Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-12-2021 14:44
Static task
static1
Behavioral task
behavioral1
Sample
96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe
Resource
win10-en-20211104
General
-
Target
96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe
-
Size
213KB
-
MD5
5dcb1b120e3fd1acdd5f222493bd19b8
-
SHA1
c1a2a5a269976b0e1ef333d71b6bac272d8f8077
-
SHA256
96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad
-
SHA512
0e34bd780fdcb8299b4111ed0c8f99a6f8a2d82e39f24f2282bb1f647b872c190a9d324f504446384d35ed0ce171235a4407923206644ec887cb7369fedfc786
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
raccoon
1.8.3-hotfix
f797145799b7b1b77b35d81de942eee0908da519
-
url4cnc
http://91.219.236.27/capibar
http://94.158.245.167/capibar
http://185.163.204.216/capibar
http://185.225.19.238/capibar
http://185.163.204.218/capibar
https://t.me/capibar
Extracted
raccoon
1.8.3-hotfix
fd4f23250443a724a3d1548e6ab07c481dfc2814
-
url4cnc
http://91.219.236.27/duglassa1
http://94.158.245.167/duglassa1
http://185.163.204.216/duglassa1
http://185.225.19.238/duglassa1
http://185.163.204.218/duglassa1
https://t.me/duglassa1
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1124-139-0x0000000001270000-0x00000000012D9000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Bazar/Team9 Loader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1176-159-0x0000000180000000-0x0000000180040000-memory.dmp BazarLoaderVar5 -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
EAAF.exeEAAF.exe6416.exe6B1C.exe80B9.exe9A2E.exepid process 1324 EAAF.exe 1396 EAAF.exe 1412 6416.exe 1124 6B1C.exe 1052 80B9.exe 4060 9A2E.exe -
Deletes itself 1 IoCs
Processes:
pid process 3040 -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1176 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
6B1C.exepid process 1124 6B1C.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exeEAAF.exedescription pid process target process PID 2604 set thread context of 3856 2604 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe PID 1324 set thread context of 1396 1324 EAAF.exe EAAF.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exeEAAF.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EAAF.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EAAF.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EAAF.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exepid process 3856 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 3856 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3040 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exeEAAF.exepid process 3856 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 1396 EAAF.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
6B1C.exedescription pid process Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 1124 6B1C.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exeEAAF.exedescription pid process target process PID 2604 wrote to memory of 3856 2604 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe PID 2604 wrote to memory of 3856 2604 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe PID 2604 wrote to memory of 3856 2604 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe PID 2604 wrote to memory of 3856 2604 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe PID 2604 wrote to memory of 3856 2604 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe PID 2604 wrote to memory of 3856 2604 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe 96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe PID 3040 wrote to memory of 1324 3040 EAAF.exe PID 3040 wrote to memory of 1324 3040 EAAF.exe PID 3040 wrote to memory of 1324 3040 EAAF.exe PID 1324 wrote to memory of 1396 1324 EAAF.exe EAAF.exe PID 1324 wrote to memory of 1396 1324 EAAF.exe EAAF.exe PID 1324 wrote to memory of 1396 1324 EAAF.exe EAAF.exe PID 1324 wrote to memory of 1396 1324 EAAF.exe EAAF.exe PID 1324 wrote to memory of 1396 1324 EAAF.exe EAAF.exe PID 1324 wrote to memory of 1396 1324 EAAF.exe EAAF.exe PID 3040 wrote to memory of 1412 3040 6416.exe PID 3040 wrote to memory of 1412 3040 6416.exe PID 3040 wrote to memory of 1412 3040 6416.exe PID 3040 wrote to memory of 1124 3040 6B1C.exe PID 3040 wrote to memory of 1124 3040 6B1C.exe PID 3040 wrote to memory of 1124 3040 6B1C.exe PID 3040 wrote to memory of 1176 3040 regsvr32.exe PID 3040 wrote to memory of 1176 3040 regsvr32.exe PID 3040 wrote to memory of 1052 3040 80B9.exe PID 3040 wrote to memory of 1052 3040 80B9.exe PID 3040 wrote to memory of 1052 3040 80B9.exe PID 3040 wrote to memory of 4060 3040 9A2E.exe PID 3040 wrote to memory of 4060 3040 9A2E.exe PID 3040 wrote to memory of 4060 3040 9A2E.