Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 10:52

General

  • Target

    f72e4dd60ebccfa1790bb49c335dd79ff4860da3c5623c30a778d4cbc6f61077.exe

  • Size

    1.8MB

  • MD5

    7582ed7a9f3ac0c15a2b7c81155d8b59

  • SHA1

    0c0429b3d9f1acaeeffb7fd92946cab77d1be2f6

  • SHA256

    f72e4dd60ebccfa1790bb49c335dd79ff4860da3c5623c30a778d4cbc6f61077

  • SHA512

    6be6568d2109397e266ce71014f503ec10bd38626146bb38f7955b6f360fccd4c05bad19ac5f94f3695427c595e9eda61079c01e6d156634978039c3749245a0

  • SSDEEP

    49152:OhjAJVllHZrhbBruPk+xjSMX4ODTDF8OcFSkMh:OgVTVXYNX9mOWSkM

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f72e4dd60ebccfa1790bb49c335dd79ff4860da3c5623c30a778d4cbc6f61077.exe
    "C:\Users\Admin\AppData\Local\Temp\f72e4dd60ebccfa1790bb49c335dd79ff4860da3c5623c30a778d4cbc6f61077.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2204
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\f72e4dd60ebccfa1790bb49c335dd79ff4860da3c5623c30a778d4cbc6f61077.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1068
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\smss.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dllhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:360
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Videos\RuntimeBroker.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1464
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\fontdrvhost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3580
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\System.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2904
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\csrss.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1664
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GzNm8d7cL0.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:4676
        • C:\Recovery\WindowsRE\fontdrvhost.exe
          "C:\Recovery\WindowsRE\fontdrvhost.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:928
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\77b03e35-0451-4371-8fd8-0ff63a69da4a.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3416
            • C:\Recovery\WindowsRE\fontdrvhost.exe
              C:\Recovery\WindowsRE\fontdrvhost.exe
              5⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1428
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6e59a0f2-e300-446c-af38-d7af3d5d19c3.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3244
                • C:\Recovery\WindowsRE\fontdrvhost.exe
                  C:\Recovery\WindowsRE\fontdrvhost.exe
                  7⤵
                  • UAC bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:3964
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\87222994-ea78-41c5-bf90-3f3ea8c1e731.vbs"
                    8⤵
                      PID:392
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\80bece52-b31a-4ee6-865b-420477439eb4.vbs"
                      8⤵
                        PID:4520
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c902d54c-6ba7-4aac-8354-85b9a965269b.vbs"
                    6⤵
                      PID:1952
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0260fd4f-e7df-44f1-8475-65644f21a53d.vbs"
                  4⤵
                    PID:2928
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\smss.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4268
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\smss.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2464
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Uninstall Information\smss.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4688
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:5104
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2592
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1436
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3416
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3960
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Videos\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1692
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2944
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3484
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2060
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\System.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2996
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4896
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4532
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4668
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3368
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3328

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Recovery\WindowsRE\System.exe

              Filesize

              1.8MB

              MD5

              7582ed7a9f3ac0c15a2b7c81155d8b59

              SHA1

              0c0429b3d9f1acaeeffb7fd92946cab77d1be2f6

              SHA256

              f72e4dd60ebccfa1790bb49c335dd79ff4860da3c5623c30a778d4cbc6f61077

              SHA512

              6be6568d2109397e266ce71014f503ec10bd38626146bb38f7955b6f360fccd4c05bad19ac5f94f3695427c595e9eda61079c01e6d156634978039c3749245a0

            • C:\Recovery\WindowsRE\fontdrvhost.exe

              Filesize

              1.8MB

              MD5

              4719de302f125b25850e7c78ded2acf9

              SHA1

              0036bcc15f1b62edf5a9c3e8db1643c898676578

              SHA256

              498a0a570cba4406e646375a6e270afe4a129a5868e5736a6475ef6020c2c504

              SHA512

              696d1e99426828ef4c31e577a984d497b015ca61c1bb474e288d108839a6c8b86736f60131e73c0fb1b356212adf14c26d0f5a9093a052575b0efc0f54c07c3b

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log

              Filesize

              1KB

              MD5

              4a667f150a4d1d02f53a9f24d89d53d1

              SHA1

              306e125c9edce66f28fdb63e6c4ca5c9ad6e8c97

              SHA256

              414659decfd237dde09625a49811e03b5b30ee06ee2ee97ea8bcfac394d281fd

              SHA512

              4edd8e73ce03488a6d92750a782cd4042fbb54a5b3f8d8ba3ea227fda0653c2cd84f0c5d64976c7cdc1f518a2fdc8ff10e2a015ec7acf3cd01b0d62bc98542d8

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              2e907f77659a6601fcc408274894da2e

              SHA1

              9f5b72abef1cd7145bf37547cdb1b9254b4efe9d

              SHA256

              385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233

              SHA512

              34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              cadef9abd087803c630df65264a6c81c

              SHA1

              babbf3636c347c8727c35f3eef2ee643dbcc4bd2

              SHA256

              cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

              SHA512

              7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              bd5940f08d0be56e65e5f2aaf47c538e

              SHA1

              d7e31b87866e5e383ab5499da64aba50f03e8443

              SHA256

              2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

              SHA512

              c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

            • C:\Users\Admin\AppData\Local\Temp\0260fd4f-e7df-44f1-8475-65644f21a53d.vbs

              Filesize

              489B

              MD5

              8df3ee806a56d2eeb4053d9837ffb0bf

              SHA1

              fe9d78325277b316bece625984643d9ac13e5b78

              SHA256

              5b5f2868892c1fc73fff07467f3af6fd63245d6fe71df991a2b64fc7e259697d

              SHA512

              34c567eef66002859e5d75dd0d673be3928114e73d320a9cf29949464bcb18fb0aefa946488015923f58e4d36769bd8a024735a246533f6d2c52608de98f1d02

