Resubmissions

11-06-2024 12:46

240611-pzqqwsxcna 10

11-06-2024 12:38

240611-pt2afaxeqj 10

Analysis

  • max time kernel
    1s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 12:46

General

  • Target

    2024-06-11_673d8b4bc5c4ae22db5852a3b922a1f5_cobalt-strike_cobaltstrike.exe

  • Size

    5.9MB

  • MD5

    673d8b4bc5c4ae22db5852a3b922a1f5

  • SHA1

    867e4c7e622b0b5e243ee61e9f08e6c1a6d7d9f9

  • SHA256

    43066b7f544a52df663693f265e6881bc8f5cafd7a7bea69bbc173bac4b695df

  • SHA512

    08e3c65c427284c8b93f079b4370f3aa6983b6932d55c66b6e17767c8e6e7cc1bfd24a5453523fa10197a6070866d20abd8c322d0d0849fdaf61db8f76d41d25

  • SSDEEP

    98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUj:Q+856utgpPF8u/7j

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 45 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 9 IoCs
  • UPX packed file 41 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 9 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-11_673d8b4bc5c4ae22db5852a3b922a1f5_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-11_673d8b4bc5c4ae22db5852a3b922a1f5_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\System\mPVpEMm.exe
      C:\Windows\System\mPVpEMm.exe
      2⤵
      • Executes dropped EXE
      PID:2084
    • C:\Windows\System\kSxyeqC.exe
      C:\Windows\System\kSxyeqC.exe
      2⤵
      • Executes dropped EXE
      PID:2580
    • C:\Windows\System\XPwnHEX.exe
      C:\Windows\System\XPwnHEX.exe
      2⤵
      • Executes dropped EXE
      PID:2756
    • C:\Windows\System\VvnRmvp.exe
      C:\Windows\System\VvnRmvp.exe
      2⤵
      • Executes dropped EXE
      PID:2600
    • C:\Windows\System\dZYgrCf.exe
      C:\Windows\System\dZYgrCf.exe
      2⤵
      • Executes dropped EXE
      PID:2592
    • C:\Windows\System\KsJZKzU.exe
      C:\Windows\System\KsJZKzU.exe
      2⤵
      • Executes dropped EXE
      PID:2564
    • C:\Windows\System\ddVftjA.exe
      C:\Windows\System\ddVftjA.exe
      2⤵
      • Executes dropped EXE
      PID:2640
    • C:\Windows\System\faiMdMM.exe
      C:\Windows\System\faiMdMM.exe
      2⤵
      • Executes dropped EXE
      PID:2208
    • C:\Windows\System\VxvTIBn.exe
      C:\Windows\System\VxvTIBn.exe
      2⤵
      • Executes dropped EXE
      PID:2496
    • C:\Windows\System\dpyTbWW.exe
      C:\Windows\System\dpyTbWW.exe
      2⤵
        PID:2596
      • C:\Windows\System\xWnBNGX.exe
        C:\Windows\System\xWnBNGX.exe
        2⤵
          PID:2528
        • C:\Windows\System\dAduGsN.exe
          C:\Windows\System\dAduGsN.exe
          2⤵
            PID:2700
          • C:\Windows\System\fiNZxcD.exe
            C:\Windows\System\fiNZxcD.exe
            2⤵
              PID:2784
            • C:\Windows\System\gfsSJRG.exe
              C:\Windows\System\gfsSJRG.exe
              2⤵
                PID:2836
              • C:\Windows\System\THEskLN.exe
                C:\Windows\System\THEskLN.exe
                2⤵
                  PID:1556
                • C:\Windows\System\UsBjEpW.exe
                  C:\Windows\System\UsBjEpW.exe
                  2⤵
                    PID:824
                  • C:\Windows\System\lMmgjIT.exe
                    C:\Windows\System\lMmgjIT.exe
                    2⤵
                      PID:1888
                    • C:\Windows\System\qSUSWBZ.exe
                      C:\Windows\System\qSUSWBZ.exe
                      2⤵
                        PID:1892
                      • C:\Windows\System\CSarfgy.exe
                        C:\Windows\System\CSarfgy.exe
                        2⤵
                          PID:760
                        • C:\Windows\System\YHVzPOl.exe
                          C:\Windows\System\YHVzPOl.exe
                          2⤵
                            PID:1596
                          • C:\Windows\System\KDLGjax.exe
                            C:\Windows\System\KDLGjax.exe
                            2⤵
                              PID:1712

                          Network

                          MITRE ATT&CK Matrix

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\system\CSarfgy.exe
                            Filesize

