Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2023 04:14

General

  • Target

    64944a1f7d846006e04b6101d40a28b4.exe

  • Size

    1.2MB

  • MD5

    64944a1f7d846006e04b6101d40a28b4

  • SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

  • SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

  • SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • SSDEEP

    24576:yV4G6JWrIWNuFYRF4Bs2kpvjpqzeRVXJIcXStT:y4WrIWMietCvjtRVJCJ

Malware Config

Signatures

  • Detect PureLogs payload 11 IoCs
  • Detect ZGRat V1 34 IoCs
  • PureLogs

    PureLogs is an infostealer written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64944a1f7d846006e04b6101d40a28b4.exe
    "C:\Users\Admin\AppData\Local\Temp\64944a1f7d846006e04b6101d40a28b4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\64944a1f7d846006e04b6101d40a28b4.exe
      C:\Users\Admin\AppData\Local\Temp\64944a1f7d846006e04b6101d40a28b4.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:508
  • C:\Users\Admin\AppData\Local\Exception\bzivzkp\Default.exe
    C:\Users\Admin\AppData\Local\Exception\bzivzkp\Default.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Exception\bzivzkp\Default.exe
      C:\Users\Admin\AppData\Local\Exception\bzivzkp\Default.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4128
  • C:\Users\Admin\AppData\Local\Temp\lxeoe.exe
    C:\Users\Admin\AppData\Local\Temp\lxeoe.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Users\Admin\AppData\Local\Temp\lxeoe.exe
      C:\Users\Admin\AppData\Local\Temp\lxeoe.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3976
  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
    C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
      C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3300
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2248
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 41ro9pm28wkFbbFCnmC78AfqpdFTw3fE56kajDNhw3naU9nXJQiqSvi7Vv71yAxLG3hXtP5Jne8utHn1oHsPXo1MQBhA5D6.miners -p x --algo rx/0 --cpu-max-threads-hint=50
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:4912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Exception\bzivzkp\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Exception\bzivzkp\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Exception\bzivzkp\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\64944a1f7d846006e04b6101d40a28b4.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Default.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MSBuild.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\lxeoe.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Temp\lxeoe.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Local\Temp\lxeoe.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Local\Temp\lxeoe.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • memory/508-22-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-70-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-24-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-26-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-28-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-30-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-32-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-34-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-36-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-38-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-40-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-42-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-44-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-46-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-48-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-50-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-52-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-54-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-56-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-58-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-62-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-60-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-64-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-66-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-68-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-20-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-72-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-76-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-74-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-2197-0x00000201CFE20000-0x00000201CFE28000-memory.dmp

    Filesize

    32KB

  • memory/508-2198-0x00000201E8600000-0x00000201E8656000-memory.dmp

    Filesize

    344KB

  • memory/508-2199-0x00000201E8BB0000-0x00000201E8C04000-memory.dmp

    Filesize

    336KB

  • memory/508-2201-0x00007FFA685A0000-0x00007FFA69061000-memory.dmp

    Filesize

    10.8MB

  • memory/508-18-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-16-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-8-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/508-11-0x00000201E8680000-0x00000201E8764000-memory.dmp

    Filesize

    912KB

  • memory/508-15-0x00000201E8680000-0x00000201E8760000-memory.dmp

    Filesize

    896KB

  • memory/508-14-0x00000201E8670000-0x00000201E8680000-memory.dmp

    Filesize

    64KB

  • memory/508-12-0x00007FFA685A0000-0x00007FFA69061000-memory.dmp

    Filesize

    10.8MB

  • memory/1068-4-0x000001BDAB990000-0x000001BDABA70000-memory.dmp

    Filesize

    896KB

  • memory/1068-2-0x000001BDAB7E0000-0x000001BDAB8C2000-memory.dmp

    Filesize

    904KB

  • memory/1068-3-0x000001BDAB980000-0x000001BDAB990000-memory.dmp

    Filesize

    64KB

  • memory/1068-1-0x00007FFA685A0000-0x00007FFA69061000-memory.dmp

    Filesize

    10.8MB

  • memory/1068-0-0x000001BD911F0000-0x000001BD91328000-memory.dmp

    Filesize

    1.2MB

  • memory/1068-5-0x000001BDABA70000-0x000001BDABB38000-memory.dmp

    Filesize

    800KB

  • memory/1068-6-0x000001BDABC40000-0x000001BDABD08000-memory.dmp

    Filesize

    800KB

  • memory/1068-13-0x00007FFA685A0000-0x00007FFA69061000-memory.dmp

    Filesize

    10.8MB

  • memory/1068-7-0x000001BD917C0000-0x000001BD9180C000-memory.dmp

    Filesize

    304KB

  • memory/1656-4397-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1656-4400-0x00000230EB720000-0x00000230EB730000-memory.dmp

