Analysis
-
max time kernel
300s -
max time network
305s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24-11-2022 07:55
Static task
static1
Behavioral task
behavioral1
Sample
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe
Resource
win10-20220812-en
General
-
Target
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe
-
Size
1.1MB
-
MD5
b478d340a787b85e086cc951d0696cb1
-
SHA1
563d9f1b35b4898d16aff1dccd8969299f7ab8b7
-
SHA256
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95
-
SHA512
93c5a3010ae7bf41ad966902aeaa32e17faa0bad3e76248e2096478af5bf169f817c6914a775efc666967a425716609099be8bf69e2900613a65791e4fcd3e09
-
SSDEEP
24576:npe9a9aC/qF5EZNo9DzDn07bPVICwUmmHcexxnn:pwa9a9F54qH075kUmmHxx1n
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Executes dropped EXE 6 IoCs
Processes:
mnb.exefsdffc.exedfsds.exedaaca.exedllhost.exedal.exepid process 4108 mnb.exe 4516 fsdffc.exe 4384 dfsds.exe 1936 daaca.exe 4908 dllhost.exe 2316 dal.exe -
Drops startup file 2 IoCs
Processes:
dfsds.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dotNET.lnk dfsds.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sysdll32.lnk dfsds.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Explorer.EXEdfsds.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Time Manager = "C:\\ProgramData\\TimeManager.exe" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\scrss = "C:\\Users\\Admin\\AppData\\Roaming\\dotNET.lnk" dfsds.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wininit = "C:\\Sysdll32.lnk" dfsds.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4704 1936 WerFault.exe daaca.exe -
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\dal.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\dal.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\dal.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\dal.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
fsdffc.exeExplorer.EXEdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fsdffc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz fsdffc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.EXE -
Modifies registry class 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dfsds.exedaaca.exedllhost.exepid process 4384 dfsds.exe 4384 dfsds.exe 1936 daaca.exe 1936 daaca.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe 4908 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3068 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
dfsds.exedaaca.exeExplorer.EXEdllhost.exedescription pid process Token: SeDebugPrivilege 4384 dfsds.exe Token: SeDebugPrivilege 1936 daaca.exe Token: SeShutdownPrivilege 3068 Explorer.EXE Token: SeCreatePagefilePrivilege 3068 Explorer.EXE Token: SeShutdownPrivilege 3068 Explorer.EXE Token: SeCreatePagefilePrivilege 3068 Explorer.EXE Token: SeDebugPrivilege 4908 dllhost.exe Token: SeShutdownPrivilege 3068 Explorer.EXE Token: SeCreatePagefilePrivilege 3068 Explorer.EXE Token: SeShutdownPrivilege 3068 Explorer.EXE Token: SeCreatePagefilePrivilege 3068 Explorer.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exemnb.exedfsds.exedaaca.exedescription pid process target process PID 1728 wrote to memory of 4108 1728 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe mnb.exe PID 1728 wrote to memory of 4108 1728 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe mnb.exe PID 1728 wrote to memory of 4108 1728 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe mnb.exe PID 4108 wrote to memory of 4516 4108 mnb.exe fsdffc.exe PID 4108 wrote to memory of 4516 4108 mnb.exe fsdffc.exe PID 4108 wrote to memory of 4516 4108 mnb.exe fsdffc.exe PID 4108 wrote to memory of 4384 4108 mnb.exe dfsds.exe PID 4108 wrote to memory of 4384 4108 mnb.exe dfsds.exe PID 4108 wrote to memory of 1936 4108 mnb.exe daaca.exe PID 4108 wrote to memory of 1936 4108 mnb.exe daaca.exe PID 4108 wrote to memory of 1936 4108 mnb.exe daaca.exe PID 4384 wrote to memory of 4908 4384 dfsds.exe dllhost.exe PID 4384 wrote to memory of 4908 4384 dfsds.exe dllhost.exe PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1936 wrote to memory of 3068 1936 daaca.exe Explorer.EXE PID 1728 wrote to memory of 2316 1728 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe dal.exe PID 1728 wrote to memory of 2316 1728 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe dal.exe PID 1728 wrote to memory of 2316 1728 8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe dal.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe"C:\Users\Admin\AppData\Local\Temp\8d41d5131fac719cc11823fb57bef9ef1ea063dbb8f52b235a3948bece039d95.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mnb.exe"C:\Users\Admin\AppData\Local\Temp\mnb.exe" -s -psfghrykjrsetdrfhjryuygs3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\fsdffc.exe"C:\Users\Admin\AppData\Roaming\fsdffc.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Users\Admin\AppData\Roaming\dfsds.exe"C:\Users\Admin\AppData\Roaming\dfsds.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\daaca.exe"C:\Users\Admin\AppData\Roaming\daaca.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 2485⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\dal.exe"C:\Users\Admin\AppData\Local\Temp\dal.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dal.exeFilesize
