Resubmissions

15-10-2024 15:36

241015-s1zlzasdkc 10

01-07-2024 18:32

240701-w6yteawhmq 10

01-07-2024 14:52

240701-r82wmaxdnd 10

01-07-2024 14:52

240701-r8syqa1dpp 10

11-03-2024 21:22

240311-z8dsssgg58 10

01-09-2021 13:18

210901-5bmxjspa5s 10

01-09-2021 13:04

210901-te4btfspqa 10

01-09-2021 05:12

210901-4wnkwm1p3j 10

31-08-2021 21:47

210831-41rp97dma2 10

31-08-2021 19:51

210831-359awwatje 10

Analysis

  • max time kernel
    65s
  • max time network
    606s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    01-09-2021 05:12

General

  • Target

    Setup (22).exe

  • Size

    631KB

  • MD5

    cb927513ff8ebff4dd52a47f7e42f934

  • SHA1

    0de47c02a8adc4940a6c18621b4e4a619641d029

  • SHA256

    fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f

  • SHA512

    988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c

Malware Config

Extracted

Family

redline

Botnet

NORMAN2

C2

45.14.49.184:27587

Extracted

Family

redline

Botnet

31.08

C2

95.181.152.47:15089

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 15 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 15 IoCs
  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup (22).exe
    "C:\Users\Admin\AppData\Local\Temp\Setup (22).exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\Documents\9rFhe_o_r_SuUyualcMhxuL1.exe
      "C:\Users\Admin\Documents\9rFhe_o_r_SuUyualcMhxuL1.exe"
      2⤵
      • Executes dropped EXE
      PID:564
      • C:\Users\Admin\Documents\9rFhe_o_r_SuUyualcMhxuL1.exe
        "C:\Users\Admin\Documents\9rFhe_o_r_SuUyualcMhxuL1.exe"
        3⤵
        • Executes dropped EXE
        PID:1552
    • C:\Users\Admin\Documents\nUODjzZGSLyq_FRcU2Sw9PoT.exe
      "C:\Users\Admin\Documents\nUODjzZGSLyq_FRcU2Sw9PoT.exe"
      2⤵
      • Executes dropped EXE
      PID:1600
    • C:\Users\Admin\Documents\AwmJPGBMqAuTxCjgs6TJ2urb.exe
      "C:\Users\Admin\Documents\AwmJPGBMqAuTxCjgs6TJ2urb.exe"
      2⤵
      • Executes dropped EXE
      PID:1456
    • C:\Users\Admin\Documents\1ggA4Pd4NaBXLGQvsQmvAPob.exe
      "C:\Users\Admin\Documents\1ggA4Pd4NaBXLGQvsQmvAPob.exe"
      2⤵
      • Executes dropped EXE
      PID:1568
    • C:\Users\Admin\Documents\QOR8pkXFYaOXV2AWpJutExsa.exe
      "C:\Users\Admin\Documents\QOR8pkXFYaOXV2AWpJutExsa.exe"
      2⤵
        PID:912
      • C:\Users\Admin\Documents\oQackjXdSQ44Ob9s6vKKQ4vO.exe
        "C:\Users\Admin\Documents\oQackjXdSQ44Ob9s6vKKQ4vO.exe"
        2⤵
          PID:1296
        • C:\Users\Admin\Documents\mFpiJtsoz_7S4YhswZ1MGeGp.exe
          "C:\Users\Admin\Documents\mFpiJtsoz_7S4YhswZ1MGeGp.exe"
          2⤵
            PID:1604
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{vKjv-XSPgs-dqbL-p5pM6}\40388373819.exe"
              3⤵
                PID:1252
                • C:\Users\Admin\AppData\Local\Temp\{vKjv-XSPgs-dqbL-p5pM6}\40388373819.exe
                  "C:\Users\Admin\AppData\Local\Temp\{vKjv-XSPgs-dqbL-p5pM6}\40388373819.exe"
                  4⤵
                    PID:2080
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{vKjv-XSPgs-dqbL-p5pM6}\53041022151.exe" /mix
                  3⤵
                    PID:2336
                    • C:\Users\Admin\AppData\Local\Temp\{vKjv-XSPgs-dqbL-p5pM6}\53041022151.exe
                      "C:\Users\Admin\AppData\Local\Temp\{vKjv-XSPgs-dqbL-p5pM6}\53041022151.exe" /mix
                      4⤵
                        PID:2372
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{vKjv-XSPgs-dqbL-p5pM6}\54576979499.exe" /mix
                      3⤵
                        PID:3340
                    • C:\Users\Admin\Documents\9Q_DhoN3Ve9cqvKS32f_IKqR.exe
                      "C:\Users\Admin\Documents\9Q_DhoN3Ve9cqvKS32f_IKqR.exe"
                      2⤵
                        PID:1796
                      • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                        "C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe"
                        2⤵
                          PID:1812
                          • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                            C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                            3⤵
                              PID:2532
                            • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                              C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                              3⤵
                                PID:2764
                              • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                3⤵
                                  PID:2956
                                • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                  C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                  3⤵
                                    PID:3020
                                  • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                    C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                    3⤵
                                      PID:908
                                    • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                      C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                      3⤵
                                        PID:1344
                                      • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                        C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                        3⤵
                                          PID:2188
                                        • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                          C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                          3⤵
                                            PID:1052
                                          • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                            C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                            3⤵
