Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 20:12

General

  • Target

    NEAS.32e1b0bf75950d5889638f0e030f70c0.exe

  • Size

    1.3MB

  • MD5

    32e1b0bf75950d5889638f0e030f70c0

  • SHA1

    46452b2a92fc30511ebe60c7daf946e039240985

  • SHA256

    91bc33ad3f53ecdae0a4f033c876fabae135910ea24351c6aee87d85d1bfff9f

  • SHA512

    2b58e540672e426838a436e6ef31cd46dafb2ca00767c35efcb4822ec19801fc33ef93fa61fae204249753ae58ad864b29747662c36691a8ed6a59ac0ddd860b

  • SSDEEP

    24576:h/DBENpV4Ttrg7k+F9P8w7YomZunmGKgPL+0Ha:9DKpVoaJQkmUnbhL/

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.32e1b0bf75950d5889638f0e030f70c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.32e1b0bf75950d5889638f0e030f70c0.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1080
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1740
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2188
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1360
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1748
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:792
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2560
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2220
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2308
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1600
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2208
    • C:\Program Files\Microsoft Office\Office14\1033\spoolsv.exe
      "C:\Program Files\Microsoft Office\Office14\1033\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2576
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\lsass.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2508
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2552
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2612
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\Office14\1033\spoolsv.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2980
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1052
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\Office14\1033\spoolsv.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1104
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Mail\en-US\WmiPrvSE.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1036
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\en-US\WmiPrvSE.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2468
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Mail\en-US\WmiPrvSE.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1444
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\audiodg.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2680
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\audiodg.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2816
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\audiodg.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\lsass.exe

    Filesize

    1.3MB

    MD5

    32e1b0bf75950d5889638f0e030f70c0

    SHA1

    46452b2a92fc30511ebe60c7daf946e039240985

    SHA256

    91bc33ad3f53ecdae0a4f033c876fabae135910ea24351c6aee87d85d1bfff9f

    SHA512

    2b58e540672e426838a436e6ef31cd46dafb2ca00767c35efcb4822ec19801fc33ef93fa61fae204249753ae58ad864b29747662c36691a8ed6a59ac0ddd860b

  • C:\Program Files\Microsoft Office\Office14\1033\spoolsv.exe

    Filesize

    1.3MB

    MD5

    69047e8b8d2d207ea6e9817fdea2160a

    SHA1

    5acbc3a83ad6133ead06811652a8b6e6f98654bb

    SHA256

    b3f90dfd84f47be26762fe81d335911bc7abe8406e7fd88fad2707711dcea4ee

    SHA512

    89baff29f1bf69475aeed8328c2464e2a3a0696835608d3d2b7d0e29be65e5e6d8516da73e6509af9b74ffef42bbefa0b6c134027d0e5b7353410206ae33727f

  • C:\Program Files\Microsoft Office\Office14\1033\spoolsv.exe

    Filesize

    1.3MB

    MD5

    69047e8b8d2d207ea6e9817fdea2160a

    SHA1

    5acbc3a83ad6133ead06811652a8b6e6f98654bb

    SHA256

    b3f90dfd84f47be26762fe81d335911bc7abe8406e7fd88fad2707711dcea4ee

    SHA512

    89baff29f1bf69475aeed8328c2464e2a3a0696835608d3d2b7d0e29be65e5e6d8516da73e6509af9b74ffef42bbefa0b6c134027d0e5b7353410206ae33727f

  • C:\Program Files\Microsoft Office\Office14\1033\spoolsv.exe

    Filesize

    1.3MB

    MD5

    69047e8b8d2d207ea6e9817fdea2160a

    SHA1

    5acbc3a83ad6133ead06811652a8b6e6f98654bb

    SHA256

    b3f90dfd84f47be26762fe81d335911bc7abe8406e7fd88fad2707711dcea4ee

    SHA512

    89baff29f1bf69475aeed8328c2464e2a3a0696835608d3d2b7d0e29be65e5e6d8516da73e6509af9b74ffef42bbefa0b6c134027d0e5b7353410206ae33727f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\99E9KP7QBLNI2DMOGM7Y.temp

    Filesize

    7KB

    MD5

    e5556271e201717758851a76ee6fcbee

    SHA1

    4b893d5e3cf0c07ff92a91167a013eb0363e92f1

    SHA256

    bf42f7bf99cfb0b458a2fb1251c1fd061e83ee04658a653d1c7dcaa78bde2136

    SHA512

    29dbadc2da0fe2bd067ad2a68f8207f637fb5ea7e184ab1831fdea3411158a196d7ddff2caefbdd4835e740fb2491bacc69b260ec5fbfdf24a51c06e6b98e6ce

  • memory/792-119-0x0000000002800000-0x0000000002880000-memory.dmp

    Filesize

    512KB

  • memory/792-164-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/792-118-0x0000000002800000-0x0000000002880000-memory.dmp

    Filesize

    512KB

  • memory/792-115-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/792-106-0x000000001B3B0000-0x000000001B692000-memory.dmp

