Analysis

  • max time kernel
    92s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 02:32

General

  • Target

    a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d.exe

  • Size

    455KB

  • MD5

    c8d9593196962fa5d706a207c16674cd

  • SHA1

    686a8e674e6615d5cd91f7b2cba0c755054b3f69

  • SHA256

    a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d

  • SHA512

    5ddae80780c6091bfe0ab5e29bc63732c08ce34f677fc341366dcecf6db9e1bd2e0ed24cfe57eface0d19c6f46010f47eb2d74888b91a503dae00651c4a756bf

  • SSDEEP

    12288:XcTpGLwWpFGIWFfDtaY4S0LEy7w0iymL/:XOpEwiFYxsEyHiyK

Malware Config

Extracted

Family

xworm

Version

5.1

C2

104.194.9.116:7000

Mutex

bUezpCDHVjUVS3W9

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot6330888131:AAE5ycZdHuNqV5SVYhHeCfRENn6GuCjwXjs/sendMessage?chat_id=1046049845

aes.plain

Extracted

Family

eternity

Wallets

47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q

Attributes
  • payload_urls

    https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects executables packed with or use KoiVM 1 IoCs
  • Detects executables using Telegram Chat Bot 1 IoCs
  • Creates new service(s) 1 TTPs
  • Stops running service(s) 3 TTPs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Launches sc.exe 9 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:336
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
        PID:672
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:964
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:744
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc
            1⤵
              PID:652
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1036
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                1⤵
                  PID:1048
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1056
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                      PID:1204
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                        PID:1220
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1352
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1364
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            1⤵
                              PID:1396
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                              1⤵
                                PID:1412
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1424
                                • C:\Windows\sysmon.exe
                                  C:\Windows\sysmon.exe
                                  1⤵
                                    PID:2704
                                  • C:\Users\Admin\AppData\Local\Temp\a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d.exe
                                    "C:\Users\Admin\AppData\Local\Temp\a50078c294c3980c23fc8da34f3fd1dc8ca042e07e0f7f67696d7035ec84700d.exe"
                                    1⤵
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:4700
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                                      2⤵
                                        PID:3164
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                                        2⤵
                                          PID:2724
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                          2⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:4260
                                          • C:\Users\Admin\AppData\Local\Temp\dxldrs.exe
                                            "C:\Users\Admin\AppData\Local\Temp\dxldrs.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • Suspicious use of WriteProcessMemory
                                            PID:2292
                                            • C:\Program Files\Windows Mail\wab.exe
                                              "C:\Program Files\Windows Mail\wab.exe"
                                              4⤵
                                              • Drops file in System32 directory
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4424
                                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                5⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2380
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                5⤵
                                                  PID:2944
                                                  • C:\Windows\system32\wusa.exe
                                                    wusa /uninstall /kb:890830 /quiet /norestart
                                                    6⤵
                                                      PID:3116
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe stop UsoSvc
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:2236
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:944
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe stop wuauserv
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:1992
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe stop bits
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:3656
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe stop dosvc
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:4412
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                    5⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3064
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                    5⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3152
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                    5⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2172
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                    5⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4148
                                                  • C:\Windows\system32\dialer.exe
                                                    C:\Windows\system32\dialer.exe
                                                    5⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2060
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe delete "AHIMMUFK"
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:2516
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe create "AHIMMUFK" binpath= "C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe" start= "auto"
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:4588
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe stop eventlog
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:1676
                                                  • C:\Windows\system32\sc.exe
                                                    C:\Windows\system32\sc.exe start "AHIMMUFK"
                                                    5⤵
                                                    • Launches sc.exe
                                                    PID:4248
                                              • C:\Users\Admin\AppData\Local\Temp\nedgfv.exe
                                                "C:\Users\Admin\AppData\Local\Temp\nedgfv.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Suspicious use of WriteProcessMemory
                                                PID:448
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                                                  4⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:928
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "installutil" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\installutil.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\installutil.exe"
                                                    5⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:5064
                                                    • C:\Windows\SysWOW64\chcp.com
                                                      chcp 65001
                                                      6⤵
                                                        PID:4384
                                                      • C:\Windows\SysWOW64\PING.EXE
                                                        ping 127.0.0.1
                                                        6⤵
                                                        • Runs ping.exe
                                                        PID:2880
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /create /tn "installutil" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\installutil.exe" /rl HIGHEST /f
                                                        6⤵
                                                        • Creates scheduled task(s)
                                                        PID:836
                                                      • C:\Users\Admin\AppData\Local\ServiceHub\installutil.exe
                                                        "C:\Users\Admin\AppData\Local\ServiceHub\installutil.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        PID:5108
                                                • C:\Users\Admin\AppData\Local\Temp\nwsijt.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\nwsijt.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2572
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
                                                    4⤵
                                                    • Drops startup file
                                                    PID:3960
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                2⤵
                                                  PID:4816
                                              • C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe
                                                C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:1924
                                              • C:\Windows\system32\sihost.exe
                                                sihost.exe
                                                1⤵
                                                  PID:2360
                                                • C:\Windows\system32\sihost.exe
                                                  sihost.exe
                                                  1⤵
                                                    PID:64

