Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2023 21:16
Behavioral task
behavioral1
Sample
bb1ef2ca98ae809bf836c6f1767cc426.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bb1ef2ca98ae809bf836c6f1767cc426.exe
Resource
win10v2004-20230220-en
General
-
Target
bb1ef2ca98ae809bf836c6f1767cc426.exe
-
Size
827KB
-
MD5
bb1ef2ca98ae809bf836c6f1767cc426
-
SHA1
3ec5f3acbf39a52ae978cfe6d440090e6e7e85d6
-
SHA256
5232c6db5c412780ace4c035be6bde85e2ff91f4d5699f849b028939dc39cf74
-
SHA512
c3d9a6ceaff7bfdca46cd115aad4ed0739cfdef2809149a29e5eca26a0a5cc9bedd0225adc17d6c4fb344a3edf0e553d24fdba63a34e820dcd8144453985e7cc
-
SSDEEP
12288:tuSciL28Yzhe9iolOGbdUUd+3JQvv0Iggv0v/X8qnNLblqR:tciL28Y+iYOGpUUd+3HIg3nNLG
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 30 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2416 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3080 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1108 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1216 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3440 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4660 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1268 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 640 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2556 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3364 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1120 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3868 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3316 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2212 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4572 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1352 2380 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 2380 schtasks.exe -
Processes:
resource yara_rule behavioral2/memory/4972-133-0x0000000000450000-0x0000000000526000-memory.dmp dcrat C:\Program Files\Internet Explorer\de-DE\fontdrvhost.exe dcrat C:\odt\spoolsv.exe dcrat C:\odt\spoolsv.exe dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bb1ef2ca98ae809bf836c6f1767cc426.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation bb1ef2ca98ae809bf836c6f1767cc426.exe -
Executes dropped EXE 1 IoCs
Processes:
spoolsv.exepid process 2336 spoolsv.exe -
Drops file in Program Files directory 4 IoCs
Processes:
bb1ef2ca98ae809bf836c6f1767cc426.exedescription ioc process File created C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe bb1ef2ca98ae809bf836c6f1767cc426.exe File created C:\Program Files (x86)\Windows Multimedia Platform\ea1d8f6d871115 bb1ef2ca98ae809bf836c6f1767cc426.exe File created C:\Program Files\Internet Explorer\de-DE\fontdrvhost.exe bb1ef2ca98ae809bf836c6f1767cc426.exe File created C:\Program Files\Internet Explorer\de-DE\5b884080fd4f94 bb1ef2ca98ae809bf836c6f1767cc426.exe -
Drops file in Windows directory 2 IoCs
Processes:
bb1ef2ca98ae809bf836c6f1767cc426.exedescription ioc process File created C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Themes\SIHClient.exe bb1ef2ca98ae809bf836c6f1767cc426.exe File created C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Themes\7b3bf1de107bcf bb1ef2ca98ae809bf836c6f1767cc426.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1752 schtasks.exe 1108 schtasks.exe 4660 schtasks.exe 2556 schtasks.exe 1996 schtasks.exe 1352 schtasks.exe 640 schtasks.exe 1120 schtasks.exe 2212 schtasks.exe 4572 schtasks.exe 2476 schtasks.exe 2644 schtasks.exe 3080 schtasks.exe 1268 schtasks.exe 1756 schtasks.exe 3040 schtasks.exe 232 schtasks.exe 1576 schtasks.exe 3440 schtasks.exe 1696 schtasks.exe 3868 schtasks.exe 2804 schtasks.exe 3316 schtasks.exe 2560 schtasks.exe 2068 schtasks.exe 2416 schtasks.exe 1216 schtasks.exe 2264 schtasks.exe 3364 schtasks.exe 2040 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
bb1ef2ca98ae809bf836c6f1767cc426.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings bb1ef2ca98ae809bf836c6f1767cc426.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
