Resubmissions

26-12-2022 00:04

221226-acrmcafe2y 10

26-12-2022 00:03

221226-acfvvafe2x 10

26-12-2022 00:03

221226-ab851acc75 10

26-12-2022 00:03

221226-ab3m8afe2w 10

26-12-2022 00:02

221226-abs4sacc74 10

26-12-2022 00:01

221226-abb59scc72 10

Analysis

  • max time kernel
    130s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-12-2022 00:03

General

  • Target

    a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56.exe

  • Size

    1.7MB

  • MD5

    c090c2077f7c71e38f4b7fedfe0ef1e3

  • SHA1

    2d01b3e7f9f80961aa6bada443a5d969bf88c052

  • SHA256

    a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56

  • SHA512

    150d46cd92ab52985ee1cfa197ecfb50fe83c3d7070b99ffd187e72582b6b539e63edb990dc820882a900f446512c391557848568c35d57382abb48207e0d028

  • SSDEEP

    24576:U2G/nvxW3Ww0tjWmsIUvGdf4wNKfgo9WB4E/rR9NVGIoUtcrneDa0kPs/MQdb6Of:UbA30jW9vgwrng9EIZyqa0esNnN5P

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 48 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 48 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56.exe
    "C:\Users\Admin\AppData\Local\Temp\a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ServerReview\MzalesUHq9EVa0XF.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4952
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\ServerReview\sWa1toVd2dh5viFItIPl1K.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4276
        • C:\ServerReview\bridgeProviderref.exe
          "C:\ServerReview\bridgeProviderref.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5020
          • C:\Users\Default\NetHood\cmd.exe
            "C:\Users\Default\NetHood\cmd.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3824
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1544
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Pictures\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2636
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Recent\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3020
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Recent\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4464
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Windows\ELAMBKUP\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4576
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Users\Default\NetHood\cmd.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4564
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\ServerReview\sihost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:64
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\PrintDialog\Assets\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1516
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Multimedia Platform\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:204
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchUI" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\SearchUI.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:860
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchUIS" /sc MINUTE /mo 14 /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\SearchUI.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3144
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SearchUIS" /sc MINUTE /mo 6 /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\SearchUI.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2176
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1800
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2428
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2488
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\fontdrvhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2648
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2664
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2912
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1888
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1204
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4584
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\Uninstall Information\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2204
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\services.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2296
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\Uninstall Information\services.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:308
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3284
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Multimedia Platform\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3308
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Windows\PrintDialog\Assets\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1120
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Windows\PrintDialog\Assets\fontdrvhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4220
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3800
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1472
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1368
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 9 /tr "'C:\ServerReview\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:516
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\ServerReview\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:636
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1052
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4620
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:736
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Users\Default\NetHood\cmd.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1812
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Default\NetHood\cmd.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4556
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\ELAMBKUP\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4616
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Windows\ELAMBKUP\explorer.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4356
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\Temp\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4412
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4360
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\Temp\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4596
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Recent\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4484
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Public\Pictures\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4364
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Pictures\sihost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4440
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3016
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\taskhostw.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3136

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ServerReview\MzalesUHq9EVa0XF.vbe
    Filesize

    211B

    MD5

    fb66d6d565dce17c5007b0a7e4df8b73

    SHA1

    1a968335d68201d39ce11439b434721c7c28cdde

    SHA256

    141fbc97b724eda2dedcba78ca1d5f340a817c56e338c5bf8624afa2477e7736

    SHA512

    d7c160c69e06862cdc9e626d27c757f267ca75a888ec71ab8ccbaf237173c463f58d79e6775232684e452a4e0910110c318b5ee0f39657590cdbb1c1da6f9fcc

  • C:\ServerReview\bridgeProviderref.exe
    Filesize

    1.4MB

    MD5

    8734e10de083db53ee35a423e7d7c9a9

    SHA1

    eed4e041b8b2e235d5200cdc39fd63ead9989f0f

    SHA256

    3687ba9aef354b3bd04ca7af044d1fcbcd0c643df76c7038dffc51c9a0d17620

    SHA512

    627d249a5fc80c5d8c9cdf78a079be7430ac154fae4147afedb833b79c3f89ddc08ad63da50a09b817e8248eeb0ab58d56d6f730b1df30deae9b3f4b39d33e51

