Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18-09-2024 21:43

General

  • Target

    Downlaoder_Menu.exe

  • Size

    4.5MB

  • MD5

    ec79983fdb605310fac832ba5809e2d6

  • SHA1

    ca83d6453563e02decf614d0ce331de493267d2f

  • SHA256

    b67d8fc52334fb2309368bf2a738520f1b42436951b211b7896f612b86350c10

  • SHA512

    234bb8696c8a6929784165366dc4317d5826738711a7661bf26e4ffab8e958db23d0f2a11542b3f0b5c4c71d62d3e4bc7a730d94d917a21d132d40e2a67ed460

  • SSDEEP

    98304:ePj50PrsilC2IbhblAh5+dWspirADIsYAVjw1gI:i5gahZWs80sfsw1R

Malware Config

Extracted

Family

xenorat

C2

hax.onthewifi.com

Mutex

hAxxx

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1960

  • startup_name

    Windows

Signatures

  • Detect XenoRat Payload 2 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 4 TTPs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Power Settings 1 TTPs 4 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Downlaoder_Menu.exe
    "C:\Users\Admin\AppData\Local\Temp\Downlaoder_Menu.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZgBiACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAGgAcwBjACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcAVwBpAG4AZABvAHcAcwAgAGkAbgBzAHQAYQBsAGwAYQB0AGkAbwBuACAAZQBuAGMAbwB1AG4AdABlAHIAZQBkACAAYQBuACAAdQBuAGUAeABwAGUAYwB0AGUAZAAgAGUAcgByAG8AcgAuACAAVgBlAHIAaQBmAHkAIAB0AGgAYQB0ACAAdABoAGUAIABpAG4AcwB0AGEAbABsAGEAdABpAG8AbgAgAHMAbwB1AHIAYwBlAHMAIABhAHIAZQAgAGEAYwBjAGUAcwBpAGIAbABlACwAIABhAG4AZAAgAHIAZQBzAHQAYQByAHQAIAB0AGgAZQAgAGkAbgBzAHQAYQBsAGwAYQB0AGkAbwBuAC4AJwAsACcAJwAsACcATwBLACcALAAnAEUAcgByAG8AcgAnACkAPAAjAHgAZABtACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:252
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHoAawByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAbABwACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAcABwACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAZgBnACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3860
    • C:\Windows\Downloader_Menu_2.1.exe
      "C:\Windows\Downloader_Menu_2.1.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Users\Admin\cvtres.exe
        C:\Users\Admin\cvtres.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:892
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\temp_.ps1"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops startup file
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
            5⤵
            • Drops file in Drivers directory
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3712
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2344
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1516
              • C:\Windows\system32\wusa.exe
                wusa /uninstall /kb:890830 /quiet /norestart
                7⤵
                  PID:4460
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop UsoSvc
                6⤵
                • Launches sc.exe
                PID:1408
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop WaaSMedicSvc
                6⤵
                • Launches sc.exe
                PID:2276
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop wuauserv
                6⤵
                • Launches sc.exe
                PID:3656
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop bits
                6⤵
                • Launches sc.exe
                PID:4768
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop dosvc
                6⤵
                • Launches sc.exe
                PID:4800
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:2024
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:3512
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:3968
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:2240
              • C:\Windows\explorer.exe
                explorer.exe
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4776
      • C:\Users\Admin\AppData\Roaming\risk.exe
        "C:\Users\Admin\AppData\Roaming\risk.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Roaming\XenoManager\risk.exe
          "C:\Users\Admin\AppData\Roaming\XenoManager\risk.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3452
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks.exe" /Create /TN "Windows" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8D8A.tmp" /F
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3344

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      9f873035e19a5e8ef5a11d57f8dab1b7

      SHA1

      9a9c985796d01d067c038ac252a74f2d9a3ffe27

      SHA256

      7e3e793a2d0e67cda741607dba4cc11acdeabe7c8a5c5c316e0389f32e9dce86

      SHA512

      539bad3bc7e2982d2034ccbd0b6a90d7edbc14fd1e1269039c17783f4f4d3c11a202d80c0e3d65d2dccf3499d3038924ecdef082c9776dedd423fa262ef3a4ca

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d0c46cad6c0778401e21910bd6b56b70

      SHA1

      7be418951ea96326aca445b8dfe449b2bfa0dca6

      SHA256

      9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

      SHA512

      057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      c99a3482a8a02266c151f4871d26f7b8

      SHA1

      3e29577df0aa39dd71435d64187d79889de752c6

      SHA256

      db0b13e6d8f9513168e629a19b647b71fc836028935e4423792698e98e6879a8

      SHA512

      fe29e5dc317da5c1efdbcef061119172b4108601db320c92a2132e0c83cfbaf604ccf9c390af82842b97f84d0bac934d80f052a84b3a7a93927b4b48152fde5a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      17KB

