Analysis

  • max time kernel
    168s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 14:42

General

  • Target

    works (i thimk).exe

  • Size

    46KB

  • MD5

    63b36e568577473bb71a7b54f56e8ec2

  • SHA1

    7a36dc6d73687d3e8df8b02abeeaf52b7075e33d

  • SHA256

    0a4869f2b7d46eda43c07a1986f8cccecc36b42bf5587b146f6f6a5f119b2bb5

  • SHA512

    9c41f09037d56b7143596526a26d0a0fd5d45f0d2b1e31e56950a35ef494b60eaf0941cb0e0e485228216aba2fe0accf295988fcc20d664fe9b1bbb20e223305

  • SSDEEP

    768:jdhO/poiiUcjlJInljsZ8H9Xqk5nWEZ5SbTDaBuI7CPW57:xw+jjgn1sZ8H9XqcnW85SbTkuID

Malware Config

Extracted

Family

xenorat

C2

communication-sig.gl.at.ply.gg

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    3038

  • startup_name

    Java Updater

Signatures

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\works (i thimk).exe
    "C:\Users\Admin\AppData\Local\Temp\works (i thimk).exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\XenoManager\works (i thimk).exe
      "C:\Users\Admin\AppData\Local\Temp\XenoManager\works (i thimk).exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /Create /TN "Java Updater" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC832.tmp" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:552
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffaccd146f8,0x7ffaccd14708,0x7ffaccd14718
      2⤵
        PID:3956
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
        2⤵
          PID:508
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:888
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:8
          2⤵
            PID:2640
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1
            2⤵
              PID:3976
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:1
              2⤵
                PID:2456
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:1
                2⤵
                  PID:2212
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                  2⤵
                    PID:1452
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 /prefetch:8
                    2⤵
                      PID:5156
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5316
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:1
                      2⤵
                        PID:6076
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2784 /prefetch:1
                        2⤵
                          PID:6088
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1321040208460357912,5464587523863092120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:1
                          2⤵
                            PID:3740
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:432
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2384
                            • C:\Windows\system32\taskmgr.exe
                              "C:\Windows\system32\taskmgr.exe" /7
                              1⤵
                              • Checks SCSI registry key(s)
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:5436
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:5848
                              • C:\Windows\system32\taskmgr.exe
                                "C:\Windows\system32\taskmgr.exe" /7
                                1⤵
                                • Checks SCSI registry key(s)
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5856

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                Filesize

                                64KB

                                MD5

                                d2fb266b97caff2086bf0fa74eddb6b2

                                SHA1

                                2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

                                SHA256

                                b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

                                SHA512

                                c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

                              • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                Filesize

                                4B

                                MD5

                                f49655f856acb8884cc0ace29216f511

                                SHA1

                                cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                SHA256

                                7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                SHA512

                                599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                              • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                Filesize

                                944B

                                MD5

                                6bd369f7c74a28194c991ed1404da30f

                                SHA1

                                0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

                                SHA256

                                878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

                                SHA512

                                8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\works (i thimk).exe.log

                                Filesize

                                226B

                                MD5

                                916851e072fbabc4796d8916c5131092

                                SHA1

                                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                                SHA256

                                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                                SHA512

                                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                38f59a47b777f2fc52088e96ffb2baaf

                                SHA1

                                267224482588b41a96d813f6d9e9d924867062db

                                SHA256

                                13569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b

                                SHA512

                                4657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                e82054b231466cb6707f2694a6f67999

                                SHA1

                                467af156914db40fd02e85d6f77ba1c5ef64a78b

                                SHA256

                                437cca5a37f26c7e1d47e9940ecd8c74c44022d1b5f6fa8d2645ad89068996b0

                                SHA512

                                ec1ec74e61eacd084d29fdf79f303bbc3fb98d0d03b74fb516f8bd9a9cc9282042d8747fbf0f06c29e4de342b7879535df6c08c5644ce036c957ce70bf9c355f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                421ffcf6ee2851e65295e633b7127690

                                SHA1

                                bb6d244b93a658ae74ada55fb42caf60582a3943

                                SHA256

                                af06bbc15c5dc1e09765bd0c48d7066e97b1a8ed482fbb8101f03a0b8c7bfb0d

                                SHA512

                                4f588b1078173a5e285a0a1766a250cd4746dc9c8e99669b631f24e3dc8b70ffc9a0f61492bf21830d6170ce24f28b4e798cff30ae4c04fc067031dc24877583