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe"C:\Users\Admin\AppData\Local\Temp\96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe"C:\Users\Admin\AppData\Local\Temp\96bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EAAF.exeC:\Users\Admin\AppData\Local\Temp\EAAF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\EAAF.exeC:\Users\Admin\AppData\Local\Temp\EAAF.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\6416.exeC:\Users\Admin\AppData\Local\Temp\6416.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\6B1C.exeC:\Users\Admin\AppData\Local\Temp\6B1C.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\78B9.dll1⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\80B9.exeC:\Users\Admin\AppData\Local\Temp\80B9.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\9A2E.exeC:\Users\Admin\AppData\Local\Temp\9A2E.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6416.exeMD5
bce50d5b17bb88f22f0000511026520d
SHA1599aaed4ee72ec0e0fc4cada844a1c210e332961
SHA25677e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455
SHA512c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536
-
C:\Users\Admin\AppData\Local\Temp\6416.exeMD5
bce50d5b17bb88f22f0000511026520d
SHA1599aaed4ee72ec0e0fc4cada844a1c210e332961
SHA25677e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455
SHA512c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536
-
C:\Users\Admin\AppData\Local\Temp\6B1C.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\6B1C.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\78B9.dllMD5
d08fcd4a44230a79c94380f259b2ebc6
SHA16c80fd972746493c871372f96ad35d29d0bb6422
SHA25654ff61f369d5c01b1770f8ad2fd7bc31373c7a54e14c7eadc63119d3e9cb38b6
SHA5125ec0f7f82f2495754c74ae09958f74525bb72641fae73dff1feefb56d16cd9189ead0fb1a49b01f4768c16dc8dceff4ab490480ab2a180e483f2043b3607b9e2
-
C:\Users\Admin\AppData\Local\Temp\80B9.exeMD5
c910c28e370e3e16c2a27e7acf65ea9a
SHA1a25693d3842385bcde757b070e78973e43f37526
SHA2565dc8f665251e67cf8f784e537df31894f9106d7dbdb72f35ce53b2c3ad357f0d
SHA512624d164eda0b6f9a1c309539bc128c5b560c0a0013176eb4d9333055654cfa4243b2211c0b5ac3bf666036a1fdcc7c3e2999abb0e8ad3a6809bf4d2ddeaee230
-
C:\Users\Admin\AppData\Local\Temp\80B9.exeMD5
c910c28e370e3e16c2a27e7acf65ea9a
SHA1a25693d3842385bcde757b070e78973e43f37526
SHA2565dc8f665251e67cf8f784e537df31894f9106d7dbdb72f35ce53b2c3ad357f0d
SHA512624d164eda0b6f9a1c309539bc128c5b560c0a0013176eb4d9333055654cfa4243b2211c0b5ac3bf666036a1fdcc7c3e2999abb0e8ad3a6809bf4d2ddeaee230
-
C:\Users\Admin\AppData\Local\Temp\9A2E.exeMD5
82647c7fd8bfcebe57a46f009285e030
SHA1d602af33f0bb33493b0d3530ee9369b5cfe2df0a
SHA256eefc11d7652518188e5cec696e4e45f774acc45b4d158cba71eb5a8cfe392736
SHA5123c956fca15a15ef0e4804f51de7aa1cd2dbd829340558378350defbb2924986c72cce4af54b126e078d09d9acbe4bb435f1160944523f8fb6dbf871cbf546fa9
-
C:\Users\Admin\AppData\Local\Temp\9A2E.exeMD5
82647c7fd8bfcebe57a46f009285e030
SHA1d602af33f0bb33493b0d3530ee9369b5cfe2df0a
SHA256eefc11d7652518188e5cec696e4e45f774acc45b4d158cba71eb5a8cfe392736
SHA5123c956fca15a15ef0e4804f51de7aa1cd2dbd829340558378350defbb2924986c72cce4af54b126e078d09d9acbe4bb435f1160944523f8fb6dbf871cbf546fa9
-
C:\Users\Admin\AppData\Local\Temp\EAAF.exeMD5
5dcb1b120e3fd1acdd5f222493bd19b8
SHA1c1a2a5a269976b0e1ef333d71b6bac272d8f8077
SHA25696bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad
SHA5120e34bd780fdcb8299b4111ed0c8f99a6f8a2d82e39f24f2282bb1f647b872c190a9d324f504446384d35ed0ce171235a4407923206644ec887cb7369fedfc786
-
C:\Users\Admin\AppData\Local\Temp\EAAF.exeMD5