35KB
MD569947fc31894cd78ea651768721e26fa
SHA18f1d431dc0e082e29b8e420df9063737c56d6600
SHA2562e16065cb223473d0891696e8bed97c240baad32d66c71a9c35b3f2faa1c02b7
SHA512d1ebb7427a16201f827c918798e9c90a278b936846459f01ad09f4f095989792260cfab243f3a3655db2784a4a979f9badfd57462d0e7aa233f8c7f83a5fd1f0
-
C:\Users\Admin\AppData\Local\Temp\dal.exeFilesize
35KB
MD569947fc31894cd78ea651768721e26fa
SHA18f1d431dc0e082e29b8e420df9063737c56d6600
SHA2562e16065cb223473d0891696e8bed97c240baad32d66c71a9c35b3f2faa1c02b7
SHA512d1ebb7427a16201f827c918798e9c90a278b936846459f01ad09f4f095989792260cfab243f3a3655db2784a4a979f9badfd57462d0e7aa233f8c7f83a5fd1f0
-
C:\Users\Admin\AppData\Local\Temp\mnb.exeFilesize
1.2MB
MD58d44f882db1ce5ec780096bd698cadeb
SHA15eb4589f28d054befe40750a7c54de8a6f1bd0fa
SHA256103df9101017558d967a8d246739520b7024a930319c3352278c19298ec6084e
SHA512f97ccc467096023d704a4761c253ac73ed9bd3173cf1b7734b3cc6433e53f9e26393b30922c6836349a834ce8293c8b55c742a2be3f89cef42f5d2e8473347e7
-
C:\Users\Admin\AppData\Local\Temp\mnb.exeFilesize
1.2MB
MD58d44f882db1ce5ec780096bd698cadeb
SHA15eb4589f28d054befe40750a7c54de8a6f1bd0fa
SHA256103df9101017558d967a8d246739520b7024a930319c3352278c19298ec6084e
SHA512f97ccc467096023d704a4761c253ac73ed9bd3173cf1b7734b3cc6433e53f9e26393b30922c6836349a834ce8293c8b55c742a2be3f89cef42f5d2e8473347e7
-
C:\Users\Admin\AppData\Roaming\daaca.exeFilesize
415KB
MD5dda23435a7b21721ba96ae7fb9812e20
SHA12e179d2f38f04879d249aac505ec05e99efbe6aa
SHA256521729034f0ce5b2d3616d8efb8fc43202181cd8c6ff48b535b695dbcde75eb6
SHA512b0972d4ad7f1ca9b3ff08fef2bd4f39368877233c100aa17caf7d93c0d8baa3cc390b7f6d3150af5f4e2d2f6352bbba9b51862790f53934cab1755720293b7ce
-
C:\Users\Admin\AppData\Roaming\daaca.exeFilesize
415KB
MD5dda23435a7b21721ba96ae7fb9812e20
SHA12e179d2f38f04879d249aac505ec05e99efbe6aa
SHA256521729034f0ce5b2d3616d8efb8fc43202181cd8c6ff48b535b695dbcde75eb6
SHA512b0972d4ad7f1ca9b3ff08fef2bd4f39368877233c100aa17caf7d93c0d8baa3cc390b7f6d3150af5f4e2d2f6352bbba9b51862790f53934cab1755720293b7ce
-
C:\Users\Admin\AppData\Roaming\dfsds.exeFilesize
1.2MB
MD5047af34af65efd5c6ee38eb7ad100a01
SHA161809e8f559b27e72a603a45a53116327845dbeb
SHA256931972b7531ee614ff9f9403fb0612ca4e3d668c5bfbedacb9fe18e4ac312f1d
SHA5127e0355636e5883fff7d42c78bc67973b5da4216a7b07fa94e089ff2aaa6f957356e0bc089d89dde71ba0151d3588c5713c9d15f205419cbb5abcd253beed9f4d
-
C:\Users\Admin\AppData\Roaming\dfsds.exeFilesize
1.2MB
MD5047af34af65efd5c6ee38eb7ad100a01
SHA161809e8f559b27e72a603a45a53116327845dbeb
SHA256931972b7531ee614ff9f9403fb0612ca4e3d668c5bfbedacb9fe18e4ac312f1d
SHA5127e0355636e5883fff7d42c78bc67973b5da4216a7b07fa94e089ff2aaa6f957356e0bc089d89dde71ba0151d3588c5713c9d15f205419cbb5abcd253beed9f4d
-
C:\Users\Admin\AppData\Roaming\dllhost.exeFilesize
1.2MB
MD5047af34af65efd5c6ee38eb7ad100a01
SHA161809e8f559b27e72a603a45a53116327845dbeb
SHA256931972b7531ee614ff9f9403fb0612ca4e3d668c5bfbedacb9fe18e4ac312f1d
SHA5127e0355636e5883fff7d42c78bc67973b5da4216a7b07fa94e089ff2aaa6f957356e0bc089d89dde71ba0151d3588c5713c9d15f205419cbb5abcd253beed9f4d
-
C:\Users\Admin\AppData\Roaming\dllhost.exeFilesize
1.2MB
MD5047af34af65efd5c6ee38eb7ad100a01
SHA161809e8f559b27e72a603a45a53116327845dbeb
SHA256931972b7531ee614ff9f9403fb0612ca4e3d668c5bfbedacb9fe18e4ac312f1d
SHA5127e0355636e5883fff7d42c78bc67973b5da4216a7b07fa94e089ff2aaa6f957356e0bc089d89dde71ba0151d3588c5713c9d15f205419cbb5abcd253beed9f4d
-
C:\Users\Admin\AppData\Roaming\fsdffc.exeFilesize
48KB
MD5f12bdda1f8ea3816740ba7a81df1e92e
SHA17e8f561c66e76868d2145029f71fd6ed8bc3dd50
SHA256d93f9e11688e7317fabcf7ea26ed573619edece0ae6520e80624705ac1dbb273
SHA512f095f82295fda5622a0b682041d7934a1e943c652a9527d649764cbd0c0ae5d16f2a341aa95bf03383793cead97cea93c38276b6260acae431836088ff944abb
-
C:\Users\Admin\AppData\Roaming\fsdffc.exeFilesize
48KB
MD5f12bdda1f8ea3816740ba7a81df1e92e
SHA17e8f561c66e76868d2145029f71fd6ed8bc3dd50
SHA256d93f9e11688e7317fabcf7ea26ed573619edece0ae6520e80624705ac1dbb273