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\ProgramData\xlffyhztkvzk\pkiwizgebqxq.exe

                                                    Filesize

                                                    506KB

                                                    MD5

                                                    dbb30349963dbf34b6a50e6a2c3f3644

                                                    SHA1

                                                    cebf338e946e24cd28c0d45eb04b69197a3d8429

                                                    SHA256

                                                    02ea7b9948dfc54980fd86dc40b38575c1f401a5a466e5f9fbf9ded33eb1f6a7

                                                    SHA512

                                                    98e8e84a6999e55c1ec129b82fcfbc140845b58583204ad723e76185fdae8b57280a8ea9e5414959b2a8f8b1f0ec92cc5397edd67d53dca35c1efd0c6443387a

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\installutil.exe.log

                                                    Filesize

                                                    321B

                                                    MD5

                                                    baf5d1398fdb79e947b60fe51e45397f

                                                    SHA1

                                                    49e7b8389f47b93509d621b8030b75e96bb577af

                                                    SHA256

                                                    10c8c7b5fa58f8c6b69f44e92a4e2af111b59fcf4f21a07e04b19e14876ccdf8

                                                    SHA512

                                                    b2c9ef5581d5eae7c17ae260fe9f52344ed737fa851cb44d1cea58a32359d0ac5d0ca3099c970209bd30a0d4af6e504101f21b7054cf5eca91c0831cf12fb413

                                                  • C:\Users\Admin\AppData\Local\ServiceHub\installutil.exe

                                                    Filesize

                                                    41KB

                                                    MD5

                                                    5d4073b2eb6d217c19f2b22f21bf8d57

                                                    SHA1

                                                    f0209900fbf08d004b886a0b3ba33ea2b0bf9da8

                                                    SHA256

                                                    ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3

                                                    SHA512

                                                    9ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_syloyhpc.fzg.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Users\Admin\AppData\Local\Temp\dxldrs.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    86e00d529b3b454a84b942ac916211e3

                                                    SHA1

                                                    021c733e5448436b384bf0d3a0ba81f4d0d93f9a

                                                    SHA256

                                                    30e01b261cb5d7524a303cdbe9d177fc05d74279642e4a87b46ee70045e68d53

                                                    SHA512

                                                    9a08379b35a3bf1699b925c6dbfc6e85123f1155e567929eaff3683e5e9f196a16775e3a2f6a7585f7c0f0f201ef4be009cda5cf94b160742642145837c3de1e

