Overview
overview
6Static
static
3mfc140kor.dll
windows7_x64
1mfc140kor.dll
windows10-2004_x64
1mfc140rus.dll
windows7_x64
1mfc140rus.dll
windows10-2004_x64
1mfc140u.dll
windows7_x64
1mfc140u.dll
windows10-2004_x64
1mfcm140.dll
windows7_x64
1mfcm140.dll
windows10-2004_x64
1mfcm140u.dll
windows7_x64
1mfcm140u.dll
windows10-2004_x64
1msvcp140.dll
windows7_x64
3msvcp140.dll
windows10-2004_x64
3node_sqlite3.dll
windows7_x64
3node_sqlite3.dll
windows10-2004_x64
3onlinedocu...on.url
windows7_x64
6onlinedocu...on.url
windows10-2004_x64
6opc.ua.cer...r..exe
windows7_x64
1opc.ua.cer...r..exe
windows10-2004_x64
1opcualds.exe
windows7_x64
1opcualds.exe
windows10-2004_x64
1rsopcgatew...es.dll
windows7_x64
1rsopcgatew...es.dll
windows10-2004_x64
1rsopcgatew...es.dll
windows7_x64
1rsopcgatew...es.dll
windows10-2004_x64
1rsopcgatewaychs.dll
windows7_x64
1rsopcgatewaychs.dll
windows10-2004_x64
1rsopcgatew...al.xml
windows7_x64
1rsopcgatew...al.xml
windows10-2004_x64
1rsopcgatew...te.xml
windows7_x64
1rsopcgatew...te.xml
windows10-2004_x64
1rsopcgatewayfra.dll
windows7_x64
1rsopcgatewayfra.dll
windows10-2004_x64
1Analysis
-
max time kernel
161s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
13-04-2022 00:45
Behavioral task
behavioral1
Sample
mfc140kor.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
mfc140kor.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
mfc140rus.dll
Resource
win7-20220331-en
Behavioral task
behavioral4
Sample
mfc140rus.dll
Resource
win10v2004-20220331-en
Behavioral task
behavioral5
Sample
mfc140u.dll
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
mfc140u.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
mfcm140.dll
Resource
win7-20220331-en
Behavioral task
behavioral8
Sample
mfcm140.dll
Resource
win10v2004-20220331-en
Behavioral task
behavioral9
Sample
mfcm140u.dll
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
mfcm140u.dll
Resource
win10v2004-20220331-en
Behavioral task
behavioral11
Sample
msvcp140.dll
Resource
win7-20220331-en
Behavioral task
behavioral12
Sample
msvcp140.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
node_sqlite3.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
node_sqlite3.dll
Resource
win10v2004-20220331-en
Behavioral task
behavioral15
Sample
onlinedocumentation.url
Resource
win7-20220331-en
Behavioral task
behavioral16
Sample
onlinedocumentation.url
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
opc.ua.certificategenerator..exe
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
opc.ua.certificategenerator..exe
Resource
win10v2004-20220331-en
Behavioral task
behavioral19
Sample
opcualds.exe
Resource
win7-20220331-en
Behavioral task
behavioral20
Sample
opcualds.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral21
Sample
rsopcgatewayaddin.resources.dll
Resource
win7-20220331-en
Behavioral task
behavioral22
Sample
rsopcgatewayaddin.resources.dll
Resource
win10v2004-20220331-en
Behavioral task
behavioral23
Sample
rsopcgatewayaddin.resources.dll
Resource
win7-20220310-en
Behavioral task
behavioral24
Sample
rsopcgatewayaddin.resources.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral25
Sample
rsopcgatewaychs.dll
Resource
win7-20220331-en
Behavioral task
behavioral26
Sample
rsopcgatewaychs.dll
Resource
win10v2004-20220331-en
Behavioral task
behavioral27
Sample
rsopcgatewaydcomcfg_local.xml
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
rsopcgatewaydcomcfg_local.xml
Resource
win10v2004-20220331-en
Behavioral task
behavioral29
Sample
rsopcgatewaydcomcfg_remote.xml
Resource
win7-20220331-en
Behavioral task
behavioral30
Sample
rsopcgatewaydcomcfg_remote.xml
Resource
win10v2004-20220310-en
Behavioral task
behavioral31
Sample
rsopcgatewayfra.dll
Resource
win7-20220331-en
Behavioral task
behavioral32
Sample
rsopcgatewayfra.dll
Resource
win10v2004-en-20220113
General
-
Target
onlinedocumentation.url
-
Size
61B
-
MD5
878dd1f05f73ef7c4701564992f85953
-
SHA1
6a761b0e64d50b36c70047c36efc24b88a6f71f5
-
SHA256
b6bd8bad56285a8317351e36c40986946d44ee6d1fce6e4d84c5e736079bc32c
-
SHA512
c8bb9f1e801f417d885c1013751c6b1a57e01c284a44be447892b99fcf700d096f2bacac87b2ca580a8a3417b8b730c4a79968355a0f1b747ae4a02940ec0a9c
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\ee9cb008-0027-4950-84e6-c805e8587e8e.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220413005202.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 204 msedge.exe 204 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 2016 identity_helper.exe 2016 identity_helper.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exemsedge.exedescription pid process target process PID 4552 wrote to memory of 4908 4552 rundll32.exe msedge.exe PID 4552 wrote to memory of 4908 4552 rundll32.exe msedge.exe PID 4908 wrote to memory of 4440 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4440 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 112 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 204 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 204 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4452 4908 msedge.exe msedge.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\onlinedocumentation.url1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.opcfoundation.org/LDS/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8198e46f8,0x7ff8198e4708,0x7ff8198e47183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6c8fc5460,0x7ff6c8fc5470,0x7ff6c8fc54804⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6128 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3355355027596471462,5433835898359558521,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5692 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\pipe\LOCAL\crashpad_4908_QHBXSRIEFGJBHSYTMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/112-136-0x0000000000000000-mapping.dmp
-
memory/112-138-0x00007FF839570000-0x00007FF839571000-memory.dmpFilesize
4KB
-
memory/204-137-0x0000000000000000-mapping.dmp
-
memory/636-144-0x0000000000000000-mapping.dmp
-
memory/1904-155-0x0000000000000000-mapping.dmp
-
memory/2016-157-0x0000000000000000-mapping.dmp
-
memory/2544-150-0x0000000000000000-mapping.dmp
-
memory/2644-164-0x0000000000000000-mapping.dmp
-
memory/2876-156-0x0000000000000000-mapping.dmp
-
memory/3476-162-0x0000000000000000-mapping.dmp
-
memory/3816-153-0x0000000000000000-mapping.dmp
-
memory/4220-147-0x0000000000000000-mapping.dmp
-
memory/4264-159-0x0000000000000000-mapping.dmp
-
memory/4440-134-0x0000000000000000-mapping.dmp
-
memory/4452-141-0x0000000000000000-mapping.dmp
-
memory/4908-133-0x0000000000000000-mapping.dmp