Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 02:03

General

  • Target

    0e1ea55667ec6d7ed658718be1528ce3f5e5ac464113e114a96379004137787b.exe

  • Size

    3.7MB

  • MD5

    934f077da68d3fda26839f06286b71e4

  • SHA1

    f805ec2e43d7518d420b94b954fd6b4e640ef64d

  • SHA256

    0e1ea55667ec6d7ed658718be1528ce3f5e5ac464113e114a96379004137787b

  • SHA512

    85e2bff55ce5aa6569d50146a3d95c611f774605fa9a8ee041cede3a928bf7585943e63aaf9eb5b14dc4d25fe6bee3e57d58c9b586653322300aaa67e87dd714

  • SSDEEP

    49152:UbA30FDlon6ZtXRUNAtf3zkDcpigc4Jp8+bF5BxiLFHqzQ6yQH2lJwtYv2:UbZ7tXyNAtf3Rigc4n58xHqzQ6TH2Lel

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e1ea55667ec6d7ed658718be1528ce3f5e5ac464113e114a96379004137787b.exe
    "C:\Users\Admin\AppData\Local\Temp\0e1ea55667ec6d7ed658718be1528ce3f5e5ac464113e114a96379004137787b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\BridgehyperchainportAgent\lcZ6MvLb.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\BridgehyperchainportAgent\akmRZ8KYIwqCrue04KkAUPxFzhoyZ.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\BridgehyperchainportAgent\hyperblockDll.exe
          "C:\BridgehyperchainportAgent\hyperblockDll.exe"
          4⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3464
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XRUFp2rQv1.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2076
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2176
              • C:\Users\Admin\explorer.exe
                "C:\Users\Admin\explorer.exe"
                6⤵
                • UAC bypass
                • Checks computer location settings
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:4240
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7e9a152a-e892-471b-8781-af4463ca344a.vbs"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4136
                  • C:\Users\Admin\explorer.exe
                    C:\Users\Admin\explorer.exe
                    8⤵
                    • UAC bypass
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:3300
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\014bbeff-d3d3-4f10-904f-f2bbac9bcbe8.vbs"
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3560
                      • C:\Users\Admin\explorer.exe
                        C:\Users\Admin\explorer.exe
                        10⤵
                        • UAC bypass
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        • System policy modification
                        PID:4616
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f8be67f7-7eff-4636-bb79-2134f75fd934.vbs"
                          11⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2244
                          • C:\Users\Admin\explorer.exe
                            C:\Users\Admin\explorer.exe
                            12⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1436
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tyn9L6IQ9t.bat"
                          11⤵
                          • Suspicious use of WriteProcessMemory
                          PID:440
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            12⤵
                              PID:4428
                            • C:\Users\Admin\explorer.exe
                              "C:\Users\Admin\explorer.exe"
                              12⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3180
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5r0vkQZNof.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4256
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:4172
                          • C:\Users\Admin\explorer.exe
                            "C:\Users\Admin\explorer.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2304
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7f0e5868-415d-4063-9b5c-65d3b38d5411.vbs"
                          9⤵
                            PID:1960
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YAqnNK9scZ.bat"
                        7⤵
                        • Suspicious use of WriteProcessMemory
                        PID:872
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          8⤵
                            PID:4988
                          • C:\Users\Admin\explorer.exe
                            "C:\Users\Admin\explorer.exe"
                            8⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1860
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e934c361-59c8-46a8-be1f-a72b42259213.vbs"
                          7⤵
                            PID:4332
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\BridgehyperchainportAgent\file.vbs"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:1244
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\BridgehyperchainportAgent\RuntimeBroker.exe'" /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:1860
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\BridgehyperchainportAgent\RuntimeBroker.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:3084
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\BridgehyperchainportAgent\RuntimeBroker.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:3600
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\explorer.exe'" /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:3264
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Admin\explorer.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:4492
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\explorer.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:844
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:1848
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:748
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:1196
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:4712
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:2000
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:3192
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\wininit.exe'" /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:628
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\wininit.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:4428
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\wininit.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:1436
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Windows\IdentityCRL\INT\taskhostw.exe'" /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:4484
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\INT\taskhostw.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:1716
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Windows\IdentityCRL\INT\taskhostw.exe'" /rl HIGHEST /f
                1⤵
                • Process spawned unexpected child process
                • Scheduled Task/Job: Scheduled Task
                PID:4572

