Analysis

  • max time kernel
    83s
  • max time network
    84s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-de
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-delocale:de-deos:windows10-ltsc 2021-x64systemwindows
  • submitted
    09/03/2025, 13:36

General

  • Target

    Release/Xeno.exe

  • Size

    250.0MB

  • MD5

    7c55d5d57b1ebe0b18ecee8e1ae04a7e

  • SHA1

    73b6d784f75948492509a6c5c035ba1db4e019ad

  • SHA256

    e3468f7e04145fe3ac32c1ee74772cb5132a1d9a022f6a232530bbedc688b1b9

  • SHA512

    28e074bf3ac9bb4407d80ac9f1bc00ad1a3f90b5d6e8ac932e0f148959afbddce9cef804c9a679ef407babe315ce97ac68c66379347bab7b89ce6a058b5a6c0e

  • SSDEEP

    24576:kXOI1c6VPKAGgUSuTQNrNdiUhVZqYeLfGZS0ugeigtn6RSDL2sdPvn6Mda:GP7PKguTkjiSqLfGZS0pJiL2IJA

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3180
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2728
    • C:\Users\Admin\AppData\Local\Temp\Release\Xeno.exe
      "C:\Users\Admin\AppData\Local\Temp\Release\Xeno.exe"
      1⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4320
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c expand Equation.jar Equation.jar.bat & Equation.jar.bat
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3556
        • C:\Windows\SysWOW64\expand.exe
          expand Equation.jar Equation.jar.bat
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2092
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4036
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1676
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2384
        • C:\Windows\SysWOW64\findstr.exe
          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:804
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 44687
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2540
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Racing.jar
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1136
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "language" Communication
          3⤵
          • System Location Discovery: System Language Discovery
          PID:240
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 44687\Hydraulic.com + Hq + Linking + Here + Mpg + Canada + Dinner + Arthritis + Overnight + Sculpture + Skating 44687\Hydraulic.com
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4548
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Theaters.jar + ..\Approved.jar + ..\Scope.jar + ..\Added.jar + ..\Banks.jar + ..\Savings.jar + ..\Saddam.jar + ..\Everywhere.jar + ..\Roberts.jar + ..\Clients.jar + ..\Transcription.jar + ..\Modem.jar X
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2584
        • C:\Users\Admin\AppData\Local\Temp\44687\Hydraulic.com
          Hydraulic.com X
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4064
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 928
            4⤵
            • Program crash
            PID:1904
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2280
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1952
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4064 -ip 4064
      1⤵
        PID:2644

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\44687\Hydraulic.com

        Filesize

        925KB

        MD5

        62d09f076e6e0240548c2f837536a46a

        SHA1

        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

        SHA256

        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

        SHA512

        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

      • C:\Users\Admin\AppData\Local\Temp\44687\X

        Filesize

        789KB

        MD5

        9162838e9c004c8efcec95e97ea8ddbd

        SHA1

        d9d84d30faf1c867d5b5bd8a8535a6e74b87fd8a

        SHA256

        9a485ba0f31f0088295a3aabde71294ce72809dbce0300f0d0f48b06bb05f26e

        SHA512

        7b18430affdc2f36d6e496a26d3bbfbfdf81c2e0f823f1e767c32af86a862990d70966d242e9cd4021ad54563bc9008d2f98023a98d6075bbfab6109b2eb0562

      • C:\Users\Admin\AppData\Local\Temp\Added.jar

        Filesize

        59KB

        MD5

        435f231ac419ebe165869c1a7d7723e6

        SHA1

        d6d602ea79fcc4dd503ae6b4db2b787f4b9c81ab

        SHA256

        988fafe32032007c55ca53ca42ba71fbeeb9ca7989fe93de0a434e8df431d9e2

        SHA512

        b09672e40866d81a753fc6acade7303714143253432c43ce0d5bdab491e4bff2ff77a6026626bd1b5496295eb96e2000cedafd50ff7e73ac44e050c5c2c8df45

