Resubmissions

01-07-2024 12:05

240701-n9bt2s1akf 10

01-07-2024 11:59

240701-n5w97atdqr 10

Analysis

  • max time kernel
    258s
  • max time network
    267s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 12:05

Errors

Reason
Machine shutdown

General

  • Target

    fix.exe

  • Size

    35KB

  • MD5

    83bbe29b99a54bad48074efb72ce1fcc

  • SHA1

    421deeba13130a8eebacc8c7f48f28e6fe8485f2

  • SHA256

    99bf031f23b1759702a56ccfc9425f0a063654dcc4a94d8feeb89792c82f3082

  • SHA512

    67fe2ac907c297cd3c4d1af7f80257b468bc4e73cab428568ea1238d41cd8c43262765a0b0d43b2accb003901a66e9e7ec162fefda2fd89040697e1e168ac27f

  • SSDEEP

    768:ChiLce92aOrsQiUy5FyS9ZL6LOjhibold:ChkceWsQi5FT9ZL6LOjGo7

Malware Config

Extracted

Family

xworm

Version

5.0

C2

20.ip.gl.ply.gg:53765

Mutex

JCfj6Aifpywc6Ul9

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fix.exe
    "C:\Users\Admin\AppData\Local\Temp\fix.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\fix.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4252
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'fix.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:8
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4932
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2352
    • C:\Windows\SYSTEM32\shutdown.exe
      shutdown.exe /f /s /t 0
      2⤵
        PID:1748
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:3084
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4456
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3540
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff8eabab58,0x7fff8eabab68,0x7fff8eabab78
          2⤵
            PID:1548
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:2
            2⤵
              PID:1116
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:8
              2⤵
                PID:4556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:8
                2⤵
                  PID:4560
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:1
                  2⤵
                    PID:4816
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:1
                    2⤵
                      PID:1552
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4380 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:1
                      2⤵
                        PID:2532
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4304 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:8
                        2⤵
                          PID:4916
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4500 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:8
                          2⤵
                            PID:3116
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:8
                            2⤵
                              PID:2972
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4852 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:8
                              2⤵
                                PID:8
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:8
                                2⤵
                                  PID:1584
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5092 --field-trial-handle=1892,i,4577150508876368370,1392349960523238781,131072 /prefetch:1
                                  2⤵
                                    PID:1840
                                • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                  1⤵
                                    PID:3132
                                  • C:\Windows\system32\LogonUI.exe
                                    "LogonUI.exe" /flags:0x4 /state0:0xa39b7055 /state1:0x41c64e6d
                                    1⤵
                                    • Modifies data under HKEY_USERS
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4924

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    432B

                                    MD5

                                    e70f34bcf137f5a906c965dbc341d42e

                                    SHA1

                                    34d583faf962bd3454eb324b5336e04f40be549b

                                    SHA256

                                    42b23bbd1d3e131e46e3d904700c705bae7bff385fe8671c60e09fad8632220d

                                    SHA512

                                    7b20553a8037cc0a21d4bcec31dedd5f2065afbbea369f9e2e8dd3ddf7854f659de68417a77f1b08a0edf0f9de822041467d786bd8ca40521a723807e259b75c

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    2KB

                                    MD5

                                    938c3c9688734f98ced3186afe767dff

                                    SHA1

                                    cd2488b877bc9ab80f31eca4dda3d6e0717b6e74

                                    SHA256

                                    2c08b80adc65e107152aa691cc2b70286c6068f9949c6b9ae2a207cf4897e160

                                    SHA512

                                    5e9b5cc38ae3c3bafa30418d7c3ced6fe9c269790279f42002fa86d507453ddbf4ea8ef77d8e4ba69de81be229be76fc64033d2ff59d96f8964ca77811b72cc7

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    356B

                                    MD5

                                    3dc7acbfbbdcd7295d2ee7f64b4d9836

                                    SHA1

                                    9b0d9f1f90e0938161798cdda4e8e13446c4c5a9

                                    SHA256

                                    3d1d4fa35931c3ec1a50b4d931520306132c56be6325f7d8bc632f72d237c2d4

                                    SHA512

                                    270e126672c45750eebc58c9990bcaac3d3f4bd352eb8cfee174496e0b189d88e2104f8c8fc7dbb67e500ee438ec809e39c91f4d32b68abfab88015e7e056bbd

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    356B

                                    MD5

                                    2871518232ee141b0379188fb77692db

                                    SHA1

                                    20dde297cd9b0e4de53da6991cba34097354f8eb

                                    SHA256

                                    8e49bf3d44bbf90458a4e79b37e129d05b37d6988b532d75d36e162b76a0ece0

                                    SHA512

                                    18d2164c8eeacbb275f5ff4211f2341af00d1e01d23facf9cc41077e097ab6dcb1b9a638734ec5c2d0d4686e06d7c4b91d3dc7b330b6fc9e2b0fec6a66d9698a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    189228cbf89f1fe19701f10cead39075

                                    SHA1

                                    af71583062643be3b931fa1b6a7c9eafbaa66e2c

                                    SHA256

                                    bb38099a29f89104cc7f74c2f8bcaf38482e32724969d52cd151cb3b3a3e6791

                                    SHA512

                                    03fba2fb520ae8d40fdd62af8d745344cbcc1a2b37c6b3ee10c45fa88474293b6662906434d9f23f8e0a755734cd9764b3ff653603f4401693c493ee25240db1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    77690344155c5971353eba945d6dca1a