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\BridgehyperchainportAgent\akmRZ8KYIwqCrue04KkAUPxFzhoyZ.bat

                Filesize

                48B

                MD5

                efb9b32455839f2f1e46065e13aeb93f

                SHA1

                cae49ccdd500a9808ac144387b15ad6ced46c036

                SHA256

                611d9c30bfabaaa6e9aee5c75025b71dca9116c45300ac325febeefe2d5b0e24

                SHA512

                351d053f36e497238add089f19e30f164c1110be7826d58e7fb71705b06a7d6d51789add692ac08af4c1e613e3f9c54789a5c8f707ad302a70bcd379645cff1c

              • C:\BridgehyperchainportAgent\file.vbs

                Filesize

                34B

                MD5

                677cc4360477c72cb0ce00406a949c61

                SHA1

                b679e8c3427f6c5fc47c8ac46cd0e56c9424de05

                SHA256

                f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b

                SHA512

                7cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a

              • C:\BridgehyperchainportAgent\hyperblockDll.exe

                Filesize

                3.4MB

                MD5

                df6d3aff42df48d0830227cae92e6bd6

                SHA1

                bf7f75fd82694b2a44098df2b28c2db35e7ea142

                SHA256

                05b5df5bc84e193fba3aa26d1b20cb81faa7b176a24a8df2238c8ed61e6e583a

                SHA512

                07163831729582397fdbdcef5d921750b2968b9d555fd0b881913ae1b283573e4efc827d0eb51552882743b541e44ff2a8dbf0d99a4e5c3f47228a4536bab64a

              • C:\BridgehyperchainportAgent\lcZ6MvLb.vbe

                Filesize

                231B

                MD5

                05a47a3e17c29bf5b8bc6949a26ccb44

                SHA1

                87e896625a30943a252a839ba3e22507422bbb04

                SHA256

                85f873ac1def74dea8180c0cce0084490505d2bc213abf34d3a95fda4b92c63f

                SHA512

                72ef9bb092cfbc824341aa0075ee594b410e9afea3a8ae40c0f1743a4cb2528005701099ef156dc0f2a2da4474809f1d5995e01d12c6ac36f0cc7ae6baf8f64b

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log

                Filesize

                1KB

                MD5

                655010c15ea0ca05a6e5ddcd84986b98

                SHA1

                120bf7e516aeed462c07625fbfcdab5124ad05d3

                SHA256

                2b1ffeab025cc7c61c50e3e2e4c9253046d9174cf00181a8c1de733a4c0daa14

                SHA512

                e52c26718d7d1e979837b5ac626dde26920fe7413b8aa7be6f1be566a1b0f035582f4d313400e3ad6b92552abb1dfaf186b60b875fb955a2a94fd839fe841437

              • C:\Users\Admin\AppData\Local\Temp\014bbeff-d3d3-4f10-904f-f2bbac9bcbe8.vbs

                Filesize

                703B

                MD5

                1b9637d95dc7b9d6002757f9683f4246

                SHA1

                d0e67b2bc9924c37f9be92d2d861be9060496f70

                SHA256

                1a41dd9b2b249cf500dd0e2e94f2f93b0efc3070358e059adcb31303c6da0dc6

                SHA512

                f94f46aabd4f28e2a8fca6692dd2d21e286ae5029b5ec3eb227f7fb28674ace142c6fbf0db589696690baeee50e7ca3b40b9eae13f1f4a05d0c277f10158b968

              • C:\Users\Admin\AppData\Local\Temp\5r0vkQZNof.bat

                Filesize

                192B

                MD5

                2144077f3bd91b8454f5c25fd1532143

                SHA1

                303ba6d70931389d4adaac62d0cd2cd879539a45

                SHA256

                9c05d5ae45a2b9168c6639743b93aa97ba75abb165d7518e746354a605819ed8

                SHA512

                3e5d1888a4c11c0ff2737242161496d21368ee2692c17f965d258e3b37667eadf6f25040a63886d2acbecc0ddb55aacb01045453b30f756b99a3e0e7461366b3