                                                  • C:\Users\Admin\AppData\Local\Temp\nedgfv.exe

                                                    Filesize

                                                    393KB

                                                    MD5

                                                    3f3a51617811e9581aba50376599efa6

                                                    SHA1

                                                    9b26aa73f43a4db9b216b90d1aa3e2e4d602fde8

                                                    SHA256

                                                    5f3403e13e316d9320d46233e9f62b183623c46ec80c6c55139efdd72c5ada37

                                                    SHA512

                                                    9ad5cfb29281dd462b726c7ee239926f83050181fe4f6c3e9057e51df65ae7f850cecbf1cb453287720314275335df36bb8d5299d09a1f73329a5b9292db3ee3

                                                  • C:\Users\Admin\AppData\Local\Temp\nwsijt.exe

                                                    Filesize

                                                    756KB

                                                    MD5

                                                    d76027fe4cfd48c7f8999c796e50e731

                                                    SHA1

                                                    5026422e84bf445e2d141529e2b808187a30d9f6

                                                    SHA256

                                                    148da274864c690a7c01119e025bdc0ab94fa9c110c30afb42e51b1c990a2799

                                                    SHA512

                                                    2e2c4a5319a61555913648702ddcfb8b40d548dcfda1a536a2e85f9cb85d25d9a463743dc866f86b4de99fd10f9c402def424b9e8a203189518f45e924b89d2d

                                                  • memory/448-379-0x00007FFA98F20000-0x00007FFA98F47000-memory.dmp

                                                    Filesize

                                                    156KB

                                                  • memory/448-479-0x00007FFA9AB70000-0x00007FFA9AB8A000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/448-401-0x00007FFA98F20000-0x00007FFA98F41000-memory.dmp

                                                    Filesize

                                                    132KB

                                                  • memory/448-393-0x00007FFA9AB70000-0x00007FFA9AB8B000-memory.dmp

                                                    Filesize

                                                    108KB

                                                  • memory/448-387-0x00007FFA87050000-0x00007FFA8709B000-memory.dmp

                                                    Filesize

                                                    300KB

                                                  • memory/448-426-0x00007FFA9AB70000-0x00007FFA9AB89000-memory.dmp

                                                    Filesize

                                                    100KB

                                                  • memory/448-373-0x00007FFA98F20000-0x00007FFA98F44000-memory.dmp

                                                    Filesize

                                                    144KB

                                                  • memory/448-58-0x00007FFA8B490000-0x00007FFA8BF51000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/448-439-0x00007FFA98F20000-0x00007FFA98F42000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/448-407-0x00007FFA9AB70000-0x00007FFA9AB8C000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/448-86-0x0000021270D90000-0x0000021270D98000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/448-83-0x00000212714F0000-0x000002127153A000-memory.dmp

                                                    Filesize

                                                    296KB

                                                  • memory/448-81-0x0000021270D90000-0x0000021270D98000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/448-80-0x0000021270D90000-0x0000021270D98000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/448-77-0x0000021270D90000-0x0000021270D98000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/448-78-0x0000021270D90000-0x0000021270D98000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/448-63-0x000002126FF00000-0x000002126FF10000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/448-61-0x0000021255930000-0x000002125593E000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/928-323-0x0000000000400000-0x000000000040A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2292-70-0x0000012EFF4D0000-0x0000012EFF4F0000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/2292-28-0x00007FFA8B490000-0x00007FFA8BF51000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2292-43-0x0000012EFF970000-0x0000012EFFA2A000-memory.dmp

                                                    Filesize

                                                    744KB

                                                  • memory/2292-42-0x0000012EFF450000-0x0000012EFF480000-memory.dmp

                                                    Filesize

                                                    192KB

                                                  • memory/2292-46-0x0000012E9B4A0000-0x0000012E9B869000-memory.dmp

                                                    Filesize

                                                    3.8MB

                                                  • memory/2292-41-0x0000012EFF3A0000-0x0000012EFF3B0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2292-39-0x0000012EFF970000-0x0000012EFFA92000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/2292-38-0x0000012EFF3E0000-0x0000012EFF3FA000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/2292-37-0x0000012EFF550000-0x0000012EFF5F4000-memory.dmp

