Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 12:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://185.215.113.66/pei.exe
Resource
win7-20221111-en
General
Malware Config
Extracted
phorphiex
http://185.215.113.66/
1Gpu5QiBqsquu71AGqHwb4Y68iwnkdGH1k
3PPJU1omRSTwxDbbfVyxh9Mm8WkiMGZviMh
37AcEVDyoPyUJUKNM3mM1UxNNvKgN6Abn5
qqlt9zzv020vtlswk5v6e90nv7hsuqz0nggp4rj5t0
Xj6orHUgmtZtPb2wGSTX2reQZJ89ZeeYYG
DRyZQqRX998DYdf7zGdTCShGcRBbxjUAbF
0x25229D09B0048F23e60c010C8eE1ae65C727e973
LhoapQ1TFjG2Fvbwn5WbM2wYcwisKRVz7x
r3j2xjQLmVa6Cg3cHZLqLNVja1x6g1AtNL
TVTrpva4J2g8SENebPar4YnfnCqwUeiX4a
t1MrdY4n3DBL3uip5Pq6tqx4doYpihJJG68
AXUqtUXyQmU8buqL5ehCLuLLHhhFrREXuw
bitcoincash:qqlt9zzv020vtlswk5v6e90nv7hsuqz0nggp4rj5t0
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
GDX4NDGHA5WKQLOI65PKPZRHSN6ZAUBRHA7BL44O5IOVMMZFZISMHTUD
bnb1zm5y3pns0ertprnvdyulz63tenlp9kc4m78v0m
bc1qdk0fquc7ug2zn7zpdyx4kasdy34t00c5r2xdup
Signatures
-
Processes:
sysagrsv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysagrsv.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
pei.exe3120427920.exesysagrsv.exe3117114989.exe101795949.exepid process 3232 pei.exe 2816 3120427920.exe 5112 sysagrsv.exe 2192 3117114989.exe 1484 101795949.exe -
Processes:
sysagrsv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysagrsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysagrsv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3120427920.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysagrsv.exe" 3120427920.exe -
Drops file in Windows directory 2 IoCs
Processes:
3120427920.exedescription ioc process File opened for modification C:\Windows\sysagrsv.exe 3120427920.exe File created C:\Windows\sysagrsv.exe 3120427920.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 89be75672cbed801 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{E7D091AB-0CE9-4CEC-B62C-102372631164}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "382450447" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a013bd2d243ad901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "763617556" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31013412" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ace76e3f4173e64a9997e9a3bf6dec4700000000020000000000106600000001000020000000cdc730fc19eb057674e075d22f9fb06fc40e067ae75fa4a139cc085428c6c59a000000000e800000000200002000000029c9035dbaae6e7bb3b4f4ee5a3cef863568682d5352ef055d9cf22a33e8f8f7200000008c4ea47836d4c4759033dcdcf623eaf2d6f2c25a399309ac61088b55e752e20c400000009df212fd6e9ae9a48781f57c0d1fd128fc12de6804e6807d073efe1c1fc562891e945993d7dd8d7cbc7b4623384fec3645862df3de4267fddae9f6ad5b5b79f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{58730A3F-A617-11ED-A0EE-DE60447A8195} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "763774190" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ace76e3f4173e64a9997e9a3bf6dec4700000000020000000000106600000001000020000000b17e3d39302ad93b6cef5b11b1ef2554aa57635ee7f087ea3eb9a2e46e410b87000000000e800000000200002000000040ddc8f61b2c0f137c9edcc52ad3d3916d840193f4912fb9cc5b9811a29e2b7a200000003d961dc177152297953b59173d4efb7198c30da8b115a2e6ae9383b3f5efae0740000000f89fa315632776eba2fb0f510e5d2b9ef2f25aae817e855c7cc65393c66def3843cc5f5e695f8628aa11ea25dd63e1370c011c463e9ef89801178181751ae2fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31013412" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b5cd2d243ad901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 