Analysis

  • max time kernel
    100s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 00:28

General

  • Target

    a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d.exe

  • Size

    455KB

  • MD5

    c8d9593196962fa5d706a207c16674cd

  • SHA1

    686a8e674e6615d5cd91f7b2cba0c755054b3f69

  • SHA256

    a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d

  • SHA512

    5ddae80780c6091bfe0ab5e29bc63732c08ce34f677fc341366dcecf6db9e1bd2e0ed24cfe57eface0d19c6f46010f47eb2d74888b91a503dae00651c4a756bf

  • SSDEEP

    12288:XcTpGLwWpFGIWFfDtaY4S0LEy7w0iymL/:XOpEwiFYxsEyHiyK

Malware Config

Extracted

Family

xworm

Version

5.1

C2

104.194.9.116:7000

Mutex

bUezpCDHVjUVS3W9

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6330888131:AAE5ycZdHuNqV5SVYhHeCfRENn6GuCjwXjs/sendMessage?chat_id=1046049845

aes.plain

Extracted

Family

eternity

Wallets

47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q

Attributes
  • payload_urls

    https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects executables packed with or use KoiVM 1 IoCs
  • Detects executables using Telegram Chat Bot 1 IoCs
  • Creates new service(s) 1 TTPs
  • Stops running service(s) 3 TTPs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Launches sc.exe 9 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:592
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:60
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:676
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:952
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:400
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1044
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1060
                • C:\Windows\sysmon.exe
                  C:\Windows\sysmon.exe
                  1⤵
                    PID:2544
                  • C:\Users\Admin\AppData\Local\Temp\a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d.exe
                    "C:\Users\Admin\AppData\Local\Temp\a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d.exe"
                    1⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:936
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      2⤵
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3904
                      • C:\Users\Admin\AppData\Local\Temp\xfgpkf.exe
                        "C:\Users\Admin\AppData\Local\Temp\xfgpkf.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:2172
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                          4⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4468
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "AddInProcess32" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\AddInProcess32.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\AddInProcess32.exe"
                            5⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4996
                            • C:\Windows\SysWOW64\chcp.com
                              chcp 65001
                              6⤵
                                PID:996
                              • C:\Windows\SysWOW64\PING.EXE
                                ping 127.0.0.1
                                6⤵
                                • Runs ping.exe
                                PID:3472
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /create /tn "AddInProcess32" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\AddInProcess32.exe" /rl HIGHEST /f
                                6⤵
                                • Creates scheduled task(s)
                                PID:4988
                              • C:\Users\Admin\AppData\Local\ServiceHub\AddInProcess32.exe
                                "C:\Users\Admin\AppData\Local\ServiceHub\AddInProcess32.exe"
                                6⤵
                                • Executes dropped EXE
                                PID:2964
                        • C:\Users\Admin\AppData\Local\Temp\kccktn.exe
                          "C:\Users\Admin\AppData\Local\Temp\kccktn.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of WriteProcessMemory
                          PID:5108
                          • C:\Program Files\Internet Explorer\iexplore.exe
                            "C:\Program Files\Internet Explorer\iexplore.exe"
                            4⤵
                            • Drops startup file
                            PID:4616
                          • C:\Program Files\Internet Explorer\iexplore.exe
                            "C:\Program Files\Internet Explorer\iexplore.exe"
                            4⤵
                              PID:4260
                          • C:\Users\Admin\AppData\Local\Temp\crwqcc.exe
                            "C:\Users\Admin\AppData\Local\Temp\crwqcc.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious use of WriteProcessMemory
                            PID:2260
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
                              4⤵
                              • Drops file in System32 directory
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5112
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                5⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2072
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                5⤵
                                  PID:1996
                                  • C:\Windows\system32\wusa.exe
                                    wusa /uninstall /kb:890830 /quiet /norestart
                                    6⤵
                                      PID:1120
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop UsoSvc
                                    5⤵
                                    • Launches sc.exe
                                    PID:4280
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                    5⤵
                                    • Launches sc.exe
                                    PID:4468
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop wuauserv
                                    5⤵
                                    • Launches sc.exe
                                    PID:1104
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop bits
                                    5⤵
                                    • Launches sc.exe
                                    PID:1424
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop dosvc
                                    5⤵
                                    • Launches sc.exe
                                    PID:3848
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3800
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4936
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:912
                                  • C:\Windows\system32\powercfg.exe
                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:264
                                  • C:\Windows\system32\dialer.exe
                                    C:\Windows\system32\dialer.exe
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1840
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe delete "AHIMMUFK"
                                    5⤵
                                    • Launches sc.exe
                                    PID:4764
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe create "AHIMMUFK" binpath= "C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe" start= "auto"
                                    5⤵
                                    • Launches sc.exe
                                    PID:2588
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe stop eventlog
                                    5⤵
                                    • Launches sc.exe
                                    PID:1216
                                  • C:\Windows\system32\sc.exe
                                    C:\Windows\system32\sc.exe start "AHIMMUFK"
                                    5⤵
                                    • Launches sc.exe
                                    PID:412
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
                                  4⤵
                                    PID:3808
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                2⤵
                                  PID:3880
                              • C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe
                                C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe
                                1⤵
                                  PID:1892

