Overview

overview

10

Static

static

#Order#.exe

windows7_x64

7

#Order#.exe

windows10_x64

7

#QTN-20-97...7..exe

windows7_x64

6

#QTN-20-97...7..exe

windows10_x64

5

$70k MT 30JAN.exe

windows7_x64

6

$70k MT 30JAN.exe

windows10_x64

6

03-02-20.exe

windows7_x64

7

03-02-20.exe

windows10_x64

7

20191107145436608.exe

windows7_x64

6

20191107145436608.exe

windows10_x64

6

2019111211...fo.exe

windows7_x64

6

2019111211...fo.exe

windows10_x64

6

2020 ORDERS.exe

windows7_x64

5

2020 ORDERS.exe

windows10_x64

5

624880_ZOC...PT.exe

windows7_x64

6

624880_ZOC...PT.exe

windows10_x64

6

ADMIN DEPT...NT.exe

windows7_x64

8

ADMIN DEPT...NT.exe

windows10_x64

10

AWB_TR0089.exe

windows7_x64

1

AWB_TR0089.exe

windows10_x64

1

Avis de virement.exe

windows7_x64

7

Avis de virement.exe

windows10_x64

8

BL-INVOICE...CS.exe

windows7_x64

6

BL-INVOICE...CS.exe

windows10_x64

6

BMS PO 4820.exe

windows7_x64

6

BMS PO 4820.exe

windows10_x64

6

BSO_191120...df.exe

windows7_x64

6

BSO_191120...df.exe

windows10_x64

6

Bank Information.exe

windows7_x64

6

Bank Information.exe

windows10_x64

6

C.V - Expe...es.exe

windows7_x64

7

C.V - Expe...es.exe

windows10_x64

7

C956PO.exe

windows7_x64

6

C956PO.exe

windows10_x64

6

CIN - U140...32.exe

windows7_x64

6

CIN - U140...32.exe

windows10_x64

6

CV - Resum...ma.exe

windows7_x64

10

CV - Resum...ma.exe

windows10_x64

7

Calendar2Excel.exe

windows7_x64

1

Calendar2Excel.exe

windows10_x64

1

DOC302429042_SDOU.exe

windows7_x64

5

DOC302429042_SDOU.exe

windows10_x64

5

DOC37774732.exe

windows7_x64

6

DOC37774732.exe

windows10_x64

6

Doc _45654.exe

windows7_x64

6

Doc _45654.exe

windows10_x64

6

Docs.exe

windows7_x64

6

Docs.exe

windows10_x64

6

Document_Invoice.exe

windows7_x64

7

Document_Invoice.exe

windows10_x64

7

FOENER RFQ...DF.exe

windows7_x64

6

FOENER RFQ...DF.exe

windows10_x64

6

Following ...ts.exe

windows7_x64

7

Following ...ts.exe

windows10_x64

7

HTQ19-P040...AN.exe

windows7_x64

7

HTQ19-P040...AN.exe

windows10_x64

7

IMAGE221.exe

windows7_x64

8

IMAGE221.exe

windows10_x64

8

Invoice.exe

windows7_x64

6

Invoice.exe

windows10_x64

6

LPO-16155152112.exe

windows7_x64

7

LPO-16155152112.exe

windows10_x64

8

Lëscht vu...lt.exe

windows7_x64

6

Lëscht vu...lt.exe

windows10_x64

6

MT Swift copy.exe

windows7_x64

6

MT Swift copy.exe

windows10_x64

6

NEW P.O-8...FE.exe

windows7_x64

6

NEW P.O-8...FE.exe

windows10_x64

6

NEW P.O -J...20.exe

windows7_x64

6

NEW P.O -J...20.exe

windows10_x64

6

NNBL DRAFT...df.exe

windows7_x64

6

NNBL DRAFT...df.exe

windows10_x64

6

New Order ...05.exe

windows7_x64

6

New Order ...05.exe

windows10_x64

6

New Purcha...er.exe

windows7_x64

8

New Purcha...er.exe

windows10_x64

8

New Year Order.exe

windows7_x64

8

New Year Order.exe

windows10_x64

8

New order ...5).exe

windows7_x64

10

New order ...5).exe

windows10_x64

10

