Analysis

  • max time kernel
    611s
  • max time network
    632s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-12-2023 01:43

General

  • Target

    076be2c09b944ec56381f42405728f7f657d2597b6e27191354568fb70170b29.exe

  • Size

    5.4MB

  • MD5

    fbbeef748d1a778d15265c1b78a0f5f2

  • SHA1

    d81baf14bf5d2f017a1a7bfd9e75d03ca7621b8a

  • SHA256

    076be2c09b944ec56381f42405728f7f657d2597b6e27191354568fb70170b29

  • SHA512

    dceb3004fb5018552d26051e32ebdbf9aa85e62f0ef14d7897e797e2bbc6b12381ce320b53361f199c6e24fef0d7a37ce96899357c9165a815d79045e7d78c2a

  • SSDEEP

    49152:rpQDkXmuSP9y8X1hMUR/kMC3WpP7MqRyBxpt+yyQ6ihi04raAWK3+M2lkXy1YweG:

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 22 IoCs
  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\076be2c09b944ec56381f42405728f7f657d2597b6e27191354568fb70170b29.exe
    "C:\Users\Admin\AppData\Local\Temp\076be2c09b944ec56381f42405728f7f657d2597b6e27191354568fb70170b29.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1628
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4580
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "system32" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\system32.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3056
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" cmd /c "C:\Users\Admin\AppData\Roaming\Microsoft\system32.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Roaming\Microsoft\system32.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Windows\system32\cmd.exe
          "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3224
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2312
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4484
        • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3112
          • C:\Windows\System32\conhost.exe
            "C:\Windows\System32\conhost.exe" "btxqrylfjywb"
            5⤵
              PID:2948
          • C:\Windows\System32\conhost.exe
            C:\Windows\System32\conhost.exe daotxgcst0 Xji3FXYfqqI2timPThbgZueMNpSES88mLhMz2ywydJTuZ3pr9Wc9od0CPGl8zltBH1Xd8++CGqZaKmfIdcke/FqmIk+tPi+Vjxoqy8VYr9WlywEtsT8GDDX0fEJI+8zLRDuoUp3zjcQ12gSE62NojNF2plD6bVvUH+rDqTaIznDkEJMCWbysz24KpOhY4a6dxdMO+ARNKR9jZEQSeG2ozraJkyJfoVzXAVlnN04BNZcBsHcF0FEWX1+Mt6PFZQ5P7hXuGf4caCjxy5Wk3aGevU2GX35FqiosYvti+bxy9te9z3P+pDZAOP6CY99ObIwe9itH4fRyXIjW+w9RaDuSBOyGlnj1Gmo+1K/Oid1tnyQYP4Jbri0GvV/1mWDeLL6mslC1zKo8JCCQpAXKM0aCHZKEKbzdZgjYrblOsSo6lkVjp8Rf5HsF6PJdqgH4dPiDWPS0es6gi65okSP8kzO2PA==
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2952
    • C:\Windows\system32\schtasks.exe
      schtasks /create /f /sc onlogon /rl highest /tn "system32" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\system32.exe"
      1⤵
      • Creates scheduled task(s)
      PID:904

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      627073ee3ca9676911bee35548eff2b8

      SHA1

      4c4b68c65e2cab9864b51167d710aa29ebdcff2e

      SHA256

      85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

      SHA512

      3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      05b3cd21c1ec02f04caba773186ee8d0

      SHA1

      39e790bfe10abf55b74dfb3603df8fcf6b5e6edb

      SHA256

      911efc5cf9cbeb697543eb3242f5297e1be46dd6603a390140a9ff031ed9e1e8

      SHA512

      e751008b032394817beb46937fd93a73be97254c2be94dd42f22fb1306d2715c653ece16fa96eab1a3e73811936768cea6b37888437086fc6f3e3e793a2515eb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      052b734e3d0b49bccde40def527c10df

      SHA1

      2ac7c9bd7dc7bd54699fd06252a89a963e1c1ec0

      SHA256

      d51b94b595a5bee567d89011dc8d97f6210a7911828e5a24172708d5a177f65f

      SHA512

      bbe94350f51a4029f44631e5bb6658d9583d46011db3ca3159a21b179ab7dc7b200a27ccdf34897fdcba890acec2cdb84a2c1ba0cd95360478e38e911f56f4ba

