Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2024, 00:45

General

  • Target

    0ad0b4a4a549230e090d712b5521bd96.exe

  • Size

    3.3MB

  • MD5

    0ad0b4a4a549230e090d712b5521bd96

  • SHA1

    55690e0d976955e80f14c314efcaa34e3303a02b

  • SHA256

    9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429

  • SHA512

    b689ab2b7e3a59f760d3c6cb3b72927e3dc0eb9323aceb05c2571ca85863fc769098924b943e6e80edb1853c348451869996fd4c38a7dd10dc8e2970e5d4d027

  • SSDEEP

    49152:dvE7aj/zSltwCUFFINtKAh/tIBs2htYmMoxqSeU843FULbiGLSkGHuIB6MlwALMV:9FzPFFIv7h/KVWYxVeE+i1FOIB6Mmkw

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Executes dropped EXE 12 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ad0b4a4a549230e090d712b5521bd96.exe
    "C:\Users\Admin\AppData\Local\Temp\0ad0b4a4a549230e090d712b5521bd96.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xf5xiSm3pm.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2880
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:2748
          • C:\Program Files\Windows Media Player\Visualizations\smss.exe
            "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tLBDHjzlZn.bat"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1640
              • C:\Windows\system32\chcp.com
                chcp 65001
                5⤵
                  PID:2016
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  5⤵
                    PID:2900
                  • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                    "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2896
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\m2M6WqyfOt.bat"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1028
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        7⤵
                          PID:1552
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          7⤵
                            PID:956
                          • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                            "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1348
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\um5tZ6OCE3.bat"
                              8⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1576
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                9⤵
                                  PID:2256
                                • C:\Windows\system32\PING.EXE
                                  ping -n 10 localhost
                                  9⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:3016
                                • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                  "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                  9⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:2208
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CnplMLrBiA.bat"
                                    10⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:1724
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      11⤵
                                        PID:2088
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        11⤵
                                          PID:1532
                                        • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                          "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                          11⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:2728
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6jqn6DqxiC.bat"
                                            12⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:1756
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              13⤵
                                                PID:2600
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                13⤵
                                                  PID:2144
                                                • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                                  "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                                  13⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2412
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PN8AyO50yD.bat"
                                                    14⤵
                                                      PID:892
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        15⤵
                                                          PID:688
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          15⤵
                                                            PID:2388
                                                          • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                                            "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                                            15⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2296
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9QW9oB7wRt.bat"
                                                              16⤵
                                                                PID:2788
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp 65001
                                                                  17⤵
                                                                    PID:2808
                                                                  • C:\Windows\system32\PING.EXE
                                                                    ping -n 10 localhost
                                                                    17⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    • Runs ping.exe
                                                                    PID:2760
                                                                  • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                                                    "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                                                    17⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2556
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cZiCzHXbdI.bat"
                                                                      18⤵
                                                                        PID:320
                                                                        • C:\Windows\system32\chcp.com
                                                                          chcp 65001
                                                                          19⤵
                                                                            PID:1620
                                                                          • C:\Windows\system32\PING.EXE
                                                                            ping -n 10 localhost
                                                                            19⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:1680
                                                                          • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                                                            "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                                                            19⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1188
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QcyIS95rA8.bat"
                                                                              20⤵
                                                                                PID:1276
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  21⤵
                                                                                    PID:2988
                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                    21⤵
                                                                                      PID:2060
                                                                                    • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                                                                      "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                                                                      21⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1972
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9QW9oB7wRt.bat"
                                                                                        22⤵
                                                                                          PID:1596
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp 65001
                                                                                            23⤵
                                                                                              PID:1300
                                                                                            • C:\Windows\system32\PING.EXE
                                                                                              ping -n 10 localhost
                                                                                              23⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              • Runs ping.exe
                                                                                              PID:2220
                                                                                            • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                                                                              "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                                                                              23⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1660
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dTvpXsGAB1.bat"
                                                                                                24⤵
                                                                                                  PID:2652
                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                    chcp 65001
                                                                                                    25⤵
                                                                                                      PID:1248
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      ping -n 10 localhost
                                                                                                      25⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:860
                                                                                                    • C:\Program Files\Windows Media Player\Visualizations\smss.exe
                                                                                                      "C:\Program Files\Windows Media Player\Visualizations\smss.exe"
                                                                                                      25⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2424
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lpuFzxtUQC.bat"
                                                                                                        26⤵
                                                                                                          PID:1680
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            27⤵
                                                                                                              PID:1740
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              27⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:2648