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe

                                  Filesize

                                  3.1MB

                                  MD5

                                  a526de1f9de51e1acbc6b8a492673174

                                  SHA1

                                  9de369d588f9c95e6ba0a5e2ce525365e0531a89

                                  SHA256

                                  23c34ff2bb98f028fefab008f83af6c74a5f7b99114e6140cd69212644bf8d3e

                                  SHA512

                                  445b35a32f81541a987442980a6baf98725629f454dc42d68921a4c5c901bf48f71fd8a8bfbe25eccd16567688a5f566e65919bf2433bf6beba167035d1c94ce

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AddInProcess32.exe.log

                                  Filesize

                                  321B

                                  MD5

                                  baf5d1398fdb79e947b60fe51e45397f

                                  SHA1

                                  49e7b8389f47b93509d621b8030b75e96bb577af

                                  SHA256

                                  10c8c7b5fa58f8c6b69f44e92a4e2af111b59fcf4f21a07e04b19e14876ccdf8

                                  SHA512

                                  b2c9ef5581d5eae7c17ae260fe9f52344ed737fa851cb44d1cea58a32359d0ac5d0ca3099c970209bd30a0d4af6e504101f21b7054cf5eca91c0831cf12fb413

                                • C:\Users\Admin\AppData\Local\ServiceHub\AddInProcess32.exe

                                  Filesize

                                  42KB

                                  MD5

                                  9827ff3cdf4b83f9c86354606736ca9c

                                  SHA1

                                  e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

                                  SHA256

                                  c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

                                  SHA512

                                  8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1wrkjqdm.5bt.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\crwqcc.exe

                                  Filesize

                                  3.1MB

                                  MD5

                                  86e00d529b3b454a84b942ac916211e3

                                  SHA1

                                  021c733e5448436b384bf0d3a0ba81f4d0d93f9a

                                  SHA256

                                  30e01b261cb5d7524a303cdbe9d177fc05d74279642e4a87b46ee70045e68d53

                                  SHA512

                                  9a08379b35a3bf1699b925c6dbfc6e85123f1155e567929eaff3683e5e9f196a16775e3a2f6a7585f7c0f0f201ef4be009cda5cf94b160742642145837c3de1e

                                • C:\Users\Admin\AppData\Local\Temp\kccktn.exe

                                  Filesize

                                  756KB

                                  MD5

                                  d76027fe4cfd48c7f8999c796e50e731

                                  SHA1

                                  5026422e84bf445e2d141529e2b808187a30d9f6

                                  SHA256

                                  148da274864c690a7c01119e025bdc0ab94fa9c110c30afb42e51b1c990a2799

                                  SHA512

                                  2e2c4a5319a61555913648702ddcfb8b40d548dcfda1a536a2e85f9cb85d25d9a463743dc866f86b4de99fd10f9c402def424b9e8a203189518f45e924b89d2d

                                • C:\Users\Admin\AppData\Local\Temp\xfgpkf.exe

                                  Filesize

                                  393KB

                                  MD5

                                  3f3a51617811e9581aba50376599efa6

                                  SHA1

                                  9b26aa73f43a4db9b216b90d1aa3e2e4d602fde8

                                  SHA256

                                  5f3403e13e316d9320d46233e9f62b183623c46ec80c6c55139efdd72c5ada37

                                  SHA512

                                  9ad5cfb29281dd462b726c7ee239926f83050181fe4f6c3e9057e51df65ae7f850cecbf1cb453287720314275335df36bb8d5299d09a1f73329a5b9292db3ee3

