Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    16-12-2021 03:03

General

  • Target

    901caedcbf4e9285d14a2039d55fd6a8e2d5c6bc8ed118874854a9055ca19fa7.exe

  • Size

    334KB

  • MD5

    eb3438963d798545d8ec5b577d9adcf1

  • SHA1

    9e49405b8154f8e0474fd7159b56c1d51d39e465

  • SHA256

    901caedcbf4e9285d14a2039d55fd6a8e2d5c6bc8ed118874854a9055ca19fa7

  • SHA512

    fd4de64097020189b6346b4a14d1534803a0b30dfc51422697b2d526b1541bd3c90dd185fc6f41a246953ce4822b13ce78ef22dc9724e1209f4775f4860934e3

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

3372020928

C2

jeliskvosh.com

Extracted

Family

redline

Botnet

22

C2

195.133.47.114:38127

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.77.127.230:8888

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • VKeylogger

    A keylogger first seen in Nov 2020.

  • VKeylogger Payload 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

    suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

  • Arkei Stealer Payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 1 IoCs
  • Blocks application from running via registry modification

    Adds application to list of disallowed applications.

  • Downloads MZ/PE file
  • Executes dropped EXE 15 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\901caedcbf4e9285d14a2039d55fd6a8e2d5c6bc8ed118874854a9055ca19fa7.exe
    "C:\Users\Admin\AppData\Local\Temp\901caedcbf4e9285d14a2039d55fd6a8e2d5c6bc8ed118874854a9055ca19fa7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Users\Admin\AppData\Local\Temp\901caedcbf4e9285d14a2039d55fd6a8e2d5c6bc8ed118874854a9055ca19fa7.exe
      "C:\Users\Admin\AppData\Local\Temp\901caedcbf4e9285d14a2039d55fd6a8e2d5c6bc8ed118874854a9055ca19fa7.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4108
  • C:\Users\Admin\AppData\Local\Temp\1578.exe
    C:\Users\Admin\AppData\Local\Temp\1578.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Users\Admin\AppData\Local\Temp\1578.exe
      C:\Users\Admin\AppData\Local\Temp\1578.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4440
  • C:\Users\Admin\AppData\Local\Temp\22F6.exe
    C:\Users\Admin\AppData\Local\Temp\22F6.exe
    1⤵
    • Executes dropped EXE
    PID:4392
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 248
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:916
  • C:\Users\Admin\AppData\Local\Temp\3259.exe
    C:\Users\Admin\AppData\Local\Temp\3259.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4372
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\35A5.dll
    1⤵
    • Loads dropped DLL
    PID:3792
  • C:\Users\Admin\AppData\Local\Temp\43FE.exe
    C:\Users\Admin\AppData\Local\Temp\43FE.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\43FE.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 5
        3⤵
        • Delays execution with timeout.exe
        PID:4364
  • C:\Users\Admin\AppData\Local\Temp\4874.exe
    C:\Users\Admin\AppData\Local\Temp\4874.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1344
  • C:\Users\Admin\AppData\Local\Temp\61AA.exe
    C:\Users\Admin\AppData\Local\Temp\61AA.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ep bypass -noexit
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of AdjustPrivilegeToken
      PID:2492
  • C:\Users\Admin\AppData\Local\Temp\61AA.exe
    C:\Users\Admin\AppData\Local\Temp\61AA.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2032
  • C:\Users\Admin\AppData\Local\Temp\64D7.exe
    C:\Users\Admin\AppData\Local\Temp\64D7.exe
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    PID:3048
  • C:\Users\Admin\AppData\Local\Temp\66AD.exe
    C:\Users\Admin\AppData\Local\Temp\66AD.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2224
  • C:\Users\Admin\AppData\Local\Temp\696D.exe
    C:\Users\Admin\AppData\Local\Temp\696D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      PID:2924
  • C:\Users\Admin\AppData\Local\Temp\74B9.exe
    C:\Users\Admin\AppData\Local\Temp\74B9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:4536
  • C:\Users\Admin\AppData\Local\Temp\83BE.exe
    C:\Users\Admin\AppData\Local\Temp\83BE.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    PID:2520
  • C:\Users\Admin\AppData\Local\Temp\8C4A.exe
    C:\Users\Admin\AppData\Local\Temp\8C4A.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    PID:1616
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im 8C4A.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8C4A.exe" & del C:\ProgramData\*.dll & exit
      2⤵
        PID:532
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /im 8C4A.exe /f
          3⤵
          • Kills process with taskkill
          PID:1144
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 6
          3⤵
          • Delays execution with timeout.exe
          PID:2580
    • C:\Users\Admin\AppData\Local\Temp\FA67.exe
      C:\Users\Admin\AppData\Local\Temp\FA67.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2648
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:1460
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:4936

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1060-165-0x00000000006E6000-0x00000000006F8000-memory.dmp