      • C:\Users\Admin\AppData\Local\Temp\Approved.jar

        Filesize

        63KB

        MD5

        652e93227113314913e3747128f92f99

        SHA1

        912e66707fdce809cd484a34f8be884da8701c24

        SHA256

        b04e883fd9fa60be649b4ab8bcd67cdf04e3bedb002bcab6b629e8f61034eee1

        SHA512

        f49a7982b931e5326706ca6d03a5a41d5d49db5dbf640c49fd7dd9b2386dde26a4841039d58c3801759877341362fe379a7af699edab947c902fc446db432c92

      • C:\Users\Admin\AppData\Local\Temp\Arthritis

        Filesize

        111KB

        MD5

        2c7ad84efd1ea6bd887eef06430a5613

        SHA1

        3e6a74a433fc4ab47549b78d3c9d6026acb53d78

        SHA256

        f1483744c07172e7fc1928e948f296c5a1e179663e1f9b970928519ef03b98b5

        SHA512

        7afb7a5b9648514a961e320aaa3203fed113d6fd530f2ec6771282df066a68271bd3cb9dcdfb85c9b89e992980705deb05e79bc8c2df9c128caba4a94a8b738e

      • C:\Users\Admin\AppData\Local\Temp\Banks.jar

        Filesize

        62KB

        MD5

        b6d84bb1930c6510f5ac843f22061ef3

        SHA1

        4d1b33dc4077971ea28bbe4ed19ce340ab659fa4

        SHA256

        cbf96dc0cfb925145dd699e27299251e458bd4e53a36959f652b6d4560513012

        SHA512

        c0848f7a561077c6e2b1b194fcba43dce74a273d53802e5c6c1ca26a407832fc6b98b61e833da84e2e7b68cab9aa4f64909759e343380784ee53a6ed8b36ba37

      • C:\Users\Admin\AppData\Local\Temp\Canada

        Filesize

        106KB

        MD5

        d43dee23039fd184cac21fb704b8a26d

        SHA1

        197056c90b0214a3107f68e2c565d514119b337a

        SHA256

        098986fb9ef8676cade45c6c12d53a16d5bab06c09ce5d444b19f2f2d632d7e1

        SHA512

        9ea03a95dc6b047848ddb16f52adff854f37f613d3c5775fe6ff7890c11816cc737c7c7e974e3299523e6e6eb024c8bd1e3cd07fc3f5f0a644c94cfd58619b60

      • C:\Users\Admin\AppData\Local\Temp\Clients.jar

        Filesize

        88KB

        MD5

        8024c8d6254d3b00ff618a9e5895a60c

        SHA1

        61e1f87baf09a156fd99d4e38311c4de2f853869

        SHA256

        6bce949132a9e095abe4b65abe166dd5dfb5f9e171c061e7c66a32db69e3ed15

        SHA512

        f6df2b1404b5de91d3f06e11143555ec8f5f8777bffe2f04fa9f05eff56e56f52b10d7d02ea137fc54df8c55723ee502889e48fe05764b6fbcc667c93e9e7c4d

      • C:\Users\Admin\AppData\Local\Temp\Communication

        Filesize

        2KB

        MD5

        62b300ec94c95e0bcc6c130ae0208d5c

        SHA1

        95047afed5d803fe50129bcf6262537de95c176e

        SHA256

        3dec0682b8fd302c776fd2e2240e7d3bd705c1a4dbe49a6cc42a3c1cc28bc9b6

        SHA512

        737104713fb60caa55872f3043de41cb3c2ee06270abe26981d19b62830f00bc2c296316da8392fa59665abe16b31d84bb807cab2622199c21f287f275106ba7

      • C:\Users\Admin\AppData\Local\Temp\Dinner

        Filesize

        75KB

        MD5

        8a55a968950a6c3c3f5a4f164f37019d

        SHA1

        19f4e21a62f85ea628a43ab41cbb060e2036d9b2

        SHA256

        fc6278986819370f76b2c0a3496872a1ef72713c88892edb2bebcb7d81811748

        SHA512

        c7921f1f1909c2d1aa622b1244cba064ac4267f92d6d28eca78acfff4af5b3be630197482259787eec778b1bcdffbd3551a20576a9c5c91cb7c07fe684b72281

