Analysis

  • max time kernel
    294s
  • max time network
    298s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 18:55

General

  • Target

    bebra.exe

  • Size

    74KB

  • MD5

    669e9e7f8c7290ffda453a62f14ca030

  • SHA1

    4eabe1cb31a0c2ed609fcdef7a5d2ca0bfff328c

  • SHA256

    58b0a1a32bd96f09ac520b8a7433cc86f0ac5c3fa1df4741dd8b2bd12713f749

  • SHA512

    bbc310297435462479a6035e0522ce3da55bac7ca2b1fd77825a798b70f84edb4402405b25cfb33d0dad808570f6b1dab88f7699d0d4777a97465d8183075655

  • SSDEEP

    1536:BKru/Ft/VKQWRdx0zaYEeqbGxkwfTlk6QUGH+meODiDDO1:UrWF1MpAEeqbG6IywmeOWDi1

Malware Config

Extracted

Family

xworm

C2

consider-catalog.gl.at.ply.gg:61770

Attributes
  • Install_directory

    %AppData%

  • install_file

    bebra.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bebra.exe
    "C:\Users\Admin\AppData\Local\Temp\bebra.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bebra.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3860
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'bebra.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4756
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\bebra.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3468
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'bebra.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3628
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3472
      • C:\Windows\system32\netsh.exe
        netsh wlan show profiles
        3⤵
          PID:3772
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /7
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:612
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9fb9446f8,0x7ff9fb944708,0x7ff9fb944718
        2⤵
          PID:4172
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
          2⤵
            PID:3764
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
            2⤵
              PID:672
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:8
              2⤵
                PID:4392
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                2⤵
                  PID:2884
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                  2⤵
                    PID:2184
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:1
                    2⤵
                      PID:1156
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:1
                      2⤵
                        PID:1948
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:8
                        2⤵
                          PID:2532
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:8
                          2⤵
                            PID:1736
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1
                            2⤵
                              PID:3392
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1
                              2⤵
                                PID:2008
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                                2⤵
                                  PID:2648
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3052
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2336

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    d85ba6ff808d9e5444a4b369f5bc2730

                                    SHA1

                                    31aa9d96590fff6981b315e0b391b575e4c0804a

                                    SHA256

                                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                    SHA512

                                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    612a6c4247ef652299b376221c984213

                                    SHA1

                                    d306f3b16bde39708aa862aee372345feb559750

                                    SHA256

                                    9d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a

                                    SHA512

                                    34a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    56641592f6e69f5f5fb06f2319384490

                                    SHA1

                                    6a86be42e2c6d26b7830ad9f4e2627995fd91069

                                    SHA256

                                    02d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455

                                    SHA512

                                    c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    b5a1f7385dc35dfee9244cd72f1551f5

                                    SHA1

                                    0e43fb2ec6ef9c4b6be3eea2cb8d88cce9c8936e

                                    SHA256

                                    c41773ed6a7d8973f8366cb5f02d8cb061637070a9761373066f006abe539c66

                                    SHA512

                                    d3d60141a24005c0315cef1f7a593c142782f7c19aa04c8236ccb9f0e793ba63a1617dee5e9f1d339ce3fb2ea1143d7a902c79888345baf1976ad7ba6ae70ca7

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    86bea0216a11065c3743b9f873fc73f8

                                    SHA1

                                    2e3aa34437da6dca32da5d048e3a76e100681ce3

                                    SHA256

                                    3b5c938868580236a06c5c53269da53969560e67efa7f89d125fe720d8ece491

                                    SHA512

                                    ed98537df7cb57b4dba6cb982b76f948e93ed2d8de98abf44e350c224e81d36220a6d94952f1c2186f0009e412ded4290cf6cf91cd02fd9cc9bcad5ac0c12bb7

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    64ab0c701a84a7874cad5fc3bf55f41e

                                    SHA1

                                    6ae330d63b801271f5fba148cde4de56e979e5a1

                                    SHA256

                                    49a76b4253c55ffae1849886facc7fd188c69eb5c0f0c2b861887f8c222cc2ee

                                    SHA512

                                    dda60010932906f557ef0507dd0305ca3268917c5b9a0adbf694d3dd244bb3ab77aedab02f9fb552636247eb380c9413299877a318b42d7c8eecd17386b96c77

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    2e907f77659a6601fcc408274894da2e

                                    SHA1

                                    9f5b72abef1cd7145bf37547cdb1b9254b4efe9d

                                    SHA256

                                    385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233

                                    SHA512

                                    34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    67e8893616f805af2411e2f4a1411b2a