3464 iexplore.exe 3464 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3464 iexplore.exe 3464 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
iexplore.exepei.exe3120427920.exesysagrsv.exedescription pid process target process PID 3464 wrote to memory of 2584 3464 iexplore.exe IEXPLORE.EXE PID 3464 wrote to memory of 2584 3464 iexplore.exe IEXPLORE.EXE PID 3464 wrote to memory of 2584 3464 iexplore.exe IEXPLORE.EXE PID 3464 wrote to memory of 3232 3464 iexplore.exe pei.exe PID 3464 wrote to memory of 3232 3464 iexplore.exe pei.exe PID 3464 wrote to memory of 3232 3464 iexplore.exe pei.exe PID 3232 wrote to memory of 2816 3232 pei.exe 3120427920.exe PID 3232 wrote to memory of 2816 3232 pei.exe 3120427920.exe PID 3232 wrote to memory of 2816 3232 pei.exe 3120427920.exe PID 2816 wrote to memory of 5112 2816 3120427920.exe sysagrsv.exe PID 2816 wrote to memory of 5112 2816 3120427920.exe sysagrsv.exe PID 2816 wrote to memory of 5112 2816 3120427920.exe sysagrsv.exe PID 5112 wrote to memory of 2192 5112 sysagrsv.exe 3117114989.exe PID 5112 wrote to memory of 2192 5112 sysagrsv.exe 3117114989.exe PID 5112 wrote to memory of 2192 5112 sysagrsv.exe 3117114989.exe PID 5112 wrote to memory of 1484 5112 sysagrsv.exe 101795949.exe PID 5112 wrote to memory of 1484 5112 sysagrsv.exe 101795949.exe PID 5112 wrote to memory of 1484 5112 sysagrsv.exe 101795949.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://185.215.113.66/pei.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3464 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\pei.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\pei.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3120427920.exeC:\Users\Admin\AppData\Local\Temp\3120427920.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\sysagrsv.exeC:\Windows\sysagrsv.exe4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3117114989.exeC:\Users\Admin\AppData\Local\Temp\3117114989.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\101795949.exeC:\Users\Admin\AppData\Local\Temp\101795949.exe5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\pei.exeFilesize
6KB
MD53fade1189c46a975a19599f9bc8ce9b8
SHA1d36f6d972624b6f8b7de5553f5bc89b43f554c1a
SHA256959ed7f57b49523114b54616f2f5bdb40c78cd1fcf8f506d3bc3721e833cee03
SHA51212bc72d5e93e762466f36cafcf026c28ea977a3e9eb5c8a1e79d63107f957d9399a6e0c21dec63db78ab8e0ba7f31108754ac335994e3d015516cff5de42fa01
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\pei.exe.7ihh1jq.partialFilesize
6KB
MD53fade1189c46a975a19599f9bc8ce9b8
SHA1d36f6d972624b6f8b7de5553f5bc89b43f554c1a
SHA256959ed7f57b49523114b54616f2f5bdb40c78cd1fcf8f506d3bc3721e833cee03