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                12KB

                                MD5

                                432770cf32c4d2d2fc3c5df8793ac288

                                SHA1

                                16509b7672f629883b865f2f1f28a3d6a5653180

                                SHA256

                                4820807a1a297bfc2a3fa4a0d7fc4de6739310e797f4b16ab9d718a84848d22e

                                SHA512

                                f376f081843bec2f6181898ebceb584fee549970438e312727dd4f1326facb4881e1cc8b07ea6cac451cc6c6c66b02db041eb2a73134c88bcf9ba54eda46f025

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                6328cc6278f0f98590ba29dd104f656f

                                SHA1

                                fe2ccb2630c2d3a9763341c9a4c5ac3bce01e302

                                SHA256

                                dc4eaadabef8dd21eca44e9e78142b422abc89296e3afef5e7cf0a8c44042739

                                SHA512

                                8cfbcea989b537720171b31268001bf562470ada3ea868636a2a926c38098e9c75fd618f44ab543989aed904c90281fcd8d32a5a44afa3b67efacaa933d1c6dd

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                6effba77283c1f3fa3ac1a93c71d32ef

                                SHA1

                                c57151cf3ee725b50a60d306631083890c573a43

                                SHA256

                                3a1cc659d9c2ea2f1229ec743339cbd5a8d21fc4277b9f98556ae413c56004cb

                                SHA512

                                29f3d3dbdd3f500203f00999e27edb766d7e12033c3b0ae7a9f032e73dd7bcc7a4ea2933a420c224d5432dfee37204afb91a2a213481c9f538ff172329ce5bca

                              • C:\Users\Admin\AppData\Local\Temp\XenoManager\works (i thimk).exe

                                Filesize

                                46KB

                                MD5

                                63b36e568577473bb71a7b54f56e8ec2

                                SHA1

                                7a36dc6d73687d3e8df8b02abeeaf52b7075e33d

                                SHA256

                                0a4869f2b7d46eda43c07a1986f8cccecc36b42bf5587b146f6f6a5f119b2bb5

                                SHA512

                                9c41f09037d56b7143596526a26d0a0fd5d45f0d2b1e31e56950a35ef494b60eaf0941cb0e0e485228216aba2fe0accf295988fcc20d664fe9b1bbb20e223305

                              • C:\Users\Admin\AppData\Local\Temp\tmpC832.tmp

                                Filesize

                                1KB

                                MD5

                                29eb753358d125c7c390bbc045159183

                                SHA1

                                e4d75fddaed27d5f9c6cebb61b9a894c86537172

                                SHA256

                                177305de144cf978284546c92b54d160292c5eadc50d1a60e6e5d4d335558129

                                SHA512

                                f81ceaf387b4ba65cbfec795231422a6df11bc7f4a9566c68a3f5c4407283adfe1e5d3f27259f84a101460fdcd4369fe7089b88d36b2651ad5656bb4aba39820

                              • memory/2112-22-0x00000000055F0000-0x00000000055FA000-memory.dmp

                                Filesize

                                40KB

                              • memory/2112-21-0x00000000055B0000-0x00000000055C2000-memory.dmp

                                Filesize

                                72KB

                              • memory/2112-20-0x00000000743D0000-0x0000000074B80000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/2112-19-0x00000000743D0000-0x0000000074B80000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/2112-18-0x0000000005600000-0x0000000005666000-memory.dmp

                                Filesize

                                408KB

                              • memory/2112-15-0x00000000743D0000-0x0000000074B80000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/3744-0-0x00000000743DE000-0x00000000743DF000-memory.dmp

                                Filesize

                                4KB

                              • memory/3744-1-0x0000000000150000-0x0000000000162000-memory.dmp

                                Filesize

                                72KB

                              • memory/5436-71-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-66-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-69-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-70-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-72-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-67-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-60-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-61-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-62-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5436-68-0x000001CB6C660000-0x000001CB6C661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-136-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-137-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-147-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-146-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-145-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-144-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-143-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-142-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB

                              • memory/5856-135-0x00000217DFF40000-0x00000217DFF41000-memory.dmp

                                Filesize

                                4KB