Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 02:11

General

  • Target

    2jkq6pqh4du44qj7.exe

  • Size

    48KB

  • MD5

    452bd74c6deedb5eefcfe3332424ba1b

  • SHA1

    3736c43df60f7a402622d07f8c47ad62f6fefb30

  • SHA256

    82cfe1298f8c4cf047fe1c737deb16b22e8e05d3de81d896f4b30b7923d9c53d

  • SHA512

    17e752284d5e6a9cd7e0c8f9163464b51e58ebb2aaf90d4736e4136a11962164c984be505f5fc0a66e8fa52b7a33dca1fe52060cf94d9cf0b24e6688a6a55d48

  • SSDEEP

    768:o+pbB1ZIDV83MhPvF7TBuJkTvObyCEwWPMHV9w3NGuDgtIrYi3xs:DB1ZIDV8uPGm7Obl3kMHV9cGusIr73xs

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2jkq6pqh4du44qj7.exe
    "C:\Users\Admin\AppData\Local\Temp\2jkq6pqh4du44qj7.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" netsh advfirewall firewall add rule name="?'$2E!CME$J}EH" dir=in action=allow program="C:\Windows\windows" enable=yes & exit
      2⤵
        PID:4792
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1064
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5036
    • C:\Windows\windows
      C:\Windows\windows
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2952
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4756
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:616
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1096
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4968
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1936
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1636
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3920
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4308
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4216
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4704
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3200
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1756
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:100
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4444
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4400
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2608
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4736
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1936
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
        2⤵
          PID:2028
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:532
        • C:\Windows\system32\cmd.exe
          "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
          2⤵
            PID:3700
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2280
          • C:\Windows\system32\cmd.exe
            "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
            2⤵
              PID:828
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2388
            • C:\Windows\system32\cmd.exe
              "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
              2⤵
                PID:664
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                  3⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:4044
              • C:\Windows\system32\cmd.exe
                "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                2⤵
                  PID:5008
                  • C:\Windows\system32\schtasks.exe
                    schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:1636
                • C:\Windows\system32\cmd.exe
                  "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                  2⤵
                    PID:2604
                    • C:\Windows\system32\schtasks.exe
                      schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                      3⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:2248
                  • C:\Windows\system32\cmd.exe
                    "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                    2⤵
                      PID:2508
                      • C:\Windows\system32\schtasks.exe
                        schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                        3⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:4388
                    • C:\Windows\system32\cmd.exe
                      "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                      2⤵
                        PID:1720
                        • C:\Windows\system32\schtasks.exe
                          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:4604
                      • C:\Windows\system32\cmd.exe
                        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                        2⤵
                          PID:2416
                          • C:\Windows\system32\schtasks.exe
                            schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:3588
                      • C:\Windows\windows
                        C:\Windows\windows
                        1⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2368
                        • C:\Windows\system32\cmd.exe
                          "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3048
                          • C:\Windows\system32\schtasks.exe
                            schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:4768
                      • C:\Windows\windows
                        C:\Windows\windows
                        1⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4940
                        • C:\Windows\system32\cmd.exe
                          "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                          2⤵
                            PID:4148
                            • C:\Windows\system32\schtasks.exe
                              schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                              3⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:2600
                        • C:\Windows\windows
                          C:\Windows\windows
                          1⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4816
                          • C:\Windows\system32\cmd.exe
                            "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1420
                            • C:\Windows\system32\schtasks.exe
                              schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                              3⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:1664
                        • C:\Windows\windows
                          C:\Windows\windows
                          1⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1424
                          • C:\Windows\system32\cmd.exe
                            "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                            2⤵
                              PID:1728
                              • C:\Windows\system32\schtasks.exe
                                schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                                3⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:3252
                          • C:\Windows\windows
                            C:\Windows\windows
                            1⤵
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2604
                            • C:\Windows\system32\cmd.exe
                              "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                              2⤵
                                PID:4404
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                                  3⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2288
                            • C:\Windows\windows
                              C:\Windows\windows
                              1⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1856
                              • C:\Windows\system32\cmd.exe
                                "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                                2⤵
                                  PID:4488
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                                    3⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2508
                              • C:\Windows\windows
                                C:\Windows\windows
                                1⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4564
                                • C:\Windows\system32\cmd.exe
                                  "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                                  2⤵
                                    PID:3360
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                                      3⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4744
                                • C:\Windows\windows
                                  C:\Windows\windows
                                  1⤵
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1732
                                  • C:\Windows\system32\cmd.exe
                                    "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                                    2⤵
                                      PID:880
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:1056
                                  • C:\Windows\windows
                                    C:\Windows\windows
                                    1⤵
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3280
                                    • C:\Windows\system32\cmd.exe
                                      "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                                      2⤵
                                        PID:2556
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                                          3⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4324
                                    • C:\Windows\windows
                                      C:\Windows\windows
                                      1⤵
                                      • Executes dropped EXE
                                      • Drops file in Windows directory
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4540
                                      • C:\Windows\system32\cmd.exe
                                        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                                        2⤵
                                          PID:3284
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                                            3⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3784
                                      • C:\Windows\windows
                                        C:\Windows\windows
                                        1⤵
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4820
                                        • C:\Windows\system32\cmd.exe
                                          "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST & exit
                                          2⤵
                                            PID:4584
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks /create /f /sc minute /mo 1 /tn "" /tr "C:\Windows\windows" /RL HIGHEST
                                              3⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:116

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\windows.log

                                          Filesize

                                          1KB

                                          MD5

                                          f26118d675c61402c218ac6794d90a63

                                          SHA1

                                          ffc8d592f3ca8255ca5119eff5b576eb16ac7fac

                                          SHA256

                                          d049789c187b2f58c900eab10205bc037740dca8640ab40c314790fefaab66ff

                                          SHA512

                                          6f14b71dae095131053a1b590e60ccec4e14c47c745bf9d52de48988d7b93b1f50bbb6bac0222dc49e3e45def052b20be2d34e116991027718da2e0fb8eb45d0

                                        • memory/2568-63-0x0000000020A50000-0x0000000020B1A000-memory.dmp

                                          Filesize

                                          808KB

                                        • memory/2568-77-0x000000001E7E0000-0x000000001E7F2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/5036-55-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-57-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-52-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-45-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-47-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-46-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-54-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-51-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-56-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5036-53-0x0000018A30DE0000-0x0000018A30DE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5084-0-0x00007FFEBCFA3000-0x00007FFEBCFA5000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/5084-6-0x00007FFEBCFA0000-0x00007FFEBDA61000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/5084-44-0x00007FFEBCFA0000-0x00007FFEBDA61000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/5084-4-0x00007FFEBCFA0000-0x00007FFEBDA61000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/5084-3-0x00007FFEBCFA0000-0x00007FFEBDA61000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/5084-1-0x0000000000D90000-0x0000000000DA0000-memory.dmp

                                          Filesize

                                          64KB