      • C:\Users\Admin\AppData\Local\Temp\Everywhere.jar

        Filesize

        79KB

        MD5

        4aa652c0a7cfcb4579fe211f6feece59

        SHA1

        1770b09d0626083729eb698946f040d3109c9bdb

        SHA256

        b644d2ad34b87a39435ecf7ec569b081df5176ffd3346b39b1c4453cc7677ee1

        SHA512

        5d9008f8288f3aa8e3e29322ed27503e0be6a0ca46f9de13f7a4d6887889d144a26f25e51235cadb65f737d482b7321a2b9f87b9748f2f0c0b8a69708a56c77d

      • C:\Users\Admin\AppData\Local\Temp\Here

        Filesize

        110KB

        MD5

        5913d7c1427c0d7b1654fb869bce4ef2

        SHA1

        c2eb762a75f20bb031c845a3c696d2fd95cd429a

        SHA256

        e040c90f8a785d3b4892843146a4813f6fe1ae626f8de755953c5a3137273fd4

        SHA512

        e2601d6ecd347942f11ec799892c5cbfbd0d16f574f0b92c3fc96be025c656c4b6e91cfed5788d26ab842c4d71147dac60a4a22ac49ecf795dae9d07d3e53de3

      • C:\Users\Admin\AppData\Local\Temp\Hq

        Filesize

        62KB

        MD5

        694c62832ce6d237318b5fbfcab6fbb7

        SHA1

        a4cc25aa5616c555e27beb535eb2a4f4a1d8ea98

        SHA256

        13530d6de5459493faa9741ab3a55def1129ef60b8f281c05724ff8b6de9a8ba

        SHA512

        88b00c320bfa8e3bbb3f7c06843664fe6f3751fb9102777d5c73a8275e281dab9ce4eeac681697177ba402fea85dd7890a2093f73643779cca2943f2951732d7

      • C:\Users\Admin\AppData\Local\Temp\Linking

        Filesize

        138KB

        MD5

        06c817a7e6957bbda320e06e8efb4860

        SHA1

        9cbd4bd61c1392774c3755bdec5e686be6f463ba

        SHA256

        d6652bb348f2c80ccb0165a2f0c27eb7bb1d3a00eb1ac1c0c14169203f48d52d

        SHA512

        f863702b7eca00708a3d51acc8501600b61079b658639f395f870cfcd53c6efb3448f48795ede878f9dd51b1d4c28c4428de688494a678aecb4722ea96bc5a24

      • C:\Users\Admin\AppData\Local\Temp\Modem.jar

        Filesize

        25KB

        MD5

        46a5f2b2710ae339fd216f1982fd66bb

        SHA1

        f32f5790fa88aaf0f40e96ea9bd813e17a541ef8

        SHA256

        fdb18ceb5042ad9f278037d265d225d2f1163453427e601b47fec93900817add

        SHA512

        5386f38ab1de727271fb22b09f7ca168a3b6f2aaa2ce8b6e267f1379812dcf8548010cd835cbf4c0e8f39c6a14ead267c17aadf8b37cc458402cf1b6ccb1ce5c

      • C:\Users\Admin\AppData\Local\Temp\Mpg

        Filesize

        120KB

        MD5

        60e723d55503a5a8bc89cbe26c398e80

        SHA1

        23245af8e5f430c7b2f31089e2d8bc1b905fba6a

        SHA256

        7fff7a3c8aff86d836816df0956a4afca894132da949a75dc1d697bb6b4f2120

        SHA512

        7f6de734eb95c1fbec8c2b8f1c07eb1d964dcc5f7db8dfe84c89375886c6c0579af435ad75152318808c6d30a8c7d6623dfb06df73d53a736aa1ad727de66ec4

      • C:\Users\Admin\AppData\Local\Temp\Overnight

        Filesize

        50KB

        MD5

        c57ea496649cb328acce666d486e7c16

        SHA1

        74b4f4b3fad64c7c1704cb39aa8c79a3f3d7d899

        SHA256

        9a2434739bd0fd9b270088b5244a0696f7805aa87f0fb988a0be77d5507d3161

        SHA512

        cf7f4a3c253cef1fc04122b15b555073b84549b2928c223de225d886adf2912c8b1fea0bc1f7ab255f8fdcdabca153f2ff5d994417b8e7c69157ea594c8a68de