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe

                                                          Filesize

                                                          3.3MB

                                                          MD5

                                                          0ad0b4a4a549230e090d712b5521bd96

                                                          SHA1

                                                          55690e0d976955e80f14c314efcaa34e3303a02b

                                                          SHA256

                                                          9882ee185d8d4db2a86040b7e3c7687cef737470f2a7b5c88868e80880cbd429

                                                          SHA512

                                                          b689ab2b7e3a59f760d3c6cb3b72927e3dc0eb9323aceb05c2571ca85863fc769098924b943e6e80edb1853c348451869996fd4c38a7dd10dc8e2970e5d4d027

                                                        • C:\Users\Admin\AppData\Local\Temp\6jqn6DqxiC.bat

                                                          Filesize

                                                          237B

                                                          MD5

                                                          1d60d4559b954302de3eb9c9137b3c04

                                                          SHA1

                                                          8aef3c994cbaa68f9dcfda4d88f37cff9fa62200

                                                          SHA256

                                                          bd451f7d27a1da2bc5b0b8835fded579616186ee673dabb77640d7fb11f5198e

                                                          SHA512

                                                          10f379b06bf2002c7b7bb39ccab549818399341c64f488444859ec5e2d63c8e15d615f5e2bf2edd8c9cdfc7967eb52bc595e9f2035ab48d941abefa95d206486

                                                        • C:\Users\Admin\AppData\Local\Temp\9QW9oB7wRt.bat

                                                          Filesize

                                                          189B

                                                          MD5

                                                          807344a3510f81619d9d6d0df78859b5

                                                          SHA1

                                                          da65cdc1a4f4c4694436cc61a9452ea931176238

                                                          SHA256

                                                          3a663dc43e76639ddc672fb924825fc832d5ff99203404c37e973465bf47698f

                                                          SHA512

                                                          0c83c15e96da21665a2064a1a487b63334dd9884e53b0f3a0f6a377e67c3290ef2fbce94979413018a637b726ce4411878632e2f179f02a1cd71839c0abb7890

                                                        • C:\Users\Admin\AppData\Local\Temp\CnplMLrBiA.bat

                                                          Filesize

                                                          237B

                                                          MD5

                                                          9f6bdfe20af9989d6c871e9afc0e723e

                                                          SHA1

                                                          8e92374ac48659dd42313e369ca47ea645ff445e

                                                          SHA256

                                                          57245a5203c96a41190974d36f0f401df423d0ff7f416d625dfc0af157491cc0

                                                          SHA512

                                                          92595cf131fc8669ff242e82e1c3a9e527b03447d7a21a08c31c83d4cf34dbe3330c4696f2a737e88a41dbf2fbfef7319d7fbf9d3899da49707a3e91dd0c45da

                                                        • C:\Users\Admin\AppData\Local\Temp\PN8AyO50yD.bat

                                                          Filesize

                                                          237B

                                                          MD5

                                                          50af63cb2366447d625827c8ea0f2cda

                                                          SHA1

                                                          f224df5d4bba8d7cba3f68016d6c1ea6c866b62d

                                                          SHA256

                                                          4c86046cfb3e4592dbd0d2b0d0277920e165d592585a611442d85960d7bf8ff2

                                                          SHA512

                                                          9a8822e22f670502733934fbb9f7271496234e5adb2efc93844871b613218c8b425922d2274e076067dc06f5f61861c5c15fd32fc89e7e89a5c3643bb8b0d46e