                                                    Filesize

                                                    656KB

                                                  • memory/2292-36-0x0000012EFF6B0000-0x0000012EFF80A000-memory.dmp

                                                    Filesize

                                                    1.4MB

                                                  • memory/2292-45-0x0000012E81A10000-0x0000012E81A32000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/2292-57-0x0000012EFF3E0000-0x0000012EFF3FE000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/2292-59-0x0000012EFF970000-0x0000012EFF9EC000-memory.dmp

                                                    Filesize

                                                    496KB

                                                  • memory/2292-40-0x0000012EFF4A0000-0x0000012EFF4E4000-memory.dmp

                                                    Filesize

                                                    272KB

                                                  • memory/2292-35-0x0000012EFF3E0000-0x0000012EFF3F8000-memory.dmp

                                                    Filesize

                                                    96KB

                                                  • memory/2292-62-0x0000012EFF3C0000-0x0000012EFF3C8000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/2292-64-0x0000012EFF3C0000-0x0000012EFF3CE000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/2292-34-0x0000012EFF3A0000-0x0000012EFF3B0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2292-65-0x0000012EFF3C0000-0x0000012EFF3C8000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/2292-60-0x0000012EFFC90000-0x0000012EFFD2C000-memory.dmp

                                                    Filesize

                                                    624KB

                                                  • memory/2292-66-0x0000012EFF550000-0x0000012EFF572000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/2292-67-0x0000012EFF4D0000-0x0000012EFF4EA000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/2292-68-0x0000012EFF3C0000-0x0000012EFF3CA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2292-69-0x0000012EFF4D0000-0x0000012EFF4E2000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/2292-349-0x00007FFA9AB70000-0x00007FFA9AB8A000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/2292-71-0x0000012EFFD40000-0x0000012EFFDF0000-memory.dmp

                                                    Filesize

                                                    704KB

                                                  • memory/2292-72-0x0000012F00180000-0x0000012F002F6000-memory.dmp

                                                    Filesize

                                                    1.5MB

                                                  • memory/2292-73-0x0000012EFF730000-0x0000012EFF752000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/2292-74-0x0000012F00480000-0x0000012F0068A000-memory.dmp

                                                    Filesize

                                                    2.0MB

                                                  • memory/2292-75-0x0000012EFF470000-0x0000012EFF480000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2292-76-0x0000012EFF730000-0x0000012EFF75A000-memory.dmp

                                                    Filesize

                                                    168KB

                                                  • memory/2292-33-0x0000012E81A10000-0x0000012E81A24000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/2292-32-0x0000012E81A10000-0x0000012E81A2C000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/2292-31-0x0000012EFF3A0000-0x0000012EFF3AA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2292-79-0x0000012EFF470000-0x0000012EFF478000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/2292-82-0x0000012EFF470000-0x0000012EFF478000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/2292-29-0x0000012E9A1D0000-0x0000012E9A1E0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2292-44-0x0000012EFF730000-0x0000012EFF790000-memory.dmp

                                                    Filesize

                                                    384KB

                                                  • memory/2292-84-0x0000012EFF470000-0x0000012EFF480000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2292-85-0x0000012EFF9A0000-0x0000012EFF9C0000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/2292-27-0x0000012EFF060000-0x0000012EFF06E000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/2292-344-0x00007FFA87050000-0x00007FFA87094000-memory.dmp

                                                    Filesize

                                                    272KB

                                                  • memory/2292-287-0x0000012E9A110000-0x0000012E9A146000-memory.dmp

                                                    Filesize

                                                    216KB

                                                  • memory/2292-295-0x0000012E9A180000-0x0000012E9A194000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/2292-299-0x0000012E9B220000-0x0000012E9B36E000-memory.dmp