        Filesize

        72KB

      • memory/1060-171-0x0000000000400000-0x00000000004D6000-memory.dmp

        Filesize

        856KB

      • memory/1060-169-0x00000000004F0000-0x000000000050C000-memory.dmp

        Filesize

        112KB

      • memory/1344-174-0x0000000000400000-0x00000000004CD000-memory.dmp

        Filesize

        820KB

      • memory/1344-166-0x0000000000766000-0x0000000000777000-memory.dmp

        Filesize

        68KB

      • memory/1344-172-0x00000000004D0000-0x000000000057E000-memory.dmp

        Filesize

        696KB

      • memory/2128-173-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/2128-177-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/2224-208-0x00000000054E0000-0x0000000005AE6000-memory.dmp

        Filesize

        6.0MB

      • memory/2224-191-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

        Filesize

        4KB

      • memory/2492-209-0x0000000003200000-0x0000000003201000-memory.dmp

        Filesize

        4KB

      • memory/2492-198-0x0000000007E70000-0x0000000007E71000-memory.dmp

        Filesize

        4KB

      • memory/2492-181-0x0000000006ED0000-0x0000000006ED1000-memory.dmp

        Filesize

        4KB

      • memory/2492-182-0x0000000007580000-0x0000000007581000-memory.dmp

        Filesize

        4KB

      • memory/2492-180-0x0000000003200000-0x0000000003201000-memory.dmp

        Filesize

        4KB

      • memory/2492-179-0x0000000003200000-0x0000000003201000-memory.dmp

        Filesize

        4KB

      • memory/2492-186-0x0000000006F40000-0x0000000006F41000-memory.dmp

        Filesize

        4KB

      • memory/2492-187-0x0000000006F42000-0x0000000006F43000-memory.dmp

        Filesize

        4KB

      • memory/2492-229-0x0000000009510000-0x0000000009511000-memory.dmp

        Filesize

        4KB

      • memory/2492-219-0x00000000087F0000-0x00000000087F1000-memory.dmp

        Filesize

        4KB

      • memory/2492-203-0x0000000008350000-0x0000000008351000-memory.dmp

        Filesize

        4KB

      • memory/2492-199-0x0000000007F10000-0x0000000007F11000-memory.dmp

        Filesize

        4KB

      • memory/2492-193-0x0000000007BF0000-0x0000000007BF1000-memory.dmp

        Filesize

        4KB

      • memory/2492-195-0x0000000007C90000-0x0000000007C91000-memory.dmp

        Filesize

        4KB

      • memory/2520-319-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-322-0x00000000029B0000-0x00000000029B1000-memory.dmp

        Filesize

        4KB

      • memory/2520-324-0x0000000002960000-0x0000000002961000-memory.dmp

        Filesize

        4KB

      • memory/2520-321-0x00000000029A0000-0x00000000029A1000-memory.dmp

        Filesize

        4KB

      • memory/2520-320-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

        Filesize

        4KB

      • memory/2520-318-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-317-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-316-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-314-0x0000000002890000-0x0000000002891000-memory.dmp

        Filesize

        4KB

      • memory/2520-315-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-311-0x0000000002820000-0x0000000002821000-memory.dmp

        Filesize

        4KB

      • memory/2520-310-0x0000000002830000-0x0000000002831000-memory.dmp

        Filesize

        4KB

      • memory/2520-308-0x0000000002870000-0x0000000002871000-memory.dmp

        Filesize

        4KB

      • memory/2520-307-0x0000000002800000-0x0000000002801000-memory.dmp

        Filesize

        4KB

      • memory/2520-306-0x0000000002850000-0x0000000002851000-memory.dmp

        Filesize

        4KB

      • memory/2520-305-0x0000000002840000-0x0000000002841000-memory.dmp

        Filesize

        4KB

      • memory/2520-303-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-304-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-302-0x0000000002620000-0x0000000002621000-memory.dmp

        Filesize

        4KB

      • memory/2520-301-0x0000000002600000-0x0000000002601000-memory.dmp

        Filesize

        4KB

      • memory/2520-300-0x0000000000C10000-0x0000000000C11000-memory.dmp

        Filesize

        4KB

      • memory/2520-298-0x00000000025E0000-0x00000000025E1000-memory.dmp

        Filesize

        4KB

      • memory/2520-299-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

        Filesize

        4KB

      • memory/2520-297-0x00000000025D0000-0x00000000025D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-296-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-294-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-292-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-273-0x0000000000B30000-0x0000000000B90000-memory.dmp

