Analysis

  • max time kernel
    149s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    24-08-2021 15:42

General

  • Target

    5e7f9ae99a7e6cc5a2f40a4a159bc3db.exe

  • Size

    150KB

  • MD5

    5e7f9ae99a7e6cc5a2f40a4a159bc3db

  • SHA1

    7fe31637a9f6e2e6e463d2076702a00f92f06d76

  • SHA256

    b302fcb42934760527ba26528d13aaa8e2cc3150b8055485e5c27f24edaf2892

  • SHA512

    48e3d73da4d1584ca42fa07cca2f02796040b7b2b19c9889631868b3fcea727a4fc0a268a63133cc7c8a6350a4514b7891f611410c89440dcfa10fce19cef5d2

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

fe582536ec580228180f270f7cb80a867860e010

Attributes
  • url4cnc

    https://telete.in/xylichanjk

rc4.plain
rc4.plain

Extracted

Family

vidar

Version

40.1

Botnet

824

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    824

Extracted

Family

raccoon

Botnet

b8ef25fa9e346b7a31e4b6ff160623dd5fed2474

Attributes
  • url4cnc

    https://telete.in/iphbarberleo

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e7f9ae99a7e6cc5a2f40a4a159bc3db.exe
    "C:\Users\Admin\AppData\Local\Temp\5e7f9ae99a7e6cc5a2f40a4a159bc3db.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\5e7f9ae99a7e6cc5a2f40a4a159bc3db.exe
      "C:\Users\Admin\AppData\Local\Temp\5e7f9ae99a7e6cc5a2f40a4a159bc3db.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1300
  • C:\Users\Admin\AppData\Local\Temp\4106.exe
    C:\Users\Admin\AppData\Local\Temp\4106.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:1488
  • C:\Users\Admin\AppData\Local\Temp\423F.exe
    C:\Users\Admin\AppData\Local\Temp\423F.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    PID:1848
  • C:\Users\Admin\AppData\Local\Temp\43E5.exe
    C:\Users\Admin\AppData\Local\Temp\43E5.exe
    1⤵
    • Executes dropped EXE
    PID:1384
  • C:\Users\Admin\AppData\Local\Temp\5007.exe
    C:\Users\Admin\AppData\Local\Temp\5007.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:452
  • C:\Users\Admin\AppData\Local\Temp\5536.exe
    C:\Users\Admin\AppData\Local\Temp\5536.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gyqlyqk\
      2⤵
        PID:980
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wjjhghuu.exe" C:\Windows\SysWOW64\gyqlyqk\
        2⤵
          PID:1068
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create gyqlyqk binPath= "C:\Windows\SysWOW64\gyqlyqk\wjjhghuu.exe /d\"C:\Users\Admin\AppData\Local\Temp\5536.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:1656
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description gyqlyqk "wifi internet conection"
            2⤵
              PID:704
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start gyqlyqk
              2⤵
                PID:1552
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1640
              • C:\Users\Admin\AppData\Local\Temp\5A07.exe
                C:\Users\Admin\AppData\Local\Temp\5A07.exe
                1⤵
                • Executes dropped EXE
                PID:1820
              • C:\Users\Admin\AppData\Local\Temp\6213.exe
                C:\Users\Admin\AppData\Local\Temp\6213.exe
                1⤵
                • Executes dropped EXE
                PID:1440
              • C:\Windows\SysWOW64\gyqlyqk\wjjhghuu.exe
                C:\Windows\SysWOW64\gyqlyqk\wjjhghuu.exe /d"C:\Users\Admin\AppData\Local\Temp\5536.exe"
                1⤵
                  PID:1644