                            3.6MB

                            MD5

                            b5d6c8b472f6137523570f20868f4041

                            SHA1

                            61a520c4e5802e3278d223745c0d5b53798489c3

                            SHA256

                            df7d971e23b4ededa31b1693094cae103f35c8a092bea9c558c1e9bba9ccc324

                            SHA512

                            310f2bca69858a022c70080fd06c881ff6459ee943f0afef48d3fc47591912fad27b5857e0c076a90ca0c03ab0f8ff278f0a7686305712014a6bb182fc4a4229

                          • C:\Windows\system\KDLGjax.exe
                            Filesize

                            3.4MB

                            MD5

                            4e77e5b0d3e1f7e95208469762b9de9f

                            SHA1

                            0a5a009be862764615777c1b707d36edbc11ff21

                            SHA256

                            f92c26d020b7221553156425eb37df2d0419664ed1b1dfec4bcc6dd4844b43e4

                            SHA512

                            dda02ecff4425b741e8db0fc2114ffa66fea763a1c1005abb22eb8a9df84cf46de8481047ea55594255e59f8002d15f025c5315e413a202ba4d0fe32fa539aee

                          • C:\Windows\system\THEskLN.exe
                            Filesize

                            4.0MB

                            MD5

                            f505e9632fbd4a5d58adc9e4173d1271

                            SHA1

                            1bde162a3fb4ccb17e2151f596876ce0481e68a3

                            SHA256

                            470c9e84848117759613eb687b446759f7d07a7f41d04dc436b012f7f509e2e6

                            SHA512

                            e198372dce29bd351d9034837bc88bf336ab45518f945c233b0df8303eb7db6dfe81aa40e79300136ac6bc7ee0344b1f19f04eb515a02bbb33d814e047faaccf

                          • C:\Windows\system\VvnRmvp.exe
                            Filesize

                            4.1MB

                            MD5

                            79cb800fff47a06afebef72028461c94

                            SHA1

                            ff75505398b632020d3756d39d393f7d0d663647

                            SHA256

                            2760b590a3c4c257a39f7b7571e6c124eaff33574997b2f854f74eb79aa5ddcd

                            SHA512

                            78f1927d2b050cb370b68ab097fb94c3e648811aa84b2fd62943b155b74ce09079cdacc50c8966802fcb433c83f629e8829ddc1d359fa6ac0fd803671d765d22

                          • C:\Windows\system\XPwnHEX.exe
                            Filesize

                            4.6MB

                            MD5

                            4f0cb466323d60e5a42b8bbca13af789

                            SHA1

                            0b0d1d7c3420f9b8951eedc6f694291aa6860683

                            SHA256

                            14e8c6e62596f8ac3b95156893bec3348d06084f939b1ae4b0666ae0bbad22c1

                            SHA512

                            fe9b813ed2de6a08ddd4b2fb045773ce294012803d0eb1907aa77feef2f33d34b6606370f174e33cd257b2911bac027bcc9256c0387c11941a9dede8f4cf2c8a

                          • C:\Windows\system\XPwnHEX.exe
                            Filesize

                            4.1MB

                            MD5

                            8761e24e350138657b894ef4abc022b3

                            SHA1

                            d8a472ab579a0a7730dc53b82141820743bf0add

                            SHA256

                            90ff928b10d3aa61f93e297a424adfd7de082491cedd004c49d1b3e6304001c5

                            SHA512

                            0940ca6e284cc88f597e67d24689c2bd27279e29ac57b92c9a970374616a16847704e9659f2d243a69fbad09babbd862f84224ad7c3530cc8135c95bd2c72628

                          • C:\Windows\system\YHVzPOl.exe
                            Filesize

                            3.8MB

                            MD5

                            1a0e1455de686b8158fbc1e4c92a2f9d

                            SHA1

                            29170fbafb064ea2f4235b38c121cb23ca398b78

                            SHA256

                            751d7a519550296e44f729642a25deee57e02effc38513cfbd1634914ad4844e

                            SHA512

                            0c3cf17afd7417c22e0ca6141bcc86ad947d316dec4ac51bbf0cfbf64b1e1e9ff9d8ef71b04c70e0dce9d50c4cfc20ef43f31d0c81e2d8a56a7eec0800995807

