Analysis

  • max time kernel
    157s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 16:33

General

  • Target

    cc8bfc41764822a0d4957c09838043c3372e15b443d15f6b517507d50b93c97e.exe

  • Size

    378KB

  • MD5

    dbd4eaa32b48668264f9944a4cecf40c

  • SHA1

    2040758fdda0905074ecc8d6d88da1f0b615b01b

  • SHA256

    cc8bfc41764822a0d4957c09838043c3372e15b443d15f6b517507d50b93c97e

  • SHA512

    69c338f2c328a0ea64d44c00845c2031573acc6bd4fb3ad72393733363a8ef8fd2dab268bf5274fffbf275c7ca028f79fffc92a0b834304ba0053149daa4a464

  • SSDEEP

    6144:bDATSLGRpIup8WvH0k3XFiVqzyigEx2MXjPMk:bDA+KXICvHpFjyza9

Malware Config

Extracted

Family

vidar

Version

56.1

Botnet

1148

C2

https://t.me/dishasta

https://steamcommunity.com/profiles/76561199441933804

Attributes
  • profile_id

    1148

Extracted

Family

redline

Botnet

YT

C2

65.21.5.58:48811

Attributes
  • auth_value

    fb878dde7f3b4ad1e1bc26d24db36d28

Signatures

  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc8bfc41764822a0d4957c09838043c3372e15b443d15f6b517507d50b93c97e.exe
    "C:\Users\Admin\AppData\Local\Temp\cc8bfc41764822a0d4957c09838043c3372e15b443d15f6b517507d50b93c97e.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1436
  • C:\Users\Admin\AppData\Local\Temp\4239.exe
    C:\Users\Admin\AppData\Local\Temp\4239.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Users\Admin\AppData\Local\Temp\4239.exe
      "C:\Users\Admin\AppData\Local\Temp\4239.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Users\Admin\AppData\Local\Temp\4239.exe
        "C:\Users\Admin\AppData\Local\Temp\4239.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4800
        • C:\Users\Admin\AppData\Local\Temp\4239.exe
          "C:\Users\Admin\AppData\Local\Temp\4239.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          PID:3996
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 1884
            5⤵
            • Program crash
            PID:3448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 284
          4⤵
          • Program crash
          PID:2288
  • C:\Users\Admin\AppData\Local\Temp\4528.exe
    C:\Users\Admin\AppData\Local\Temp\4528.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4568
  • C:\Users\Admin\AppData\Local\Temp\46BF.exe
    C:\Users\Admin\AppData\Local\Temp\46BF.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    PID:4532
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 508
      2⤵
      • Program crash
      PID:5064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4800 -ip 4800
    1⤵
      PID:1540
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:4128
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:4576
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:808
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:4504
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:3048
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:3172
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3052
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:2088
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:2172
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4532 -ip 4532
                        1⤵
                          PID:3304
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3996 -ip 3996
                          1⤵
                            PID:5096

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Execution

                          Scripting

                          1
                          T1064

                          Defense Evasion

                          Virtualization/Sandbox Evasion

                          1
                          T1497

                          Scripting

                          1
                          T1064

                          Credential Access

                          Credentials in Files

                          3
                          T1081

                          Discovery

                          Query Registry

                          5
                          T1012

                          Virtualization/Sandbox Evasion

                          1
                          T1497

                          System Information Discovery

                          4
                          T1082

                          Peripheral Device Discovery

                          1
                          T1120

                          Collection

                          Data from Local System

                          3
                          T1005

                          Command and Control

                          Web Service

                          1
                          T1102

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\mozglue.dll
                            Filesize

                            133KB

                            MD5

                            8f73c08a9660691143661bf7332c3c27

                            SHA1

                            37fa65dd737c50fda710fdbde89e51374d0c204a

                            SHA256

                            3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                            SHA512

                            0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                          • C:\ProgramData\nss3.dll
                            Filesize

                            1.2MB

                            MD5

                            bfac4e3c5908856ba17d41edcd455a51

                            SHA1

                            8eec7e888767aa9e4cca8ff246eb2aacb9170428

                            SHA256

                            e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                            SHA512

                            2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                          • C:\Users\Admin\AppData\Local\Temp\4239.exe
                            Filesize

                            2.8MB

                            MD5

                            0fd3c8d453f4ced35d4fa84cf66ae24d

                            SHA1

                            a43c32a6cb243f75ea5e25c1c317b4a871a01ca2

                            SHA256

                            2d3619f533adf751bce2326606b48923f5082c84f127914c88528a9109d2a7fa

                            SHA512

                            ab5005e73b10b4e8339d8abac34a68946b2bca0b671142714c1b7257b9d1278e0b8b856d9f1fce2715fa109689e5dbd9ae15e10b3b5851f95cc5dd0e32bfd83c