                                • memory/60-704-0x00000196D8380000-0x00000196D83AB000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/592-693-0x00007FF936A70000-0x00007FF936A80000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/592-692-0x0000014986F50000-0x0000014986F7B000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/592-690-0x0000014986F20000-0x0000014986F44000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/676-699-0x00007FF936A70000-0x00007FF936A80000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/676-695-0x00000184DCE30000-0x00000184DCE5B000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/936-9-0x00007FF958640000-0x00007FF959101000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/936-0-0x000001FB17D40000-0x000001FB17D56000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/936-5-0x000001FB32510000-0x000001FB32574000-memory.dmp

                                  Filesize

                                  400KB

                                • memory/936-4-0x000001FB19970000-0x000001FB1998E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/936-3-0x000001FB34370000-0x000001FB343E6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/936-2-0x000001FB323E0000-0x000001FB323F0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/936-1-0x00007FF958640000-0x00007FF959101000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/952-706-0x00007FF936A70000-0x00007FF936A80000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1840-682-0x0000000140000000-0x000000014002B000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/1840-681-0x0000000140000000-0x000000014002B000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/1840-680-0x0000000140000000-0x000000014002B000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/1840-679-0x0000000140000000-0x000000014002B000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/1840-684-0x0000000140000000-0x000000014002B000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/1840-685-0x00007FF9769F0000-0x00007FF976BE5000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1840-686-0x00007FF9758F0000-0x00007FF9759AE000-memory.dmp

                                  Filesize

                                  760KB

                                • memory/1840-687-0x0000000140000000-0x000000014002B000-memory.dmp

                                  Filesize

                                  172KB

                                • memory/2172-73-0x0000022FBAD80000-0x0000022FBADA2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/2172-74-0x0000022FBC000000-0x0000022FBC20A000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/2172-51-0x0000022FB9DE0000-0x0000022FB9DFA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/2172-52-0x0000022FBAC80000-0x0000022FBADA2000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/2172-54-0x0000022F9FD50000-0x0000022F9FD60000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2172-55-0x0000022FBA710000-0x0000022FBA740000-memory.dmp

                                  Filesize

                                  192KB

                                • memory/2172-56-0x0000022FBAFA0000-0x0000022FBB05A000-memory.dmp

                                  Filesize

                                  744KB

                                • memory/2172-53-0x0000022FBA760000-0x0000022FBA7A4000-memory.dmp

                                  Filesize

                                  272KB

                                • memory/2172-57-0x0000022FBAC80000-0x0000022FBACE0000-memory.dmp

                                  Filesize

                                  384KB

                                • memory/2172-58-0x0000022FB9DC0000-0x0000022FB9DE2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/2172-59-0x0000022FBB120000-0x0000022FBB4E9000-memory.dmp

                                  Filesize

                                  3.8MB

                                • memory/2172-60-0x0000022FB9FE0000-0x0000022FB9FFE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/2172-46-0x0000022F9FD50000-0x0000022F9FD64000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/2172-62-0x0000022FBB1C0000-0x0000022FBB25C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/2172-64-0x0000022FB9DC0000-0x0000022FB9DCE000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2172-45-0x0000022F9FD50000-0x0000022F9FD6C000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/2172-65-0x0000022FB9DC0000-0x0000022FB9DC8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2172-44-0x0000022F9FC20000-0x0000022F9FC2A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/2172-50-0x0000022FBA7C0000-0x0000022FBA864000-memory.dmp

                                  Filesize

                                  656KB

                                • memory/2172-68-0x0000022FB9DC0000-0x0000022FB9DCA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/2172-30-0x0000022FB9E20000-0x0000022FB9E30000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2172-70-0x0000022FBA790000-0x0000022FBA7B0000-memory.dmp

                                  Filesize

                                  128KB

                                • memory/2172-71-0x0000022FBB1D0000-0x0000022FBB280000-memory.dmp

                                  Filesize

                                  704KB

                                • memory/2172-326-0x00007FF967FF0000-0x00007FF96800A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/2172-49-0x0000022FBADE0000-0x0000022FBAF3A000-memory.dmp