                                              PID:2156
                                            • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                              C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                              3⤵
                                                PID:2336
                                              • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                                C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                                3⤵
                                                  PID:2456
                                                • C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                                  C:\Users\Admin\Documents\KWs2qO4QL1gDa66T5Ki3UIGp.exe
                                                  3⤵
                                                    PID:1392
                                                • C:\Users\Admin\Documents\J4hsm6uPf6_SbafSs9hpt3Xi.exe
                                                  "C:\Users\Admin\Documents\J4hsm6uPf6_SbafSs9hpt3Xi.exe"
                                                  2⤵
                                                    PID:1880
                                                    • C:\Users\Admin\Documents\J4hsm6uPf6_SbafSs9hpt3Xi.exe
                                                      C:\Users\Admin\Documents\J4hsm6uPf6_SbafSs9hpt3Xi.exe
                                                      3⤵
                                                        PID:2540
                                                      • C:\Users\Admin\Documents\J4hsm6uPf6_SbafSs9hpt3Xi.exe
                                                        C:\Users\Admin\Documents\J4hsm6uPf6_SbafSs9hpt3Xi.exe
                                                        3⤵
                                                          PID:2752
                                                        • C:\Users\Admin\Documents\J4hsm6uPf6_SbafSs9hpt3Xi.exe
                                                          C:\Users\Admin\Documents\J4hsm6uPf6_SbafSs9hpt3Xi.exe
                                                          3⤵
                                                            PID:2840
                                                        • C:\Users\Admin\Documents\IH4BemsbZVbrij5KFteBDfIK.exe
                                                          "C:\Users\Admin\Documents\IH4BemsbZVbrij5KFteBDfIK.exe"
                                                          2⤵
                                                            PID:316
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
                                                              3⤵
                                                              • Creates scheduled task(s)
                                                              PID:2492
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
                                                              3⤵
                                                              • Creates scheduled task(s)
                                                              PID:2568
                                                          • C:\Users\Admin\Documents\eqWbbMB5zgm825zfuLGCCX2H.exe
                                                            "C:\Users\Admin\Documents\eqWbbMB5zgm825zfuLGCCX2H.exe"
                                                            2⤵
                                                              PID:1820
                                                            • C:\Users\Admin\Documents\0u_sJgeAl_J3uErNr5gRmtse.exe
                                                              "C:\Users\Admin\Documents\0u_sJgeAl_J3uErNr5gRmtse.exe"
                                                              2⤵
                                                                PID:472
                                                              • C:\Users\Admin\Documents\Ppvx1hIiHe8I8tOJc2QTJaEP.exe
                                                                "C:\Users\Admin\Documents\Ppvx1hIiHe8I8tOJc2QTJaEP.exe"
                                                                2⤵
                                                                  PID:1616
                                                                • C:\Users\Admin\Documents\px8Smhek7Bj55naP3roEoD2l.exe
                                                                  "C:\Users\Admin\Documents\px8Smhek7Bj55naP3roEoD2l.exe"
                                                                  2⤵
                                                                    PID:1032
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\68025706041.exe"
                                                                      3⤵
                                                                        PID:2452
                                                                        • C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\68025706041.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\68025706041.exe"
                                                                          4⤵
                                                                            PID:2740
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\59517670795.exe" /mix
                                                                          3⤵
                                                                            PID:2860
                                                                            • C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\59517670795.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\59517670795.exe" /mix
                                                                              4⤵
                                                                                PID:1148
