f103145cea1636f546efa0fce1593ea199b6bb248675755ccb84bdda5f5f4ede5cf9e53ab0e5a59e706d16585f192da500d7
-
C:\Users\Admin\AppData\Local\Temp\E1CB.exeMD5
0d5553e4a19d544d104aa8bbee6b1b29
SHA1fd330dcbfe8fe69974e393c2bc82c85d5f454247
SHA256905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327
SHA512ee6ac8cd9b10b320b738b6aa0793f103145cea1636f546efa0fce1593ea199b6bb248675755ccb84bdda5f5f4ede5cf9e53ab0e5a59e706d16585f192da500d7
-
C:\Users\Admin\AppData\Local\Temp\E537.exeMD5
8df6ef1e48d3a33226c91bf4a93b0c8a
SHA1e70ed102babe577b9481be056cb8cc0564bdc669
SHA2565c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd
SHA512d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0
-
C:\Users\Admin\AppData\Local\Temp\E537.exeMD5
8df6ef1e48d3a33226c91bf4a93b0c8a
SHA1e70ed102babe577b9481be056cb8cc0564bdc669
SHA2565c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd
SHA512d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0
-
C:\Users\Admin\AppData\Local\Temp\E537.exeMD5
8df6ef1e48d3a33226c91bf4a93b0c8a
SHA1e70ed102babe577b9481be056cb8cc0564bdc669
SHA2565c08f9fc48f867d84001477316d7235e73483cc3fc6ac0f94ebd68564da016cd
SHA512d5e021bfd927ebd9ce585bafe88970ea576f4e27752940e087a03d18568787d7442735495703cd8c02a4988e4ab13fcfc089956c9b109d250227b947b8dab1d0
-
C:\Users\Admin\AppData\Local\Temp\FDF0.exeMD5
f853fe6b26dcf67545675aec618f3a99
SHA1a70f5ffd6dac789909ccb19dfb31272a520c7bc0
SHA256091ba447af0f0cabd66484b3f81e909ca01be4e27db9ccf42779174e04dad57a
SHA5124764e88d5bdcf88447e0782c88fec18f5a1083b460829e16635a8602173f1a6813d3ff93866bef587f9f9b682451d4386bd765b2da580c69f7483b48f074bbd3
-
C:\Users\Admin\AppData\Local\Temp\FDF0.exeMD5
f853fe6b26dcf67545675aec618f3a99
SHA1a70f5ffd6dac789909ccb19dfb31272a520c7bc0
SHA256091ba447af0f0cabd66484b3f81e909ca01be4e27db9ccf42779174e04dad57a
SHA5124764e88d5bdcf88447e0782c88fec18f5a1083b460829e16635a8602173f1a6813d3ff93866bef587f9f9b682451d4386bd765b2da580c69f7483b48f074bbd3
-
C:\Users\Admin\AppData\Roaming\ufgifsvMD5
0d5553e4a19d544d104aa8bbee6b1b29
SHA1fd330dcbfe8fe69974e393c2bc82c85d5f454247
SHA256905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327
SHA512ee6ac8cd9b10b320b738b6aa0793f103145cea1636f546efa0fce1593ea199b6bb248675755ccb84bdda5f5f4ede5cf9e53ab0e5a59e706d16585f192da500d7
-
C:\Users\Admin\AppData\Roaming\ufgifsvMD5
0d5553e4a19d544d104aa8bbee6b1b29
SHA1fd330dcbfe8fe69974e393c2bc82c85d5f454247
SHA256905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327
SHA512ee6ac8cd9b10b320b738b6aa0793f103145cea1636f546efa0fce1593ea199b6bb248675755ccb84bdda5f5f4ede5cf9e53ab0e5a59e706d16585f192da500d7
-
C:\Users\Admin\AppData\Roaming\ufgifsvMD5
0d5553e4a19d544d104aa8bbee6b1b29
SHA1fd330dcbfe8fe69974e393c2bc82c85d5f454247
SHA256905deb8731d287f33b690099dcf92356e5c671ba7339f4ebff3a704098286327
SHA512ee6ac8cd9b10b320b738b6aa0793f103145cea1636f546efa0fce1593ea199b6bb248675755ccb84bdda5f5f4ede5cf9e53ab0e5a59e706d16585f192da500d7
-
memory/772-151-0x0000000000402FA5-mapping.dmp
-
memory/3048-118-0x0000000000430000-0x0000000000446000-memory.dmpFilesize
88KB
-
memory/3048-153-0x00000000004A0000-0x00000000004B6000-memory.dmpFilesize
88KB
-
memory/3420-125-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/3420-128-0x0000000000B30000-0x0000000000B31000-memory.dmpFilesize
4KB
-
memory/3420-132-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/3420-131-0x0000000004AB0000-0x0000000004AB1000-memory.dmpFilesize
4KB
-
memory/3420-122-0x0000000000000000-mapping.dmp
-
memory/3420-127-0x00000000048A0000-0x00000000048A1000-memory.dmpFilesize
4KB
-
memory/3536-119-0x0000000000000000-mapping.dmp
-
memory/3704-117-0x00000000001E0000-0x00000000001E9000-memory.dmpFilesize
36KB
-
memory/4164-116-0x0000000000402FA5-mapping.dmp
-
memory/4164-115-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4348-154-0x00000000069D0000-0x00000000069D1000-memory.dmpFilesize
4KB
-
memory/4348-134-0x000000000041C5CE-mapping.dmp
-
memory/4348-143-0x00000000050C0000-0x00000000056C6000-memory.dmpFilesize
6.0MB
-
memory/4348-133-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/4348-142-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/4348-141-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/4348-140-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/4348-139-0x00000000012B0000-0x00000000012B1000-memory.dmpFilesize
4KB
-
memory/4348-138-0x00000000056D0000-0x00000000056D1000-memory.dmpFilesize
4KB
-
memory/4348-164-0x0000000007060000-0x0000000007061000-memory.dmpFilesize
4KB
-
memory/4348-155-0x00000000070D0000-0x00000000070D1000-memory.dmpFilesize
4KB
-
memory/4348-157-0x0000000006CC0000-0x0000000006CC1000-memory.dmpFilesize
4KB
-
memory/4504-159-0x00000000772D0000-0x000000007745E000-memory.dmpFilesize
1.6MB
-
memory/4504-162-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/4504-170-0x0000000005460000-0x0000000005461000-memory.dmpFilesize
4KB
-
memory/4504-147-0x0000000000000000-mapping.dmp
-
memory/4504-179-0x00000000090B0000-0x00000000090B1000-memory.dmpFilesize
4KB
-
memory/4624-145-0x0000000000402FA5-mapping.dmp