      MD5

      15f6bc2b9bd14bcde6353890dc590353

      SHA1

      068e7fa20f1a9dc3c2639f4773deb21e70c0264e

      SHA256

      90e28982243f11cb2126f1cde442384cea43382676f4d5fc3f3a671be5bf1092

      SHA512

      da274f7f06350d4e4dc80f10e43538e0c6800d8e1765fe960953b15bb33e2d98ba09e519f649f8961e4233ef12264ca61009782c205fe5667f4cf723ae26847c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q2of1usx.go2.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp8D8A.tmp

      Filesize

      1KB

      MD5

      c824a7486b8af655d347fd367022d0d2

      SHA1

      17bb7f077818e6d5ecb3be0fc681d341b82dd72b

      SHA256

      025ef7965c1b7643ff8d71a48c71d62ce4380e3ac6324ecf51f80717a4d61c14

      SHA512

      a026982ac700263bf2dfd5415365dbe52b0e59095adfd00c937af28f5c84978faf65aeb2cd2c7c9dc5c7b38dc82dc2acc2d7b91e96026e73a881483168586bc1

    • C:\Users\Admin\AppData\Roaming\risk.exe

      Filesize

      45KB

      MD5

      2cb05f0d4360327b33956fedf516c6fe

      SHA1

      4562653b1361ce66ded9633e5883d00184c08796

      SHA256

      af82f7a1ca358d54f5da73409d05360c265f7569fb768218051c7ef2620e66e6

      SHA512

      f0967245d1693d74d146356c9540a9ae0b848a96a6e58eacc111a951a6b32e01f325f8848b2b0c66b38dbfcdcb37e052ccfc27cf9b3b6752f3cba876181f6fa6

    • C:\Users\Admin\cvtres.exe

      Filesize

      5KB

      MD5

      c9698a20e68954387eed40d36d17c087

      SHA1

      c50cf0ac1cbf51a89b6c1b816e5e63e7e7287179

      SHA256

      3a71a978827979baeec7b94607e93a72cf2a51a7204a572f68a3788d83b87d8f

      SHA512

      f8099e4e6bf6e1cd850faa398b3ef8862852342bef0ec8a7318495be6e82ddf903834b951faa6c5bbd0879414dcaccf3fec6ade4ef74054e08011d718ed1e813

    • C:\Users\Admin\temp.bat

      Filesize

      5.4MB

      MD5

      96b7afe999094957a1ce5b1c0ee0cb2f

      SHA1

      6b5d48b5f75246993de0263d27d2b9cdcc6ebf3f

      SHA256

      d22cb88bfae5285d86cb35c2acba863f85b2e63c241c1959d15ca3416bcb5e4a

      SHA512

      ed7e02b26664b442f95fdf83af03d7773c017dadf3bec8c2d37cc2b30c49b6751a3104b85f00cfedbd145f422635e5b3ad49ea80adf7c0a92b06db474c6a238c

    • C:\Users\Admin\temp.ps1

      Filesize

      1KB

      MD5

      5e817bbd9ef2f8821aa0283b20a51923

      SHA1

      102ca518d89653fb400636e660fa3fc276235c5c

      SHA256

      27f2822ca2be992ebb6e1000aa3a2c39e9b4ff7e257cb45eadda8776d65018a7

      SHA512

      f21388e0655e6733abc70ff9fe2bbfdca00d81d2e7a09236d679293df34a966990f689f2d62119cdd877c7aeda35ab0c2b3c66108bc6b721e5dea34a93342d2e

    • C:\Users\Admin\temp_.bat

      Filesize

      5.4MB

      MD5

      ff46d6b0970c55dba491b6dd06384f84

      SHA1

      c8be08575f2174a9a00bff33e3b1a7c1d9c4a025

      SHA256

      a5ad5faab69350449e8fd14adcb262ecb289696d5f0da374891e9eb226824c85

      SHA512

      b0d5b4eb5d9b58f35f218dffb43956716adb062626a75fcde11ba517e9d16d015f8a0d90ae72fbad47c87cbec86ef3e6a16347900f0c0be97e47f6d58bdac3a6

    • C:\Users\Admin\temp_.ps1

      Filesize

      1KB

      MD5

      5a0a8376c0e45cc25d4050920cee3dcc

      SHA1

      2de4ddf90f3165b245bd9f77c145c8f770c98b85

      SHA256

      86af1b7845145745ccaf65bf0dbeb1a981701ad0c6793c2dc93c0c2f2aef8d25

      SHA512

      f5afd39336d6b9f0590d68a716e8c3b403c13b98aae34d76f43e34698d2c6485e3dbce7a6439623362effec50ab0b2696b1ed25e377ba4dae75047ef419f51c0