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\63920621123.exe" /mix
                                                                              3⤵
                                                                                PID:2924
                                                                                • C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\63920621123.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\{pN10-MUf1p-4Cuk-NF4tu}\63920621123.exe" /mix
                                                                                  4⤵
                                                                                    PID:3056
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /c taskkill /im "px8Smhek7Bj55naP3roEoD2l.exe" /f & erase "C:\Users\Admin\Documents\px8Smhek7Bj55naP3roEoD2l.exe" & exit
                                                                                  3⤵
                                                                                    PID:2860
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /im "px8Smhek7Bj55naP3roEoD2l.exe" /f
                                                                                      4⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:1840
                                                                                • C:\Users\Admin\Documents\rB3bhT5ai3bZKd4GIwSQRFJc.exe
                                                                                  "C:\Users\Admin\Documents\rB3bhT5ai3bZKd4GIwSQRFJc.exe"
                                                                                  2⤵
                                                                                    PID:1036
                                                                                    • C:\Users\Admin\Documents\rB3bhT5ai3bZKd4GIwSQRFJc.exe
                                                                                      "C:\Users\Admin\Documents\rB3bhT5ai3bZKd4GIwSQRFJc.exe" -u
                                                                                      3⤵
                                                                                        PID:2424
                                                                                    • C:\Users\Admin\Documents\MHC4AxGviE1aPEs75740_ca7.exe
                                                                                      "C:\Users\Admin\Documents\MHC4AxGviE1aPEs75740_ca7.exe"
                                                                                      2⤵
                                                                                        PID:1660
                                                                                      • C:\Users\Admin\Documents\wQUvieBjBMKKpbSdHZOD_JUa.exe
                                                                                        "C:\Users\Admin\Documents\wQUvieBjBMKKpbSdHZOD_JUa.exe"
                                                                                        2⤵
                                                                                          PID:1520
                                                                                          • C:\Windows\SysWOW64\mshta.exe
                                                                                            "C:\Windows\System32\mshta.exe" VbsCrIPt: cLOSe ( CREAteobjecT ( "wScRiPT.ShElL" ). RUN ( "C:\Windows\system32\cmd.exe /C tYpe ""C:\Users\Admin\Documents\wQUvieBjBMKKpbSdHZOD_JUa.exe"" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi & if """"== """" for %m in ( ""C:\Users\Admin\Documents\wQUvieBjBMKKpbSdHZOD_JUa.exe"" ) do taskkill /iM ""%~NXm"" -F" , 0 , TRUE ) )
                                                                                            3⤵
                                                                                              PID:2348
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\system32\cmd.exe" /C tYpe "C:\Users\Admin\Documents\wQUvieBjBMKKpbSdHZOD_JUa.exe" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi& if ""== "" for %m in ( "C:\Users\Admin\Documents\wQUvieBjBMKKpbSdHZOD_JUa.exe" ) do taskkill /iM "%~NXm" -F
                                                                                                4⤵
                                                                                                  PID:2820
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE
                                                                                                    IQ0v_FE_.ExE -poRsuYEMryiLi
                                                                                                    5⤵
                                                                                                      PID:928
                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                        "C:\Windows\System32\mshta.exe" VbsCrIPt: cLOSe ( CREAteobjecT ( "wScRiPT.ShElL" ). RUN ( "C:\Windows\system32\cmd.exe /C tYpe ""C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE"" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi & if ""-poRsuYEMryiLi""== """" for %m in ( ""C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE"" ) do taskkill /iM ""%~NXm"" -F" , 0 , TRUE ) )
                                                                                                        6⤵
                                                                                                          PID:904
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "C:\Windows\system32\cmd.exe" /C tYpe "C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE" > IQ0V_Fe_.eXE && StaRt IQ0v_FE_.ExE -poRsuYEMryiLi& if "-poRsuYEMryiLi"== "" for %m in ( "C:\Users\Admin\AppData\Local\Temp\IQ0V_Fe_.eXE" ) do taskkill /iM "%~NXm" -F
                                                                                                            7⤵
