Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-05-2024 01:01

General

  • Target

    f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19.exe

  • Size

    596KB

  • MD5

    1d3535cc01b2cc54b808a55e945707a0

  • SHA1

    a9a563b8ee37f17c847248bb207b28086d9f4628

  • SHA256

    f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19

  • SHA512

    4c344a2abc7ace17a3fced1e3fcf09ac959b47d8bc1a5bf4280d46c3dccd015254a42ce722f93bbbe28f9866696db685df6209b4e863fa9e02772753eeb2ebbc

  • SSDEEP

    12288:15/Sm4/r42toIX4IaZo2BOtdMKX8MbICwAvV6LwfAnxMlpxxWmBNIg9SWvAK:70/rX8IJ2BwNQcfAnxgDzBx

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

beshomandotestbesnd.run.place:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    taskmgr.exe

  • telegram

    https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672

Extracted

Family

redline

Botnet

Vic

C2

beshomandotestbesnd.run.place:1111

Signatures

  • Detect Xworm Payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19.exe
    "C:\Users\Admin\AppData\Local\Temp\f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\ProgramData\system.exe
      "C:\ProgramData\system.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3444
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\system.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3396
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskmgr.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1152
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4984
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "taskmgr" /tr "C:\ProgramData\taskmgr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2592
    • C:\ProgramData\build.exe
      "C:\ProgramData\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 1312
      2⤵
      • Program crash
      PID:3920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3424 -ip 3424
    1⤵
      PID:2724
    • C:\ProgramData\taskmgr.exe
      C:\ProgramData\taskmgr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3916
    • C:\ProgramData\taskmgr.exe
      C:\ProgramData\taskmgr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\build.exe
      Filesize

      95KB

      MD5

      16280875fdcf55ab4c8f1dff6dabc72e

      SHA1

      39880e6fbb258f4f4fa5c79337ec893acae55fb7

      SHA256

      91455ac8837ff1fdba7067cd3e7f790c1649ae70164ccbdf0483eae831a7253a

      SHA512

      53ba4e5e88a8f19ba3faa2f1244501c2d62827a9178ec0fdc995582e03e7d8e39f2dfd7bde11285781a65a021d4f4aab48b94be66a8a1cebbd47ab0cb819202e

    • C:\ProgramData\system.exe
      Filesize

      75KB

      MD5

      70b9f8ef4c4ce24fe372b292aebcd138

      SHA1

      5fd7ce9318727b27db0dd50effbb632686d53f8c

      SHA256

      15af516d88e83cfc8d3deebe7aeb9ccaebc558fc93544ef31b612113fcce907b

      SHA512

      b4658ccb665aa9f43cc049a51c477a0b314c5c13d254d648e34f9feca9feb06021bbf271857f73998e31cc7f877fa5457fbe7420beb58f3563fbfbe121a4cbad

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\taskmgr.exe.log
      Filesize

      654B

      MD5

      2ff39f6c7249774be85fd60a8f9a245e

      SHA1

      684ff36b31aedc1e587c8496c02722c6698c1c4e

      SHA256

      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

      SHA512

      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      6d42b6da621e8df5674e26b799c8e2aa

      SHA1

      ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

      SHA256

      5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

      SHA512

      53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      47605a4dda32c9dff09a9ca441417339

      SHA1

      4f68c895c35b0dc36257fc8251e70b968c560b62

      SHA256

      e6254c2bc9846a76a4567ab91b6eae76e937307ff9301b65d577ffe6e15fe40a

      SHA512

      b6823b6e794a2fe3e4c4ecfb3f0d61a54821de7feb4f9e3e7fd463e7fbb5e6848f59865b487dafebeac431e4f4db81ef56836d94cac67da39852c566ed34a885

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      da185fddf7e751e39023edde12930f37

      SHA1

      657fcb7fda401b69d3bb97e7b6abf126ac36d4b2

      SHA256

      8928226805a92acd76d21e1a276176d9af3ca1ec31f14e45a2b4b88f4722cad5

      SHA512

      db7bc02a1bd86d587840a56334dee9cb80aa0a8635cd2eb1c490bc5466659350de4d625f320731e34fac235016515d0dddc05a6081149dc6c2e82c262be6b975

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dgxemfww.hyd.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp7256.tmp
      Filesize

      46KB

      MD5

      8f5942354d3809f865f9767eddf51314

      SHA1

      20be11c0d42fc0cef53931ea9152b55082d1a11e

      SHA256

      776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

      SHA512

      fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

    • C:\Users\Admin\AppData\Local\Temp\tmp727B.tmp
      Filesize

      100KB

      MD5

      7e58c37fd1d2f60791d5f890d3635279

      SHA1

      5b7b963802b7f877d83fe5be180091b678b56a02

      SHA256

      df01ff75a8b48de6e0244b43f74b09ab7ebe99167e5da84739761e0d99fb9fc7

      SHA512

      a3ec0c65b2781340862eddd6a9154fb0e243a54e88121f0711c5648971374b6f7a87d8b2a6177b4f1ae0d78fb05cf0ee034d3242920301e2ee9fcd883a21b85e