                                                        • C:\Users\Admin\AppData\Local\Temp\QcyIS95rA8.bat

                                                          Filesize

                                                          237B

                                                          MD5

                                                          e44bb84cc8a9f9177c5c7a217641b26d

                                                          SHA1

                                                          c4ac72695df184dcd6c7797f8e0213ba814e0869

                                                          SHA256

                                                          d3c8b17af77ff002acc8ab05e0d365d04c7eb8a9aa5c7f739db8ed53fb150be1

                                                          SHA512

                                                          812a5a7d34bdf3fc475987556aa3f94f3d7f0aaec9c28c2856ba40858c69cd34264a560598feaddb79ee6bc795f0a548f5e94627972ce1aa4cd56c094dccd047

                                                        • C:\Users\Admin\AppData\Local\Temp\cZiCzHXbdI.bat

                                                          Filesize

                                                          189B

                                                          MD5

                                                          b99d74d005ce8c348a59c0e12fc2110f

                                                          SHA1

                                                          12452e0c1dc115a39e9ae207a60cb851932d1b4f

                                                          SHA256

                                                          761479984e1ee04e4a65a2a5d81480072a3f0478da710e608c618534de5cc542

                                                          SHA512

                                                          279906010c3c633f9082beebf104c8e8adb5ad0c6cefa746b160182680fa4453a15453c6709e8c9ed676e4d96b10d57768884344672a936a36794c3528c4aa3b

                                                        • C:\Users\Admin\AppData\Local\Temp\dTvpXsGAB1.bat

                                                          Filesize

                                                          189B

                                                          MD5

                                                          311ee7b38466ff7c9e25b442b7aff411

                                                          SHA1

                                                          f079173209ae24ec1d0b9c987c3351d8a5369439

                                                          SHA256

                                                          91a62b1b1ddc64d8656310fcb5e9e4fda3ddd9f902ed1a9f024b95729bea5219

                                                          SHA512

                                                          8f97daa6c9fe5cd0cf029dbdd714f5d0ba1ccef498eb75fc68f270f1373e7444fa66eed6568534d29704f8147d56569596b441341856af27c69841930f7e293e

                                                        • C:\Users\Admin\AppData\Local\Temp\lpuFzxtUQC.bat

                                                          Filesize

                                                          189B

                                                          MD5

                                                          220528837eea49518b4e0a689582b67e

                                                          SHA1

                                                          fe7aa00f782183a7e4228ce6d46f626801896c62

                                                          SHA256

                                                          ea4a94196e322339e3639a4171fcd1024e0d913e8b4f0900cf145e7bdcbae106

                                                          SHA512

                                                          29c18eb3f4bfa38a070314221241efc38ad560506fd178bef7b2b7ec04d3840ca0cc1e26bc60e58dd212aa5baba1eefe915694a4536b23e879b05df40c24762c

                                                        • C:\Users\Admin\AppData\Local\Temp\m2M6WqyfOt.bat

                                                          Filesize

                                                          237B

                                                          MD5

                                                          76d357ae03bfe52406428355bc3a1a40

                                                          SHA1

                                                          47f17573b81c7fdc7f077dc760e9eaa063528cbc

                                                          SHA256

                                                          2e47c90b5bfb22b23a5ed0d602dfc4f253975e99bba3c16fe7eca7d7f03f4002

                                                          SHA512

                                                          1f8a262244df4954b589f9d7db98e5487df4f7b9573690a15cc11b0f7cdb46f913bb88f4cd56fd39c67c4d670c8d782477f73aebeff26c0e012ea4b91bbf731e

                                                        • C:\Users\Admin\AppData\Local\Temp\tLBDHjzlZn.bat

                                                          Filesize

                                                          237B

                                                          MD5

                                                          51b0e08ba25ebec60f17075208ff75ab

                                                          SHA1

                                                          ecebabb029d36e5e175622d98a265c451a874dcd

                                                          SHA256

                                                          b532519158cafeb3a0634698c4fdb4a0f1532cf48d4fbc37d1e0fafffe7514cc

                                                          SHA512

                                                          942a717d509e358e8d2a546a482150b70de82ace8cbd431ff33fa32adf156081ac91ebb6e283fa79a839897a7c881b6be4431e04e8d9486be0165116bfa27523