OCEAN BILL...NG.exe

windows7_x64

6

OCEAN BILL...NG.exe

windows10_x64

6

ORDER FILE.exe

windows7_x64

10

ORDER FILE.exe

windows10_x64

10

Order Feb 2020.exe

windows7_x64

6

Order Feb 2020.exe

windows10_x64

6

Order Speciations.exe

windows7_x64

1

Order Speciations.exe

windows10_x64

10

Order list.exe

windows7_x64

8

Order list.exe

windows10_x64

8

P.O.25890.exe

windows7_x64

6

P.O.25890.exe

windows10_x64

6

PAYMENT DE...DF.exe

windows7_x64

10

PAYMENT DE...DF.exe

windows10_x64

10

PDF324561.exe

windows7_x64

6

PDF324561.exe

windows10_x64

6

PO BMS 4820.exe

windows7_x64

6

PO BMS 4820.exe

windows10_x64

6

PO NO.SC-100887.exe

windows7_x64

6

PO NO.SC-100887.exe

windows10_x64

6

PO#32136578.exe

windows7_x64

6

PO#32136578.exe

windows10_x64

6

PO#P-13082...df.exe

windows7_x64

5

PO#P-13082...df.exe

windows10_x64

5

PO-0088PI69.exe

windows7_x64

6

PO-0088PI69.exe

windows10_x64

6

PO-05808T008.exe

windows7_x64

6

PO-05808T008.exe

windows10_x64

6

PO-ABA-098722.exe

windows7_x64

7

PO-ABA-098722.exe

windows10_x64

7

PO. 11092873.exe

windows7_x64

6

PO. 11092873.exe

windows10_x64

6

PO.exe

windows7_x64

6

PO.exe

windows10_x64

6

PO1782020.exe

windows7_x64

10

PO1782020.exe

windows10_x64

10

PO3245_Signed.exe

windows7_x64

10

PO3245_Signed.exe

windows10_x64

10

PRODUCT LIST.exe

windows7_x64

6

PRODUCT LIST.exe

windows10_x64

6

Payment De...ce.exe

windows7_x64

6

Payment De...ce.exe

windows10_x64

6

Payment Details.exe

windows7_x64

10

Payment Details.exe

windows10_x64

10

Photo-Samp...50.exe

windows7_x64

7

Photo-Samp...50.exe

windows10_x64

10

Presupuest...19.exe

windows7_x64

6

Presupuest...19.exe

windows10_x64

6

Proform In...ea.exe

windows7_x64

6

Proform In...ea.exe

windows10_x64

6

Proform Invoice.exe

windows7_x64

6

Proform Invoice.exe

windows10_x64

6

Proforma Invoice.exe

windows7_x64

6

Proforma Invoice.exe

windows10_x64

6

Purchase O...2).exe

windows7_x64

8

Purchase O...2).exe

windows10_x64

8

Purchase Order.exe

windows7_x64

7

Purchase Order.exe

windows10_x64

7

Purchase order.exe

windows7_x64

7

Purchase order.exe

windows10_x64

7

QUOTATION.Pdf.exe

windows7_x64

8

QUOTATION.Pdf.exe

windows10_x64

8

Quotation.exe

windows7_x64

7

Quotation.exe

windows10_x64

7

RFQ2901202...43.exe

windows7_x64

6

RFQ2901202...43.exe

windows10_x64

5

Revised_PO...01.exe

windows7_x64

10

Revised_PO...01.exe

windows10_x64

10

SEA LONGIT...ER.exe

windows7_x64

1

SEA LONGIT...ER.exe

windows10_x64

1

SHIPPING P...76.exe

windows7_x64

6

SHIPPING P...76.exe

windows10_x64

6

SKM_C33501...00.exe

windows7_x64

6

SKM_C33501...00.exe

windows10_x64

6

SOA DEC 2019.exe

windows7_x64

1

SOA DEC 2019.exe

windows10_x64

7

SOA JAN 2020.exe

windows7_x64

6

SOA JAN 2020.exe

windows10_x64

6

SOA.exe

windows7_x64

6

SOA.exe

windows10_x64

6

SP3-139-V1...ER.exe

windows7_x64

8

SP3-139-V1...ER.exe

windows10_x64

8