    • C:\Users\Admin\AppData\Local\Temp\tmp72B6.tmp
      Filesize

      48KB

      MD5

      349e6eb110e34a08924d92f6b334801d

      SHA1

      bdfb289daff51890cc71697b6322aa4b35ec9169

      SHA256

      c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

      SHA512

      2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

    • C:\Users\Admin\AppData\Local\Temp\tmp72CC.tmp
      Filesize

      20KB

      MD5

      49693267e0adbcd119f9f5e02adf3a80

      SHA1

      3ba3d7f89b8ad195ca82c92737e960e1f2b349df

      SHA256

      d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

      SHA512

      b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

    • C:\Users\Admin\AppData\Local\Temp\tmp72D2.tmp
      Filesize

      116KB

      MD5

      f70aa3fa04f0536280f872ad17973c3d

      SHA1

      50a7b889329a92de1b272d0ecf5fce87395d3123

      SHA256

      8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

      SHA512

      30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

    • C:\Users\Admin\AppData\Local\Temp\tmp72FD.tmp
      Filesize

      96KB

      MD5

      d367ddfda80fdcf578726bc3b0bc3e3c

      SHA1

      23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

      SHA256

      0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

      SHA512

      40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

    • C:\Users\Admin\AppData\Local\Temp\tmpA0D.tmp
      Filesize

      100KB

      MD5

      1b942faa8e8b1008a8c3c1004ba57349

      SHA1

      cd99977f6c1819b12b33240b784ca816dfe2cb91

      SHA256

      555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc

      SHA512

      5aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43

    • memory/2244-147-0x0000000004E50000-0x0000000004E9C000-memory.dmp
      Filesize

      304KB

    • memory/2244-207-0x0000000006B20000-0x000000000704C000-memory.dmp
      Filesize

      5.2MB

    • memory/2244-144-0x00000000054E0000-0x0000000005AF8000-memory.dmp
      Filesize

      6.1MB

    • memory/2244-146-0x0000000004EC0000-0x0000000004EFC000-memory.dmp
      Filesize

      240KB

    • memory/2244-150-0x00000000751EE000-0x00000000751EF000-memory.dmp
      Filesize

      4KB

    • memory/2244-145-0x0000000004E30000-0x0000000004E42000-memory.dmp
      Filesize

      72KB

    • memory/2244-143-0x00000000005B0000-0x00000000005CE000-memory.dmp
      Filesize

      120KB

    • memory/2244-420-0x0000000006A60000-0x0000000006AF2000-memory.dmp
      Filesize

      584KB

    • memory/2244-265-0x00000000063B0000-0x0000000006416000-memory.dmp
      Filesize

      408KB

    • memory/2244-152-0x0000000005140000-0x000000000524A000-memory.dmp
      Filesize

      1.0MB

    • memory/2244-206-0x0000000006420000-0x00000000065E2000-memory.dmp
      Filesize

      1.8MB

    • memory/2244-421-0x0000000007050000-0x00000000070C6000-memory.dmp
      Filesize

      472KB

    • memory/2244-422-0x0000000007150000-0x000000000716E000-memory.dmp
      Filesize

      120KB

    • memory/2244-424-0x00000000751EE000-0x00000000751EF000-memory.dmp
      Filesize

      4KB

    • memory/2244-425-0x00000000751E0000-0x0000000075990000-memory.dmp
      Filesize

      7.7MB

    • memory/2244-431-0x00000000751E0000-0x0000000075990000-memory.dmp
      Filesize

      7.7MB

    • memory/2244-151-0x00000000751E0000-0x0000000075990000-memory.dmp
      Filesize

      7.7MB

    • memory/3424-148-0x0000000000400000-0x00000000004DF000-memory.dmp
      Filesize

      892KB

    • memory/3424-69-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-45-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-43-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-39-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-37-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-33-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-31-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-29-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-27-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-25-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-23-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-49-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-51-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-21-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-19-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-17-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-15-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-13-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-11-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-9-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-8-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-154-0x0000000000400000-0x000000000048B000-memory.dmp
      Filesize

      556KB

    • memory/3424-3-0x0000000000400000-0x000000000048B000-memory.dmp
      Filesize

      556KB

    • memory/3424-53-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-2-0x0000000002120000-0x00000000021A8000-memory.dmp
      Filesize

      544KB

    • memory/3424-55-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-57-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-59-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-61-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-63-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-65-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-67-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-118-0x0000000005460000-0x00000000054FC000-memory.dmp
      Filesize

      624KB

    • memory/3424-1-0x0000000000680000-0x0000000000780000-memory.dmp
      Filesize

      1024KB

    • memory/3424-4-0x00000000024F0000-0x0000000002556000-memory.dmp
      Filesize

      408KB

    • memory/3424-5-0x0000000000400000-0x00000000004DF000-memory.dmp
      Filesize

      892KB

    • memory/3424-47-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-71-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-41-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-35-0x00000000026E0000-0x000000000273F000-memory.dmp
      Filesize

      380KB

    • memory/3424-7-0x00000000026E0000-0x0000000002744000-memory.dmp
      Filesize

      400KB

    • memory/3424-6-0x0000000004EB0000-0x0000000005454000-memory.dmp
      Filesize

      5.6MB

    • memory/3444-423-0x00007FF8E4333000-0x00007FF8E4335000-memory.dmp
      Filesize

      8KB

    • memory/3444-139-0x0000000000710000-0x000000000072A000-memory.dmp
      Filesize

      104KB

    • memory/3444-426-0x000000001B3D0000-0x000000001B3E0000-memory.dmp
      Filesize

      64KB

    • memory/3444-149-0x00007FF8E4333000-0x00007FF8E4335000-memory.dmp
      Filesize

      8KB

    • memory/3444-432-0x000000001CDA0000-0x000000001CDDA000-memory.dmp
      Filesize

      232KB

    • memory/3444-155-0x000000001B3D0000-0x000000001B3E0000-memory.dmp
      Filesize

      64KB

    • memory/4616-165-0x000002804B8C0000-0x000002804B8E2000-memory.dmp
      Filesize

      136KB