  • C:\ServerReview\bridgeProviderref.exe
    Filesize

    1.4MB

    MD5

    8734e10de083db53ee35a423e7d7c9a9

    SHA1

    eed4e041b8b2e235d5200cdc39fd63ead9989f0f

    SHA256

    3687ba9aef354b3bd04ca7af044d1fcbcd0c643df76c7038dffc51c9a0d17620

    SHA512

    627d249a5fc80c5d8c9cdf78a079be7430ac154fae4147afedb833b79c3f89ddc08ad63da50a09b817e8248eeb0ab58d56d6f730b1df30deae9b3f4b39d33e51

  • C:\ServerReview\sWa1toVd2dh5viFItIPl1K.bat
    Filesize

    39B

    MD5

    dbba88d93e1a4c249cd8c44bd99cf3d3

    SHA1

    75bf459416022380605880066cc0bef81966b4f8

    SHA256

    e8f43b3eb90675247331fbba6091b365bf672bf4096de426af3ac9c627c23462

    SHA512

    38f65e02dfc2b95aaf626040dac731b7e997aba3873cd832bac29e39e7afcfc52b9b46ea5cde943a5fa55889a45cddaaa753fea071822d4c9060e00c89706b52

  • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Network Shortcuts\cmd.exe
    Filesize

    1.4MB

    MD5

    8734e10de083db53ee35a423e7d7c9a9

    SHA1

    eed4e041b8b2e235d5200cdc39fd63ead9989f0f

    SHA256

    3687ba9aef354b3bd04ca7af044d1fcbcd0c643df76c7038dffc51c9a0d17620

    SHA512

    627d249a5fc80c5d8c9cdf78a079be7430ac154fae4147afedb833b79c3f89ddc08ad63da50a09b817e8248eeb0ab58d56d6f730b1df30deae9b3f4b39d33e51

  • C:\Users\Default\NetHood\cmd.exe
    Filesize

    1.4MB

    MD5

    8734e10de083db53ee35a423e7d7c9a9

    SHA1

    eed4e041b8b2e235d5200cdc39fd63ead9989f0f

    SHA256

    3687ba9aef354b3bd04ca7af044d1fcbcd0c643df76c7038dffc51c9a0d17620

    SHA512

    627d249a5fc80c5d8c9cdf78a079be7430ac154fae4147afedb833b79c3f89ddc08ad63da50a09b817e8248eeb0ab58d56d6f730b1df30deae9b3f4b39d33e51

  • memory/2696-160-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-156-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-124-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-125-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-127-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-128-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-129-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-130-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-131-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-132-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-133-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-162-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-135-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-136-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-137-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-138-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-139-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-140-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-141-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-142-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-143-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-144-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-145-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-146-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-148-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-147-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-149-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-150-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-152-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-151-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-153-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-154-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-155-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-163-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-157-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-158-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-121-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-159-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-134-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-119-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-122-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-164-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-165-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-166-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-167-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-168-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-171-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-173-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-172-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-170-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-169-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-174-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-176-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-175-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-177-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-178-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-179-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-180-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-181-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-182-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-120-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/2696-161-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/3824-298-0x000000001CEB0000-0x000000001D072000-memory.dmp
    Filesize

    1.8MB

  • memory/3824-295-0x0000000000000000-mapping.dmp
  • memory/4276-259-0x0000000000000000-mapping.dmp
  • memory/4952-183-0x0000000000000000-mapping.dmp
  • memory/4952-185-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/4952-184-0x0000000077BF0000-0x0000000077D7E000-memory.dmp
    Filesize

    1.6MB

  • memory/5020-286-0x0000000001020000-0x000000000103C000-memory.dmp
    Filesize

    112KB

  • memory/5020-290-0x0000000002B60000-0x0000000002B6C000-memory.dmp
    Filesize

    48KB

  • memory/5020-282-0x0000000000000000-mapping.dmp
  • memory/5020-285-0x0000000000730000-0x00000000008A8000-memory.dmp
    Filesize

    1.5MB

  • memory/5020-294-0x0000000002BB0000-0x0000000002BBC000-memory.dmp
    Filesize

    48KB

  • memory/5020-293-0x0000000002BA0000-0x0000000002BAE000-memory.dmp
    Filesize

    56KB

  • memory/5020-292-0x000000001C190000-0x000000001C6B6000-memory.dmp
    Filesize

    5.1MB

  • memory/5020-287-0x000000001B4A0000-0x000000001B4F0000-memory.dmp
    Filesize

    320KB

  • memory/5020-289-0x0000000001040000-0x0000000001050000-memory.dmp
    Filesize

    64KB

  • memory/5020-288-0x0000000000DC0000-0x0000000000DD0000-memory.dmp
    Filesize

    64KB

  • memory/5020-291-0x0000000002B70000-0x0000000002B82000-memory.dmp
    Filesize

    72KB