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      80707036df540b6657f9d443b449e3c3

      SHA1

      b3e7d5d97274942164bf93c8c4b8a9b68713f46f

      SHA256

      6651e5f976619cef991deef61776cf43d4c4b3d7c551dd2192b647df71586ab0

      SHA512

      65e41e9e730fed4f7a7d3f6f35875a16948b897f87c8c70b371fd0ac7f0951814f6a75e7698665194bbc65a3665a684e7be229e7e24193b50483ae7e55eebf4f

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_knnqbj4x.due.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
      Filesize

      41KB

      MD5

      0d9997f25134f5ef5a24129f5ceb852b

      SHA1

      2ec46c904a25270bb120f42094547db1c3d80ec6

      SHA256

      fd76de9221b99030040b3488d903a8fe1ca56b851a5e93b17b119954328e7b41

      SHA512

      e5401fbcc22302d52065d04d93cf499e152b1cb1c79c9a66b5680b948971da5b0e87dd35d1f54360c4e53e324e7d42277f3aa43dc40950eb25f6815af4f359a3

    • C:\Users\Admin\AppData\Roaming\Microsoft\system32.exe
      Filesize

      241KB

      MD5

      1228a3ab53e7256e02ef0aa2cfbf0820

      SHA1

      66c1879ffe81597db280031bf52eb7d16c957b40

      SHA256

      9be826fee58112dc1aa4e6814db094b8b8529bfdd78f6c71d0f53ec77125343a

      SHA512

      3161e4383738a7d089d899cbf08cefe83ce1cf11daf5c1e26401646bfacfd1cc5dde51950e3180babf979771ba7d11755576507030e311eef14b51cbbee43831

    • C:\Users\Admin\AppData\Roaming\Microsoft\system32.exe
      Filesize

      164KB

      MD5

      0d2df29f101f0f74f90ae1891ebd5e39

      SHA1

      c405c3b6a2b11f84c9ca845d6a5db2b224603075

      SHA256

      6cfe14aba927e6b8c030e6021730736c29ec3156e19f5f5e24a64a7a701342fb

      SHA512

      73aaa024b3f94ed48be864142a286be35e2ffc40d3575513eeb24dbfa8dc9c730580a087bd9a485ac4c20fa47ca46a168cc3c5b645e9400d883afe371eef0eaf

    • memory/1368-48-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/1368-37-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/1368-2-0x0000000003910000-0x0000000003922000-memory.dmp
      Filesize

      72KB

    • memory/1368-3-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/1368-4-0x00000000037D0000-0x00000000037E0000-memory.dmp
      Filesize

      64KB

    • memory/1368-5-0x00000000037D0000-0x00000000037E0000-memory.dmp
      Filesize

      64KB

    • memory/1368-42-0x00000000037D0000-0x00000000037E0000-memory.dmp
      Filesize

      64KB

    • memory/1368-6-0x00000000037D0000-0x00000000037E0000-memory.dmp
      Filesize

      64KB

    • memory/1368-40-0x00000000037D0000-0x00000000037E0000-memory.dmp
      Filesize

      64KB

    • memory/1368-1-0x000000001C5C0000-0x000000001C9C8000-memory.dmp
      Filesize

      4.0MB

    • memory/1368-0-0x0000000000E70000-0x0000000001278000-memory.dmp
      Filesize

      4.0MB

    • memory/1368-41-0x00000000037D0000-0x00000000037E0000-memory.dmp
      Filesize

      64KB

    • memory/1628-22-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/1628-15-0x000001F5518B0000-0x000001F5518D2000-memory.dmp
      Filesize

      136KB

    • memory/1628-16-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/1628-19-0x000001F551980000-0x000001F551990000-memory.dmp
      Filesize

      64KB

    • memory/1628-18-0x000001F551980000-0x000001F551990000-memory.dmp
      Filesize

      64KB

    • memory/1628-17-0x000001F551980000-0x000001F551990000-memory.dmp
      Filesize

      64KB

    • memory/2312-63-0x0000029B6F660000-0x0000029B6F670000-memory.dmp
      Filesize

      64KB

    • memory/2312-65-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/2312-61-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/2948-121-0x000001E9F3BF0000-0x000001E9F3C00000-memory.dmp
      Filesize

