Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    30-10-2021 03:42

General

  • Target

    2a3faedb8bf90b9d4cb105ed8468de99.exe

  • Size

    179KB

  • MD5

    2a3faedb8bf90b9d4cb105ed8468de99

  • SHA1

    950a754b9ab1f1d03c63f245a4d09d9a27eb7910

  • SHA256

    ff5e6a034fe1ea8be1f93bb560bf909ff78bf8efe22df3ac7a039023420b15b2

  • SHA512

    57662fd4d12fc57657c9753a036262ac41411f31ae0fcb3dba791bcad21ff16d3484e14346cf67b8f3827609eba30bea26ce5df76acb67d7795c9fc52a1595ec

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xacokuo8.top/

http://hajezey1.top/

http://nusurtal4f.net/

http://netomishnetojuk.net/

http://escalivrouter.net/

http://nick22doom4.net/

http://wrioshtivsio.su/

http://nusotiso4.su/

http://rickkhtovkka.biz/

http://palisotoliso.net/

http://193.56.146.214/

https://193.56.146.214/

rc4.i32
rc4.i32
rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

999888988

C2

93.115.20.139:28978

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a3faedb8bf90b9d4cb105ed8468de99.exe
    "C:\Users\Admin\AppData\Local\Temp\2a3faedb8bf90b9d4cb105ed8468de99.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Users\Admin\AppData\Local\Temp\2a3faedb8bf90b9d4cb105ed8468de99.exe
      "C:\Users\Admin\AppData\Local\Temp\2a3faedb8bf90b9d4cb105ed8468de99.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1424
  • C:\Users\Admin\AppData\Local\Temp\5C43.exe
    C:\Users\Admin\AppData\Local\Temp\5C43.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\5C43.exe
      C:\Users\Admin\AppData\Local\Temp\5C43.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1692
  • C:\Users\Admin\AppData\Local\Temp\622E.exe
    C:\Users\Admin\AppData\Local\Temp\622E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1948
  • C:\Users\Admin\AppData\Local\Temp\64CD.exe
    C:\Users\Admin\AppData\Local\Temp\64CD.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1792
  • C:\Users\Admin\AppData\Local\Temp\68D4.exe
    C:\Users\Admin\AppData\Local\Temp\68D4.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\68D4.exe
      "68D4.exe"
      2⤵
        PID:1000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 564
        2⤵
        • Loads dropped DLL
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1700
    • C:\Users\Admin\AppData\Local\Temp\70B1.exe
      C:\Users\Admin\AppData\Local\Temp\70B1.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1396
    • C:\Users\Admin\AppData\Local\Temp\795A.exe
      C:\Users\Admin\AppData\Local\Temp\795A.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 480
        2⤵
        • Loads dropped DLL
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1960

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5C43.exe
      MD5

      2a3faedb8bf90b9d4cb105ed8468de99

      SHA1

      950a754b9ab1f1d03c63f245a4d09d9a27eb7910

      SHA256

      ff5e6a034fe1ea8be1f93bb560bf909ff78bf8efe22df3ac7a039023420b15b2

      SHA512

      57662fd4d12fc57657c9753a036262ac41411f31ae0fcb3dba791bcad21ff16d3484e14346cf67b8f3827609eba30bea26ce5df76acb67d7795c9fc52a1595ec

    • C:\Users\Admin\AppData\Local\Temp\5C43.exe
      MD5

      2a3faedb8bf90b9d4cb105ed8468de99

      SHA1

      950a754b9ab1f1d03c63f245a4d09d9a27eb7910

      SHA256

      ff5e6a034fe1ea8be1f93bb560bf909ff78bf8efe22df3ac7a039023420b15b2

      SHA512

      57662fd4d12fc57657c9753a036262ac41411f31ae0fcb3dba791bcad21ff16d3484e14346cf67b8f3827609eba30bea26ce5df76acb67d7795c9fc52a1595ec

    • C:\Users\Admin\AppData\Local\Temp\5C43.exe
      MD5

      2a3faedb8bf90b9d4cb105ed8468de99

      SHA1

      950a754b9ab1f1d03c63f245a4d09d9a27eb7910

      SHA256

      ff5e6a034fe1ea8be1f93bb560bf909ff78bf8efe22df3ac7a039023420b15b2

      SHA512

      57662fd4d12fc57657c9753a036262ac41411f31ae0fcb3dba791bcad21ff16d3484e14346cf67b8f3827609eba30bea26ce5df76acb67d7795c9fc52a1595ec

    • C:\Users\Admin\AppData\Local\Temp\622E.exe
      MD5

      42758e2569239a774becdb12698b124c

      SHA1

      4ab353c4177a69fc9a6f3844852762809591dd2f

      SHA256

      e3380dfdd6297ac134bb22c7c1603782f198a5b2164855bf66a95bae47ab472d

      SHA512

      959a6d4e39bc949f8c92c4213a7dd424eff46aaccbce6553d42863f4341b934ceb14997f67fdc2013d064a09c6134b9a113438347b7dedf65e3a7e2ada5def18

    • C:\Users\Admin\AppData\Local\Temp\622E.exe
      MD5

      42758e2569239a774becdb12698b124c

      SHA1

      4ab353c4177a69fc9a6f3844852762809591dd2f

      SHA256

      e3380dfdd6297ac134bb22c7c1603782f198a5b2164855bf66a95bae47ab472d

      SHA512

      959a6d4e39bc949f8c92c4213a7dd424eff46aaccbce6553d42863f4341b934ceb14997f67fdc2013d064a09c6134b9a113438347b7dedf65e3a7e2ada5def18

    • C:\Users\Admin\AppData\Local\Temp\64CD.exe
      MD5

      73252acb344040ddc5d9ce78a5d3a4c2

      SHA1

      3a16c3698ccf7940adfb2b2a9cc8c20b1ba1d015

      SHA256

      b8ac77c37de98099dcdc5924418d445f4b11ecf326edd41a2d49ed6efd2a07eb

      SHA512

      1541e3d7bd163a4c348c6e5c7098c6f3add62b1121296ca28934a69ad308c2e51ca6b841359010da96e71fa42fd6e09f7591448433dc3b01104007808427c3de

    • C:\Users\Admin\AppData\Local\Temp\68D4.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • C:\Users\Admin\AppData\Local\Temp\68D4.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • C:\Users\Admin\AppData\Local\Temp\70B1.exe
      MD5

      31be6099d31bdbf1ed339effdc1c7064

      SHA1

      6b1077be6cf57ea98c3be8b6f0268d025ea72d88

      SHA256

      9d9056d76be4beb3cc17cd95c47108ab42d73255f2bc031423d044ed927fb885

      SHA512

      ecc057643c2e65c74f3286c8856eb57fec75fcb650fbe864d53ec0c36c34e0da3242e19657b1abb75aa3eee88a7367e77ffc0e3fe98bfef0d180c74966d1cede

    • C:\Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • C:\Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • \Users\Admin\AppData\Local\Temp\1105.tmp
      MD5

      d124f55b9393c976963407dff51ffa79

      SHA1

      2c7bbedd79791bfb866898c85b504186db610b5d

      SHA256

      ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

      SHA512

      278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

    • \Users\Admin\AppData\Local\Temp\5C43.exe
      MD5

      2a3faedb8bf90b9d4cb105ed8468de99

      SHA1

      950a754b9ab1f1d03c63f245a4d09d9a27eb7910

      SHA256

      ff5e6a034fe1ea8be1f93bb560bf909ff78bf8efe22df3ac7a039023420b15b2

      SHA512

      57662fd4d12fc57657c9753a036262ac41411f31ae0fcb3dba791bcad21ff16d3484e14346cf67b8f3827609eba30bea26ce5df76acb67d7795c9fc52a1595ec

    • \Users\Admin\AppData\Local\Temp\68D4.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\68D4.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\68D4.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\68D4.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\68D4.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\68D4.exe
      MD5

      ab823df932b3c2941a9015848ebdb97b

      SHA1

      a7e2d46ada3a42a3d32a96937c316340f2e62a5b

      SHA256

      812d78a50a8de210dbbce12fda210461770b8b928f8b3249de80ecb68055f61e

      SHA512

      59ac83ced7e0a68e7491812b494e715fc19ba2aa25edbc0b5765792a1dc19432dbf8f5b671ea4eebf590740c63ee1a50fe4b0fc716b986f6c5070b920f5c2325

