Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 15:16

General

  • Target

    9040D1F68050A9B2533AC7E8B59C2AA0.exe

  • Size

    3.4MB

  • MD5

    9040d1f68050a9b2533ac7e8b59c2aa0

  • SHA1

    1b38a5284d4510423c0c4ac77066fc6eb41b9286

  • SHA256

    7eb02adb15e19f6a197a641d054d24d133f6d0880afbb8ff53a6629cbc666b67

  • SHA512

    e2121c2d4156af7968d3e608affc33519933a9e8c3ae6b2ad49af059e3b6cca12b1e3f36bc0283df2ae9645c199192d45f6b1e8053af6adf08724d11791a1f39

  • SSDEEP

    49152:s3GMesEktOcTPuKyI1qd5i6JTnl9gs6ToWbepfutWiNFg20+5J3pS8Dzy:nuEktPuu1qbhwDoWHgt+5JZS8fy

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 24 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 18 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 12 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • System policy modification 1 TTPs 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9040D1F68050A9B2533AC7E8B59C2AA0.exe
    "C:\Users\Admin\AppData\Local\Temp\9040D1F68050A9B2533AC7E8B59C2AA0.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1076
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\o9WJoXeSAa.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1172
        • C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe
          "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:680
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\929dbc38-b3a3-4564-9e57-df347d0f970f.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4052
            • C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe
              "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"
              5⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4228
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a9dfc884-90a5-46df-9eca-90e5317086bf.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4544
                • C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe
                  "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"
                  7⤵
                  • UAC bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:2264
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1c472ea4-c141-40bf-a9a1-2a5c5ba3241f.vbs"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:5000
                    • C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe
                      "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"
                      9⤵
                      • UAC bypass
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:1148
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\348c9634-389a-4f75-ac70-e05009b07989.vbs"
                        10⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3844
                        • C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe
                          "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe"
                          11⤵
                          • UAC bypass
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          • System policy modification
                          PID:3164
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\04ef9370-1cd5-4f33-91dc-7dd201e07181.vbs"
                            12⤵
                              PID:2052
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3034841a-1eb3-442a-82dc-fc011c3dc0a5.vbs"
                              12⤵
                                PID:1572
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7e2601a0-e406-4e37-9b56-b485a63a7986.vbs"
                            10⤵
                              PID:1104
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d127243a-56e1-40e4-b03c-66a3e10debbe.vbs"
                          8⤵
                            PID:3668
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2b4ce047-7af4-4036-b280-091d369d5932.vbs"
                        6⤵
                          PID:4668
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\54be16a2-7139-42c4-9c60-73a9a2af418a.vbs"
                      4⤵
                        PID:3028
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\csrss.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:4092
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:820
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:536
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\csrss.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:1684
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\csrss.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2808
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\dotnet\host\fxr\7.0.16\csrss.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3460
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\Idle.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:1860
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3784
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3772
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\addins\fontdrvhost.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2392
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\addins\fontdrvhost.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3404
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Windows\addins\fontdrvhost.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2388
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\Panther\actionqueue\lsass.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3548
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\Panther\actionqueue\lsass.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3544
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Windows\Panther\actionqueue\lsass.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:1560
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3160
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:404
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\backgroundTaskHost.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:984
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:5060
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:4808
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3892
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\services.exe'" /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:2100
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\services.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3116
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\services.exe'" /rl HIGHEST /f
                  1⤵
                  • Process spawned unexpected child process
                  • Scheduled Task/Job: Scheduled Task
                  PID:3896

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\backgroundTaskHost.exe.log

                  Filesize

                  1KB

                  MD5

                  49b64127208271d8f797256057d0b006

                  SHA1

                  b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

                  SHA256

                  2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

                  SHA512

                  f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

                • C:\Users\Admin\AppData\Local\Temp\04ef9370-1cd5-4f33-91dc-7dd201e07181.vbs

                  Filesize

                  761B

                  MD5

                  ee802087c28df8be013dc7b34151c372

                  SHA1

                  6b43dd1193e3713e89137ef568f8316105abc4a0

                  SHA256

                  0557c6301cb0930258988f6a215b56d50b8cb0ec83c152b57ef1c3e1b3c20460

                  SHA512

                  695b942ba4b5c273ea7facf2388c258d4c1659e6b31f6caf48b9dc346029be79f78440c50d70d0b6a247312b1ff9f73f0554532788a00a8b81a818bdc8a5afdf