            • C:\Users\Admin\AppData\Local\Temp\6e59a0f2-e300-446c-af38-d7af3d5d19c3.vbs

              Filesize

              713B

              MD5

              0c37ebe30f233ad3138d7fc14c48eb4a

              SHA1

              c2504b0b53213c9744a80187eb8d27b8106fcd7b

              SHA256

              b4f4dc1dd132056dec87ecd653c75e145342dc39328de5704e4179e8ee4f1434

              SHA512

              2c5ff711ce3ff48187d884b3617ed62e999972ca1bc3f2906f3151344f48b1112af64d55594ecb94e14ec3b9f3b085e5e03708bc3ee57f07ae511e034df111ab

            • C:\Users\Admin\AppData\Local\Temp\77b03e35-0451-4371-8fd8-0ff63a69da4a.vbs

              Filesize

              712B

              MD5

              78605832c1d803eef5ec3c45d05e032f

              SHA1

              906591895ca1efed7885ba512c2424d709f13a7c

              SHA256

              25322f50aa8aca479802595ad8c5823fe54156ef9b066fd58ea104adf8b5aaec

              SHA512

              a8bcf23ec90791a8f0ac8c06bb588996a120355577e57a736f6d2e06dec5043dda916f667f4702bc1fbad6e56612a5f1fc3d92391832f85c236bd0066686f960

            • C:\Users\Admin\AppData\Local\Temp\87222994-ea78-41c5-bf90-3f3ea8c1e731.vbs

              Filesize

              713B

              MD5

              37bf12e81434d9e06cbac4301b78ea72

              SHA1

              24c2d28da24ccea2cba811c42db42f23b761116f

              SHA256

              961ce2f17ba6653194f80c03808696f73e083f43d5232067942a6b018c027dca

              SHA512

              838d2ba80dfc4cb25ee5eaaad149341503977c8cad7db4ce4b20fba1abcd36ecded53f947f16534f3b3f83a67e8c104f727d8bdc3d0b1f2201504959758bd71f

            • C:\Users\Admin\AppData\Local\Temp\GzNm8d7cL0.bat

              Filesize

              202B

              MD5

              b9d38ca28bc7e824cd3e5654d85b6adf

              SHA1

              794c5796dbf185b6d4561eed26c6cbef7bc71d42

              SHA256

              92f7c54d247ffa5e1b33f9d44ebeb20e654019a1b569a1ad2e1f8396325752cf

              SHA512

              bde60966d4218c4fb4b30ebe9419eb2915025e7a6e1a726a2a60d6646080480338c16115cdae2a147edab8b15c8667567edf56cacffa23a630f6835a2649d61f

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_d3qqyo1v.4od.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • memory/928-165-0x0000000002F70000-0x0000000002F82000-memory.dmp

              Filesize

              72KB

            • memory/928-163-0x0000000000C10000-0x0000000000DDE000-memory.dmp

              Filesize

              1.8MB

            • memory/928-164-0x0000000002F50000-0x0000000002F62000-memory.dmp

              Filesize

              72KB

            • memory/2204-10-0x000000001BED0000-0x000000001BEDA000-memory.dmp

              Filesize

              40KB

            • memory/2204-0-0x00007FFA5E943000-0x00007FFA5E945000-memory.dmp

              Filesize

              8KB

            • memory/2204-6-0x00000000030C0000-0x00000000030D0000-memory.dmp

              Filesize

              64KB

            • memory/2204-2-0x00007FFA5E940000-0x00007FFA5F401000-memory.dmp

              Filesize

              10.8MB

            • memory/2204-97-0x00007FFA5E940000-0x00007FFA5F401000-memory.dmp

              Filesize

              10.8MB

            • memory/2204-17-0x000000001C0B0000-0x000000001C0BC000-memory.dmp

              Filesize

              48KB

            • memory/2204-16-0x000000001C0A0000-0x000000001C0AC000-memory.dmp

              Filesize

              48KB

            • memory/2204-13-0x000000001C070000-0x000000001C07A000-memory.dmp

              Filesize

              40KB

            • memory/2204-15-0x000000001C090000-0x000000001C09E000-memory.dmp

              Filesize

              56KB

            • memory/2204-14-0x000000001C080000-0x000000001C08E000-memory.dmp

              Filesize

              56KB

            • memory/2204-12-0x000000001C5A0000-0x000000001CAC8000-memory.dmp

              Filesize

              5.2MB

            • memory/2204-3-0x0000000002EE0000-0x0000000002EFC000-memory.dmp

              Filesize

              112KB

            • memory/2204-11-0x000000001BEE0000-0x000000001BEF2000-memory.dmp

              Filesize

              72KB

            • memory/2204-9-0x000000001BEF0000-0x000000001BF00000-memory.dmp

              Filesize

              64KB

            • memory/2204-4-0x000000001BF20000-0x000000001BF70000-memory.dmp

              Filesize

              320KB

            • memory/2204-7-0x00000000030D0000-0x00000000030E6000-memory.dmp

              Filesize

              88KB

            • memory/2204-8-0x00000000030F0000-0x0000000003102000-memory.dmp

              Filesize

              72KB

            • memory/2204-5-0x0000000002F00000-0x0000000002F08000-memory.dmp

              Filesize

              32KB

            • memory/2204-1-0x0000000000A80000-0x0000000000C4E000-memory.dmp

              Filesize

              1.8MB

            • memory/3660-88-0x00000181E1970000-0x00000181E1992000-memory.dmp

              Filesize

              136KB

            • memory/3964-189-0x000000001BBC0000-0x000000001BBD2000-memory.dmp

              Filesize

              72KB