bb1ef2ca98ae809bf836c6f1767cc426.exespoolsv.exepid process 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe 2336 spoolsv.exe 2336 spoolsv.exe 2336 spoolsv.exe 2336 spoolsv.exe 2336 spoolsv.exe 2336 spoolsv.exe 2336 spoolsv.exe 2336 spoolsv.exe 2336 spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bb1ef2ca98ae809bf836c6f1767cc426.exespoolsv.exedescription pid process Token: SeDebugPrivilege 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe Token: SeDebugPrivilege 2336 spoolsv.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bb1ef2ca98ae809bf836c6f1767cc426.execmd.exedescription pid process target process PID 4972 wrote to memory of 2004 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe cmd.exe PID 4972 wrote to memory of 2004 4972 bb1ef2ca98ae809bf836c6f1767cc426.exe cmd.exe PID 2004 wrote to memory of 3740 2004 cmd.exe w32tm.exe PID 2004 wrote to memory of 3740 2004 cmd.exe w32tm.exe PID 2004 wrote to memory of 2336 2004 cmd.exe spoolsv.exe PID 2004 wrote to memory of 2336 2004 cmd.exe spoolsv.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb1ef2ca98ae809bf836c6f1767cc426.exe"C:\Users\Admin\AppData\Local\Temp\bb1ef2ca98ae809bf836c6f1767cc426.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gPruMTYe2E.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
-
C:\odt\spoolsv.exe"C:\odt\spoolsv.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\odt\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\odt\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\de-DE\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\de-DE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Program Files\Internet Explorer\de-DE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SIHClientS" /sc MINUTE /mo 11 /tr "'C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Themes\SIHClient.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SIHClient" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Themes\SIHClient.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SIHClientS" /sc MINUTE /mo 10 /tr "'C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Themes\SIHClient.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\odt\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\odt\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\odt\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Internet Explorer\de-DE\fontdrvhost.exeFilesize
827KB
MD5bb1ef2ca98ae809bf836c6f1767cc426
SHA13ec5f3acbf39a52ae978cfe6d440090e6e7e85d6
SHA2565232c6db5c412780ace4c035be6bde85e2ff91f4d5699f849b028939dc39cf74
SHA512c3d9a6ceaff7bfdca46cd115aad4ed0739cfdef2809149a29e5eca26a0a5cc9bedd0225adc17d6c4fb344a3edf0e553d24fdba63a34e820dcd8144453985e7cc
-
C:\Users\Admin\AppData\Local\Temp\gPruMTYe2E.batFilesize
183B
MD569561caeef7aa6ed66ad8a9a5c71bc9a
SHA14f6086901c8cfaf50aec57fc2a9a9329a99a64bc
SHA25695252f1c3e1acd66d1a5a71cf562e2078495b46d8d4c2bcab818891604ede0ba
SHA51266b43f47bf6313abe2b277796aa64d36e9cc7a42de5b0d54399833e56a4b615746dc3e993a5d2d7c97422c515606208732a9a90aa77d4d550d7c155acb651eda
-
C:\odt\spoolsv.exeFilesize
827KB
MD5bb1ef2ca98ae809bf836c6f1767cc426
SHA13ec5f3acbf39a52ae978cfe6d440090e6e7e85d6
SHA2565232c6db5c412780ace4c035be6bde85e2ff91f4d5699f849b028939dc39cf74
SHA512c3d9a6ceaff7bfdca46cd115aad4ed0739cfdef2809149a29e5eca26a0a5cc9bedd0225adc17d6c4fb344a3edf0e553d24fdba63a34e820dcd8144453985e7cc
-
C:\odt\spoolsv.exeFilesize
827KB
MD5bb1ef2ca98ae809bf836c6f1767cc426
SHA13ec5f3acbf39a52ae978cfe6d440090e6e7e85d6
SHA2565232c6db5c412780ace4c035be6bde85e2ff91f4d5699f849b028939dc39cf74
SHA512c3d9a6ceaff7bfdca46cd115aad4ed0739cfdef2809149a29e5eca26a0a5cc9bedd0225adc17d6c4fb344a3edf0e553d24fdba63a34e820dcd8144453985e7cc
-
memory/2336-164-0x000000001BA50000-0x000000001BA60000-memory.dmpFilesize
64KB
-
memory/2336-165-0x000000001BA50000-0x000000001BA60000-memory.dmpFilesize
64KB
-
memory/4972-133-0x0000000000450000-0x0000000000526000-memory.dmpFilesize
856KB
-
memory/4972-134-0x000000001B4C0000-0x000000001B4D0000-memory.dmpFilesize
64KB