Scan 50%_s...89.exe

windows7_x64

6

Scan 50%_s...89.exe

windows10_x64

6

Shipment Details.exe

windows7_x64

10

Shipment Details.exe

windows10_x64

10

Shipping D...B).exe

windows7_x64

1

Shipping D...B).exe

windows10_x64

1

Shipping i...t..exe

windows7_x64

6

Shipping i...t..exe

windows10_x64

6

Swift copy.exe

windows7_x64

6

Swift copy.exe

windows10_x64

6

Swift.exe

windows7_x64

10

Swift.exe

windows10_x64

10

TT COPY.exe

windows7_x64

6

TT COPY.exe

windows10_x64

6

TT Statement.exe

windows7_x64

6

TT Statement.exe

windows10_x64

6

The Original Copy.exe

windows7_x64

10

The Original Copy.exe

windows10_x64

7

UPDATE SOA...41.exe

windows7_x64

1

UPDATE SOA...41.exe

windows10_x64

1

URGENT ENQUIRY.exe

windows7_x64

1

URGENT ENQUIRY.exe

windows10_x64

1

Untitled_2...-1.exe

windows7_x64

1

Untitled_2...-1.exe

windows10_x64

7

Unusual lo...ss.exe

windows7_x64

1

Unusual lo...ss.exe

windows10_x64

1

bin_2CE6.exe

windows7_x64

5

bin_2CE6.exe

windows10_x64

6

bin_4B66.exe

windows7_x64

8

bin_4B66.exe

windows10_x64

10

bin_C237.exe

windows7_x64

5

bin_C237.exe

windows10_x64

6

bin_protec...1F.exe

windows7_x64

5

bin_protec...1F.exe

windows10_x64

6

devis.exe

windows7_x64

5

devis.exe

windows10_x64

5

dhl_doc7348255141.exe

windows7_x64

6

dhl_doc7348255141.exe

windows10_x64

6

documento.exe

windows7_x64

7

documento.exe

windows10_x64

7

new order -85486.exe

windows7_x64

6

new order -85486.exe

windows10_x64

6

payment 000012223.exe

windows7_x64

6

payment 000012223.exe

windows10_x64

6

po 23232 signed.exe

windows7_x64

10

po 23232 signed.exe

windows10_x64

10

products inquiry.exe

windows7_x64

6

products inquiry.exe

windows10_x64

6

products_inquiry.exe

windows7_x64

6

products_inquiry.exe

windows10_x64

6

proforma invoice.exe

windows7_x64

6

proforma invoice.exe

windows10_x64

6

purchase o...7..exe

windows7_x64

7

purchase o...7..exe

windows10_x64

7

shipping doc.exe

windows7_x64

6

shipping doc.exe

windows10_x64

6

statement ...nt.exe

windows7_x64

6

statement ...nt.exe

windows10_x64

6

swift.exe

windows7_x64

10

swift.exe

windows10_x64

10

swiftcopy 433.exe

windows7_x64

10

swiftcopy 433.exe

windows10_x64

10

swiftcopy.exe

windows7_x64

10

swiftcopy.exe

windows10_x64

10

updated statement.exe

windows7_x64

6

updated statement.exe

windows10_x64

6

w3TM24p.exe

windows7_x64

1

w3TM24p.exe

windows10_x64

1

Analysis

  • max time kernel
    153s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    20-02-2020 07:05

General

  • Target

    SP3-139-V128 ORDER.exe

  • Size

    623KB

  • MD5

    ada6dac710065598c4c5be654823cfa8

  • SHA1

    cc5ca7f098b329a5045678b19cb13febbe30ab9e

  • SHA256

    780de9dbdc4a6adf0fc709f365715fcc86f40a675834a3ba602ff11e20f72505

  • SHA512

    ccd4011b1a8f9b893096c53ef0caede2fe34faf059db41cb455f3a1be864c55620620d4a2bf26f3b9924218b2fff7b9ed7f88262fe724b5ece53c15748146ed1