              • C:\Users\Admin\AppData\Local\Temp\7e9a152a-e892-471b-8781-af4463ca344a.vbs

                Filesize

                703B

                MD5

                c5132a0bba80b430a2b22814ec8b3d64

                SHA1

                82b921e101506e1d077152fd2aa2bc7ad6fd7974

                SHA256

                35a4df3647dd15284216507b32fe1fb66e5443511ad59e66480e7c86d2cf2d1c

                SHA512

                b07aa25b90be0925bc574c164937e772c7fc5a12fabaafee6ab4f13051c3e70f59be59648833066082c37d6b10f98aa7d96b480f17db75f4d75f34b4da0d043b

              • C:\Users\Admin\AppData\Local\Temp\XRUFp2rQv1.bat

                Filesize

                192B

                MD5

                74ae213f5413b8cd81f869fa85b7facc

                SHA1

                d404a2ee5365519c811c44e92be82d66245af422

                SHA256

                9439a96063c79fb2d812a715178ea7518e935894b09262168a9f9d619bf04fd0

                SHA512

                71d68e677734df5c98735e1a883e529389ff2b686abbb34f8ddaef42e8a7549792f253e3d8921c3d8e56c1d6d4e8b9e7541df777ae6338094ff34f1d5dd3fc95

              • C:\Users\Admin\AppData\Local\Temp\YAqnNK9scZ.bat

                Filesize

                192B

                MD5

                76d87fd2a3d34cda8a7a19b7ebf9be29

                SHA1

                7e44366ff22831b4d7b3a8915e9affab62e4363e

                SHA256

                dabef4e321447e8bef1f71dd2b237432a729b8cdf65087e0f73a12c0070aaa5d

                SHA512

                2df1c4fc09914b26f984955072b427cc78dd4447b2b3373e32d5d8192eaf498452701464e556e138368510ebc46aa2f3e009da50b2e8841403376412ad915ac5

              • C:\Users\Admin\AppData\Local\Temp\e934c361-59c8-46a8-be1f-a72b42259213.vbs

                Filesize

                479B

                MD5

                37d195c917d992a0366f45468c011620

                SHA1

                6e5afd65cb16981c8cc66fdf3724db082372726e

                SHA256

                767713b2b4adaebe6afb1f33a50312b139529f41e70de28bc6ba1392d31fb162

                SHA512

                f9f043e5eadc11cf7da9b2ef7b619cf6acf6bb914a1d09e221c6544c0205ee469792d5ba1775bc3ecafd0b548145858d34093ed6f081ce154642143357c2f7f3

              • C:\Users\Admin\AppData\Local\Temp\f8be67f7-7eff-4636-bb79-2134f75fd934.vbs

                Filesize

                703B

                MD5

                20036095c3ef4c13307de4ea15217705

                SHA1

                248f5142be92e21a0ce5e384ec7a75f4e81f7840

                SHA256

                fa9f9305cd3d314d3cd1fbe431ab13f8bfe58dd30f1c90ba49c91ff412b7f43e

                SHA512

                323c6f8a3739f72c2734066987ce3eb2bfb5114d96d1925a5589e07f356d15ab184a3a3e0cb7c54c93b885aa01744445fe9cf5faeaa320f92077c43f905cadbb

              • C:\Users\Admin\AppData\Local\Temp\tyn9L6IQ9t.bat

                Filesize

                192B

                MD5

                1081a0d52c4de425242b14818c66a563

                SHA1

                8e3ef4cf5f0e50556a4f3918afea02f057b68830

                SHA256

                9aae1b8fde94d0fefff84721f90d11b1801c426d99c166bbf8efed7eb6fc47e3

                SHA512

                254fd3dc2604b437615141742430b7ebc628653433c486ecc6bf9e664fc5042906fe455464934e146025602740fc8ef0372485806ce28173eb241ecea984de23