5dcb1b120e3fd1acdd5f222493bd19b8
SHA1c1a2a5a269976b0e1ef333d71b6bac272d8f8077
SHA25696bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad
SHA5120e34bd780fdcb8299b4111ed0c8f99a6f8a2d82e39f24f2282bb1f647b872c190a9d324f504446384d35ed0ce171235a4407923206644ec887cb7369fedfc786
-
C:\Users\Admin\AppData\Local\Temp\EAAF.exeMD5
5dcb1b120e3fd1acdd5f222493bd19b8
SHA1c1a2a5a269976b0e1ef333d71b6bac272d8f8077
SHA25696bc2b106c58acdbddad04b6c1288b5d9939a14bc13d083db55aa453fac7a6ad
SHA5120e34bd780fdcb8299b4111ed0c8f99a6f8a2d82e39f24f2282bb1f647b872c190a9d324f504446384d35ed0ce171235a4407923206644ec887cb7369fedfc786
-
\Users\Admin\AppData\Local\Temp\78B9.dllMD5
d08fcd4a44230a79c94380f259b2ebc6
SHA16c80fd972746493c871372f96ad35d29d0bb6422
SHA25654ff61f369d5c01b1770f8ad2fd7bc31373c7a54e14c7eadc63119d3e9cb38b6
SHA5125ec0f7f82f2495754c74ae09958f74525bb72641fae73dff1feefb56d16cd9189ead0fb1a49b01f4768c16dc8dceff4ab490480ab2a180e483f2043b3607b9e2
-
memory/1052-164-0x0000000000000000-mapping.dmp
-
memory/1052-167-0x0000000000EA0000-0x0000000000EE6000-memory.dmpFilesize
280KB
-
memory/1124-149-0x0000000005B60000-0x0000000005B61000-memory.dmpFilesize
4KB
-
memory/1124-171-0x0000000006A10000-0x0000000006A11000-memory.dmpFilesize
4KB
-
memory/1124-177-0x0000000007C20000-0x0000000007C21000-memory.dmpFilesize
4KB
-
memory/1124-176-0x0000000007520000-0x0000000007521000-memory.dmpFilesize
4KB
-
memory/1124-139-0x0000000001270000-0x00000000012D9000-memory.dmpFilesize
420KB
-
memory/1124-140-0x0000000001190000-0x0000000001191000-memory.dmpFilesize
4KB
-
memory/1124-141-0x0000000075C40000-0x0000000075E02000-memory.dmpFilesize
1.8MB
-
memory/1124-142-0x0000000076730000-0x0000000076821000-memory.dmpFilesize
964KB
-
memory/1124-143-0x0000000001270000-0x0000000001271000-memory.dmpFilesize
4KB
-
memory/1124-144-0x0000000002F70000-0x0000000002FB5000-memory.dmpFilesize
276KB
-
memory/1124-146-0x0000000071890000-0x0000000071910000-memory.dmpFilesize
512KB
-
memory/1124-147-0x0000000006060000-0x0000000006061000-memory.dmpFilesize
4KB
-
memory/1124-148-0x0000000005990000-0x0000000005991000-memory.dmpFilesize
4KB
-
memory/1124-172-0x00000000069F0000-0x00000000069F1000-memory.dmpFilesize
4KB
-
memory/1124-150-0x00000000059F0000-0x00000000059F1000-memory.dmpFilesize
4KB
-
memory/1124-152-0x0000000005A40000-0x0000000005A41000-memory.dmpFilesize
4KB
-
memory/1124-151-0x0000000074090000-0x0000000074614000-memory.dmpFilesize
5.5MB
-
memory/1124-153-0x0000000074620000-0x0000000075968000-memory.dmpFilesize
19.3MB
-
memory/1124-154-0x0000000005A50000-0x0000000005A51000-memory.dmpFilesize
4KB
-
memory/1124-155-0x000000006FB00000-0x000000006FB4B000-memory.dmpFilesize
300KB
-
memory/1124-136-0x0000000000000000-mapping.dmp
-
memory/1124-170-0x00000000068F0000-0x00000000068F1000-memory.dmpFilesize
4KB
-
memory/1124-169-0x0000000005D50000-0x0000000005D51000-memory.dmpFilesize
4KB
-
memory/1124-168-0x0000000006B70000-0x0000000006B71000-memory.dmpFilesize
4KB
-
memory/1176-159-0x0000000180000000-0x0000000180040000-memory.dmpFilesize
256KB
-
memory/1176-156-0x0000000000000000-mapping.dmp
-
memory/1324-123-0x0000000000000000-mapping.dmp
-
memory/1396-127-0x0000000000402F47-mapping.dmp
-
memory/1412-134-0x0000000002100000-0x000000000218F000-memory.dmpFilesize
572KB
-
memory/1412-130-0x0000000000000000-mapping.dmp
-
memory/1412-135-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/2604-121-0x0000000002CE0000-0x0000000002CE9000-memory.dmpFilesize
36KB
-
memory/2604-120-0x0000000002CD0000-0x0000000002CD9000-memory.dmpFilesize
36KB
-
memory/3040-129-0x0000000002560000-0x0000000002576000-memory.dmpFilesize
88KB
-
memory/3040-122-0x00000000009A0000-0x00000000009B6000-memory.dmpFilesize
88KB
-
memory/3856-118-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3856-119-0x0000000000402F47-mapping.dmp
-
memory/4060-173-0x0000000000000000-mapping.dmp
-
memory/4060-178-0x0000000004820000-0x000000000486F000-memory.dmpFilesize
316KB
-
memory/4060-179-0x0000000004870000-0x00000000048FF000-memory.dmpFilesize
572KB
-
memory/4060-180-0x0000000000400000-0x0000000002BBC000-memory.dmpFilesize
39.7MB