SHA51212bc72d5e93e762466f36cafcf026c28ea977a3e9eb5c8a1e79d63107f957d9399a6e0c21dec63db78ab8e0ba7f31108754ac335994e3d015516cff5de42fa01
-
C:\Users\Admin\AppData\Local\Temp\101795949.exeFilesize
75KB
MD517eb719f9e19aefae9114aa922681e7f
SHA1a2165a6d3ff4dee62215bd489bbcc0aaa498e70a
SHA256e0ac6b5de69220016ae30e12a499cd7e0002ab66942203376a0bb97b1790ad70
SHA51277e7663c0b2cccf1f357c3f75cae22b0c8e207d482f8e5237f3d81844266d4f49d10574abbb6531ab20b417ed19a4d4991214933362a004413ccbe8a41f194de
-
C:\Users\Admin\AppData\Local\Temp\101795949.exeFilesize
75KB
MD517eb719f9e19aefae9114aa922681e7f
SHA1a2165a6d3ff4dee62215bd489bbcc0aaa498e70a
SHA256e0ac6b5de69220016ae30e12a499cd7e0002ab66942203376a0bb97b1790ad70
SHA51277e7663c0b2cccf1f357c3f75cae22b0c8e207d482f8e5237f3d81844266d4f49d10574abbb6531ab20b417ed19a4d4991214933362a004413ccbe8a41f194de
-
C:\Users\Admin\AppData\Local\Temp\3117114989.exeFilesize
6KB
MD503ee7b245daeebbf2ccaa1690a9fc8fc
SHA1561710d7f8c05ff5c2a3a384be5de6e023e41ac4
SHA2566bc23b9878978a2f3c507acfdad0b2244a8bda5143359613db039cb21d9c1228
SHA512f64163899218b24ee1dd59748e024e0106d83dbea3e31c0f05b1efb8558a47c232dbbcd1463a121c63e2dff2743887925238d8bf6eab0b9ee0292386918e8e55
-
C:\Users\Admin\AppData\Local\Temp\3117114989.exeFilesize
6KB
MD503ee7b245daeebbf2ccaa1690a9fc8fc
SHA1561710d7f8c05ff5c2a3a384be5de6e023e41ac4
SHA2566bc23b9878978a2f3c507acfdad0b2244a8bda5143359613db039cb21d9c1228
SHA512f64163899218b24ee1dd59748e024e0106d83dbea3e31c0f05b1efb8558a47c232dbbcd1463a121c63e2dff2743887925238d8bf6eab0b9ee0292386918e8e55
-
C:\Users\Admin\AppData\Local\Temp\3120427920.exeFilesize
75KB
MD517eb719f9e19aefae9114aa922681e7f
SHA1a2165a6d3ff4dee62215bd489bbcc0aaa498e70a
SHA256e0ac6b5de69220016ae30e12a499cd7e0002ab66942203376a0bb97b1790ad70
SHA51277e7663c0b2cccf1f357c3f75cae22b0c8e207d482f8e5237f3d81844266d4f49d10574abbb6531ab20b417ed19a4d4991214933362a004413ccbe8a41f194de
-
C:\Users\Admin\AppData\Local\Temp\3120427920.exeFilesize
75KB
MD517eb719f9e19aefae9114aa922681e7f
SHA1a2165a6d3ff4dee62215bd489bbcc0aaa498e70a
SHA256e0ac6b5de69220016ae30e12a499cd7e0002ab66942203376a0bb97b1790ad70
SHA51277e7663c0b2cccf1f357c3f75cae22b0c8e207d482f8e5237f3d81844266d4f49d10574abbb6531ab20b417ed19a4d4991214933362a004413ccbe8a41f194de
-
C:\Windows\sysagrsv.exeFilesize
75KB
MD517eb719f9e19aefae9114aa922681e7f
SHA1a2165a6d3ff4dee62215bd489bbcc0aaa498e70a
SHA256e0ac6b5de69220016ae30e12a499cd7e0002ab66942203376a0bb97b1790ad70
SHA51277e7663c0b2cccf1f357c3f75cae22b0c8e207d482f8e5237f3d81844266d4f49d10574abbb6531ab20b417ed19a4d4991214933362a004413ccbe8a41f194de
-
C:\Windows\sysagrsv.exeFilesize
75KB
MD517eb719f9e19aefae9114aa922681e7f
SHA1a2165a6d3ff4dee62215bd489bbcc0aaa498e70a
SHA256e0ac6b5de69220016ae30e12a499cd7e0002ab66942203376a0bb97b1790ad70
SHA51277e7663c0b2cccf1f357c3f75cae22b0c8e207d482f8e5237f3d81844266d4f49d10574abbb6531ab20b417ed19a4d4991214933362a004413ccbe8a41f194de
-
memory/1484-144-0x0000000000000000-mapping.dmp
-
memory/2192-141-0x0000000000000000-mapping.dmp
-
memory/2816-135-0x0000000000000000-mapping.dmp
-
memory/3232-133-0x0000000000000000-mapping.dmp
-
memory/5112-138-0x0000000000000000-mapping.dmp