                                    SHA1

                                    d646daf8afc12ffcce32d20110538aecd8790b6c

                                    SHA256

                                    00781321cad54c703379370696df6f93a4af63a4cbfed1d6986aa1bea604d419

                                    SHA512

                                    766f13dc34ba63aaa915684654e1d63ff23a93808dbb18cd42b8dcff437ed15bd0050d3486c1d3fbd048c33fe26cd3191b4338abacdd1386a52c72613b0f0fed

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                    Filesize

                                    16KB

                                    MD5

                                    2595f568e4032f5ab9a67a93c9a1f7ee

                                    SHA1

                                    b2690d8ebf8d517fa970e010ac595be206210979

                                    SHA256

                                    e4fa4b6030f2e3c6e6a0261d055a0c047d42064b2429977d7f325c91887e56ab

                                    SHA512

                                    a207418403729afb3a500975fa9253fd3e4bc1a007c0b4a0bc214fd3b5b260c87d20cb498cd27e12ab0054cef1c8ebf2eb256470ece5ae40c85187c84ae3dfca

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    269KB

                                    MD5

                                    2df17a6e82529f07148062f5a2f98e16

                                    SHA1

                                    d714707034e783d6f36b3fb7dc8efa5e69475279

                                    SHA256

                                    67f4b6fea5a3b18b48d04047aa3d12be9f8f5c4f180ba0637a1dea3a541c43da

                                    SHA512

                                    b1fecb7e5b7db6b0a4221a64f36c55ab1ff8fedc6e2bfba00688bcb41c41f229b24a9b5cddb496567fe609b1178f2416cb4b8b85b48d32db07f3e2176fbc9745

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    269KB

                                    MD5

                                    e1bbe9a6a1e5c31ae9607c6c654bb6a3

                                    SHA1

                                    31200e8776a0bad9b87d7a35eeddccc47d9be19e

                                    SHA256

                                    24a5b0ad6d37d69f58da6005bc4d72a65230101df467f6dfa4c8675d71e1ca67

                                    SHA512

                                    4081226db161da1c4881dae563ffe5deaf3e6f9eaca27f8f636e2140c73c0db6d6a470e00edd295555389f9ce2b23a4941f906792a808c2e143054e32bd5321b

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    d85ba6ff808d9e5444a4b369f5bc2730

                                    SHA1

                                    31aa9d96590fff6981b315e0b391b575e4c0804a

                                    SHA256

                                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                    SHA512

                                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    6d42b6da621e8df5674e26b799c8e2aa

                                    SHA1

                                    ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                    SHA256

                                    5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                    SHA512

                                    53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    0aa63dbb46d451e47a7a682c64af776d

                                    SHA1

                                    3b0026f2dae8e9c491ccaa40133755779de35aaa

                                    SHA256

                                    9158038718d41172c22a3c1a15852405e3e1c8e2c44fa066328eb1520e5d977b

                                    SHA512

                                    4d2564850c2ab1bc71089412f19147df4a1cd3075aa2039aa894271b333cd9c510b7ba4d70889f24d45d8b366d8b5167abdcf24314e4753420337c7d34e7c43f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    944B

                                    MD5

                                    60945d1a2e48da37d4ce8d9c56b6845a

                                    SHA1

                                    83e80a6acbeb44b68b0da00b139471f428a9d6c1

                                    SHA256

                                    314b91c00997034d6e015f40230d90ebbf57de5dc938b62c1a214d591793dbe3

                                    SHA512

                                    5d068f1d6443e26ae3cad1c80f969e50e5860967b314153c4d3b6efd1cfa39f0907c6427bec7fa43db079f258b6357e4e9a1b0b1a36b1481d2049ea0e67909ed

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i512vr4t.fo5.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Roaming\svchost.exe

                                    Filesize

                                    35KB

                                    MD5

                                    83bbe29b99a54bad48074efb72ce1fcc

                                    SHA1

                                    421deeba13130a8eebacc8c7f48f28e6fe8485f2

                                    SHA256

                                    99bf031f23b1759702a56ccfc9425f0a063654dcc4a94d8feeb89792c82f3082

                                    SHA512

                                    67fe2ac907c297cd3c4d1af7f80257b468bc4e73cab428568ea1238d41cd8c43262765a0b0d43b2accb003901a66e9e7ec162fefda2fd89040697e1e168ac27f

                                  • \??\pipe\crashpad_3540_OIDPMRUQGUNVAUPC

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/2096-55-0x00007FFFA3D00000-0x00007FFFA47C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2096-0-0x00007FFFA3D03000-0x00007FFFA3D05000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/2096-54-0x00007FFFA3D03000-0x00007FFFA3D05000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/2096-53-0x00007FFFA3D00000-0x00007FFFA47C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2096-254-0x00007FFFA3D00000-0x00007FFFA47C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2096-1-0x0000000000B10000-0x0000000000B20000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4252-17-0x00007FFFA3D00000-0x00007FFFA47C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4252-14-0x00007FFFA3D00000-0x00007FFFA47C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4252-13-0x00007FFFA3D00000-0x00007FFFA47C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4252-12-0x00007FFFA3D00000-0x00007FFFA47C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4252-7-0x000001907DAE0000-0x000001907DB02000-memory.dmp

                                    Filesize

                                    136KB