Resubmissions

11-06-2024 12:49

240611-p2sm9sxgpq 1

19-04-2024 05:35

240419-f92rgabb5t 10

Analysis

  • max time kernel
    78s
  • max time network
    107s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 05:35

General

  • Target

    fe7c4b36fca4fdf53789979a4a09c880.exe

  • Size

    50KB

  • MD5

    fe7c4b36fca4fdf53789979a4a09c880

  • SHA1

    89caf7f3b9f4d7d732ade5593e1958f6f025afa1

  • SHA256

    1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470

  • SHA512

    e0668f6dfda991ab07870d53ce291f73d48533c44dfed1178c8b98b57c799eb77f19451bc70d09caaf757bf18ef6217b44e7fc626b38c89261dc8920796339f3

  • SSDEEP

    768:mDrJUAkwf3ppZuBdrm+KiPxWEh9HgPxWEjj4G:8rkwf3ppZRsPxZgPx94G

Malware Config

Extracted

Family

xworm

Version

3.1

C2

gamemodz.duckdns.org:6969

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Detect Xworm Payload 1 IoCs
  • Detect ZGRat V1 34 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe7c4b36fca4fdf53789979a4a09c880.exe
    "C:\Users\Admin\AppData\Local\Temp\fe7c4b36fca4fdf53789979a4a09c880.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "cvtres" /tr "C:\Users\Admin\AppData\Roaming\cvtres.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3032
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://i.imgflip.com/1p7cdj.jpg
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2432
      • C:\Users\Admin\AppData\Local\Temp\zzoulw.exe
        "C:\Users\Admin\AppData\Local\Temp\zzoulw.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:792
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 792 -s 564
          4⤵
            PID:1424
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          3⤵
            PID:852
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {D6B6A373-8BED-4F9D-99C4-D8C8F0FC35EF} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1584
        • C:\Users\Admin\AppData\Roaming\cvtres.exe
          C:\Users\Admin\AppData\Roaming\cvtres.exe
          2⤵
          • Executes dropped EXE
          PID:2212

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        914B

        MD5

        e4a68ac854ac5242460afd72481b2a44

        SHA1

        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

        SHA256

        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

        SHA512

        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        252B

        MD5

        6adb974de49630853a1ba95ecbd0faa5

        SHA1

        09941cead63b987f764e7edfdaaf8df1a5a6b669

        SHA256

        10ee09851f09675135d4695240e2bc5db4c1500fed5ea1e352a1c99d393628d7

        SHA512

        e469baf70d337caf0b8d3317a8c0d56e3edc601be8c85cb5d00e56dfab1c795bc195a5dc3c9acc827d05c30ba41522eca15941d206387e71028e3402e4ecc43b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        62b38b5a401fff241f57a3c8d0a4dc06

        SHA1

        2f946a18530f6fdeee9ca1d10bf8a585bce5fcd4

        SHA256

        27e0a9f498fda19f8dbf2d29315b5ced018c2ede1c002e5781bc6ba0548bcab1

        SHA512

        3899dab3fe76c46ae4a0295c4687b002ab0fc58bf5fe6dfd865f520303926ce83e5c7d89704bc12f349bb2230acbeb64c38a0310fb8186b93b5a8f3d0a099d1b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        baea0a2ba82db687bbe3ee09d55b9d50

        SHA1

        88d14e2ecc7c40fd7b9b072199e4232bf498e864

        SHA256

        aa1e61cfdbc02e5192bbdf04deda4456cb4b22974f3c163c2ae14cce1b8f1c90

        SHA512

        689d1ee259af876135e2648fbf63f0cbee0ca6f62bcd2c74ec41ab4be9119cfb1b9653adda59e00f54987a9f157101c46695e811799c5be5c6b1f878148a6f7b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        86ed08b8c99d3b7821d64e63efd71ff0

        SHA1

        3874d0e90ed09e3812d14d11f966a2959b25ea18

        SHA256

        18a64ec5685b7d1bca04677b6046f0f2f3feb629113aacd2815c95a7566fc8fd

        SHA512

        83d91227ae03779990ed4e8e9887f9748ea0fe546ca5398a0cdbfa1eb9bab5ef6ec3144612ba0c300ab2dc3222c9948161ddc50afa163722d50e77f0271bd888

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        05726149b00c3ab03e32a55bd6ec4af8

        SHA1

        51c672403c91d6433fecd2bb5ff4d25a0a9f97d9

        SHA256

        759c6bcc7ef07c07b839764cdd246a96ddbf165bd258a7ce622756046158eb18

        SHA512

        8ca558417406bacbf843cd38f157790396eccc6eacb3c57c76d3c9a2577d1c26ea940244096942b981f8cca5a9bc19914ec97c42bc2e067a26f95937d7fdd435

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        f7ac70eac7bc52713521b75ef6192bbf