    • \Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • \Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • \Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • \Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • \Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • \Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • \Users\Admin\AppData\Local\Temp\795A.exe
      MD5

      a93fa53a3471997ccf4176fd88da2fb2

      SHA1

      3756b162dc96521a42d95beb0d6aa7b80c82757d

      SHA256

      789a80269564acd3bb1caa10c87bf7376b3194ae28006451f7a6413a5aec93f0

      SHA512

      f1dd1992871e4eb6561af3a790d01c0c67852ab3d3e854d4b6215495e92b8b488d60ed7f4041e55a27fb952ea847e1e5d6041da5b056dab461c280771e876693

    • memory/580-58-0x0000000000020000-0x0000000000028000-memory.dmp
      Filesize

      32KB

    • memory/580-59-0x0000000000030000-0x0000000000039000-memory.dmp
      Filesize

      36KB

    • memory/724-91-0x0000000000000000-mapping.dmp
    • memory/724-102-0x0000000000220000-0x000000000026E000-memory.dmp
      Filesize

      312KB

    • memory/724-111-0x0000000000400000-0x0000000000491000-memory.dmp
      Filesize

      580KB

    • memory/724-104-0x00000000002F0000-0x000000000037E000-memory.dmp
      Filesize

      568KB

    • memory/1204-60-0x0000000002BF0000-0x0000000002C06000-memory.dmp
      Filesize

      88KB

    • memory/1204-93-0x0000000004160000-0x0000000004176000-memory.dmp
      Filesize

      88KB

    • memory/1204-114-0x0000000005FA0000-0x0000000005FB6000-memory.dmp
      Filesize

      88KB

    • memory/1204-101-0x00000000043B0000-0x00000000043C6000-memory.dmp
      Filesize

      88KB

    • memory/1348-76-0x0000000000000000-mapping.dmp
    • memory/1348-79-0x0000000000E30000-0x0000000000E31000-memory.dmp
      Filesize

      4KB

    • memory/1396-99-0x0000000000400000-0x0000000002B4D000-memory.dmp
      Filesize

      39.3MB

    • memory/1396-98-0x00000000001B0000-0x00000000001B9000-memory.dmp
      Filesize

      36KB

    • memory/1396-86-0x0000000000000000-mapping.dmp
    • memory/1396-94-0x00000000002ED000-0x00000000002FE000-memory.dmp
      Filesize

      68KB

    • memory/1424-55-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB

    • memory/1424-56-0x0000000000402E0C-mapping.dmp
    • memory/1424-57-0x0000000075AC1000-0x0000000075AC3000-memory.dmp
      Filesize

      8KB

    • memory/1428-61-0x0000000000000000-mapping.dmp
    • memory/1692-71-0x0000000000402E0C-mapping.dmp
    • memory/1700-113-0x0000000001CB0000-0x0000000001D10000-memory.dmp
      Filesize

      384KB

    • memory/1700-106-0x0000000000000000-mapping.dmp
    • memory/1792-89-0x0000000000230000-0x0000000000239000-memory.dmp
      Filesize

      36KB

    • memory/1792-66-0x0000000000000000-mapping.dmp
    • memory/1792-88-0x0000000000220000-0x0000000000228000-memory.dmp
      Filesize

      32KB

    • memory/1792-90-0x0000000000400000-0x0000000002EFA000-memory.dmp
      Filesize

      43.0MB

    • memory/1948-63-0x0000000000000000-mapping.dmp
    • memory/1948-83-0x0000000000520000-0x0000000000521000-memory.dmp
      Filesize

      4KB

    • memory/1948-82-0x00000000004E0000-0x00000000004E3000-memory.dmp
      Filesize

      12KB

    • memory/1948-96-0x0000000000A10000-0x0000000000A2F000-memory.dmp
      Filesize

      124KB

    • memory/1948-97-0x0000000000A30000-0x0000000000A4A000-memory.dmp
      Filesize

      104KB

    • memory/1948-74-0x0000000000350000-0x0000000000351000-memory.dmp
      Filesize

      4KB

    • memory/1960-115-0x0000000000000000-mapping.dmp
    • memory/1960-124-0x0000000002180000-0x0000000002181000-memory.dmp
      Filesize

      4KB