    • C:\Windows\Downloader_Menu_2.1.exe

      Filesize

      4.4MB

      MD5

      9d3195f106a540570da0d038bc07cf68

      SHA1

      33c1dd7a4101d1622b4d9268da0b731e00ddca39

      SHA256

      240b3b43f49f5430d9d2e263e857d6e4c9c98af09fe8ae7d9c0e6b7c9eeacfce

      SHA512

      9c7b0da3e2a01a05f61e39648d31851c5b0d70d7f20d865792cf4c8cec39ad764b2f11833116dbcdea57f3ec1785345921defbd656eab4fc23095b63ba889f69

    • memory/252-47-0x0000000005CC0000-0x0000000006017000-memory.dmp

      Filesize

      3.3MB

    • memory/252-27-0x0000000005390000-0x00000000053F6000-memory.dmp

      Filesize

      408KB

    • memory/252-26-0x00000000051F0000-0x0000000005212000-memory.dmp

      Filesize

      136KB

    • memory/252-28-0x0000000005470000-0x00000000054D6000-memory.dmp

      Filesize

      408KB

    • memory/252-63-0x00000000066C0000-0x00000000066DA000-memory.dmp

      Filesize

      104KB

    • memory/252-76-0x0000000008420000-0x00000000089C6000-memory.dmp

      Filesize

      5.6MB

    • memory/252-77-0x00000000075C0000-0x0000000007652000-memory.dmp

      Filesize

      584KB

    • memory/252-62-0x00000000077F0000-0x0000000007E6A000-memory.dmp

      Filesize

      6.5MB

    • memory/252-57-0x00000000061A0000-0x00000000061BE000-memory.dmp

      Filesize

      120KB

    • memory/252-58-0x00000000061E0000-0x000000000622C000-memory.dmp

      Filesize

      304KB

    • memory/892-90-0x0000020E77980000-0x0000020E77988000-memory.dmp

      Filesize

      32KB

    • memory/1628-105-0x000001F4F5150000-0x000001F4F5172000-memory.dmp

      Filesize

      136KB

    • memory/1628-114-0x000001F4DCB40000-0x000001F4DCB5E000-memory.dmp

      Filesize

      120KB

    • memory/1628-116-0x000001F4F5350000-0x000001F4F549F000-memory.dmp

      Filesize

      1.3MB

    • memory/1628-118-0x000001F490CF0000-0x000001F490CF6000-memory.dmp

      Filesize

      24KB

    • memory/1628-112-0x000001F490000000-0x000001F490530000-memory.dmp

      Filesize

      5.2MB

    • memory/1628-123-0x000001F4F5350000-0x000001F4F549F000-memory.dmp

      Filesize

      1.3MB

    • memory/1628-113-0x000001F4F5720000-0x000001F4F5796000-memory.dmp

      Filesize

      472KB

    • memory/2632-21-0x0000000000210000-0x0000000000222000-memory.dmp

      Filesize

      72KB

    • memory/3712-119-0x0000000140000000-0x0000000140508000-memory.dmp

      Filesize

      5.0MB

    • memory/3712-120-0x0000000140000000-0x0000000140508000-memory.dmp

      Filesize

      5.0MB

    • memory/3860-73-0x00000000078E0000-0x0000000007984000-memory.dmp

      Filesize

      656KB

    • memory/3860-84-0x0000000007D50000-0x0000000007D58000-memory.dmp

      Filesize

      32KB

    • memory/3860-83-0x0000000007D60000-0x0000000007D7A000-memory.dmp

      Filesize

      104KB

    • memory/3860-82-0x0000000007C70000-0x0000000007C85000-memory.dmp

      Filesize

      84KB

    • memory/3860-81-0x0000000007C60000-0x0000000007C6E000-memory.dmp

      Filesize

      56KB

    • memory/3860-80-0x0000000007C20000-0x0000000007C31000-memory.dmp

      Filesize

      68KB

    • memory/3860-79-0x0000000007CA0000-0x0000000007D36000-memory.dmp

      Filesize

      600KB

    • memory/3860-78-0x0000000007AA0000-0x0000000007AAA000-memory.dmp

      Filesize

      40KB

    • memory/3860-72-0x00000000076B0000-0x00000000076CE000-memory.dmp

      Filesize

      120KB

    • memory/3860-61-0x0000000074C90000-0x0000000074CDC000-memory.dmp

      Filesize

      304KB

    • memory/3860-60-0x0000000007650000-0x0000000007684000-memory.dmp

      Filesize

      208KB

    • memory/3860-25-0x00000000058D0000-0x0000000005EFA000-memory.dmp

      Filesize

      6.2MB

    • memory/3860-23-0x0000000005260000-0x0000000005296000-memory.dmp

      Filesize

      216KB

    • memory/4776-145-0x0000000000C20000-0x0000000000C40000-memory.dmp

      Filesize

      128KB

    • memory/4776-138-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-140-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-141-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-139-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-144-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-143-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-142-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-149-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-148-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-146-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-150-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-147-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-151-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-153-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-154-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB

    • memory/4776-155-0x0000000140000000-0x0000000140848000-memory.dmp

      Filesize

      8.3MB