Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    18s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2023, 10:01

General

  • Target

    ac27c0a6f62525fe96a24691ab05e83e.exe

  • Size

    1.3MB

  • MD5

    ac27c0a6f62525fe96a24691ab05e83e

  • SHA1

    8c4e59a5aec502672f45bdb82b5f430ddb3d54e7

  • SHA256

    45bb804f2217118de509c8aa1f6366aa64a6c9ba596236cf36cb0f814e4b1080

  • SHA512

    d4c605a6b2eabf0a1d035b67794271e4949638f2da71c5e0ebbdb861a757af9987d64950ee13290f445abf1227ca293e394ba4eaff64d86a8944de2e9b925289

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac27c0a6f62525fe96a24691ab05e83e.exe
    "C:\Users\Admin\AppData\Local\Temp\ac27c0a6f62525fe96a24691ab05e83e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:588
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
              PID:1960
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\DVD Maker\it-IT\sppsvc.exe'
              5⤵
                PID:1256
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Journal\es-ES\sppsvc.exe'
                5⤵
                  PID:800
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'
                  5⤵
                    PID:1172
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\fr-FR\spoolsv.exe'
                    5⤵
                      PID:280
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WMIADAP.exe'
                      5⤵
                        PID:1484
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\ed738222-6219-11ed-b5ae-5e34c4ab0fa3\explorer.exe'
                        5⤵
                          PID:2004
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\MSBuild\Microsoft\services.exe'
                          5⤵
                            PID:552
                          • C:\providercommon\csrss.exe
                            "C:\providercommon\csrss.exe"
                            5⤵
                            • Executes dropped EXE
                            PID:316
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files\DVD Maker\it-IT\sppsvc.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1656
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\DVD Maker\it-IT\sppsvc.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1616
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Program Files\DVD Maker\it-IT\sppsvc.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1768
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Journal\es-ES\sppsvc.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1216
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\es-ES\sppsvc.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1328
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Journal\es-ES\sppsvc.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:552
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\providercommon\csrss.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:112
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1568
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1456
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Windows\fr-FR\spoolsv.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1348
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\fr-FR\spoolsv.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1904
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\fr-FR\spoolsv.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1752
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1608
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:2040
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\WMIADAP.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:960
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Recovery\ed738222-6219-11ed-b5ae-5e34c4ab0fa3\explorer.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1120
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\ed738222-6219-11ed-b5ae-5e34c4ab0fa3\explorer.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1500
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Recovery\ed738222-6219-11ed-b5ae-5e34c4ab0fa3\explorer.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:780
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\services.exe'" /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:768
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\services.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1808
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\services.exe'" /rl HIGHEST /f
                    1⤵
                    • Process spawned unexpected child process
                    • Creates scheduled task(s)
                    PID:1988

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    72bb4db966b8cde6988e486439d5636e

                    SHA1

                    ed004bd722e7f9e6460c3772d25629b38698de7b

                    SHA256

                    aacdcc4eb2c5b9471f73fe7b65d374003700fb9768d412e758045096df53b3bf

                    SHA512

                    f55a2eda5c38ca9fdafe3f463699149d0b489728550eea3d46c3fad599df905b2d63106660a5f39fae0a5b8a9be6b99fe4f0fcd290064172d9cb3aa4083c26f5

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    72bb4db966b8cde6988e486439d5636e

                    SHA1

                    ed004bd722e7f9e6460c3772d25629b38698de7b

                    SHA256

                    aacdcc4eb2c5b9471f73fe7b65d374003700fb9768d412e758045096df53b3bf

                    SHA512

                    f55a2eda5c38ca9fdafe3f463699149d0b489728550eea3d46c3fad599df905b2d63106660a5f39fae0a5b8a9be6b99fe4f0fcd290064172d9cb3aa4083c26f5

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    72bb4db966b8cde6988e486439d5636e

                    SHA1

                    ed004bd722e7f9e6460c3772d25629b38698de7b

                    SHA256

                    aacdcc4eb2c5b9471f73fe7b65d374003700fb9768d412e758045096df53b3bf

                    SHA512

                    f55a2eda5c38ca9fdafe3f463699149d0b489728550eea3d46c3fad599df905b2d63106660a5f39fae0a5b8a9be6b99fe4f0fcd290064172d9cb3aa4083c26f5

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    72bb4db966b8cde6988e486439d5636e

