Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 15:36

General

  • Target

    9356ed2de6a7feed01f5fecb99fc74ddd0eab39eb9421c7a31f5562ada971239.exe

  • Size

    6.6MB

  • MD5

    81f2740836dbe2cafa7e671398391962

  • SHA1

    03602d8af9f6d298a939fce0309117f394b8ad2e

  • SHA256

    9356ed2de6a7feed01f5fecb99fc74ddd0eab39eb9421c7a31f5562ada971239

  • SHA512

    34803ecb93d2acf992772be863ad9be3bac7a10fe087d013641586d4a7361d72a5ab8a15a4dc60f9b4d990c5d3b86fd3bd596f87a3be25faa7c2a5380556e15a

  • SSDEEP

    196608:rVks9fzm96+85xe7PqCsXDjpf/2WliXYrHW1LHFO0fN:5d+h7PqCEJ2ciIrHWRHFO8

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9356ed2de6a7feed01f5fecb99fc74ddd0eab39eb9421c7a31f5562ada971239.exe
    "C:\Users\Admin\AppData\Local\Temp\9356ed2de6a7feed01f5fecb99fc74ddd0eab39eb9421c7a31f5562ada971239.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Users\Admin\AppData\Local\Temp\9356ed2de6a7feed01f5fecb99fc74ddd0eab39eb9421c7a31f5562ada971239.exe
      "C:\Users\Admin\AppData\Local\Temp\9356ed2de6a7feed01f5fecb99fc74ddd0eab39eb9421c7a31f5562ada971239.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Windows\SYSTEM32\cmd.exe
        cmd /c echo %temp%
        3⤵
          PID:3140
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\INST.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4912
          • C:\Users\Admin\AppData\Local\Temp\INST.exe
            C:\Users\Admin\AppData\Local\Temp\INST.exe
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4948
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\INST.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4588
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Update\Install\{0D3B55D5-C891-4ABD-ADA8-7B4746A87555}\dllhost.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4712
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\IdentityCRL\production\conhost.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:552
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5112
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\RuntimeBroker.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3908
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\conhost.exe'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2844
            • C:\Windows\IdentityCRL\production\conhost.exe
              "C:\Windows\IdentityCRL\production\conhost.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:4852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\Update\Install\{0D3B55D5-C891-4ABD-ADA8-7B4746A87555}\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:444
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Install\{0D3B55D5-C891-4ABD-ADA8-7B4746A87555}\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4396
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\Update\Install\{0D3B55D5-C891-4ABD-ADA8-7B4746A87555}\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4720
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:396
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2128
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3184
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Windows\IdentityCRL\production\conhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4232
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\production\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1512
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Windows\IdentityCRL\production\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4320
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4340
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:720
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:316
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:116
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1116
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4812

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      77d622bb1a5b250869a3238b9bc1402b

      SHA1

      d47f4003c2554b9dfc4c16f22460b331886b191b

      SHA256

      f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

      SHA512

      d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      77d622bb1a5b250869a3238b9bc1402b

      SHA1

      d47f4003c2554b9dfc4c16f22460b331886b191b

      SHA256

      f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

      SHA512

      d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      e243a38635ff9a06c87c2a61a2200656

      SHA1

      ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

      SHA256

      af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

      SHA512

      4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      e243a38635ff9a06c87c2a61a2200656

      SHA1

      ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

      SHA256

      af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

      SHA512

      4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      944B

      MD5

      cadef9abd087803c630df65264a6c81c

      SHA1

      babbf3636c347c8727c35f3eef2ee643dbcc4bd2

      SHA256

      cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

      SHA512

      7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

    • C:\Users\Admin\AppData\Local\Temp\INST.exe
      Filesize

      1.9MB

      MD5

      8cc36cbc565744d77a502f6e07acc113

      SHA1

      5c2267ce4065461ca05bcd0df5cd1989e7d41bec

      SHA256

      14a4cdd55c50471641f52ec48b7cd717a3f540f0d79b617d0038696a9441d174

      SHA512

      8925c85f1a0f4752d46c8f6a03e6f1c5c185cb794a3980d4283e9f38f0d65d8546f971003817a7f6c795ba9e4c2119ebea837efcc7890e502a7a830d8c93bfc9

    • C:\Users\Admin\AppData\Local\Temp\INST.exe
      Filesize

      1.9MB

      MD5

      8cc36cbc565744d77a502f6e07acc113

      SHA1

      5c2267ce4065461ca05bcd0df5cd1989e7d41bec

      SHA256

      14a4cdd55c50471641f52ec48b7cd717a3f540f0d79b617d0038696a9441d174

      SHA512

      8925c85f1a0f4752d46c8f6a03e6f1c5c185cb794a3980d4283e9f38f0d65d8546f971003817a7f6c795ba9e4c2119ebea837efcc7890e502a7a830d8c93bfc9