                                                    Filesize

                                                    1.3MB

                                                  • memory/2292-307-0x0000012E9B1A0000-0x0000012E9B263000-memory.dmp

                                                    Filesize

                                                    780KB

                                                  • memory/2292-312-0x00007FFA9AB70000-0x00007FFA9AB8C000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/2292-340-0x00007FFA87050000-0x00007FFA87092000-memory.dmp

                                                    Filesize

                                                    264KB

                                                  • memory/2292-324-0x00007FFA9AB70000-0x00007FFA9AB89000-memory.dmp

                                                    Filesize

                                                    100KB

                                                  • memory/2292-331-0x00007FFA98F20000-0x00007FFA98F42000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/2572-385-0x00007FFA86F30000-0x00007FFA86F66000-memory.dmp

                                                    Filesize

                                                    216KB

                                                  • memory/2572-517-0x00007FFA86F20000-0x00007FFA86F62000-memory.dmp

                                                    Filesize

                                                    264KB

                                                  • memory/2572-496-0x00007FFA86F30000-0x00007FFA86F61000-memory.dmp

                                                    Filesize

                                                    196KB

                                                  • memory/2572-541-0x00007FFA81F40000-0x00007FFA82184000-memory.dmp

                                                    Filesize

                                                    2.3MB

                                                  • memory/2572-521-0x00007FFA86F20000-0x00007FFA86F64000-memory.dmp

                                                    Filesize

                                                    272KB

                                                  • memory/2572-557-0x000001A8FB2F0000-0x000001A8FB398000-memory.dmp

                                                    Filesize

                                                    672KB

                                                  • memory/3960-322-0x0000000000400000-0x000000000043E000-memory.dmp

                                                    Filesize

                                                    248KB

                                                  • memory/3960-339-0x0000000000400000-0x000000000043E000-memory.dmp

                                                    Filesize

                                                    248KB

                                                  • memory/4260-13-0x0000000006D60000-0x0000000006DF2000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/4260-12-0x00000000749E0000-0x0000000075190000-memory.dmp

                                                    Filesize

                                                    7.7MB

                                                  • memory/4260-11-0x00000000052A0000-0x00000000052B0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4260-10-0x00000000051E0000-0x0000000005246000-memory.dmp

                                                    Filesize

                                                    408KB

                                                  • memory/4260-26-0x00000000052A0000-0x00000000052B0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4260-8-0x0000000005140000-0x00000000051DC000-memory.dmp

                                                    Filesize

                                                    624KB

                                                  • memory/4260-7-0x00000000749E0000-0x0000000075190000-memory.dmp

                                                    Filesize

                                                    7.7MB

                                                  • memory/4260-6-0x0000000000400000-0x000000000040E000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/4260-14-0x00000000073B0000-0x0000000007954000-memory.dmp

                                                    Filesize

                                                    5.6MB

                                                  • memory/4424-332-0x0000000140000000-0x00000001402CA000-memory.dmp

                                                    Filesize

                                                    2.8MB

                                                  • memory/4424-336-0x0000000140000000-0x00000001402CA000-memory.dmp

                                                    Filesize

                                                    2.8MB

                                                  • memory/4700-0-0x0000022EEE0E0000-0x0000022EEE0F6000-memory.dmp

                                                    Filesize

                                                    88KB

                                                  • memory/4700-5-0x0000022EEFE90000-0x0000022EEFEF4000-memory.dmp

                                                    Filesize

                                                    400KB

                                                  • memory/4700-9-0x00007FFA8BA20000-0x00007FFA8C4E1000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4700-4-0x0000022EEFE70000-0x0000022EEFE8E000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/4700-3-0x0000022EF27E0000-0x0000022EF2856000-memory.dmp

                                                    Filesize

                                                    472KB

                                                  • memory/4700-2-0x0000022EF0710000-0x0000022EF0720000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4700-1-0x00007FFA8BA20000-0x00007FFA8C4E1000-memory.dmp

                                                    Filesize

                                                    10.8MB