Analysis Overview
SHA256
56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c
Threat Level: Known bad
The file 56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c was found to be: Known bad.
Malicious Activity Summary
Lumma family
Detect Lumma Stealer payload V4
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Executes dropped EXE
Loads dropped DLL
Checks BIOS information in registry
Identifies Wine through registry keys
UPX packed file
Adds Run key to start application
Suspicious use of NtSetInformationThreadHideFromDebugger
Drops file in Program Files directory
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-25 19:40
Signatures
Detect Lumma Stealer payload V4
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Lumma family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-25 19:40
Reported
2024-05-25 19:42
Platform
win7-20240508-en
Max time kernel
141s
Max time network
139s
Command Line
Signatures
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Mm | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Mm | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Mm | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Mm | N/A |
| N/A | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine | C:\Mm | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Mm | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OQSUYaac = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\MSINFO\\OQSUYaac.exe\"" | C:\Mm | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Mm | N/A |
| N/A | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | C:\Mm | N/A |
| File opened for modification | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | C:\Mm | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Mm | N/A |
| N/A | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c.exe
"C:\Users\Admin\AppData\Local\Temp\56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c.exe"
C:\Mm
C:\Mm
C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe
"C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | w.eydata.net | udp |
| CN | 125.77.158.24:80 | w.eydata.net | tcp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| CN | 47.111.82.157:33359 | songdenghui.6655.la | tcp |
| US | 8.8.8.8:53 | w.eydata.net | udp |
| CN | 125.77.158.24:80 | w.eydata.net | tcp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| CN | 47.111.82.157:33359 | songdenghui.6655.la | tcp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| CN | 47.111.82.157:33359 | songdenghui.6655.la | tcp |
Files
memory/2412-0-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-9-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-2-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-1-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-3-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-5-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-31-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-45-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-49-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-48-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-43-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-42-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-38-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-36-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-33-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-29-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-24-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-25-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-22-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-20-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-16-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-14-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-12-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2412-10-0x0000000010000000-0x000000001003E000-memory.dmp
C:\Mm
| MD5 | 7eb15beea11d9f922a4976a05eaaba4e |
| SHA1 | 0208b5382a07d38c6f6fcbaf2ee153831818976a |
| SHA256 | e94c74a889e1930f486d2f9992ccbab9689e40914fc95b1c0d4af71a45f48aa4 |
| SHA512 | 41b2aac85053310f3bf313456cb2ed3c5a025ca3f2222653916022b05893e311cc2a2fced822e205c51e346c580c1a5d6fca36f7c9d9b47a15a604123863565a |
memory/2412-54-0x0000000002530000-0x0000000002962000-memory.dmp
memory/2640-55-0x0000000000400000-0x0000000000832000-memory.dmp
memory/2640-56-0x0000000076EF0000-0x0000000076EF2000-memory.dmp
memory/2640-58-0x0000000000401000-0x0000000000452000-memory.dmp
memory/2760-66-0x0000000000400000-0x0000000000832000-memory.dmp
memory/2640-65-0x00000000035B0000-0x00000000039E2000-memory.dmp
memory/2640-68-0x0000000000400000-0x0000000000832000-memory.dmp
memory/2412-69-0x0000000010000000-0x000000001003E000-memory.dmp
memory/2760-70-0x0000000000400000-0x0000000000832000-memory.dmp
memory/2412-71-0x0000000002530000-0x0000000002962000-memory.dmp
memory/2760-73-0x0000000000400000-0x0000000000832000-memory.dmp
memory/2760-77-0x0000000000400000-0x0000000000832000-memory.dmp
memory/2760-79-0x0000000000400000-0x0000000000832000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-25 19:40
Reported
2024-05-25 19:42
Platform
win10v2004-20240508-en
Max time kernel
148s
Max time network
150s
Command Line
Signatures
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Mm | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Mm | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Mm | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Mm | N/A |
| N/A | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine | C:\Mm | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OQSUYaac = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\MSINFO\\OQSUYaac.exe\"" | C:\Mm | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Mm | N/A |
| N/A | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | C:\Mm | N/A |
| File opened for modification | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | C:\Mm | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Mm | N/A |
| N/A | N/A | C:\Mm | N/A |
| N/A | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
| N/A | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe | N/A |
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4856 wrote to memory of 4692 | N/A | C:\Users\Admin\AppData\Local\Temp\56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c.exe | C:\Mm |
| PID 4856 wrote to memory of 4692 | N/A | C:\Users\Admin\AppData\Local\Temp\56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c.exe | C:\Mm |
| PID 4856 wrote to memory of 4692 | N/A | C:\Users\Admin\AppData\Local\Temp\56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c.exe | C:\Mm |
| PID 4692 wrote to memory of 1040 | N/A | C:\Mm | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe |
| PID 4692 wrote to memory of 1040 | N/A | C:\Mm | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe |
| PID 4692 wrote to memory of 1040 | N/A | C:\Mm | C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c.exe
"C:\Users\Admin\AppData\Local\Temp\56d0ec47b14d2222747153f157d113af3966e39b7cc575f0b759594d7756ae0c.exe"
C:\Mm
C:\Mm
C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe
"C:\Program Files\Common Files\Microsoft Shared\MSINFO\OQSUYaac.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | w.eydata.net | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| CN | 125.77.158.24:80 | w.eydata.net | tcp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| CN | 47.111.82.157:33359 | songdenghui.6655.la | tcp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | w.eydata.net | udp |
| CN | 125.77.158.24:80 | w.eydata.net | tcp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.251.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| CN | 47.111.82.157:33359 | songdenghui.6655.la | tcp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | songdenghui.6655.la | udp |
| CN | 47.111.82.157:33359 | songdenghui.6655.la | tcp |
| US | 8.8.8.8:53 | 89.16.208.104.in-addr.arpa | udp |
Files
memory/4856-0-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-7-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-35-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-41-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-46-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-45-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-44-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-39-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-37-0x0000000010000000-0x000000001003E000-memory.dmp
C:\Mm
| MD5 | 7eb15beea11d9f922a4976a05eaaba4e |
| SHA1 | 0208b5382a07d38c6f6fcbaf2ee153831818976a |
| SHA256 | e94c74a889e1930f486d2f9992ccbab9689e40914fc95b1c0d4af71a45f48aa4 |
| SHA512 | 41b2aac85053310f3bf313456cb2ed3c5a025ca3f2222653916022b05893e311cc2a2fced822e205c51e346c580c1a5d6fca36f7c9d9b47a15a604123863565a |
memory/4856-33-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-31-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-30-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-27-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-25-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-23-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-21-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-19-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-17-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-15-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-11-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-10-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-3-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-2-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-13-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-5-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4856-1-0x0000000010000000-0x000000001003E000-memory.dmp
memory/4692-51-0x0000000000400000-0x0000000000832000-memory.dmp
memory/4692-52-0x0000000077564000-0x0000000077566000-memory.dmp
memory/4692-53-0x0000000000401000-0x0000000000452000-memory.dmp
memory/1040-59-0x0000000000400000-0x0000000000832000-memory.dmp
memory/4692-60-0x0000000000400000-0x0000000000832000-memory.dmp
memory/4856-61-0x0000000010000000-0x000000001003E000-memory.dmp
memory/1040-62-0x0000000000400000-0x0000000000832000-memory.dmp
memory/1040-64-0x0000000000400000-0x0000000000832000-memory.dmp
memory/1040-74-0x0000000000400000-0x0000000000832000-memory.dmp