      • C:\Users\Admin\AppData\Local\Temp\Racing.jar

        Filesize

        477KB

        MD5

        83d7452f19dd1345419b62fce87fb66e

        SHA1

        7d7f878f7641e27ca39ac2a2c7462c2b2c15d783

        SHA256

        1988f54d8bbdcf8fc22b9b6b0b90b1b9ece3d705a718ffc7bb2305032bc4af2d

        SHA512

        f1d03dfbdf5f26c0d62059d509ba6ed50a0895849bf526abe374fe44118c3d3679e109ad965d884b5aa03eb858add2450276405cdda43504ec46a427e6b4585c

      • C:\Users\Admin\AppData\Local\Temp\Roberts.jar

        Filesize

        65KB

        MD5

        948e7e51bba99fe43c379faba0717987

        SHA1

        d188305625fa7cd1485eb2bf217f2c58a2079748

        SHA256

        eaaa5ffecd938b1e71fb2361b36269fbee51b830245ba32462706a1595c932e2

        SHA512

        6554f70976e70a1b917d72c14cf360b6fb6310e3c141bb0848c54aa1cfb0f56c6c6bd55b77b10c6be5c180efa1a75a468132e79e2b7d48cf9f5d0a3c48860996

      • C:\Users\Admin\AppData\Local\Temp\Saddam.jar

        Filesize

        93KB

        MD5

        2f9767a35871962ccf742498cc4015ae

        SHA1

        d3215aca6743e32eb365ca6a69843785093f1bb0

        SHA256

        f120f5d0761f5f476ebed023453e480ece7dca8580e08bdb59d7e0b8168e8528

        SHA512

        38621edcc459b5792e0ac74b2bd4d28636054a6ca3f1690ba1186735f699423f67a3e338c20f826729587deca3230033fdf9fc8b812f21831704c208b5cb6257

      • C:\Users\Admin\AppData\Local\Temp\Savings.jar

        Filesize

        89KB

        MD5

        514140fc94bd58a595dc577b743bcdd9

        SHA1

        c8f999625ffbdae47ba65482313012cbfabefb58

        SHA256

        c61372a3d6709d751374905a22e8a332de3483bc230d948bc09266fe0b293bda

        SHA512

        925decb256a654da249d3113bd22de0d3bdd00cb4a9bf278364b2b18a2f9ea0d0a4c86200b10c6052eb75969e84b5726a6d3fde4fec03b503c2ae7325fd58a2a

      • C:\Users\Admin\AppData\Local\Temp\Scope.jar

        Filesize

        52KB

        MD5

        2a53673cf53077bb795c12796c335573

        SHA1

        1f0be945165190f0fd34c839cc7e936f5e27313b

        SHA256

        0d0dede83ee3f9cf309155952576df0626c19d992f78c03b16052c6b087cc91d

        SHA512

        a7cfe41cd8fe263b7dd7f4f7904754335bd78d6dc09421186d2a74e3dcee89066f27eb8845a7bdd79fead0ab50ac8eb9a405c9b54436927291c53566ba69c1b1

      • C:\Users\Admin\AppData\Local\Temp\Sculpture

        Filesize

        108KB

        MD5

        dbb5705b41c2d7246902b5a745463d04

        SHA1

        5d090d68f248a6cc82303ecc1bb10a883c85e20d

        SHA256

        069bcfa5d7c7cdb2faeb0094a1dcc54c399bf39d9f350b17a0b0635711d5016c

        SHA512

        7f0d50582de42c5df3f6c3596be334e5161dabd3f3e34ed9f6fed753a1cbc1141c165b0cf262d4b040c781da78ec69f387d8100baf006e68142d765e624c6c90