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                New Service

                1
                T1050

                Modify Existing Service

                1
                T1031

                Privilege Escalation

                New Service

                1
                T1050

                Defense Evasion

                Virtualization/Sandbox Evasion

                1
                T1497

                Install Root Certificate

                1
                T1130

                Modify Registry

                1
                T1112

                Credential Access

                Credentials in Files

                1
                T1081

                Discovery

                Query Registry

                3
                T1012

                Virtualization/Sandbox Evasion

                1
                T1497

                System Information Discovery

                4
                T1082

                Peripheral Device Discovery

                1
                T1120

                Collection

                Data from Local System

                1
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                  MD5

                  2902de11e30dcc620b184e3bb0f0c1cb

                  SHA1

                  5d11d14a2558801a2688dc2d6dfad39ac294f222

                  SHA256

                  e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544

                  SHA512

                  efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                  MD5

                  46e56db83743835a5a523c0714070a87

                  SHA1

                  28e43123d05c08d45f60164246d4c98b084c3891

                  SHA256

                  f48d883230e3d4b59b4c63cfa18546e971222852fd4dffc78de373c7ccfc3a10

                  SHA512

                  f8c6b87a711a31adba9029def9b9023f5d3ae50f3992e9a843c23844c8d612fd84a5dac987c47c06386a2a46e9d15efea097b3a7b965d6f75102d9daef72c22e

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  MD5

                  17a6e108c2b3644e015e373736855b7b

                  SHA1

                  84e5392b20020a811951272deefa3c1d30ee878e

                  SHA256

                  8bd001ad3ddb6c3541fe6abcb684b6d7c288b652face1d933ff5cdee9f2c4bc6

                  SHA512

                  05054753da532f3acc4d7280f16b00c5be4dac58fd49e8f4337d968d88b4080fea5a1400ce8cdbf603296ab5006168a4f187b31ce99dd016c8ef4c7b30d61155

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                  MD5

                  548e5d5aef1ee56931caf4e36279b13a

                  SHA1

                  132ecbd27075ba7d1ab11b186d945cbdf9c09162

                  SHA256

                  96da43c5397f3ee0f97bad3d6d031f96f8b1f5955dcfb7dc3f771db97b26ecf4

                  SHA512

                  afd8be7eef2b5dc363e8c1a152a3ca3969d418fc67dc50f748429c059e90d2a68d1c9e85d8931f4088fecac287703551625968f8ec87543909b6fb445346a410

                • C:\Users\Admin\AppData\Local\Temp\4106.exe
                  MD5

                  a69e12607d01237460808fa1709e5e86

                  SHA1

                  4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                  SHA256

                  188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                  SHA512

                  7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                • C:\Users\Admin\AppData\Local\Temp\423F.exe
                  MD5

                  160f931b678affb93d3aff2dd5a65734

                  SHA1

                  cbfff062a78f532b4619fbf386ff4b7b9299e690

                  SHA256

                  cc64a8243582378c46ab8b2f3c69a544fe522934856701756cb612492d59085d

                  SHA512

                  1fdfe8e49dff9d16cefe7740faace089ea706e1a9cc8597f27bd7af05ed5902acb0bd238fc514954a1cd069c2869e207d5b32e05dcf61327123465a33f25ff4f

                • C:\Users\Admin\AppData\Local\Temp\43E5.exe
                  MD5

                  bf40705cba9708182b61956985895005

                  SHA1

                  174c659e0d225b1ea0eb5a7e8d30911d17ad06a4

                  SHA256

                  6325c9ffbedd8d4a4d676d6dc5e790e6d99a65f1e3c621df7ec275ab7b047565

                  SHA512

                  f01c4764675238503776b00b0b72e0727c531908499043b4043029f495dc2f8c19db281c98ec00fdc74e5a67ecfbc7f04a2c10fefb0ba03e5d28b9d8de292600

                • C:\Users\Admin\AppData\Local\Temp\5007.exe
                  MD5

                  9aa6dd10e0bfb49baa17f04f44b9dcd3

                  SHA1

                  09ad5a6ae8a6396e7bdf783cd124417cd7515c7a

                  SHA256

                  a07cf8a0e1fadc8ab20dbe35341f1febb3a0b2e42c8f5991c0cc397b130d7621

                  SHA512

                  601f36f703ee396dba325349aa25440270c1cee6e069146c1ed7f03e96fe5fc30dead138e7f3b713549b815635e64aa97a10054e71a415690e622c417bbfbb4d