                          • C:\Windows\system\dAduGsN.exe
                            Filesize

                            3.9MB

                            MD5

                            c5f33c208b8352c92ff94fbc2b599111

                            SHA1

                            0842e8833ca026da14c777f19216ac8823767900

                            SHA256

                            6fd2df6d3131682515e5fc159d81918ada218168622149be278bff78e6839f6f

                            SHA512

                            62f9100bcb029dacf5e5850ff2c364497a0db747c663dacd840839ef6bb501ef0b8fddc8b075af9a33043a07665b866db4f1c551c78513d6efa407abe8c56db5

                          • C:\Windows\system\dZYgrCf.exe
                            Filesize

                            4.7MB

                            MD5

                            76bf0466328f407fb8356697751e9d17

                            SHA1

                            ab6d60cc0022bd9fcb09a7b133772948f1b44e71

                            SHA256

                            bc9432097e5cf86f7734fcdba0e6bde844e37f3c7c22e1538d1d567922da9884

                            SHA512

                            6cf2f8e6b124936088948bc61460f2c7dcf57e07e3b8a91ff6d8b8fbcfd1e6fcee7a878c2ad962cc9277cb4e28a8224410d0fb4788d1a0cedc18fa4f9e3db4a6

                          • C:\Windows\system\ddVftjA.exe
                            Filesize

                            4.4MB

                            MD5

                            da49f1b1f2b96b49705866203751f59f

                            SHA1

                            1fb490e694febd4abb5609eba7058906c7c62fc1

                            SHA256

                            db17ce16538e3104d76c2865f6043929089867615332842fb4539363fa1e158f

                            SHA512

                            64230d121060a4ecf7e8546c8f3f841eea180c2377add458625a54155c0dd3d899c021538950ea3047fd426aed50dfc97cdf1f7e2bcab143f2777fd079bf8bf0

                          • C:\Windows\system\faiMdMM.exe
                            Filesize

                            4.3MB

                            MD5

                            182702f8c189f2105671b3b193ea01bd

                            SHA1

                            5cbe4a492c7f661166b4ece7955c0ec73fadc31d

                            SHA256

                            a26e7690e7bc3ea344b69a7055744b04ab0a6a6f5efc215cd98698c2786c3f7f

                            SHA512

                            81af6029078315813c434ae562db848bfccfd0ce021093ded729c0431bbbdfab770bb5cf5e5e10bac76b9afc8886a0732e92ae0912c9dff147628a2530f045d1

                          • C:\Windows\system\fiNZxcD.exe
                            Filesize

                            3.6MB

                            MD5

                            0628374c349921c969043e8b725a574d

                            SHA1

                            d4d4b61d7abb11c25e423140f9a833a035819e3d

                            SHA256

                            6f83751bb7dc13a49d7ca6c6a874635ca4829b15e2d7e8a8c8ddaf2890ac09c0

                            SHA512

                            2db578fa7a962b14aae5c857e6974664cd647108bf44f83523c1fc47be8f0f23756b21e5f42a2231cc51d1daf9889177945ad8eab23827274ef49200ad4dd7a1

                          • C:\Windows\system\kSxyeqC.exe
                            Filesize

                            4.6MB

                            MD5

                            b59ae61a02cbd771b27fa4de50b0b851

                            SHA1

                            15e75d2dbd628941b8c45e2acca77033724b1d7a

                            SHA256

                            e9d1b939c2f5cb7e52df9b1745cbee643f356eea56de6ae754cae60555afaa12

                            SHA512

                            75d6a41c5e1c646ce1f43276f6eda377a3b0309beb8f2ea6b6b92ecf2f94f1fc3578016d169014d6f120ede144e3de5182b2c8205ec59aaf9cfb48fef74e91c7

                          • C:\Windows\system\lMmgjIT.exe
                            Filesize

                            3.1MB

                            MD5

                            3ee04f109da47a1ec064d84e674f1c93

                            SHA1

                            644e873cc5a86065097d9d560d0304443e10d64c

                            SHA256

                            47d2b26167d01487e92054b74706d3bb25cfa0aef4e9803e369f3581631dce9f

                            SHA512

                            9c1889d4f1db6f15c9ccdb0cc3595e9e8bef5c6661b045295c1ca732b72cf3d8471e82ed02a643342a0e821733243b7d4452a48031e235b596a8367158163fa4

                          • C:\Windows\system\mPVpEMm.exe
                            Filesize

                            4.3MB

                            MD5

                            63290320b012ea9bb27129f54c581920

                            SHA1

                            9341611f4683038c9546afef9d8154426472eca5

                            SHA256

                            2c3a2ca2de059ce6ca130c9f1710ac2b341d52e2d22a5bdfb7fd8181aa340f8d

                            SHA512

                            fad9d512f0395d6a63c972086c8bfe7a1ef67149eb3cfbdc123af9ec8f42720af72254e6085fb0582c894fa3881f4f7be441d266b95ba6999cb3dc3848d94a8a