              • memory/3464-34-0x000000001C050000-0x000000001C058000-memory.dmp

                Filesize

                32KB

              • memory/3464-42-0x000000001C0F0000-0x000000001C0FC000-memory.dmp

                Filesize

                48KB

              • memory/3464-25-0x000000001B820000-0x000000001B836000-memory.dmp

                Filesize

                88KB

              • memory/3464-26-0x000000001B840000-0x000000001B848000-memory.dmp

                Filesize

                32KB

              • memory/3464-27-0x000000001B850000-0x000000001B862000-memory.dmp

                Filesize

                72KB

              • memory/3464-28-0x000000001B870000-0x000000001B87C000-memory.dmp

                Filesize

                48KB

              • memory/3464-29-0x000000001B860000-0x000000001B868000-memory.dmp

                Filesize

                32KB

              • memory/3464-30-0x000000001C0E0000-0x000000001C0F0000-memory.dmp

                Filesize

                64KB

              • memory/3464-31-0x000000001BFE0000-0x000000001BFEA000-memory.dmp

                Filesize

                40KB

              • memory/3464-32-0x000000001BFF0000-0x000000001C046000-memory.dmp

                Filesize

                344KB

              • memory/3464-33-0x000000001C040000-0x000000001C04C000-memory.dmp

                Filesize

                48KB

              • memory/3464-23-0x000000001B800000-0x000000001B808000-memory.dmp

                Filesize

                32KB

              • memory/3464-35-0x000000001C060000-0x000000001C06C000-memory.dmp

                Filesize

                48KB

              • memory/3464-36-0x000000001C070000-0x000000001C078000-memory.dmp

                Filesize

                32KB

              • memory/3464-37-0x000000001C080000-0x000000001C092000-memory.dmp

                Filesize

                72KB

              • memory/3464-38-0x000000001C620000-0x000000001CB48000-memory.dmp

                Filesize

                5.2MB

              • memory/3464-40-0x000000001C0C0000-0x000000001C0CC000-memory.dmp

                Filesize

                48KB

              • memory/3464-39-0x000000001C0B0000-0x000000001C0BC000-memory.dmp

                Filesize

                48KB

              • memory/3464-41-0x000000001C0D0000-0x000000001C0D8000-memory.dmp

                Filesize

                32KB

              • memory/3464-24-0x000000001B810000-0x000000001B820000-memory.dmp

                Filesize

                64KB

              • memory/3464-43-0x000000001C100000-0x000000001C10C000-memory.dmp

                Filesize

                48KB

              • memory/3464-44-0x000000001C380000-0x000000001C388000-memory.dmp

                Filesize

                32KB

              • memory/3464-45-0x000000001C210000-0x000000001C21C000-memory.dmp

                Filesize

                48KB

              • memory/3464-46-0x000000001C220000-0x000000001C22A000-memory.dmp

                Filesize

                40KB

              • memory/3464-49-0x000000001C350000-0x000000001C35E000-memory.dmp

                Filesize

                56KB

              • memory/3464-48-0x000000001C340000-0x000000001C348000-memory.dmp

                Filesize

                32KB

              • memory/3464-47-0x000000001C230000-0x000000001C23E000-memory.dmp

                Filesize

                56KB

              • memory/3464-50-0x000000001C360000-0x000000001C368000-memory.dmp

                Filesize

                32KB

              • memory/3464-51-0x000000001C370000-0x000000001C37C000-memory.dmp

                Filesize

                48KB

              • memory/3464-22-0x000000001BE90000-0x000000001BEE0000-memory.dmp

                Filesize

                320KB

              • memory/3464-21-0x000000001B7E0000-0x000000001B7FC000-memory.dmp

                Filesize

                112KB

              • memory/3464-20-0x00000000013A0000-0x00000000013A8000-memory.dmp

                Filesize

                32KB

              • memory/3464-19-0x0000000001390000-0x000000000139E000-memory.dmp

                Filesize

                56KB

              • memory/3464-18-0x0000000001380000-0x000000000138E000-memory.dmp

                Filesize

                56KB

              • memory/3464-17-0x0000000000850000-0x0000000000BBA000-memory.dmp

                Filesize

                3.4MB

              • memory/3464-52-0x000000001C390000-0x000000001C398000-memory.dmp

                Filesize

                32KB

              • memory/3464-53-0x000000001C4A0000-0x000000001C4AA000-memory.dmp

                Filesize

                40KB

              • memory/3464-54-0x000000001C3A0000-0x000000001C3AC000-memory.dmp

                Filesize

                48KB