                                                        • C:\Users\Admin\AppData\Local\Temp\um5tZ6OCE3.bat

                                                          Filesize

                                                          189B

                                                          MD5

                                                          a18cd12a14bdd849be8a261abe11b20e

                                                          SHA1

                                                          56844b62cf50f865dae0a3c59c1413ebfd958d58

                                                          SHA256

                                                          a25d7809d74ae113dfde3985290f1a63c909cfefc2943360f57a8047d35e1291

                                                          SHA512

                                                          e4ff1933dd6fedf8d126f2e0bb3788a5bc75d8e5a1a8893766b57da5b8f618d9aa745c1728f94c8470879b2facfa618c0ddca10f2d708dc34c3e12e9658b36a0

                                                        • C:\Users\Admin\AppData\Local\Temp\xf5xiSm3pm.bat

                                                          Filesize

                                                          237B

                                                          MD5

                                                          2e3893e4e53882674ae459026954e004

                                                          SHA1

                                                          d47c4a72126c539febc90d5a95e5d8d4fc69b165

                                                          SHA256

                                                          232371fd269a724497b19b8e06acad890170a0df5156a316f7a55e798d82f978

                                                          SHA512

                                                          9779ec41afb4f32270edd5e4bcb62ec253a28cf03ee5a717b9e8bd9b3709c15427e70b4f0c0b7e8fb9df14876d38eec1ee0d5b046ef976f85a17ee68aa384995

                                                        • memory/1188-256-0x0000000001220000-0x0000000001566000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/1348-112-0x0000000000080000-0x00000000003C6000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/1660-304-0x00000000010A0000-0x00000000013E6000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/1972-280-0x00000000002B0000-0x00000000005F6000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/2172-21-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-20-0x0000000000420000-0x000000000042E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/2172-23-0x0000000000BA0000-0x0000000000BB2000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/2172-18-0x0000000000410000-0x0000000000420000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/2172-31-0x0000000000430000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/2172-33-0x00000000007D0000-0x00000000007E0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/2172-35-0x00000000007E0000-0x00000000007F0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/2172-37-0x0000000000EA0000-0x0000000000EFA000-memory.dmp

                                                          Filesize

                                                          360KB

                                                        • memory/2172-39-0x0000000000C00000-0x0000000000C10000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/2172-41-0x0000000000C10000-0x0000000000C1E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/2172-43-0x0000000000C20000-0x0000000000C2C000-memory.dmp

                                                          Filesize

                                                          48KB

                                                        • memory/2172-45-0x0000000001030000-0x000000000107E000-memory.dmp

                                                          Filesize

                                                          312KB

                                                        • memory/2172-24-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-26-0x0000000000BC0000-0x0000000000BD6000-memory.dmp

                                                          Filesize

                                                          88KB

                                                        • memory/2172-62-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-1-0x0000000001160000-0x00000000014A6000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/2172-27-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-29-0x0000000000BE0000-0x0000000000BF2000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/2172-0-0x000007FEF5E53000-0x000007FEF5E54000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2172-15-0x00000000005A0000-0x00000000005B8000-memory.dmp

                                                          Filesize

                                                          96KB

                                                        • memory/2172-2-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-16-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-3-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-13-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-4-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-10-0x0000000000200000-0x000000000020E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/2172-6-0x0000000000440000-0x0000000000466000-memory.dmp

                                                          Filesize

                                                          152KB

                                                        • memory/2172-12-0x0000000000580000-0x000000000059C000-memory.dmp

                                                          Filesize

                                                          112KB

                                                        • memory/2172-7-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2172-8-0x000007FEF5E50000-0x000007FEF683C000-memory.dmp

                                                          Filesize

                                                          9.9MB

                                                        • memory/2208-136-0x00000000003D0000-0x0000000000716000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/2296-208-0x0000000000C00000-0x0000000000F46000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/2412-184-0x0000000000AF0000-0x0000000000E36000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/2556-232-0x0000000000F60000-0x00000000012A6000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/2572-65-0x0000000000C20000-0x0000000000F66000-memory.dmp

                                                          Filesize

                                                          3.3MB

                                                        • memory/2728-160-0x00000000008A0000-0x0000000000BE6000-memory.dmp

                                                          Filesize

                                                          3.3MB