        SHA1

        6211e8ab690cf922367dd1bc56f63a4de179a8d5

        SHA256

        07775ee7e3d3c370f3f01603996a4041e573dea04fe5c297f1cba4c3e4eb5d48

        SHA512

        e9aba380da42121c1b4f9d3aa55092a5466729f73cb16b58e9f5464b3bdf123c9551189eaa8f2ef0ce19d58dd9510ac791926e729d2d2c372c3cbbca757cd707

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        a069274469818c94834925a446ef2b9c

        SHA1

        e19599292c766af2a2fd0fb764e0f105837a2997

        SHA256

        ef1243c6f5330018c891d4a51c58685723b0d63538d39ac89435942d2e859083

        SHA512

        0d704cd92a0be283e75fb9a49d595145bf57c66b234be357c954552ad41ef2e3d7c5e14b6be0440c48758044881994d431da98fe8f1373184994134bd5d01a60

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        9a0e27218d7fd518870b76df1434b509

        SHA1

        8103ddfbd6fef9da25e9d61c00ff8bd41fb0a949

        SHA256

        44b5c9fb4d64eb2ed9f892cc4d181fc6bf2b84b8fb44bfccc096456be92bbbc5

        SHA512

        c714d985237340d35d81bc9ed91b69ebcb7b744b66daad906eec9f2aa6b09faaeaf29657d2fb78605a00866e3b1abc93c69da67cb252ec0ee19ca7e1cf98a3b5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        8f6356282095a489ed3c5dd91a48cb53

        SHA1

        5d453d88c73d5dbdc9bbc9f385c80abf1ac09dfa

        SHA256

        e2dd034b185497da32e063be4f65f6001fdf35ad6a9f15f1459735f6eef66987

        SHA512

        e61f667fc6e8ba4716bd411f619f12715e133f3956f8b1fea119efe8301f00477eaa6e67d2688cfa66e15c379b21f54f9a41f3cbfa0544d1de795d3202e30211

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        9424fafb86aefa679d044154fb9b8d25

        SHA1

        0cf48419737334ead27eed88e4caa88b4a139766

        SHA256

        269e7900d2f9a86a23dfbfe28255f5ba704452634959b13b7d0f402b362fc165

        SHA512

        a978dda5c0cce0e960704d02465bbef06063b8c8bdf95dfe2373e82d84a1c3c771db3e1f8c172d56cf3a7a77cec723b7b93525c4aa30d50f3bdc3aa77a8d7aa1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        97e90234edae7785be6e95082de5b4fd

        SHA1

        67b19d54e55340f3d513354e17e7a5b0c38e4274

        SHA256

        2791d2faa2c9f6b0108ce992736e2c11db15c6e4fa17a4a3a3aaeacc84f744bc

        SHA512

        8b8ad3577ffcc29bcbb68abf3c0a63096ed529382cc0c8ecd2d5ea19331e820c54396d05679f60011ce29e1c97d47bb951978d598d7a917b359b827f7b82e28a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        6d54a13e72a45385df8948ceb98ec987

        SHA1

        d575f1c6a6623fca7eb8192d4ed06fa1a60a1ee4

        SHA256

        38f8521e8e868e6fbc64502f49ef11c7c8e2daec510af52a3d81ce14ed943fb5

        SHA512

        e1cf85729367a213598ac5ef9dc12baf965aa4909880ae122c4003d90b0d2b95df38b95635a748d8807fce98f92746156aa88b7936db4ff8c86c9a9db206c3cf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        1004474287d974247dc6dbd5f312fb0a

        SHA1

        e539fed23c931cc02a925c9048dffbe353efe8b0

        SHA256

        64cfa816a97c0eaaae8150f54df14a8a11ef214f81550c46db9aac78348dcd80

        SHA512

        df24e81e0774089fc23602d1377398ad1b66894702e75ad760d0deea3988a9b3723615209eb8972441d963dc539d77f22f29d9de364e5deead905e90df982482

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        db451d1f6fce4e4588bae9310b2d411b

        SHA1

        99d1e3ec88cd2c12fa6c9758a4ac64523feeb48c

        SHA256

        4d35173c66bdba0c6c93ef554ac5f7c5462d74563095764c386eb8c7f1fa117f

        SHA512

        bda1dbb579b98dfb87db0557b9ef9b56f36c5589716addd8188d4c1ad7231f658986d66bb548900a2ec31791b0321acc845189a3c52eb298cab48af7afd29d6e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        d2fa3974264615352a4b526be5519c12

        SHA1

        60c60ed6630965688fc789c1e568a3e808fce292

        SHA256

        241252f074c122ef8192ce6e85aa5b5eb1f61618afbf410114c521a4fa030f95

        SHA512

        5dc1b394b3d3f0dd6b1707b2d3beafd8064572234dbb6cc7037176cfcc7a31c1fc57525144080f2ca5041469528899f99328e0d6ff04dfb0397359b5d723bdeb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        242B