                    SHA1

                    ed004bd722e7f9e6460c3772d25629b38698de7b

                    SHA256

                    aacdcc4eb2c5b9471f73fe7b65d374003700fb9768d412e758045096df53b3bf

                    SHA512

                    f55a2eda5c38ca9fdafe3f463699149d0b489728550eea3d46c3fad599df905b2d63106660a5f39fae0a5b8a9be6b99fe4f0fcd290064172d9cb3aa4083c26f5

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    72bb4db966b8cde6988e486439d5636e

                    SHA1

                    ed004bd722e7f9e6460c3772d25629b38698de7b

                    SHA256

                    aacdcc4eb2c5b9471f73fe7b65d374003700fb9768d412e758045096df53b3bf

                    SHA512

                    f55a2eda5c38ca9fdafe3f463699149d0b489728550eea3d46c3fad599df905b2d63106660a5f39fae0a5b8a9be6b99fe4f0fcd290064172d9cb3aa4083c26f5

                  • C:\providercommon\1zu9dW.bat

                    Filesize

                    36B

                    MD5

                    6783c3ee07c7d151ceac57f1f9c8bed7

                    SHA1

                    17468f98f95bf504cc1f83c49e49a78526b3ea03

                    SHA256

                    8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                    SHA512

                    c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                  • C:\providercommon\DllCommonsvc.exe

                    Filesize

                    1.0MB

                    MD5

                    bd31e94b4143c4ce49c17d3af46bcad0

                    SHA1

                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                    SHA256

                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                    SHA512

                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                  • C:\providercommon\DllCommonsvc.exe

                    Filesize

                    1.0MB

                    MD5

                    bd31e94b4143c4ce49c17d3af46bcad0

                    SHA1

                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                    SHA256

                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                    SHA512

                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                  • C:\providercommon\csrss.exe

                    Filesize

                    1.0MB

                    MD5

                    bd31e94b4143c4ce49c17d3af46bcad0

                    SHA1

                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                    SHA256

                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                    SHA512

                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                  • C:\providercommon\csrss.exe

                    Filesize

                    1.0MB

                    MD5

                    bd31e94b4143c4ce49c17d3af46bcad0

                    SHA1

                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                    SHA256

                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                    SHA512

                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                  • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                    Filesize

                    197B

                    MD5

                    8088241160261560a02c84025d107592

                    SHA1

                    083121f7027557570994c9fc211df61730455bb5

                    SHA256

                    2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                    SHA512

                    20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                  • \providercommon\DllCommonsvc.exe

                    Filesize

                    1.0MB

                    MD5

                    bd31e94b4143c4ce49c17d3af46bcad0

                    SHA1

                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                    SHA256

                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                    SHA512

                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                  • \providercommon\DllCommonsvc.exe

                    Filesize

                    1.0MB

                    MD5

                    bd31e94b4143c4ce49c17d3af46bcad0

                    SHA1

                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                    SHA256

                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                    SHA512

                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                  • memory/280-135-0x0000000002794000-0x0000000002797000-memory.dmp

                    Filesize

                    12KB

                  • memory/280-136-0x000000000279B000-0x00000000027BA000-memory.dmp

                    Filesize

                    124KB

                  • memory/280-113-0x000007FEEB2C0000-0x000007FEEBE1D000-memory.dmp

                    Filesize

                    11.4MB

                  • memory/280-99-0x000007FEEC6B0000-0x000007FEED0D3000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/280-111-0x0000000002794000-0x0000000002797000-memory.dmp

                    Filesize

                    12KB

                  • memory/280-118-0x000000001B790000-0x000000001BA8F000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/280-123-0x0000000002794000-0x0000000002797000-memory.dmp

                    Filesize

                    12KB

                  • memory/316-89-0x00000000002F0000-0x0000000000400000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/316-96-0x00000000002C0000-0x00000000002D2000-memory.dmp

                    Filesize

                    72KB

                  • memory/552-101-0x000007FEEC6B0000-0x000007FEED0D3000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/552-109-0x00000000026B4000-0x00000000026B7000-memory.dmp