                          • C:\Users\Admin\AppData\Local\Temp\4239.exe
                            Filesize

                            2.8MB

                            MD5

                            0fd3c8d453f4ced35d4fa84cf66ae24d

                            SHA1

                            a43c32a6cb243f75ea5e25c1c317b4a871a01ca2

                            SHA256

                            2d3619f533adf751bce2326606b48923f5082c84f127914c88528a9109d2a7fa

                            SHA512

                            ab5005e73b10b4e8339d8abac34a68946b2bca0b671142714c1b7257b9d1278e0b8b856d9f1fce2715fa109689e5dbd9ae15e10b3b5851f95cc5dd0e32bfd83c

                          • C:\Users\Admin\AppData\Local\Temp\4239.exe
                            Filesize

                            2.8MB

                            MD5

                            0fd3c8d453f4ced35d4fa84cf66ae24d

                            SHA1

                            a43c32a6cb243f75ea5e25c1c317b4a871a01ca2

                            SHA256

                            2d3619f533adf751bce2326606b48923f5082c84f127914c88528a9109d2a7fa

                            SHA512

                            ab5005e73b10b4e8339d8abac34a68946b2bca0b671142714c1b7257b9d1278e0b8b856d9f1fce2715fa109689e5dbd9ae15e10b3b5851f95cc5dd0e32bfd83c

                          • C:\Users\Admin\AppData\Local\Temp\4239.exe
                            Filesize

                            2.8MB

                            MD5

                            0fd3c8d453f4ced35d4fa84cf66ae24d

                            SHA1

                            a43c32a6cb243f75ea5e25c1c317b4a871a01ca2

                            SHA256

                            2d3619f533adf751bce2326606b48923f5082c84f127914c88528a9109d2a7fa

                            SHA512

                            ab5005e73b10b4e8339d8abac34a68946b2bca0b671142714c1b7257b9d1278e0b8b856d9f1fce2715fa109689e5dbd9ae15e10b3b5851f95cc5dd0e32bfd83c

                          • C:\Users\Admin\AppData\Local\Temp\4239.exe
                            Filesize

                            2.8MB

                            MD5

                            0fd3c8d453f4ced35d4fa84cf66ae24d

                            SHA1

                            a43c32a6cb243f75ea5e25c1c317b4a871a01ca2

                            SHA256

                            2d3619f533adf751bce2326606b48923f5082c84f127914c88528a9109d2a7fa

                            SHA512

                            ab5005e73b10b4e8339d8abac34a68946b2bca0b671142714c1b7257b9d1278e0b8b856d9f1fce2715fa109689e5dbd9ae15e10b3b5851f95cc5dd0e32bfd83c

                          • C:\Users\Admin\AppData\Local\Temp\4528.exe
                            Filesize

                            1.5MB

                            MD5

                            d1964c1b30d01262eccaee06c600d726

                            SHA1

                            e213ef1a963cc1825b9183742bb2af555da72efe

                            SHA256

                            06ece311c226daf62863e5791def4efee02dacfeacc6b7635095d0a63b715a99

                            SHA512

                            02d5f5d71ef785dbc9a2c7bf960d60a19a7eeba3ae8227442c21ba153fc2443e0d1e5ec8319e70a55defcb1057f43d4f41602ba2089a64615dc3aaa8569d47a5

                          • C:\Users\Admin\AppData\Local\Temp\4528.exe
                            Filesize

                            1.5MB

                            MD5

                            d1964c1b30d01262eccaee06c600d726

                            SHA1

                            e213ef1a963cc1825b9183742bb2af555da72efe

                            SHA256

                            06ece311c226daf62863e5791def4efee02dacfeacc6b7635095d0a63b715a99

                            SHA512

                            02d5f5d71ef785dbc9a2c7bf960d60a19a7eeba3ae8227442c21ba153fc2443e0d1e5ec8319e70a55defcb1057f43d4f41602ba2089a64615dc3aaa8569d47a5

                          • C:\Users\Admin\AppData\Local\Temp\46BF.exe
                            Filesize

                            510KB

                            MD5

                            2c7867a1749edef10274f3e34b047865

                            SHA1

                            c2009f052e54f3c788e1872e7ac6f4d5fea218f9

                            SHA256

                            8845215ed3299ff3381580ab3c1e1feb69d8c44361bc15d64b57a597147a74c7

                            SHA512

                            60b503650f7f4ca7d14cfa7dabc1cda68eee8f0e34800fb160f44b3af9135bf27b15c57e26f19301baa1eb4eb6a6191cfa70d8ca28361db71969f7c0c3435e68