                          • C:\Windows\system\xWnBNGX.exe
                            Filesize

                            3.9MB

                            MD5

                            c640e7276248ae97642c2a7bf34e461f

                            SHA1

                            c86ee302e90005334c41f03ad1020133e971ca75

                            SHA256

                            487238a42789387dd63d77ce6301803af0e8b6b4838fe5e37fd3c7a1c6c8df9d

                            SHA512

                            39a62ff93da5786eb18c588fe52f317b9ac0af058cf8492aac9a86def4ed525a2902436231143b3b479d9567d6f9126d4bcd27fcc18427c127150dafae026ec6

                          • \Windows\system\KDLGjax.exe
                            Filesize

                            3.3MB

                            MD5

                            f6ff13f5b74581b4d693140d7ed15d42

                            SHA1

                            b5f72d745d10b4b9c5938885364efade2590a6ab

                            SHA256

                            0632369166c9bc5c9b434ffd89ec9c9f265e35db5f9f6e8b7957c45b2c7683c7

                            SHA512

                            39ddedcd48f0afefef8b6d9f4c6350246031d6adffaa23199754b30948665cbedbf8af674f3d181d1c85403f8709c1fd9ff92429b133ea7e8be126dcdcc115dd

                          • \Windows\system\KsJZKzU.exe
                            Filesize

                            3.4MB

                            MD5

                            67d7d0c360c2defa9a36a47a23af7dd6

                            SHA1

                            efd9d2994e80ef40cbaab5f7ef02420aebe17206

                            SHA256

                            0521cd0d1d60fc081a5e4d3f28f5a76a962e60920d871e29a2de526b0e72b791

                            SHA512

                            f5338aedc9e177da3d3af04e6946e9f03280307d40c8e1e2e21b270727d9ec57427c8f7861835c62a83f44226e722c786902eaaa4187cfaefc3a81305ca12e2b

                          • \Windows\system\VvnRmvp.exe
                            Filesize

                            4.2MB

                            MD5

                            04d51d193560bd7cbe3c1aa4176588ed

                            SHA1

                            50c403f2cdd24613871102930823a4077a309a84

                            SHA256

                            d2f2e6f71c7392c54365bfeba96646f1b48bfc2b35cee99399fabe8555745a79

                            SHA512

                            16c84370d3456e4b479306cb1207e32853b3b3dacdc34ee2c06bac6f00e0ed99d27f6c49bc2894052479d03d45c8d3898044a71ee9425a44f4f5a31a42b6918a

                          • \Windows\system\XPwnHEX.exe
                            Filesize

                            4.5MB

                            MD5

                            8a8292e812bdde0355ced9f4650bcdf4

                            SHA1

                            2e8a60c14fac2a9421b8650758842113f994675b

                            SHA256

                            b6229523bd478efadedd62bb8def3190ebe0afe3abfeb1c62110c085d9a63200

                            SHA512

                            4eff10d85ba3299f93aebab6233eea9b8e8ff0e8c82485e2d245ceaf447c799ae79b340ebc97ee5307eab71f3def8a3fb7701dabfd3d4d85b4031774dd0c46af

                          • \Windows\system\YHVzPOl.exe
                            Filesize

                            3.7MB

                            MD5

                            df43099f8ecf7fc7231104cc7906f346

                            SHA1

                            3e71eb14c6e419a455fbd4a3234cbfb9f69fb428

                            SHA256

                            2fee27d95d784896594fd4c402904f15f7b6e8d0448726197f29a8303072c9e7

                            SHA512

                            0780e96102ed70b27cdcc7843ce59b45e8d687f99de38cd1f2d8f08d1be12d524f20b3d4f78294edd2ce2d1dc761badaaa437128842e8b787cbe7919b203b90d

                          • \Windows\system\dZYgrCf.exe
                            Filesize

                            4.2MB

                            MD5

                            77dba91fb3c2cde72cb349d9f90ca79c

                            SHA1

                            b84a9e63676a0ad38ca01ffd44702e7c9744ca69

                            SHA256

                            ed264866c0bae9fa9d4a16e9bcbd3d21ee672ee0eb5b22b64a5a0fa3926ac6d7

                            SHA512

                            7688eeb8dd7644b0c13094022c2cf5cb3e8225b2176f2a6c3aa2c5fffd3842d1f2840ab41b990e0e98d17fd029498949a429fd63ec10fb6afac0d993f6b2e67c