        MD5

        a7415daeb2099e0d1362042a8f9f7e27

        SHA1

        836ba9c762733b7d886265c02e05484f406b4d91

        SHA256

        a6e6f3be07110b40261ff805bf5e4a54aa6d95c786bbd3f9959c26168083e3a6

        SHA512

        eaa499a01081491f9e9de272df30a14c7ae8f63a0abacf923902d6c1cc28df0f229d0b66902acd00ac5578ce9b6c2fd3b1fc8b8f53c98d8829d8d66720dae566

      • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

        Filesize

        4KB

        MD5

        da597791be3b6e732f0bc8b20e38ee62

        SHA1

        1125c45d285c360542027d7554a5c442288974de

        SHA256

        5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

        SHA512

        d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

      • C:\Users\Admin\AppData\Local\Temp\Tar16CE.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Roaming\cvtres.exe

        Filesize

        42KB

        MD5

        c09985ae74f0882f208d75de27770dfa

        SHA1

        31b7a087f3c0325d11f8de298f2d601ab8f94897

        SHA256

        e24570abd130832732d0dd3ec4efb6e3e1835064513c8b8a2b1ae0d530b04534

        SHA512

        d624e26d12588b8860f957f7dcfca29a84724dc087e26123136cd5e7e4e81c8233090fbd8455df17a73e452beaa780590d1f99b91ae27e151c39353999b11540

      • \Users\Admin\AppData\Local\Temp\zzoulw.exe

        Filesize

        84KB

        MD5

        7051dcbe9a0837a312b09a5ae3b42430

        SHA1

        3553ff8725a57929e438228bf141b695c13cecb4

        SHA256

        ce750c7054359e9e88556d48f7eea341374b74f494caed48251185b54c9ed644

        SHA512

        2e82160bff1fbdd6f6a9f0210dfaf831650fdefdf8e3bb70c3c2717122b107ef3610c5c5f55908843df7ba3bd3bbefc40b9d1dda07877083cbd2ab8b090a276c

      • memory/792-5075-0x0000000000110000-0x000000000012C000-memory.dmp

        Filesize

        112KB

      • memory/792-5076-0x000007FEF4E50000-0x000007FEF583C000-memory.dmp

        Filesize

        9.9MB

      • memory/1144-4915-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1144-5530-0x0000000000B50000-0x0000000000B6C000-memory.dmp

        Filesize

        112KB

      • memory/1144-4930-0x00000000002E0000-0x0000000000320000-memory.dmp

        Filesize

        256KB

      • memory/1144-4929-0x0000000073F30000-0x000000007461E000-memory.dmp

        Filesize

        6.9MB

      • memory/1144-4928-0x00000000007B0000-0x00000000007BA000-memory.dmp

        Filesize

        40KB

      • memory/1144-4917-0x00000000002E0000-0x0000000000320000-memory.dmp

        Filesize

        256KB

      • memory/1144-4916-0x0000000073F30000-0x000000007461E000-memory.dmp

        Filesize

        6.9MB

      • memory/1680-47-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-55-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-77-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-79-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-81-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-2451-0x0000000073F30000-0x000000007461E000-memory.dmp

        Filesize

        6.9MB

      • memory/1680-3022-0x0000000001ED0000-0x0000000001F10000-memory.dmp

        Filesize

        256KB

      • memory/1680-4900-0x0000000000A50000-0x0000000000A51000-memory.dmp

        Filesize

        4KB

      • memory/1680-4901-0x00000000049E0000-0x0000000004A42000-memory.dmp

        Filesize

        392KB

      • memory/1680-4902-0x00000000055A0000-0x00000000055EC000-memory.dmp

        Filesize

        304KB

      • memory/1680-4903-0x00000000005B0000-0x0000000000604000-memory.dmp

        Filesize

        336KB

      • memory/1680-4911-0x0000000073F30000-0x000000007461E000-memory.dmp

        Filesize

        6.9MB

      • memory/1680-73-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-71-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-69-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-67-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-65-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-63-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-61-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-59-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-57-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-75-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-53-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-51-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-49-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-0-0x00000000008A0000-0x00000000008AE000-memory.dmp

        Filesize

        56KB

      • memory/1680-45-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-43-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-41-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-39-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-37-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-35-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-33-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-31-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-29-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-27-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-25-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-23-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-18-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-21-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-19-0x0000000005E10000-0x0000000006030000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-17-0x0000000005E10000-0x0000000006036000-memory.dmp

        Filesize

        2.1MB

      • memory/1680-2-0x0000000001ED0000-0x0000000001F10000-memory.dmp

        Filesize

        256KB

      • memory/1680-1-0x0000000073F30000-0x000000007461E000-memory.dmp

        Filesize

        6.9MB