      • C:\Users\Admin\AppData\Local\Temp\Skating

        Filesize

        42KB

        MD5

        447b624281aa371ef42f4ce5c7c93113

        SHA1

        8a5df4ee73eb4998ee1212f2842eeb33e03e683a

        SHA256

        d7f9f61f62a1be9fd19034132db796fa928ef0c54c687b79c810a7a2b6a1a311

        SHA512

        4d6d9d68f629c269635d537b42e86f5593e79715b3969f32645f2bee54c9e3622cbae31dae0430aaf4cf0b65db037598fb67cdff465b5feb102410f9d8e10ed3

      • C:\Users\Admin\AppData\Local\Temp\Theaters.jar

        Filesize

        51KB

        MD5

        d4d44b9f20a68f7ed04edeb193858980

        SHA1

        2d2620b4fc98b1fecd959b8598f495fdfb202e57

        SHA256

        8b80455a22f72aac9e347d69d8f9fa78235350d3b273cbd4ba4d733ff6527d06

        SHA512

        394f672f674f440b310c6cca6298432058f802915f9a26b379fae7af0782b2b3c5176cffb11f406804e2270cc71af24471e275270a2d4b0bdc6e8c82ebed77ba

      • C:\Users\Admin\AppData\Local\Temp\Transcription.jar

        Filesize

        63KB

        MD5

        b04e2748044a6d6f56d4b52669c25180

        SHA1

        679760b8032b5b37d2b1bcfdb43ee6694d7e827a

        SHA256

        f6edcb189803fa50ef843ae652cbc524f157263e829e1d2bf1a77e97d4aa3035

        SHA512

        74a41ad79996fae423954749d6adaecf930cfc93f8c730912715025b32a3804d60d6465d104ed141b7e9f076fa3937c890aa4add9b9eb135b46d53b6eb026b8f

      • C:\Users\Admin\AppData\Local\Temp\equation.jar

        Filesize

        31KB

        MD5

        5f9c573d5a9f8333d3b4373fa955636b

        SHA1

        d8effbe2911271587a94d594307ed712f0fa7e5c

        SHA256

        7c8b1ff5c97a0eb8abad07295de22f7245fcf3ec5eb25954f99b86d14beb638d

        SHA512

        29b99437eb6d2529bcc3c7ac3baf358479a46ede31d7f72d30574fb3ad6a1544f97bdf9a3e6af9a6e74587624c586a6561627c04c4da972d40ea4bd49d18b6a3

      • memory/1952-91-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-88-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-93-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-92-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-81-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-90-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-89-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-80-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-87-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/1952-79-0x0000016983670000-0x0000016983671000-memory.dmp

        Filesize

        4KB

      • memory/2728-112-0x0000000076480000-0x00000000766BA000-memory.dmp

        Filesize

        2.2MB

      • memory/2728-107-0x0000000000880000-0x000000000088A000-memory.dmp

        Filesize

        40KB

      • memory/2728-109-0x0000000001000000-0x0000000001400000-memory.dmp

        Filesize

        4.0MB

      • memory/2728-110-0x00007FF9E2B30000-0x00007FF9E2D28000-memory.dmp

        Filesize

        2.0MB

      • memory/4064-97-0x0000000005260000-0x00000000052DF000-memory.dmp

        Filesize

        508KB

      • memory/4064-101-0x0000000005260000-0x00000000052DF000-memory.dmp

        Filesize

        508KB

      • memory/4064-102-0x00000000052E0000-0x00000000056E0000-memory.dmp

        Filesize

        4.0MB

      • memory/4064-103-0x00000000052E0000-0x00000000056E0000-memory.dmp

        Filesize

        4.0MB

      • memory/4064-104-0x00007FF9E2B30000-0x00007FF9E2D28000-memory.dmp

        Filesize

        2.0MB

      • memory/4064-106-0x0000000076480000-0x00000000766BA000-memory.dmp

        Filesize

        2.2MB

      • memory/4064-100-0x0000000005260000-0x00000000052DF000-memory.dmp

        Filesize

        508KB

      • memory/4064-98-0x0000000005260000-0x00000000052DF000-memory.dmp

        Filesize

        508KB

      • memory/4064-99-0x0000000005260000-0x00000000052DF000-memory.dmp

        Filesize

        508KB

      • memory/4064-96-0x0000000005260000-0x00000000052DF000-memory.dmp

        Filesize

        508KB