                                    SHA1

                                    39bf1e1a0ddf46ce7c136972120f512d92827dcd

                                    SHA256

                                    ca0dfe104c1bf27f7e01999fcdabc16c6400c3da937c832c26bdbca322381d31

                                    SHA512

                                    164e911a9935e75c8be1a6ec3d31199a16ba2a1064da6c09d771b2a38dd7fddd142301ef55d67d90f306d3a454a1ce7b72e129ea42e44500b9b8c623a8d98b4d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    a80e3fed34f92f0786e5d0291c4b0c05

                                    SHA1

                                    25bf7cdae8604adebd717272d606285cd35c528e

                                    SHA256

                                    1235efa1971a3233b95edcf295450036ae1cd71b794ba8939f3ca5656209d7d6

                                    SHA512

                                    aaefe198c9150b44ccc11449bcfc9229d6825434f298ddcf5cd3508c38ddf6d3e664e1834073bf6e0b3c37e01e3602d10085a0929d2fbfd13b277e59924b7a09

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ln2ucb54.weu.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\tmp1D90.tmp

                                    Filesize

                                    100KB

                                    MD5

                                    1b942faa8e8b1008a8c3c1004ba57349

                                    SHA1

                                    cd99977f6c1819b12b33240b784ca816dfe2cb91

                                    SHA256

                                    555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc

                                    SHA512

                                    5aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bebra.lnk

                                    Filesize

                                    759B

                                    MD5

                                    00a9e96f94f73e7e3bb1b6a4ea4e730f

                                    SHA1

                                    baa5de0127e60865cc90c06b220003d3d3723c56

                                    SHA256

                                    af75efeba5ef963827b3bc93dd5d35aa77d8e906a4c115110a8049f3911a0fd7

                                    SHA512

                                    a6d1a00e908839ec1e62e41e85230bd500cc89cce3b18b811ac669623517278d2949fdc24e4982f02066bb53598f758ad3fdc8ed74ca377ad0af1da96662c600

                                  • C:\Users\Admin\AppData\Roaming\bebra.exe

                                    Filesize

                                    74KB

                                    MD5

                                    669e9e7f8c7290ffda453a62f14ca030

                                    SHA1

                                    4eabe1cb31a0c2ed609fcdef7a5d2ca0bfff328c

                                    SHA256

                                    58b0a1a32bd96f09ac520b8a7433cc86f0ac5c3fa1df4741dd8b2bd12713f749

                                    SHA512

                                    bbc310297435462479a6035e0522ce3da55bac7ca2b1fd77825a798b70f84edb4402405b25cfb33d0dad808570f6b1dab88f7699d0d4777a97465d8183075655

                                  • memory/316-101-0x000000001DB00000-0x000000001DBB0000-memory.dmp

                                    Filesize

                                    704KB

                                  • memory/316-0-0x00007FF9FFBA3000-0x00007FF9FFBA5000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/316-206-0x000000001B370000-0x000000001B37A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/316-198-0x000000001B360000-0x000000001B36A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/316-177-0x000000001B350000-0x000000001B35E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/316-1-0x0000000000180000-0x0000000000198000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/316-2-0x00007FF9FFBA0000-0x00007FFA00661000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/316-73-0x00007FF9FFBA3000-0x00007FF9FFBA5000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/316-102-0x000000001F720000-0x000000001FC48000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/316-97-0x000000001B180000-0x000000001B18C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/316-76-0x00007FF9FFBA0000-0x00007FFA00661000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/316-79-0x0000000000A60000-0x0000000000A6C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/316-80-0x000000001C940000-0x000000001CAE9000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/316-81-0x000000001B290000-0x000000001B2CA000-memory.dmp

                                    Filesize

                                    232KB

                                  • memory/316-98-0x000000001C940000-0x000000001CAE9000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/316-86-0x000000001C940000-0x000000001CAE9000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/316-93-0x000000001D520000-0x000000001D870000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/316-95-0x000000001B330000-0x000000001B33C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/316-96-0x000000001C940000-0x000000001CAE9000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/612-61-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-68-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-72-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-66-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-60-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-71-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-70-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-69-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-62-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/612-67-0x0000023CE99F0000-0x0000023CE99F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3860-3-0x00007FF9FFBA0000-0x00007FFA00661000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3860-4-0x00007FF9FFBA0000-0x00007FFA00661000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3860-14-0x000001B7D5B10000-0x000001B7D5B32000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3860-17-0x00007FF9FFBA0000-0x00007FFA00661000-memory.dmp

                                    Filesize

                                    10.8MB