                • C:\Users\Admin\AppData\Local\Temp\5536.exe
                  MD5

                  af007477429a79870f65d8197e063482

                  SHA1

                  91ac5d115356eaca0d61b9d528913310c08f288c

                  SHA256

                  39a75660bc1eaf33a1f9ab70d757e9e3c39da875f3b7bec38f9e34e635b48d59

                  SHA512

                  52096f47a92b70a6adcc091f7a8ce26b49b92659a6fb07394bbd4a23374b7e2c60c44337688a5cd881bd6a84e157fd981a4b0d7382aeec9d7908e26ad29a56a4

                • C:\Users\Admin\AppData\Local\Temp\5536.exe
                  MD5

                  af007477429a79870f65d8197e063482

                  SHA1

                  91ac5d115356eaca0d61b9d528913310c08f288c

                  SHA256

                  39a75660bc1eaf33a1f9ab70d757e9e3c39da875f3b7bec38f9e34e635b48d59

                  SHA512

                  52096f47a92b70a6adcc091f7a8ce26b49b92659a6fb07394bbd4a23374b7e2c60c44337688a5cd881bd6a84e157fd981a4b0d7382aeec9d7908e26ad29a56a4

                • C:\Users\Admin\AppData\Local\Temp\5A07.exe
                  MD5

                  04919ad7122ec564d5dab5eb2a8a1468

                  SHA1

                  6ef8c3ce860d43452c5f4bc64df7c5387df1f095

                  SHA256

                  e78bcc0fa26a3bcf50b639137f2ca0b051d2e50cc059cab51bf6214ca2a03a5f

                  SHA512

                  e939fc1f7b9bff55e8194cddea3c62f4e35ca332599e703c794a50fc6ab909173434a2cbf5043c505bc24f59f1bb43d5ba6f7d8aab72c03475db4be623700e54

                • C:\Users\Admin\AppData\Local\Temp\6213.exe
                  MD5

                  e70ceaf1fc7771d3d791aedc0c2068a7

                  SHA1

                  97912679527c910bdf4c97265656f4c2527245db

                  SHA256

                  0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                  SHA512

                  6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                • C:\Users\Admin\AppData\Local\Temp\wjjhghuu.exe
                  MD5

                  dc99e16aed189a95eddbc4ca8c83afc1

                  SHA1

                  db11fac897425809e57193fb1a849f59e1562429

                  SHA256

                  5f8cd365e4d6a440d8878ef1d4739860621140573348aad86fcc63899dd17ad5

                  SHA512

                  a59eebd0e451a4334b854092811e9212d577abd2801f0da50b1659ed700ccfcf4a57b88e53715bfb849357a46ae50e07d070682376225d96b8a701985d2ac701

                • C:\Windows\SysWOW64\gyqlyqk\wjjhghuu.exe
                  MD5

                  41934288bd7588a20977fc740a9ace54

                  SHA1

                  949f0db9fe859b7244201a146d4c9742a26029d3

                  SHA256

                  06e4fb71c7512f0239dedefae5493d181a5d6ea5da40a90abffa51fdd4866335

                  SHA512

                  5f0a53e9404d459b5550f101241e0222702d4ece9b86d0e60a48e249a7b78c83e50b86bbd858a520e480a5c1f1f1d89ff21adf95f42182b5512618b386808ceb

                • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\freebl3.dll
                  MD5

                  2eafc1a6386c89045bcef19f0ad14778

                  SHA1

                  ab73de429ae2b7e06d43dcdc195d25699a5de045

                  SHA256

                  66389c8f1458ba02fdd77ec3c5f8f431a58ed40460399c2e3216d24fa651b70f

                  SHA512

                  993fcd3f20309dd5d2ecc5d800b0759992cabc5a9ef25024453ad2f9a403d6e625739b630baf10b19352b56fe95e7629598fb14da3b5dec0119ae5d37e5e2a4c

                • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\mozglue.dll
                  MD5

                  eae9273f8cdcf9321c6c37c244773139

                  SHA1

                  8378e2a2f3635574c106eea8419b5eb00b8489b0

                  SHA256

                  a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

                  SHA512

                  06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

                • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\msvcp140.dll
                  MD5

                  109f0f02fd37c84bfc7508d4227d7ed5

                  SHA1

                  ef7420141bb15ac334d3964082361a460bfdb975

                  SHA256

                  334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                  SHA512

                  46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\nss3.dll
                  MD5

                  02cc7b8ee30056d5912de54f1bdfc219

                  SHA1

                  a6923da95705fb81e368ae48f93d28522ef552fb

                  SHA256

                  1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

                  SHA512

                  0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

                • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\softokn3.dll
                  MD5

                  4e8df049f3459fa94ab6ad387f3561ac

                  SHA1

                  06ed392bc29ad9d5fc05ee254c2625fd65925114

                  SHA256

                  25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

                  SHA512

                  3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

                • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\vcruntime140.dll
                  MD5

                  7587bf9cb4147022cd5681b015183046

                  SHA1

                  f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                  SHA256

                  c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                  SHA512

                  0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                • \Users\Admin\AppData\LocalLow\sqlite3.dll
                  MD5

                  f964811b68f9f1487c2b41e1aef576ce

                  SHA1

                  b423959793f14b1416bc3b7051bed58a1034025f

                  SHA256

                  83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                  SHA512

                  565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                • memory/452-85-0x00000000000B0000-0x00000000000B1000-memory.dmp
                  Filesize

                  4KB

                • memory/452-79-0x0000000000000000-mapping.dmp
                • memory/452-91-0x0000000004EA0000-0x0000000004EA1000-memory.dmp
                  Filesize

                  4KB

                • memory/704-105-0x0000000000000000-mapping.dmp
                • memory/980-94-0x0000000000000000-mapping.dmp
                • memory/984-90-0x0000000000230000-0x0000000000243000-memory.dmp
                  Filesize

                  76KB

                • memory/984-95-0x0000000000400000-0x0000000002CC4000-memory.dmp
                  Filesize

                  40.8MB

                • memory/984-83-0x0000000000000000-mapping.dmp
                • memory/1068-102-0x0000000000000000-mapping.dmp
                • memory/1220-64-0x0000000002A50000-0x0000000002A66000-memory.dmp
                  Filesize

                  88KB

                • memory/1300-60-0x0000000000400000-0x0000000000409000-memory.dmp
                  Filesize

                  36KB

                • memory/1300-62-0x00000000762C1000-0x00000000762C3000-memory.dmp
                  Filesize

                  8KB

                • memory/1300-61-0x0000000000402FAB-mapping.dmp
                • memory/1384-77-0x00000000002D0000-0x000000000036D000-memory.dmp
                  Filesize

                  628KB

                • memory/1384-71-0x0000000000000000-mapping.dmp
                • memory/1384-78-0x0000000000400000-0x0000000002402000-memory.dmp
                  Filesize

                  32.0MB

                • memory/1440-98-0x0000000000000000-mapping.dmp
                • memory/1488-65-0x0000000000000000-mapping.dmp
                • memory/1552-107-0x0000000000000000-mapping.dmp
                • memory/1640-117-0x0000000000000000-mapping.dmp
                • memory/1656-104-0x0000000000000000-mapping.dmp
                • memory/1660-63-0x0000000000220000-0x000000000022A000-memory.dmp
                  Filesize

                  40KB

                • memory/1820-96-0x00000000002B0000-0x000000000033F000-memory.dmp
                  Filesize

                  572KB

                • memory/1820-88-0x0000000000000000-mapping.dmp
                • memory/1820-97-0x0000000000400000-0x0000000002CF8000-memory.dmp
                  Filesize

                  41.0MB

                • memory/1848-69-0x0000000000000000-mapping.dmp
                • memory/1848-74-0x0000000000220000-0x00000000002AF000-memory.dmp
                  Filesize

                  572KB

                • memory/1848-76-0x0000000000400000-0x0000000002D05000-memory.dmp
                  Filesize

                  41.0MB