                    Filesize

                    12KB

                  • memory/552-121-0x00000000026B4000-0x00000000026B7000-memory.dmp

                    Filesize

                    12KB

                  • memory/552-128-0x00000000026BB000-0x00000000026DA000-memory.dmp

                    Filesize

                    124KB

                  • memory/552-127-0x00000000026B4000-0x00000000026B7000-memory.dmp

                    Filesize

                    12KB

                  • memory/552-126-0x00000000026BB000-0x00000000026DA000-memory.dmp

                    Filesize

                    124KB

                  • memory/552-105-0x000007FEEB2C0000-0x000007FEEBE1D000-memory.dmp

                    Filesize

                    11.4MB

                  • memory/588-67-0x0000000000490000-0x000000000049C000-memory.dmp

                    Filesize

                    48KB

                  • memory/588-65-0x0000000001360000-0x0000000001470000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/588-66-0x0000000000260000-0x0000000000272000-memory.dmp

                    Filesize

                    72KB

                  • memory/588-68-0x00000000002F0000-0x00000000002FC000-memory.dmp

                    Filesize

                    48KB

                  • memory/588-69-0x0000000000300000-0x000000000030C000-memory.dmp

                    Filesize

                    48KB

                  • memory/800-106-0x0000000002004000-0x0000000002007000-memory.dmp

                    Filesize

                    12KB

                  • memory/800-98-0x000007FEEC6B0000-0x000007FEED0D3000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/800-102-0x000007FEEB2C0000-0x000007FEEBE1D000-memory.dmp

                    Filesize

                    11.4MB

                  • memory/800-134-0x000000000200B000-0x000000000202A000-memory.dmp

                    Filesize

                    124KB

                  • memory/800-114-0x000000001B780000-0x000000001BA7F000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/800-131-0x0000000002004000-0x0000000002007000-memory.dmp

                    Filesize

                    12KB

                  • memory/800-119-0x0000000002004000-0x0000000002007000-memory.dmp

                    Filesize

                    12KB

                  • memory/1100-54-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

                    Filesize

                    8KB

                  • memory/1172-107-0x0000000002754000-0x0000000002757000-memory.dmp

                    Filesize

                    12KB

                  • memory/1172-133-0x000000000275B000-0x000000000277A000-memory.dmp

                    Filesize

                    124KB

                  • memory/1172-132-0x0000000002754000-0x0000000002757000-memory.dmp

                    Filesize

                    12KB

                  • memory/1172-103-0x000007FEEB2C0000-0x000007FEEBE1D000-memory.dmp

                    Filesize

                    11.4MB

                  • memory/1172-125-0x000000001B8D0000-0x000000001BBCF000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/1172-120-0x0000000002754000-0x0000000002757000-memory.dmp

                    Filesize

                    12KB

                  • memory/1172-97-0x000007FEEC6B0000-0x000007FEED0D3000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/1484-130-0x000000000204B000-0x000000000206A000-memory.dmp

                    Filesize

                    124KB

                  • memory/1484-129-0x0000000002044000-0x0000000002047000-memory.dmp

                    Filesize

                    12KB

                  • memory/1484-122-0x0000000002044000-0x0000000002047000-memory.dmp

                    Filesize

                    12KB

                  • memory/1484-100-0x000007FEEC6B0000-0x000007FEED0D3000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/1484-110-0x0000000002044000-0x0000000002047000-memory.dmp

                    Filesize

                    12KB

                  • memory/1484-112-0x000007FEEB2C0000-0x000007FEEBE1D000-memory.dmp

                    Filesize

                    11.4MB

                  • memory/1484-124-0x000000001B950000-0x000000001BC4F000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/1960-78-0x000007FEFC4B1000-0x000007FEFC4B3000-memory.dmp

                    Filesize

                    8KB

                  • memory/1960-108-0x00000000021F4000-0x00000000021F7000-memory.dmp

                    Filesize

                    12KB

                  • memory/1960-117-0x00000000021FB000-0x000000000221A000-memory.dmp

                    Filesize

                    124KB

                  • memory/1960-116-0x00000000021F4000-0x00000000021F7000-memory.dmp

                    Filesize

                    12KB

                  • memory/1960-115-0x00000000021FB000-0x000000000221A000-memory.dmp

                    Filesize

                    124KB

                  • memory/1960-81-0x000007FEEC6B0000-0x000007FEED0D3000-memory.dmp

                    Filesize

                    10.1MB

                  • memory/1960-104-0x000007FEEB2C0000-0x000007FEEBE1D000-memory.dmp

                    Filesize

                    11.4MB