                          • C:\Users\Admin\AppData\Local\Temp\46BF.exe
                            Filesize

                            510KB

                            MD5

                            2c7867a1749edef10274f3e34b047865

                            SHA1

                            c2009f052e54f3c788e1872e7ac6f4d5fea218f9

                            SHA256

                            8845215ed3299ff3381580ab3c1e1feb69d8c44361bc15d64b57a597147a74c7

                            SHA512

                            60b503650f7f4ca7d14cfa7dabc1cda68eee8f0e34800fb160f44b3af9135bf27b15c57e26f19301baa1eb4eb6a6191cfa70d8ca28361db71969f7c0c3435e68

                          • memory/808-168-0x0000000000E10000-0x0000000000E19000-memory.dmp
                            Filesize

                            36KB

                          • memory/808-165-0x0000000000E20000-0x0000000000E25000-memory.dmp
                            Filesize

                            20KB

                          • memory/808-164-0x0000000000000000-mapping.dmp
                          • memory/1436-135-0x0000000000400000-0x0000000000464000-memory.dmp
                            Filesize

                            400KB

                          • memory/1436-132-0x00000000004C2000-0x00000000004D8000-memory.dmp
                            Filesize

                            88KB

                          • memory/1436-134-0x0000000000400000-0x0000000000464000-memory.dmp
                            Filesize

                            400KB

                          • memory/1436-133-0x0000000000030000-0x0000000000039000-memory.dmp
                            Filesize

                            36KB

                          • memory/2004-213-0x00007FFDFE5F0000-0x00007FFDFE7E5000-memory.dmp
                            Filesize

                            2.0MB

                          • memory/2004-214-0x00007FFDDFAC0000-0x00007FFDE0581000-memory.dmp
                            Filesize

                            10.8MB

                          • memory/2004-187-0x00000000008C0000-0x0000000000DC0000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2004-155-0x00000000008C0000-0x0000000000DC0000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2004-199-0x00007FFDFE5F0000-0x00007FFDFE7E5000-memory.dmp
                            Filesize

                            2.0MB

                          • memory/2004-152-0x00000000008C0000-0x0000000000DC0000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2004-157-0x00007FFDFE5F0000-0x00007FFDFE7E5000-memory.dmp
                            Filesize

                            2.0MB

                          • memory/2004-202-0x00007FFDDFAC0000-0x00007FFDE0581000-memory.dmp
                            Filesize

                            10.8MB

                          • memory/2004-159-0x00007FFDDFAC0000-0x00007FFDE0581000-memory.dmp
                            Filesize

                            10.8MB

                          • memory/2004-212-0x00000000008C0000-0x0000000000DC0000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2004-139-0x0000000000000000-mapping.dmp
                          • memory/2088-184-0x00000000005F0000-0x00000000005FD000-memory.dmp
                            Filesize

                            52KB

                          • memory/2088-182-0x0000000000800000-0x0000000000807000-memory.dmp
                            Filesize

                            28KB

                          • memory/2088-181-0x0000000000000000-mapping.dmp
                          • memory/2088-228-0x0000000000800000-0x0000000000807000-memory.dmp
                            Filesize

                            28KB

                          • memory/2172-183-0x0000000000000000-mapping.dmp
                          • memory/2172-186-0x0000000000BA0000-0x0000000000BAB000-memory.dmp
                            Filesize

                            44KB

                          • memory/2172-185-0x0000000000BB0000-0x0000000000BB8000-memory.dmp
                            Filesize

                            32KB

                          • memory/2172-229-0x0000000000BB0000-0x0000000000BB8000-memory.dmp
                            Filesize

                            32KB

                          • memory/3048-225-0x0000000000610000-0x0000000000632000-memory.dmp
                            Filesize

                            136KB

                          • memory/3048-172-0x0000000000000000-mapping.dmp
                          • memory/3048-173-0x0000000000610000-0x0000000000632000-memory.dmp
                            Filesize

                            136KB

                          • memory/3048-174-0x00000000005E0000-0x0000000000607000-memory.dmp
                            Filesize

                            156KB

                          • memory/3052-178-0x0000000000000000-mapping.dmp
                          • memory/3052-227-0x00000000003A0000-0x00000000003A6000-memory.dmp
                            Filesize

                            24KB

                          • memory/3052-180-0x0000000000390000-0x000000000039B000-memory.dmp
                            Filesize

                            44KB

                          • memory/3052-179-0x00000000003A0000-0x00000000003A6000-memory.dmp
                            Filesize