    • C:\Users\Admin\AppData\Local\Temp\_MEI30802\VCRUNTIME140.dll
      Filesize

      94KB

      MD5

      18049f6811fc0f94547189a9e104f5d2

      SHA1

      dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6

      SHA256

      c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db

      SHA512

      38fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7

    • C:\Users\Admin\AppData\Local\Temp\_MEI30802\VCRUNTIME140.dll
      Filesize

      94KB

      MD5

      18049f6811fc0f94547189a9e104f5d2

      SHA1

      dc127fa1ff0aab71abd76b89fc4b849ad3cf43a6

      SHA256

      c865c3366a98431ec3a5959cb5ac3966081a43b82dfcd8bfefafe0146b1508db

      SHA512

      38fa01debdb8c5369b3be45b1384434acb09a6afe75a50a31b3f0babb7bc0550261a5376dd7e5beac74234ec1722967a33fc55335b1809c0b64db42f7e56cdf7

    • C:\Users\Admin\AppData\Local\Temp\_MEI30802\base_library.zip
      Filesize

      1012KB

      MD5

      ab04fc6651d42bc1035f5869039c5165

      SHA1

      d1333cf09efff5dc3cd3993bddc951c8079bee80

      SHA256

      ea35745d64dff827ade3cf93a9354ab755f8e33b2c393846e99afc96667831e3

      SHA512

      3da8305b4717337b26f2fce3508eda2b2ea8079c152a1157c141e49e22c93c2b22086f56b9273cd6966e6d4f73cc02c6e990c5cf9b1316817f077d1f3ef457a6

    • C:\Users\Admin\AppData\Local\Temp\_MEI30802\python39.dll
      Filesize

      4.3MB

      MD5

      1d5e4c20a20740f38f061bdf48aaca4f

      SHA1

      de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0

      SHA256

      f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366

      SHA512

      9df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397

    • C:\Users\Admin\AppData\Local\Temp\_MEI30802\python39.dll
      Filesize

      4.3MB

      MD5

      1d5e4c20a20740f38f061bdf48aaca4f

      SHA1

      de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0

      SHA256

      f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366

      SHA512

      9df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397

    • C:\Windows\IdentityCRL\production\conhost.exe
      Filesize

      1.9MB

      MD5

      8cc36cbc565744d77a502f6e07acc113

      SHA1

      5c2267ce4065461ca05bcd0df5cd1989e7d41bec

      SHA256

      14a4cdd55c50471641f52ec48b7cd717a3f540f0d79b617d0038696a9441d174

      SHA512

      8925c85f1a0f4752d46c8f6a03e6f1c5c185cb794a3980d4283e9f38f0d65d8546f971003817a7f6c795ba9e4c2119ebea837efcc7890e502a7a830d8c93bfc9

    • C:\Windows\IdentityCRL\production\conhost.exe
      Filesize

      1.9MB

      MD5

      8cc36cbc565744d77a502f6e07acc113

      SHA1

      5c2267ce4065461ca05bcd0df5cd1989e7d41bec

      SHA256

      14a4cdd55c50471641f52ec48b7cd717a3f540f0d79b617d0038696a9441d174

      SHA512

      8925c85f1a0f4752d46c8f6a03e6f1c5c185cb794a3980d4283e9f38f0d65d8546f971003817a7f6c795ba9e4c2119ebea837efcc7890e502a7a830d8c93bfc9

    • memory/552-150-0x0000000000000000-mapping.dmp
    • memory/552-170-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/552-162-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/2844-175-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/2844-152-0x0000000000000000-mapping.dmp
    • memory/2844-163-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/3140-138-0x0000000000000000-mapping.dmp
    • memory/3908-161-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/3908-176-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/3908-151-0x0000000000000000-mapping.dmp
    • memory/4220-132-0x0000000000000000-mapping.dmp
    • memory/4588-156-0x00000178E4300000-0x00000178E4322000-memory.dmp
      Filesize

      136KB

    • memory/4588-147-0x0000000000000000-mapping.dmp
    • memory/4588-158-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/4588-168-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/4712-172-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/4712-148-0x0000000000000000-mapping.dmp
    • memory/4712-159-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/4852-164-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/4852-177-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/4852-153-0x0000000000000000-mapping.dmp
    • memory/4912-139-0x0000000000000000-mapping.dmp
    • memory/4948-144-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/4948-140-0x0000000000000000-mapping.dmp
    • memory/4948-157-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/4948-143-0x0000000000ED0000-0x00000000010C0000-memory.dmp
      Filesize

      1.9MB

    • memory/4948-146-0x000000001DC40000-0x000000001E168000-memory.dmp
      Filesize

      5.2MB

    • memory/4948-145-0x000000001D2C0000-0x000000001D310000-memory.dmp
      Filesize

      320KB

    • memory/5112-149-0x0000000000000000-mapping.dmp
    • memory/5112-171-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB

    • memory/5112-160-0x00007FFC468A0000-0x00007FFC47361000-memory.dmp
      Filesize

      10.8MB