                                  Filesize

                                  1.4MB

                                • memory/2172-47-0x0000022F9FD50000-0x0000022F9FD60000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2172-322-0x00007FF9593A0000-0x00007FF9593E4000-memory.dmp

                                  Filesize

                                  272KB

                                • memory/2172-76-0x0000022FBAD80000-0x0000022FBADAA000-memory.dmp

                                  Filesize

                                  168KB

                                • memory/2172-80-0x0000022FB9FE0000-0x0000022FB9FE8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2172-320-0x00007FF9593A0000-0x00007FF9593E2000-memory.dmp

                                  Filesize

                                  264KB

                                • memory/2172-81-0x0000022FB9FE0000-0x0000022FB9FE8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2172-78-0x0000022FB9FE0000-0x0000022FB9FE8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2172-312-0x00007FF967FF0000-0x00007FF968009000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/2172-308-0x00007FF967FF0000-0x00007FF96800C000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/2172-28-0x0000022F9F810000-0x0000022F9F81E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2172-84-0x0000022FB9FE0000-0x0000022FB9FF0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2172-29-0x00007FF9580F0000-0x00007FF958BB1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/2172-86-0x0000022FB9FE0000-0x0000022FB9FE8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2172-48-0x0000022FB9DE0000-0x0000022FB9DF8000-memory.dmp

                                  Filesize

                                  96KB

                                • memory/2172-294-0x0000022FA1620000-0x0000022FA1634000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/3904-15-0x0000000007620000-0x0000000007BC4000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/3904-14-0x0000000006FD0000-0x0000000007062000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/3904-13-0x0000000005580000-0x0000000005590000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3904-12-0x0000000074700000-0x0000000074EB0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3904-11-0x0000000005580000-0x0000000005590000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3904-10-0x0000000005450000-0x00000000054B6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3904-8-0x0000000005340000-0x00000000053DC000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/3904-7-0x0000000074700000-0x0000000074EB0000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3904-6-0x0000000000400000-0x000000000040E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/4468-359-0x0000000000400000-0x000000000040A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/4616-356-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/5108-67-0x00000298A4280000-0x00000298A429A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/5108-339-0x00000298A3190000-0x00000298A31C6000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/5108-391-0x00007FF9593A0000-0x00007FF9593E4000-memory.dmp

                                  Filesize

                                  272KB

                                • memory/5108-395-0x00007FF967FF0000-0x00007FF96800A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/5108-61-0x00000298A4660000-0x00000298A46DC000-memory.dmp

                                  Filesize

                                  496KB

                                • memory/5108-63-0x00000298A3370000-0x00000298A3378000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/5108-384-0x00007FF967FF0000-0x00007FF968009000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/5108-377-0x00007FF967FF0000-0x00007FF96800C000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/5108-375-0x00007FF967D40000-0x00007FF967D61000-memory.dmp

                                  Filesize

                                  132KB

                                • memory/5108-43-0x00000298A3270000-0x00000298A3280000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/5108-373-0x00007FF967FF0000-0x00007FF96800B000-memory.dmp

                                  Filesize

                                  108KB

                                • memory/5108-41-0x0000029888D30000-0x0000029888D3E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/5108-42-0x00007FF9580F0000-0x00007FF958BB1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/5108-389-0x00007FF9593A0000-0x00007FF9593E2000-memory.dmp

                                  Filesize

                                  264KB

                                • memory/5108-85-0x00000298A46E0000-0x00000298A4700000-memory.dmp

                                  Filesize

                                  128KB

                                • memory/5108-83-0x00000298A49C0000-0x00000298A4A0A000-memory.dmp

                                  Filesize

                                  296KB

                                • memory/5108-82-0x00000298A33F0000-0x00000298A33F8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/5108-77-0x00000298A33F0000-0x00000298A33F8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/5108-79-0x00000298A33F0000-0x00000298A33F8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/5108-75-0x00000298A33F0000-0x00000298A3400000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/5108-72-0x00000298A52E0000-0x00000298A5456000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/5108-69-0x00000298A4280000-0x00000298A4292000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/5108-66-0x00000298A4290000-0x00000298A42B2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/5112-539-0x0000000140000000-0x00000001402CA000-memory.dmp

                                  Filesize

                                  2.8MB

                                • memory/5112-534-0x0000000140000000-0x00000001402CA000-memory.dmp

                                  Filesize

                                  2.8MB