                                                                                                              PID:2640
                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                            "C:\Windows\System32\rundll32.exe" VHTDDahA.G,XBvVyh
                                                                                                            6⤵
                                                                                                              PID:1736
                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                            taskkill /iM "wQUvieBjBMKKpbSdHZOD_JUa.exe" -F
                                                                                                            5⤵
                                                                                                            • Kills process with taskkill
                                                                                                            PID:2324
                                                                                                    • C:\Users\Admin\Documents\olOUevqyUi1JaL70GHHbTGWC.exe
                                                                                                      "C:\Users\Admin\Documents\olOUevqyUi1JaL70GHHbTGWC.exe"
                                                                                                      2⤵
                                                                                                        PID:1508
                                                                                                      • C:\Users\Admin\Documents\1NoszuLwSlBhFtUTJGkO_1VB.exe
                                                                                                        "C:\Users\Admin\Documents\1NoszuLwSlBhFtUTJGkO_1VB.exe"
                                                                                                        2⤵
                                                                                                          PID:1808
                                                                                                        • C:\Users\Admin\Documents\V3wVHe1xz982PulCzPepw_X_.exe
                                                                                                          "C:\Users\Admin\Documents\V3wVHe1xz982PulCzPepw_X_.exe"
                                                                                                          2⤵
                                                                                                            PID:964
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-F2JVO.tmp\V3wVHe1xz982PulCzPepw_X_.tmp
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-F2JVO.tmp\V3wVHe1xz982PulCzPepw_X_.tmp" /SL5="$30158,138429,56832,C:\Users\Admin\Documents\V3wVHe1xz982PulCzPepw_X_.exe"
                                                                                                              3⤵
                                                                                                                PID:2104

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • memory/564-102-0x0000000000220000-0x000000000022A000-memory.dmp

                                                                                                            Filesize

                                                                                                            40KB

                                                                                                          • memory/1296-175-0x0000000004AD0000-0x0000000004B9D000-memory.dmp

                                                                                                            Filesize

                                                                                                            820KB

                                                                                                          • memory/1296-183-0x00000000006E0000-0x00000000006EB000-memory.dmp

                                                                                                            Filesize

                                                                                                            44KB

                                                                                                          • memory/1296-165-0x0000000004BA0000-0x0000000004C6F000-memory.dmp

                                                                                                            Filesize

                                                                                                            828KB

                                                                                                          • memory/1508-160-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/1552-77-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                          • memory/1600-130-0x0000000000FB0000-0x0000000000FB1000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/1672-60-0x0000000075971000-0x0000000075973000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/1672-61-0x0000000003CA0000-0x0000000003DDF000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                          • memory/1808-153-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/1812-163-0x00000000009F0000-0x00000000009F1000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/1820-168-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/1880-146-0x0000000000970000-0x0000000000971000-memory.dmp

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                          • memory/2532-181-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/2532-187-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/2540-182-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/2540-193-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB