Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 03:29

General

  • Target

    cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b.exe

  • Size

    1.5MB

  • MD5

    6689bd9a5c795eedc631e5fbb850b7ff

  • SHA1

    b63d8e25d4eb9abea3ed0f7867f70db2ab18cba2

  • SHA256

    cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b

  • SHA512

    ff51ccd8918344bb0439a4d9e39394383bff2196496d778db9a3d2862479e55f1bf59c7d467ff055c721231cb592c3c7ded63c5af28a3f9552dc6421dd1151bf

  • SSDEEP

    24576:K17t7ROjwJqMAVS2hEijP79eAPkavlCCyYcBoZ11q8UuZPt5PsuWg:KBt7R0wJ4L5Uw5lCCyG31oIPmg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b.exe
    "C:\Users\Admin\AppData\Local\Temp\cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qma5cbm4\qma5cbm4.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFA5E.tmp" "c:\Windows\System32\CSCF892EDC45ABD4F58B1F2532E30E49087.TMP"
        3⤵
          PID:428
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\Idle.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Registry.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3096
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\winlogon.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1152
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\AccountPictures\winlogon.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1696
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\it-IT\upfc.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1308
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1664
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LC5jFUShbt.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4144
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:1240
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3708
          • C:\Users\Default User\winlogon.exe
            "C:\Users\Default User\winlogon.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3144
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\Chrome\Application\Idle.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1928
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3752
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\Chrome\Application\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4704
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Registry.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4448
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Public\Registry.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3884
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Registry.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1364
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\winlogon.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1892
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default User\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3100
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4292
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Users\Public\AccountPictures\winlogon.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3144
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2552
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Users\Public\AccountPictures\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2272
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\upfc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4860
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1140
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Media Player\it-IT\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1604
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810bc" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\Temp\cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2956
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3388
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810bc" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\AppData\Local\Temp\cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:756

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Google\Chrome\Application\Idle.exe

        Filesize

        1.5MB

        MD5

        6689bd9a5c795eedc631e5fbb850b7ff

        SHA1

        b63d8e25d4eb9abea3ed0f7867f70db2ab18cba2

        SHA256

        cb4626ad921c63113e18c3aefb109f70c8e334089871133ea675d62d836d810b

        SHA512

        ff51ccd8918344bb0439a4d9e39394383bff2196496d778db9a3d2862479e55f1bf59c7d467ff055c721231cb592c3c7ded63c5af28a3f9552dc6421dd1151bf

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        6d3e9c29fe44e90aae6ed30ccf799ca8

        SHA1

        c7974ef72264bbdf13a2793ccf1aed11bc565dce

        SHA256

        2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

        SHA512

        60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        2e907f77659a6601fcc408274894da2e

        SHA1

        9f5b72abef1cd7145bf37547cdb1b9254b4efe9d

        SHA256

        385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233

        SHA512

        34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

      • C:\Users\Admin\AppData\Local\Temp\LC5jFUShbt.bat

        Filesize

        162B

        MD5

        2ab03bebe1e568ee4a1d598090cec060

        SHA1

        40f15527db0e77b36345ed0f730e67ded8db93f3

        SHA256

        373d76ecdb784422462e8222cb0e813099ed896e5feae1d6fe4d853a775aca94

        SHA512

        fea7ce67bd39adc00bfc75c515ba6aadd77a6db939af9f647adfc8e4e814e334f5b0b32625cb3676035d871a9f9e9b955395862e91246f6769c076c14d3c9191

      • C:\Users\Admin\AppData\Local\Temp\RESFA5E.tmp

        Filesize

        1KB

        MD5

        d0fceb20fb72de53339cc9e54cdc0827

        SHA1

        4331345e19082a740eabf8d249eef668ea703023

        SHA256

        c2d09446696ed82da7f323d2b1d88f9dfc5e3d7d3bbb3bf5a4aec05a9f87a061

        SHA512

        4922fea37c44ee06c6627b3a45ee6ecf9783efec6220a0421c1f903a625c68c39c527d3856ab799422f269f7e6e9d2e22153168f06142d75b0dbb9f3e5735442

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gi2ngyv4.fy4.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • \??\c:\Users\Admin\AppData\Local\Temp\qma5cbm4\qma5cbm4.0.cs

        Filesize

        383B

        MD5

        dbf1eb897d72bfc36f933e6fd4c4b3ee

        SHA1

        57192094aaa8e6797d4bd0afd345da2abfbbb063

        SHA256

        29bbaf7f35d02c0f188753f19522cf449eba3650289e0cc96625089232c31360

        SHA512

        9f056e8f72c67aeebeb8858cff0d26706bda965772c01f3059b1b9de1f4e55d6f830d24e3897185dd7eca9587ce64b9b00672630168ad837b401eac3bae1b193

      • \??\c:\Users\Admin\AppData\Local\Temp\qma5cbm4\qma5cbm4.cmdline

        Filesize

        235B

        MD5

        e69d2f329b59eba15f4938d5471f54bc

        SHA1

        5ad41eea6c2bc9875676c23c825ab67246857b46

        SHA256

        a143c620bd3d68c9d754c4e451f01b065fce8282808f8c406057cec0eb71fde7

        SHA512

        2b5370aca484c809b8b80d844020b210e20b938f5158e802d74bc42bc280a6c5420d3ff4f220d066e4623e2714b7e7bd224fc3966b7c9d783711c7af6637f9e4

      • \??\c:\Windows\System32\CSCF892EDC45ABD4F58B1F2532E30E49087.TMP

        Filesize

        1KB

        MD5

        75e32610d8ef6143201c7c28465fcda9

        SHA1

        b2bae99fade2dda07aecbe1659d184be0fc4e7a6

        SHA256

        97ee1cac3965d9cc55a60f20206f384719431f19ac96bdc52b93a98de51a639b

        SHA512

        b303fb99586efd19a08223ba93472fa6d33fcf9198bbf42fb16ba61001db59e5fd5835ea7696ed34e4004d23fa60697e724e6085d1269d788204bf95dfe46abc

      • memory/1308-3614-0x000001A4C5800000-0x000001A4C5822000-memory.dmp

        Filesize

        136KB

      • memory/3808-39-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-22-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-24-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-12-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-10-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-6-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-14-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-3-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-63-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-67-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-66-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-61-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-59-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-57-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-55-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-53-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-51-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-49-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-47-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-45-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-43-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-29-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-37-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-35-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-33-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-31-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-27-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-26-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-19-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-16-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-17-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3022-0x00007FFD7FAC3000-0x00007FFD7FAC5000-memory.dmp

        Filesize

        8KB

      • memory/3808-3479-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3562-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3563-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3565-0x0000000001390000-0x000000000139E000-memory.dmp

        Filesize

        56KB

      • memory/3808-3566-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3567-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3569-0x000000001B7D0000-0x000000001B7EC000-memory.dmp

        Filesize

        112KB

      • memory/3808-3575-0x00000000013F0000-0x00000000013FC000-memory.dmp

        Filesize

        48KB

      • memory/3808-3576-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3573-0x000000001B7F0000-0x000000001B808000-memory.dmp

        Filesize

        96KB

      • memory/3808-3571-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-41-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-8-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-3570-0x000000001B840000-0x000000001B890000-memory.dmp

        Filesize

        320KB

      • memory/3808-3578-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3590-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3587-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-3624-0x00007FFD7FAC0000-0x00007FFD80581000-memory.dmp

        Filesize

        10.8MB

      • memory/3808-4-0x000000001B5F0000-0x000000001B7C4000-memory.dmp

        Filesize

        1.8MB

      • memory/3808-2-0x000000001B5F0000-0x000000001B7CA000-memory.dmp

        Filesize

        1.9MB

      • memory/3808-1-0x0000000000AC0000-0x0000000000AC8000-memory.dmp

        Filesize

        32KB

      • memory/3808-0-0x00007FFD7FAC3000-0x00007FFD7FAC5000-memory.dmp

        Filesize

        8KB