    Filesize

    2.9MB

  • memory/792-107-0x0000000001DD0000-0x0000000001DD8000-memory.dmp

    Filesize

    32KB

  • memory/792-116-0x0000000002800000-0x0000000002880000-memory.dmp

    Filesize

    512KB

  • memory/792-117-0x0000000002800000-0x0000000002880000-memory.dmp

    Filesize

    512KB

  • memory/1080-146-0x0000000002A80000-0x0000000002B00000-memory.dmp

    Filesize

    512KB

  • memory/1080-147-0x0000000002A80000-0x0000000002B00000-memory.dmp

    Filesize

    512KB

  • memory/1080-145-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1192-4-0x000000001B190000-0x000000001B210000-memory.dmp

    Filesize

    512KB

  • memory/1192-0-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/1192-114-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/1192-2-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/1192-3-0x000000001B190000-0x000000001B210000-memory.dmp

    Filesize

    512KB

  • memory/1192-5-0x00000000006C0000-0x00000000006DC000-memory.dmp

    Filesize

    112KB

  • memory/1192-6-0x00000000001C0000-0x00000000001D0000-memory.dmp

    Filesize

    64KB

  • memory/1192-7-0x0000000000B20000-0x0000000000B36000-memory.dmp

    Filesize

    88KB

  • memory/1192-9-0x00000000006E0000-0x00000000006EC000-memory.dmp

    Filesize

    48KB

  • memory/1192-8-0x0000000000340000-0x000000000034A000-memory.dmp

    Filesize

    40KB

  • memory/1192-1-0x0000000000FF0000-0x0000000001142000-memory.dmp

    Filesize

    1.3MB

  • memory/1360-156-0x00000000029F0000-0x0000000002A70000-memory.dmp

    Filesize

    512KB

  • memory/1360-155-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1360-158-0x00000000029F0000-0x0000000002A70000-memory.dmp

    Filesize

    512KB

  • memory/1360-157-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1360-159-0x00000000029F0000-0x0000000002A70000-memory.dmp

    Filesize

    512KB

  • memory/1600-162-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1600-123-0x00000000024A0000-0x0000000002520000-memory.dmp

    Filesize

    512KB

  • memory/1600-163-0x00000000024A0000-0x0000000002520000-memory.dmp

    Filesize

    512KB

  • memory/1600-122-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1600-161-0x00000000024A0000-0x0000000002520000-memory.dmp

    Filesize

    512KB

  • memory/1740-160-0x0000000002500000-0x0000000002580000-memory.dmp

    Filesize

    512KB

  • memory/1740-154-0x0000000002500000-0x0000000002580000-memory.dmp

    Filesize

    512KB

  • memory/1740-151-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1740-152-0x0000000002500000-0x0000000002580000-memory.dmp

    Filesize

    512KB

  • memory/1748-124-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1748-125-0x0000000002900000-0x0000000002980000-memory.dmp

    Filesize

    512KB

  • memory/1748-132-0x0000000002900000-0x0000000002980000-memory.dmp

    Filesize

    512KB

  • memory/1748-126-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1748-130-0x0000000002900000-0x0000000002980000-memory.dmp

    Filesize

    512KB

  • memory/1968-137-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/1968-139-0x0000000002A70000-0x0000000002AF0000-memory.dmp

    Filesize

    512KB

  • memory/1968-138-0x0000000002A70000-0x0000000002AF0000-memory.dmp

    Filesize

    512KB

  • memory/2188-144-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/2188-141-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/2188-140-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/2208-148-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/2208-150-0x0000000002990000-0x0000000002A10000-memory.dmp

    Filesize

    512KB

  • memory/2208-153-0x0000000002990000-0x0000000002A10000-memory.dmp

    Filesize

    512KB

  • memory/2208-149-0x0000000002990000-0x0000000002A10000-memory.dmp

    Filesize

    512KB

  • memory/2220-135-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/2220-136-0x0000000002650000-0x00000000026D0000-memory.dmp

    Filesize

    512KB

  • memory/2220-134-0x0000000002650000-0x00000000026D0000-memory.dmp

    Filesize

    512KB

  • memory/2308-129-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/2308-131-0x0000000002480000-0x0000000002500000-memory.dmp

    Filesize

    512KB

  • memory/2308-127-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/2308-128-0x0000000002480000-0x0000000002500000-memory.dmp

    Filesize

    512KB

  • memory/2308-133-0x0000000002480000-0x0000000002500000-memory.dmp

    Filesize

    512KB

  • memory/2560-142-0x0000000002A80000-0x0000000002B00000-memory.dmp

    Filesize

    512KB

  • memory/2560-143-0x000007FEECD90000-0x000007FEED72D000-memory.dmp

    Filesize

    9.6MB

  • memory/2576-120-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2576-121-0x000000001B1C0000-0x000000001B240000-memory.dmp

    Filesize

    512KB

  • memory/2576-113-0x00000000011F0000-0x0000000001342000-memory.dmp

    Filesize

    1.3MB