Score
8/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 7331 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 128 IoCs
  • Executes dropped EXE 3 IoCs
  • Program crash 1 IoCs
  • Drops startup file 2 IoCs
  • Reads browser user data or profiles (possible credential harvesting) 2 TTPs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SP3-139-V128 ORDER.exe
    "C:\Users\Admin\AppData\Local\Temp\SP3-139-V128 ORDER.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run entry to start application
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Drops startup file
      PID:1864
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\n5jrnkah\n5jrnkah.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE011.tmp" "c:\Users\Admin\AppData\Local\Temp\n5jrnkah\CSCE7C3AD1F9C4A44F49AF926D1327D163.TMP"
          4⤵
            PID:1956
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\42vu2osh\42vu2osh.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1976
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE33C.tmp" "c:\Users\Admin\AppData\Local\Temp\42vu2osh\CSC931B207E12564399AEF92E35A28DAFB6.TMP"
            4⤵
              PID:2008
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2028
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:604
            • C:\Windows\SysWOW64\choice.exe
              choice /C Y /N /D Y /T 3
              4⤵
                PID:1560
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
              "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe"
              3⤵
              • Loads dropped DLL
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Executes dropped EXE
              • Drops startup file
              PID:860
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3kyel5tn\3kyel5tn.cmdline"
                4⤵
                  PID:792
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF1.tmp" "c:\Users\Admin\AppData\Local\Temp\3kyel5tn\CSC745E6DEB450A4463B0673C4DC423CEC8.TMP"
                    5⤵
                      PID:1536
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fknef3hu\fknef3hu.cmdline"
                    4⤵
                      PID:1540
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD48.tmp" "c:\Users\Admin\AppData\Local\Temp\fknef3hu\CSCBD7A492558E949639EB96A093F6864.TMP"
                        5⤵
                          PID:1612
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        4⤵
                          PID:1652
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe"
                          4⤵
                            PID:1060
                            • C:\Windows\SysWOW64\choice.exe
                              choice /C Y /N /D Y /T 3
                              5⤵
                                PID:1480
                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                              "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe"
                              4⤵
                              • Loads dropped DLL
                              • Executes dropped EXE
                              PID:1520
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 680
                                5⤵
                                • Loads dropped DLL
                                • Suspicious use of AdjustPrivilegeToken
                                • Program crash
                                PID:1432

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Defense Evasion

                      Modify Registry

                      1
                      T1112

                      Credential Access

                      Credentials in Files

                      1
                      T1081

                      Collection

                      Data from Local System

                      1
                      T1005

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\3kyel5tn\3kyel5tn.dll
                      • C:\Users\Admin\AppData\Local\Temp\42vu2osh\42vu2osh.dll
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtm
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • C:\Users\Admin\AppData\Local\Temp\RESBF1.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RESD48.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RESE011.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RESE33C.tmp
                      • C:\Users\Admin\AppData\Local\Temp\fknef3hu\fknef3hu.dll
                      • C:\Users\Admin\AppData\Local\Temp\n5jrnkah\n5jrnkah.dll
                      • \??\c:\Users\Admin\AppData\Local\Temp\3kyel5tn\3kyel5tn.0.cs
                      • \??\c:\Users\Admin\AppData\Local\Temp\3kyel5tn\3kyel5tn.cmdline
                      • \??\c:\Users\Admin\AppData\Local\Temp\3kyel5tn\CSC745E6DEB450A4463B0673C4DC423CEC8.TMP
                      • \??\c:\Users\Admin\AppData\Local\Temp\42vu2osh\42vu2osh.0.cs
                      • \??\c:\Users\Admin\AppData\Local\Temp\42vu2osh\42vu2osh.cmdline
                      • \??\c:\Users\Admin\AppData\Local\Temp\42vu2osh\CSC931B207E12564399AEF92E35A28DAFB6.TMP
                      • \??\c:\Users\Admin\AppData\Local\Temp\fknef3hu\CSCBD7A492558E949639EB96A093F6864.TMP
                      • \??\c:\Users\Admin\AppData\Local\Temp\fknef3hu\fknef3hu.0.cs
                      • \??\c:\Users\Admin\AppData\Local\Temp\fknef3hu\fknef3hu.cmdline
                      • \??\c:\Users\Admin\AppData\Local\Temp\n5jrnkah\CSCE7C3AD1F9C4A44F49AF926D1327D163.TMP
                      • \??\c:\Users\Admin\AppData\Local\Temp\n5jrnkah\n5jrnkah.0.cs
                      • \??\c:\Users\Admin\AppData\Local\Temp\n5jrnkah\n5jrnkah.cmdline
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                      • memory/1432-38-0x0000000002130000-0x0000000002141000-memory.dmp
                        Filesize

                        68KB

                      • memory/1432-41-0x0000000002930000-0x0000000002941000-memory.dmp
                        Filesize

                        68KB

                      • memory/2028-16-0x0000000000400000-0x000000000044E000-memory.dmp
                        Filesize

                        312KB

                      • memory/2028-17-0x0000000000400000-0x000000000044E000-memory.dmp
                        Filesize

                        312KB

                      • memory/2028-18-0x0000000000400000-0x000000000044E000-memory.dmp
                        Filesize

                        312KB