SHA512f095f82295fda5622a0b682041d7934a1e943c652a9527d649764cbd0c0ae5d16f2a341aa95bf03383793cead97cea93c38276b6260acae431836088ff944abb
-
memory/1728-131-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-153-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-130-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-128-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-132-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-133-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-134-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-135-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-136-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-137-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-138-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-139-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-141-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-140-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-142-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-143-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-144-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-145-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-147-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-146-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-148-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-149-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-150-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-151-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-152-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-129-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-154-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-155-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-156-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-157-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-158-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-116-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-127-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-117-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-126-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-125-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-124-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-118-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-119-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-120-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-121-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-123-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1728-122-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/1936-334-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/1936-239-0x0000000000000000-mapping.dmp
-
memory/1936-336-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2316-338-0x0000000000000000-mapping.dmp
-
memory/3068-335-0x0000000000800000-0x000000000081A000-memory.dmpFilesize
104KB
-
memory/3068-385-0x0000000000800000-0x000000000081A000-memory.dmpFilesize
104KB
-
memory/4108-159-0x0000000000000000-mapping.dmp
-
memory/4108-172-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-179-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-180-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-181-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-177-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-162-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-176-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-161-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-175-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-174-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-173-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-163-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-178-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-171-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-164-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-165-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-166-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-170-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-169-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-168-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4108-167-0x00000000778F0000-0x0000000077A7E000-memory.dmpFilesize
1.6MB
-
memory/4384-297-0x0000026A5BD40000-0x0000026A5BD5E000-memory.dmpFilesize
120KB
-
memory/4384-283-0x0000026A74680000-0x0000026A746F6000-memory.dmpFilesize
472KB
-
memory/4384-244-0x0000026A5A0D0000-0x0000026A5A200000-memory.dmpFilesize
1.2MB
-
memory/4384-233-0x0000000000000000-mapping.dmp
-
memory/4516-229-0x0000000000000000-mapping.dmp
-
memory/4908-311-0x0000000000000000-mapping.dmp