    Filesize

    64KB

  • memory/1656-4403-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1804-2210-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1804-4399-0x00000209E6260000-0x00000209E6270000-memory.dmp

    Filesize

    64KB

  • memory/1804-2211-0x00000209E6260000-0x00000209E6270000-memory.dmp

    Filesize

    64KB

  • memory/1804-4396-0x00000209E6260000-0x00000209E6270000-memory.dmp

    Filesize

    64KB

  • memory/1804-4398-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2040-2205-0x0000024F9FA10000-0x0000024F9FA20000-memory.dmp

    Filesize

    64KB

  • memory/2040-2212-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2040-2204-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2248-6650-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2248-6638-0x00000128C2D40000-0x00000128C2D50000-memory.dmp

    Filesize

    64KB

  • memory/2248-6637-0x00000128C2D40000-0x00000128C2D50000-memory.dmp

    Filesize

    64KB

  • memory/2248-6636-0x00000128C2D40000-0x00000128C2D50000-memory.dmp

    Filesize

    64KB

  • memory/2248-6634-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2524-6632-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2524-6627-0x000001D9A7400000-0x000001D9A7410000-memory.dmp

    Filesize

    64KB

  • memory/2524-6626-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3300-6635-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3300-6631-0x000001AC95000000-0x000001AC95010000-memory.dmp

    Filesize

    64KB

  • memory/3300-6630-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3528-6628-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3528-6621-0x000001FE7ADE0000-0x000001FE7ADF0000-memory.dmp

    Filesize

    64KB

  • memory/3528-6620-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3976-6609-0x0000017CDEEF0000-0x0000017CDEFF0000-memory.dmp

    Filesize

    1024KB

  • memory/3976-6616-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3976-6613-0x0000017CDF160000-0x0000017CDF1B6000-memory.dmp

    Filesize

    344KB

  • memory/3976-6612-0x0000017CC4E70000-0x0000017CC4E78000-memory.dmp

    Filesize

    32KB

  • memory/3976-6611-0x0000017CDF010000-0x0000017CDF020000-memory.dmp

    Filesize

    64KB

  • memory/3976-6610-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3976-6608-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/4128-6617-0x000001DF5D060000-0x000001DF5D070000-memory.dmp

    Filesize

    64KB

  • memory/4128-4405-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4128-4406-0x000001DF5D060000-0x000001DF5D070000-memory.dmp

    Filesize

    64KB

  • memory/4128-6600-0x000001DF5D060000-0x000001DF5D070000-memory.dmp

    Filesize

    64KB

  • memory/4128-6599-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4128-6591-0x000001DF5D060000-0x000001DF5D070000-memory.dmp

    Filesize

    64KB

  • memory/4912-6649-0x0000020BC81D0000-0x0000020BC81F0000-memory.dmp

    Filesize

    128KB

  • memory/4912-6643-0x0000000140000000-0x00000001407CF000-memory.dmp

    Filesize

    7.8MB

  • memory/5116-6598-0x000002B5FFF30000-0x000002B600000000-memory.dmp

    Filesize

    832KB

  • memory/5116-6596-0x000002B580340000-0x000002B580428000-memory.dmp

    Filesize

    928KB

  • memory/5116-6595-0x000002B5FFE40000-0x000002B5FFF2A000-memory.dmp

    Filesize

    936KB

  • memory/5116-6594-0x000002B5E5AE0000-0x000002B5E5C20000-memory.dmp

    Filesize

    1.2MB

  • memory/5116-6597-0x000002B5FFD60000-0x000002B5FFE30000-memory.dmp

    Filesize

    832KB

  • memory/5116-6601-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB

  • memory/5116-6602-0x000002B5FFE30000-0x000002B5FFE40000-memory.dmp

    Filesize

    64KB

  • memory/5116-6606-0x00007FFA68920000-0x00007FFA693E1000-memory.dmp

    Filesize

    10.8MB