Analysis

  • max time kernel
    300s
  • max time network
    252s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/01/2023, 04:48

General

  • Target

    a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe

  • Size

    56KB

  • MD5

    2e16b9fc1ce92309c4658bc5e78a5c63

  • SHA1

    ffee7171cefd8bcf8e27671078bf40ad41e41cbc

  • SHA256

    a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3

  • SHA512

    015a900c7f47d5c0e92bd3bc15b2aa5dcf7a8ec12900881582319c497a45d3ad1b3d33be2f221da2d501a86661f45e659c1ec5870db489e4e1d031ce5759c6de

  • SSDEEP

    768:9zOfVpyN0RyJ/Agv5W9HsHHkcigcNsxp2bgwiUaRs36fTT+UtY:8yNWUv5WBsHEc9VGbg3Dy3qThG

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe
    "C:\Users\Admin\AppData\Local\Temp\a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3328
      • C:\Windows\SysWOW64\chcp.com
        chcp 1251
        3⤵
          PID:4312
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4912
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4176
      • C:\ProgramData\Dllhost\dllhost.exe
        "C:\ProgramData\Dllhost\dllhost.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4432
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4424
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            4⤵
            • Creates scheduled task(s)
            PID:4036
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"
          3⤵
            PID:2736
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:444
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              4⤵
              • Creates scheduled task(s)
              PID:3424
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            3⤵
              PID:160
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2236
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                4⤵
                • Creates scheduled task(s)
                PID:4056
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              3⤵
                PID:188
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4364
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  4⤵
                  • Creates scheduled task(s)
                  PID:4264
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:612
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  4⤵
                  • Creates scheduled task(s)
                  PID:4236
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1615" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                3⤵
                  PID:916
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5253" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  3⤵
                    PID:1500
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk291" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                    3⤵
                      PID:1160
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6709" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                      3⤵
                        PID:932
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json
                        3⤵
                          PID:364
                          • C:\Windows\SysWOW64\chcp.com
                            chcp 1251
                            4⤵
                              PID:228
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json
                            3⤵
                              PID:5100
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 1251
                                4⤵
                                  PID:764
                                • C:\ProgramData\Dllhost\winlogson.exe
                                  C:\ProgramData\Dllhost\winlogson.exe -c config.json
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:4384

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\Dllhost\dllhost.exe

                            Filesize

                            60KB

                            MD5

                            8eac424b39ecd7724237708242536dce

                            SHA1

                            dbd058d840422fcaaf1d6897564e73be3641f7d3

                            SHA256

                            a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229

                            SHA512

                            1ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa

                          • C:\ProgramData\Dllhost\dllhost.exe

                            Filesize

                            60KB

                            MD5

                            8eac424b39ecd7724237708242536dce

                            SHA1

                            dbd058d840422fcaaf1d6897564e73be3641f7d3

                            SHA256

                            a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229

                            SHA512

                            1ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa

                          • C:\ProgramData\Dllhost\winlogson.exe

                            Filesize

                            7.8MB

                            MD5

                            6f4532e49d65c2be0355b222f96e06e8

                            SHA1

                            268e90ce25e01bbb205f6ae3f493f8da36a61480

                            SHA256

                            acaf8e844ef7f4f65033ebe9546c394cc21bce175dac8b59199106309f04e5ab

                            SHA512

                            85f495b0bbd0673df376f44e912f9a0a8d201c2843f1a9efa64d93703a2d8ba2b6fa2638a747e79604715d26ddfc07de26ba43d03adf86290d928b442bf09207

                          • C:\ProgramData\SystemFiles\config.json

                            Filesize

                            311B

                            MD5

                            a86dab3a83115be5f4ab7305f98d20d1

                            SHA1

                            205065359958ec8bf0bf9aef699d680fa477aac0

                            SHA256

                            9c05df57e16b54dda6dbd2bbc5362905d7d24bade2f447f23ec244adacfc8cfc

                            SHA512

                            78eb7f1db743472532b726e3bef831dd532c9f347ebb2b1f3a8333cd17972e75547e98b149ecee760c0bf384b941276a2151c0551a4351bebe26fcfa87dadb7d

                          • C:\ProgramData\SystemFiles\sys_rh.bin

                            Filesize

                            1KB

                            MD5

                            13096d8d61cc161abad17c0d01e85ba3

                            SHA1

                            f68befac7ee6d02916676726d6d9f63299fc29fa

                            SHA256

                            2cfafde33d1bc95655a9ab469f9313f437f6dc9a168a095cfe125770df79be49

                            SHA512

                            9649543ac40020a66f7a252fd66ae054a6c4e845c802c583ab0ff6dc2eb15280d719f5bda38442e6943f800365aab2fdb7d544113346346b9e3a6998e3ff5ab8