      64KB

    • memory/2948-106-0x000001E9DB160000-0x000001E9DB166000-memory.dmp
      Filesize

      24KB

    • memory/2948-107-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/2948-108-0x000001E9F3BF0000-0x000001E9F3C00000-memory.dmp
      Filesize

      64KB

    • memory/2948-109-0x000001E9F3BF0000-0x000001E9F3C00000-memory.dmp
      Filesize

      64KB

    • memory/2948-110-0x000001E9F3BF0000-0x000001E9F3C00000-memory.dmp
      Filesize

      64KB

    • memory/2948-118-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/2948-105-0x000001E9D95E0000-0x000001E9D95E7000-memory.dmp
      Filesize

      28KB

    • memory/2948-119-0x000001E9F3BF0000-0x000001E9F3C00000-memory.dmp
      Filesize

      64KB

    • memory/2948-120-0x000001E9F3BF0000-0x000001E9F3C00000-memory.dmp
      Filesize

      64KB

    • memory/2952-91-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-112-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-134-0x0000018F16930000-0x0000018F16950000-memory.dmp
      Filesize

      128KB

    • memory/2952-135-0x0000018F167F0000-0x0000018F16810000-memory.dmp
      Filesize

      128KB

    • memory/2952-90-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-133-0x0000018F167F0000-0x0000018F16810000-memory.dmp
      Filesize

      128KB

    • memory/2952-93-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-132-0x0000018F16930000-0x0000018F16950000-memory.dmp
      Filesize

      128KB

    • memory/2952-94-0x0000018F14DC0000-0x0000018F14DE0000-memory.dmp
      Filesize

      128KB

    • memory/2952-96-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-97-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-98-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-99-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-100-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-101-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-102-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-104-0x0000018F167B0000-0x0000018F167F0000-memory.dmp
      Filesize

      256KB

    • memory/2952-103-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-131-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-130-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-129-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-128-0x0000018F167F0000-0x0000018F16810000-memory.dmp
      Filesize

      128KB

    • memory/2952-127-0x0000018F167F0000-0x0000018F16810000-memory.dmp
      Filesize

      128KB

    • memory/2952-126-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-111-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-125-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-113-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-114-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-115-0x0000018F167F0000-0x0000018F16810000-memory.dmp
      Filesize

      128KB

    • memory/2952-116-0x0000018F16930000-0x0000018F16950000-memory.dmp
      Filesize

      128KB

    • memory/2952-117-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-124-0x0000000140000000-0x0000000140787000-memory.dmp
      Filesize

      7.5MB

    • memory/2952-123-0x0000018F16930000-0x0000018F16950000-memory.dmp
      Filesize

      128KB

    • memory/2952-122-0x0000018F167F0000-0x0000018F16810000-memory.dmp
      Filesize

      128KB

    • memory/4484-74-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/4484-78-0x000001C2F0D50000-0x000001C2F0D60000-memory.dmp
      Filesize

      64KB

    • memory/4484-80-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/4484-76-0x000001C2F0D50000-0x000001C2F0D60000-memory.dmp
      Filesize

      64KB

    • memory/4484-75-0x000001C2F0D50000-0x000001C2F0D60000-memory.dmp
      Filesize

      64KB

    • memory/4580-34-0x00000250D2D20000-0x00000250D2D30000-memory.dmp
      Filesize

      64KB

    • memory/4580-35-0x00000250D2D20000-0x00000250D2D30000-memory.dmp
      Filesize

      64KB

    • memory/4580-36-0x00000250D2D20000-0x00000250D2D30000-memory.dmp
      Filesize

      64KB

    • memory/4580-39-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/4580-33-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/5084-49-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/5084-95-0x00007FFD0D640000-0x00007FFD0E102000-memory.dmp
      Filesize

      10.8MB

    • memory/5084-52-0x000000001C340000-0x000000001C350000-memory.dmp
      Filesize

      64KB

    • memory/5084-51-0x000000001C340000-0x000000001C350000-memory.dmp
      Filesize

      64KB

    • memory/5084-50-0x000000001C340000-0x000000001C350000-memory.dmp
      Filesize

      64KB