                • C:\Users\Admin\AppData\Local\Temp\1c472ea4-c141-40bf-a9a1-2a5c5ba3241f.vbs

                  Filesize

                  761B

                  MD5

                  97040e8113aee3db2d5a4d363143d7c2

                  SHA1

                  16418373bc62419b8a419b4422f72f06804e824e

                  SHA256

                  19a92923f2c57742e333ad49619ec7e2e49ce6063811440372595b8008adb79f

                  SHA512

                  a73ca4747726fbc73222daa469d9aeec5c9f7d4010f1bce34d3d6f7864df3c6f5f5ba5c2ba0eba1ff5dd97b400c34763a43202fdb3e018c746eab2996845dfb9

                • C:\Users\Admin\AppData\Local\Temp\348c9634-389a-4f75-ac70-e05009b07989.vbs

                  Filesize

                  761B

                  MD5

                  caca77cd2ea8756708391f44bb696919

                  SHA1

                  9ea3998035410f1e5f882342072ef809f1c1e27e

                  SHA256

                  be95d4c579856cd6f4869dc571b100dbd783232e40c7dab26577beeba7ea6b3f

                  SHA512

                  bb6e019f9a198c27b6f3823156c123b2fdfafacb2e4b898dca1f9b9f1fbf2756220e392e325934dbaf7601dd360069bd6caeb77282bc425a63776f9bc4f7df05

                • C:\Users\Admin\AppData\Local\Temp\54be16a2-7139-42c4-9c60-73a9a2af418a.vbs

                  Filesize

                  537B

                  MD5

                  de79fe1a606013fb0295d69d776155b2

                  SHA1

                  650b8d042a81049b180b52ad2c76af019dab4bcd

                  SHA256

                  f415d76a4a1c558e3fad7a0f2ab9b018971318604a01e78651d96aa2bb9ad520

                  SHA512

                  126af2a3f9a4217917082d329f18586542f0858484fae0a842c1bc0ddcaff972f78d88a86385c532373f4d4dcb155d61c5ac367fc60cf49051000cadae394b7a

                • C:\Users\Admin\AppData\Local\Temp\929dbc38-b3a3-4564-9e57-df347d0f970f.vbs

                  Filesize

                  760B

                  MD5

                  cb61d25b2c60ef0bf5bd06edf0fcd4a5

                  SHA1

                  ec7e014fb9f6abb4a2bb702cb96e9d84f90453f2

                  SHA256

                  2a0e67d38c2707bfeee32770fc1a7976466e26a709498298615822471a47eec7

                  SHA512

                  0eee3a96a1f629b2c098a273beecbf17a4295391bdcde750df5fc34e33ad30ef2b779d37cc16641fcd2321746db81937792b3257721ed6c9be38ba764e428432

                • C:\Users\Admin\AppData\Local\Temp\a9dfc884-90a5-46df-9eca-90e5317086bf.vbs

                  Filesize

                  761B

                  MD5

                  def717afb3be4dc38da61dc76f9a14af

                  SHA1

                  cd5e8edf00f657419cc50bcb7187308d98375500

                  SHA256

                  57ada85d11cd74175ee5d13d2580caff045969739d0f6cf8c3d5a07a2b8a28ff

                  SHA512

                  fc89d39c2b1e963692972def8cc4fa57afebb81ced08d18ff4ad41642a5bb8410ab1d65ff27963128e6db7f23ba3f210e89b020bf2a5861aa5e9bef55afcf9be

                • C:\Users\Admin\AppData\Local\Temp\o9WJoXeSAa.bat

                  Filesize

                  250B

                  MD5

                  db2ad240d502f125599643a778e3950e

                  SHA1

                  856b3e2fc2bde3b5f288c85ec0287a9a1e022a23

                  SHA256

                  2cf3145b15b768872a7778df721389b31a4df294c4c6002a739e9822763a462a

                  SHA512

                  ef2669507cfad985dca6f26a9ea3cce6889f62f5252413d1ea233d150a6e2cbc74dea060a703fb283232fa086c1f694bc99fadc17829ada2b83193215991ae61