                          • \Windows\system\dpyTbWW.exe
                            Filesize

                            4.1MB

                            MD5

                            6fc1d2a6aa4e5fec1598640195150caa

                            SHA1

                            163971d08fea512c74e8dc6194438875b3a4e2dd

                            SHA256

                            c7702a558c524dcd71e1b49a725b4d00424bcfa78922fa47fa3df7ad8780489b

                            SHA512

                            32242bb3972b6c84fe04251d691d74728217a6789799a7b9b70417f9c92fed40204f2a0597f504eb1e15f95e5fdd6bfa9b9cbc89671f004164b2844ac1ca4ae4

                          • \Windows\system\kSxyeqC.exe
                            Filesize

                            4.8MB

                            MD5

                            bd55c8a37850d0626737d11717469d79

                            SHA1

                            53fb884c07b58454b3817a2512669857b9e86703

                            SHA256

                            0eb0ec4dbf191a3181b21c1417c5a32b7f793d882da7f301a8ece452991bb9af

                            SHA512

                            c1186a03a91b6f18a4443f429935f99a90a2866f36a83812558e86e5b67b26cc5da056c7727c190dd31a1adcb8fe79982985e6c2c66bfc39efa36d9c3a74a1e4

                          • \Windows\system\mPVpEMm.exe
                            Filesize

                            5.1MB

                            MD5

                            98ddbea8b700025cfea6cdb4aa3e43e8

                            SHA1

                            50ceb41fa98f8da019e896ed8b56fb815ade85c3

                            SHA256

                            f3d04b1b505bbd1edfc225f0ff843d2d6e124620e1863f1cebccc8fb38f1e763

                            SHA512

                            d10c79b9ffe04655d2ed28a606ef98f8550b5560c30acde63f1522d23a06ada25993e4c72d6366952d8876ac8ea72ef7e8996ba2e92abd973881f2d8a97c9a8a

                          • \Windows\system\qSUSWBZ.exe
                            Filesize

                            3.2MB

                            MD5

                            0c4fa25607b4370165ec346f1ab5cf33

                            SHA1

                            e793a93cf0e5f3e380ba686a46b04e292ac07498

                            SHA256

                            f680fd2e7e49c6829b698cc5e2e48b3f3ec8ee78dfde1c28c492f9f7a1d1aa8a

                            SHA512

                            57cf1299c34833ccdb24babcc7aeb948098cf922afcd315f5a5058d132d8d7c108e23a581403cea07290b7bffcfee0f7a4aa118bae4b90c90b7ccd5b4bd86e46

                          • memory/1944-21-0x000000013FEC0000-0x0000000140214000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-122-0x0000000002470000-0x00000000027C4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-129-0x000000013F0C0000-0x000000013F414000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-128-0x0000000002470000-0x00000000027C4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-127-0x000000013F2C0000-0x000000013F614000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-18-0x0000000002470000-0x00000000027C4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-23-0x0000000002470000-0x00000000027C4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-135-0x000000013F6B0000-0x000000013FA04000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-123-0x000000013FAE0000-0x000000013FE34000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-28-0x000000013FB90000-0x000000013FEE4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-121-0x0000000002470000-0x00000000027C4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-133-0x000000013F6B0000-0x000000013FA04000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-119-0x000000013F140000-0x000000013F494000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-32-0x0000000002470000-0x00000000027C4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-117-0x0000000002470000-0x00000000027C4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-1-0x00000000002F0000-0x0000000000300000-memory.dmp
                            Filesize

                            64KB

                          • memory/1944-115-0x0000000002470000-0x00000000027C4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-0-0x000000013F6B0000-0x000000013FA04000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1944-113-0x000000013FFA0000-0x00000001402F4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2084-19-0x000000013F820000-0x000000013FB74000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2208-114-0x000000013FFA0000-0x00000001402F4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2496-116-0x000000013F790000-0x000000013FAE4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2528-120-0x000000013F140000-0x000000013F494000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2564-70-0x000000013F740000-0x000000013FA94000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2580-20-0x000000013F5D0000-0x000000013F924000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2592-42-0x000000013F410000-0x000000013F764000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2596-118-0x000000013F780000-0x000000013FAD4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2600-30-0x000000013FB90000-0x000000013FEE4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2600-134-0x000000013FB90000-0x000000013FEE4000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2640-112-0x000000013F7D0000-0x000000013FB24000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2756-22-0x000000013FEC0000-0x0000000140214000-memory.dmp
                            Filesize

                            3.3MB