                            24KB

                          • memory/3172-226-0x0000000000BB0000-0x0000000000BB5000-memory.dmp
                            Filesize

                            20KB

                          • memory/3172-177-0x0000000000BA0000-0x0000000000BA9000-memory.dmp
                            Filesize

                            36KB

                          • memory/3172-176-0x0000000000BB0000-0x0000000000BB5000-memory.dmp
                            Filesize

                            20KB

                          • memory/3172-175-0x0000000000000000-mapping.dmp
                          • memory/3996-188-0x0000000060900000-0x0000000060992000-memory.dmp
                            Filesize

                            584KB

                          • memory/3996-151-0x0000000000400000-0x000000000045F000-memory.dmp
                            Filesize

                            380KB

                          • memory/3996-154-0x0000000000400000-0x000000000045F000-memory.dmp
                            Filesize

                            380KB

                          • memory/3996-230-0x0000000000400000-0x000000000045F000-memory.dmp
                            Filesize

                            380KB

                          • memory/3996-146-0x0000000000000000-mapping.dmp
                          • memory/3996-148-0x0000000000400000-0x000000000045F000-memory.dmp
                            Filesize

                            380KB

                          • memory/3996-204-0x0000000000400000-0x000000000045F000-memory.dmp
                            Filesize

                            380KB

                          • memory/3996-160-0x0000000000400000-0x000000000045F000-memory.dmp
                            Filesize

                            380KB

                          • memory/4128-169-0x0000000000460000-0x000000000046B000-memory.dmp
                            Filesize

                            44KB

                          • memory/4128-158-0x0000000000000000-mapping.dmp
                          • memory/4128-166-0x0000000000470000-0x0000000000477000-memory.dmp
                            Filesize

                            28KB

                          • memory/4412-136-0x0000000000000000-mapping.dmp
                          • memory/4504-218-0x00000000007E0000-0x00000000007E6000-memory.dmp
                            Filesize

                            24KB

                          • memory/4504-171-0x00000000007D0000-0x00000000007DC000-memory.dmp
                            Filesize

                            48KB

                          • memory/4504-170-0x00000000007E0000-0x00000000007E6000-memory.dmp
                            Filesize

                            24KB

                          • memory/4504-167-0x0000000000000000-mapping.dmp
                          • memory/4532-147-0x0000000000000000-mapping.dmp
                          • memory/4568-233-0x0000000005790000-0x00000000057A2000-memory.dmp
                            Filesize

                            72KB

                          • memory/4568-241-0x0000000007A40000-0x0000000007F6C000-memory.dmp
                            Filesize

                            5.2MB

                          • memory/4568-239-0x0000000006610000-0x00000000066A2000-memory.dmp
                            Filesize

                            584KB

                          • memory/4568-210-0x0000000000400000-0x000000000043A000-memory.dmp
                            Filesize

                            232KB

                          • memory/4568-211-0x000000000041B576-mapping.dmp
                          • memory/4568-235-0x00000000057F0000-0x000000000582C000-memory.dmp
                            Filesize

                            240KB

                          • memory/4576-216-0x0000000000480000-0x0000000000489000-memory.dmp
                            Filesize

                            36KB

                          • memory/4576-161-0x0000000000000000-mapping.dmp
                          • memory/4576-162-0x0000000000480000-0x0000000000489000-memory.dmp
                            Filesize

                            36KB

                          • memory/4576-163-0x00000000001F0000-0x00000000001FF000-memory.dmp
                            Filesize

                            60KB

                          • memory/4800-144-0x0000000000000000-mapping.dmp
                          • memory/4984-142-0x0000000000000000-mapping.dmp
                          • memory/5020-231-0x0000000005D40000-0x0000000006358000-memory.dmp
                            Filesize

                            6.1MB

                          • memory/5020-232-0x0000000005830000-0x000000000593A000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/5020-234-0x00000000057C0000-0x00000000057FC000-memory.dmp
                            Filesize

                            240KB

                          • memory/5020-236-0x00000000063D0000-0x0000000006436000-memory.dmp
                            Filesize

                            408KB

                          • memory/5020-237-0x0000000006BF0000-0x0000000007194000-memory.dmp
                            Filesize

                            5.6MB

                          • memory/5020-220-0x0000000000400000-0x0000000000432000-memory.dmp
                            Filesize

                            200KB

                          • memory/5020-238-0x00000000066E0000-0x0000000006772000-memory.dmp
                            Filesize

                            584KB

                          • memory/5020-240-0x0000000007370000-0x0000000007532000-memory.dmp
                            Filesize

                            1.8MB

                          • memory/5020-219-0x0000000000000000-mapping.dmp