                • C:\Windows\Panther\actionqueue\lsass.exe

                  Filesize

                  3.4MB

                  MD5

                  9040d1f68050a9b2533ac7e8b59c2aa0

                  SHA1

                  1b38a5284d4510423c0c4ac77066fc6eb41b9286

                  SHA256

                  7eb02adb15e19f6a197a641d054d24d133f6d0880afbb8ff53a6629cbc666b67

                  SHA512

                  e2121c2d4156af7968d3e608affc33519933a9e8c3ae6b2ad49af059e3b6cca12b1e3f36bc0283df2ae9645c199192d45f6b1e8053af6adf08724d11791a1f39

                • memory/1076-26-0x000000001BF10000-0x000000001BF18000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-30-0x000000001B4D0000-0x000000001B4DC000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-11-0x000000001B560000-0x000000001B568000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-12-0x000000001B570000-0x000000001B582000-memory.dmp

                  Filesize

                  72KB

                • memory/1076-13-0x000000001B580000-0x000000001B58C000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-14-0x000000001B590000-0x000000001B598000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-15-0x000000001B5A0000-0x000000001B5B0000-memory.dmp

                  Filesize

                  64KB

                • memory/1076-16-0x000000001B710000-0x000000001B71A000-memory.dmp

                  Filesize

                  40KB

                • memory/1076-17-0x000000001BE60000-0x000000001BEB6000-memory.dmp

                  Filesize

                  344KB

                • memory/1076-18-0x000000001B720000-0x000000001B72C000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-19-0x000000001B730000-0x000000001B738000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-20-0x000000001B740000-0x000000001B74C000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-21-0x000000001BEB0000-0x000000001BEB8000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-22-0x000000001BEC0000-0x000000001BED2000-memory.dmp

                  Filesize

                  72KB

                • memory/1076-23-0x000000001C420000-0x000000001C948000-memory.dmp

                  Filesize

                  5.2MB

                • memory/1076-25-0x000000001BF00000-0x000000001BF0C000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-24-0x000000001BEF0000-0x000000001BEFC000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-0-0x00007FF8244B3000-0x00007FF8244B5000-memory.dmp

                  Filesize

                  8KB

                • memory/1076-27-0x000000001BF20000-0x000000001BF2C000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-28-0x000000001B4C0000-0x000000001B4CC000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-29-0x000000001C170000-0x000000001C178000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-10-0x000000001B540000-0x000000001B556000-memory.dmp

                  Filesize

                  88KB

                • memory/1076-31-0x000000001B4E0000-0x000000001B4EA000-memory.dmp

                  Filesize

                  40KB

                • memory/1076-32-0x000000001B4F0000-0x000000001B4FE000-memory.dmp

                  Filesize

                  56KB

                • memory/1076-34-0x000000001C140000-0x000000001C14E000-memory.dmp

                  Filesize

                  56KB

                • memory/1076-33-0x000000001C130000-0x000000001C138000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-36-0x000000001C160000-0x000000001C16C000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-38-0x000000001C190000-0x000000001C19A000-memory.dmp

                  Filesize

                  40KB

                • memory/1076-35-0x000000001C150000-0x000000001C158000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-39-0x000000001C1A0000-0x000000001C1AC000-memory.dmp

                  Filesize

                  48KB

                • memory/1076-37-0x000000001C180000-0x000000001C188000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-8-0x000000001B520000-0x000000001B528000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-9-0x000000001B530000-0x000000001B540000-memory.dmp

                  Filesize

                  64KB

                • memory/1076-62-0x00007FF8244B0000-0x00007FF824F71000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1076-7-0x000000001B6C0000-0x000000001B710000-memory.dmp

                  Filesize

                  320KB

                • memory/1076-6-0x000000001B500000-0x000000001B51C000-memory.dmp

                  Filesize

                  112KB

                • memory/1076-5-0x0000000002BD0000-0x0000000002BD8000-memory.dmp

                  Filesize

                  32KB

                • memory/1076-4-0x0000000002AB0000-0x0000000002ABE000-memory.dmp

                  Filesize

                  56KB

                • memory/1076-1-0x0000000000670000-0x00000000009DA000-memory.dmp

                  Filesize

                  3.4MB

                • memory/1076-3-0x0000000002AA0000-0x0000000002AAE000-memory.dmp

                  Filesize

                  56KB

                • memory/1076-2-0x00007FF8244B0000-0x00007FF824F71000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2264-89-0x000000001B6A0000-0x000000001B6B2000-memory.dmp

                  Filesize

                  72KB

                • memory/3164-112-0x000000001B800000-0x000000001B812000-memory.dmp

                  Filesize

                  72KB