        Filesize

        384KB

      • memory/2520-290-0x00000000065E0000-0x00000000065E1000-memory.dmp

        Filesize

        4KB

      • memory/2520-274-0x00000000028F0000-0x00000000028F1000-memory.dmp

        Filesize

        4KB

      • memory/2520-275-0x0000000002900000-0x0000000002901000-memory.dmp

        Filesize

        4KB

      • memory/2520-276-0x00000000028B0000-0x00000000028B1000-memory.dmp

        Filesize

        4KB

      • memory/2520-277-0x0000000002920000-0x0000000002921000-memory.dmp

        Filesize

        4KB

      • memory/2520-278-0x00000000028E0000-0x00000000028E1000-memory.dmp

        Filesize

        4KB

      • memory/2520-280-0x00000000028D0000-0x00000000028D1000-memory.dmp

        Filesize

        4KB

      • memory/2520-284-0x0000000002910000-0x0000000002911000-memory.dmp

        Filesize

        4KB

      • memory/2520-282-0x0000000002940000-0x0000000002941000-memory.dmp

        Filesize

        4KB

      • memory/2520-286-0x00000000035E0000-0x00000000035E1000-memory.dmp

        Filesize

        4KB

      • memory/2520-287-0x00000000035D0000-0x00000000035D1000-memory.dmp

        Filesize

        4KB

      • memory/3032-119-0x0000000002CF0000-0x0000000002D06000-memory.dmp

        Filesize

        88KB

      • memory/3032-228-0x00000000059F0000-0x0000000005A06000-memory.dmp

        Filesize

        88KB

      • memory/3032-160-0x0000000003560000-0x0000000003576000-memory.dmp

        Filesize

        88KB

      • memory/3048-207-0x00000000022D0000-0x00000000022D2000-memory.dmp

        Filesize

        8KB

      • memory/3048-258-0x00000000022D5000-0x00000000022D6000-memory.dmp

        Filesize

        4KB

      • memory/3648-116-0x0000000000640000-0x0000000000649000-memory.dmp

        Filesize

        36KB

      • memory/3648-115-0x0000000000726000-0x0000000000736000-memory.dmp

        Filesize

        64KB

      • memory/3792-164-0x0000000000FC0000-0x0000000000FCA000-memory.dmp

        Filesize

        40KB

      • memory/4108-117-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4284-130-0x00000000004E0000-0x000000000058E000-memory.dmp

        Filesize

        696KB

      • memory/4284-126-0x00000000006F6000-0x0000000000707000-memory.dmp

        Filesize

        68KB

      • memory/4372-135-0x00000000013C0000-0x00000000013C1000-memory.dmp

        Filesize

        4KB

      • memory/4372-136-0x0000000002F70000-0x0000000002FB5000-memory.dmp

        Filesize

        276KB

      • memory/4372-152-0x0000000005AD0000-0x0000000005AD1000-memory.dmp

        Filesize

        4KB

      • memory/4372-144-0x0000000005A20000-0x0000000005A21000-memory.dmp

        Filesize

        4KB

      • memory/4372-143-0x00000000060A0000-0x00000000060A1000-memory.dmp

        Filesize

        4KB

      • memory/4372-153-0x0000000072D30000-0x0000000072D7B000-memory.dmp

        Filesize

        300KB

      • memory/4372-151-0x0000000074BD0000-0x0000000075F18000-memory.dmp

        Filesize

        19.3MB

      • memory/4372-146-0x0000000005BA0000-0x0000000005BA1000-memory.dmp

        Filesize

        4KB

      • memory/4372-150-0x00000000762B0000-0x0000000076834000-memory.dmp

        Filesize

        5.5MB

      • memory/4372-134-0x0000000000D70000-0x0000000000DD9000-memory.dmp

        Filesize

        420KB

      • memory/4372-137-0x0000000076E20000-0x0000000076FE2000-memory.dmp

        Filesize

        1.8MB

      • memory/4372-141-0x0000000072DF0000-0x0000000072E70000-memory.dmp

        Filesize

        512KB

      • memory/4372-148-0x0000000005A80000-0x0000000005A81000-memory.dmp

        Filesize

        4KB

      • memory/4372-139-0x0000000000D70000-0x0000000000D71000-memory.dmp

        Filesize

        4KB

      • memory/4372-138-0x0000000074430000-0x0000000074521000-memory.dmp

        Filesize

        964KB

      • memory/4372-149-0x0000000005A90000-0x0000000005A91000-memory.dmp

        Filesize

        4KB

      • memory/4392-155-0x00000000001E0000-0x00000000001E9000-memory.dmp

        Filesize

        36KB

      • memory/4392-156-0x0000000000400000-0x00000000004CD000-memory.dmp

        Filesize

        820KB

      • memory/4392-154-0x0000000000696000-0x00000000006A7000-memory.dmp

        Filesize

        68KB

      • memory/4536-234-0x0000000000120000-0x0000000000121000-memory.dmp

        Filesize

        4KB

      • memory/4536-237-0x0000000074430000-0x0000000074521000-memory.dmp

        Filesize

        964KB

      • memory/4536-236-0x0000000076E20000-0x0000000076FE2000-memory.dmp

        Filesize

        1.8MB

      • memory/4536-240-0x0000000002110000-0x0000000002155000-memory.dmp

        Filesize

        276KB

      • memory/4536-252-0x0000000004D20000-0x0000000004D21000-memory.dmp

        Filesize

        4KB

      • memory/4536-233-0x00000000008E0000-0x000000000097C000-memory.dmp

        Filesize

        624KB

      • memory/4952-272-0x0000000000400000-0x000000000081A000-memory.dmp

        Filesize

        4.1MB

      • memory/4952-271-0x0000000000820000-0x00000000008CE000-memory.dmp

        Filesize

        696KB

      • memory/4952-270-0x0000000000030000-0x000000000003A000-memory.dmp

        Filesize

        40KB