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            1c19c16e21c97ed42d5beabc93391fc5

                            SHA1

                            8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                            SHA256

                            1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                            SHA512

                            7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            18KB

                            MD5

                            499d6832576014b7822bec1c882f2901

                            SHA1

                            7a0bba128ee72838f5ae1c8158bdaec3740683e7

                            SHA256

                            22fcc5e5864613176c8f340e8aa63acf73e80fbef7b11976afabcfc26f7260d6

                            SHA512

                            b6087dc0d804d7bb90cf4ce4cb182d7c8bacacc37143751693a1e88002558bb230cc2256904f7b2a75d168cddf9e6acb60d8431bf788e02e54fb009ca3661362

                          • memory/1312-150-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-172-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-138-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-140-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-141-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-142-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-143-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-144-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-145-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-146-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-147-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-148-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-149-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-120-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-151-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-152-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-154-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-155-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-153-0x0000000000BE0000-0x0000000000BF4000-memory.dmp

                            Filesize

                            80KB

                          • memory/1312-156-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-158-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-157-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-160-0x0000000001550000-0x0000000001556000-memory.dmp

                            Filesize

                            24KB

                          • memory/1312-159-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-161-0x000000000AE70000-0x000000000B36E000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/1312-162-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-163-0x000000000A970000-0x000000000AA02000-memory.dmp

                            Filesize

                            584KB

                          • memory/1312-164-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-165-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-166-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-167-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-169-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-170-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-171-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-168-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-136-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-173-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-174-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-175-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-176-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-177-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-178-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-179-0x00000000055A0000-0x00000000055AA000-memory.dmp

                            Filesize

                            40KB

                          • memory/1312-180-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-181-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-182-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-183-0x000000000CC70000-0x000000000CCD6000-memory.dmp

                            Filesize

                            408KB

                          • memory/1312-184-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-186-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-185-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-187-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-188-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-189-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-121-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-122-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-123-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-124-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-125-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-126-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-128-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-127-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-137-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-129-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-130-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-135-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-131-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-133-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-132-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-139-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/1312-134-0x0000000077D10000-0x0000000077E9E000-memory.dmp

                            Filesize

                            1.6MB

                          • memory/4384-1182-0x000002284EA10000-0x000002284EA30000-memory.dmp

                            Filesize

                            128KB

                          • memory/4384-1181-0x000002284E9D0000-0x000002284EA10000-memory.dmp

                            Filesize

                            256KB

                          • memory/4384-1183-0x000002284EA10000-0x000002284EA30000-memory.dmp

                            Filesize

                            128KB

                          • memory/4432-697-0x0000000002740000-0x0000000002746000-memory.dmp

                            Filesize

                            24KB

                          • memory/4432-679-0x0000000000500000-0x0000000000516000-memory.dmp

                            Filesize

                            88KB

                          • memory/4912-267-0x0000000007410000-0x0000000007476000-memory.dmp

                            Filesize

                            408KB

                          • memory/4912-242-0x0000000006600000-0x0000000006636000-memory.dmp

                            Filesize

                            216KB

                          • memory/4912-271-0x0000000007510000-0x000000000752C000-memory.dmp

                            Filesize

                            112KB

                          • memory/4912-272-0x0000000007BB0000-0x0000000007BFB000-memory.dmp

                            Filesize

                            300KB

                          • memory/4912-276-0x0000000007E30000-0x0000000007EA6000-memory.dmp

                            Filesize

                            472KB

                          • memory/4912-265-0x0000000006CE0000-0x0000000006D02000-memory.dmp

                            Filesize

                            136KB

                          • memory/4912-247-0x0000000006D70000-0x0000000007398000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/4912-268-0x00000000076D0000-0x0000000007A20000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4912-535-0x0000000006920000-0x0000000006928000-memory.dmp

                            Filesize

                            32KB

                          • memory/4912-313-0x0000000008C50000-0x0000000008C83000-memory.dmp

                            Filesize

                            204KB

                          • memory/4912-314-0x0000000008C30000-0x0000000008C4E000-memory.dmp

                            Filesize

                            120KB

                          • memory/4912-323-0x0000000008CA0000-0x0000000008D45000-memory.dmp

                            Filesize

                            660KB

                          • memory/4912-327-0x00000000091B0000-0x0000000009244000-memory.dmp

                            Filesize

                            592KB

                          • memory/4912-530-0x0000000009110000-0x000000000912A000-memory.dmp

                            Filesize

                            104KB