Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2025 01:16

General

  • Target

    ba65161e6e83ddc896f9a5461f93d8f1.exe

  • Size

    2.7MB

  • MD5

    ba65161e6e83ddc896f9a5461f93d8f1

  • SHA1

    51ecdadd3f065686e9fc6394685d968215cf4029

  • SHA256

    b8b5f7e2edc5114c9554dde3723b6f6221e4ec5ae0379c7feff8e2bc7398507d

  • SHA512

    264f88cce23bcaa16394f7d22e443bccb5a10ba080acee2d71daaddee24f9e9b3c14435a971d52c4fbf22d83e7fed7a9eea0d55179db88096724b6e32808dacd

  • SSDEEP

    49152:XRx6mfxiUnp3jfmEXD9KxZU9IaK3clnUezzuuLjaO7e:h40VJ5XQxZUyrctHNyse

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 45 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 10 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba65161e6e83ddc896f9a5461f93d8f1.exe
    "C:\Users\Admin\AppData\Local\Temp\ba65161e6e83ddc896f9a5461f93d8f1.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2244
    • C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\taskhost.exe
      "C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\taskhost.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:1128
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Downloads\winlogon.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2804
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Public\Downloads\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2840
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Downloads\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2408
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Windows\en-US\winlogon.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2332
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\en-US\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2604
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Windows\en-US\winlogon.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2940
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\taskhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2924
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\taskhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2012
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\taskhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2644
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2612
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2668
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3044
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Videos\lsass.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3048
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default\Videos\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1712
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Videos\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2928
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\wininit.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1920
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:868
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\wininit.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2664
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "ba65161e6e83ddc896f9a5461f93d8f1b" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\ba65161e6e83ddc896f9a5461f93d8f1.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2776
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "ba65161e6e83ddc896f9a5461f93d8f1" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\ba65161e6e83ddc896f9a5461f93d8f1.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1700
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "ba65161e6e83ddc896f9a5461f93d8f1b" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\ba65161e6e83ddc896f9a5461f93d8f1.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2880
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Windows\Fonts\lsm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1820
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\Fonts\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1612
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Windows\Fonts\lsm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:896
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\es-ES\lsass.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2636
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\es-ES\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:3068
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\es-ES\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2448
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\smss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2396
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1440
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\smss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1872
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\Idle.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1536
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2452
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:448
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Microsoft Help\dwm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2480
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft Help\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2080
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Microsoft Help\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:380
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:976
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1868
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2032
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Windows\en-US\lsass.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1248
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\en-US\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:2544
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Windows\en-US\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1540
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:1532
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:756
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Scheduled Task/Job: Scheduled Task
    PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Google\Chrome\Application\SetupMetrics\System.exe

    Filesize

    2.7MB

    MD5

    f8851d741f989f2e5110540daf0939da

    SHA1

    9966a81c230588d70b293ff02cc36d411612dffe

    SHA256

    52145f9cd5df3cad4daf1a2ccd8ae7a8f8710f632b5f66b29559d2edb705f908

    SHA512

    845f3f34c0d70df056501cb147aa253ab1119761f22c556064ac4cf584e21cdfeda5a1875115c7d5be721adc3ecb8914d275115d522cf8cf363c1f3c566fb5b4

  • C:\ProgramData\Adobe\Acrobat\9.0\Replicate\smss.exe

    Filesize

    2.7MB

    MD5

    dd6f6b8d59afacd532b8c4741f1daa45

    SHA1

    02ca5b55d51737dc3dbb1929d5e850a145fba79a

    SHA256

    749f5c52e6e7a397df0f3a7ea89a2242599fbd0e919a86c9ca55fb9b4c829541

    SHA512

    f2fecf6edd9dbb4d1514b0c1b63d48e5c64951b8f8af4aa7790655c8888e77c613df029b985fc6ed6d50749cb5b8cbffc2c9f88ae5a8c6835ae2c75a4d477fd0

  • C:\Users\Default\Idle.exe

    Filesize

    2.7MB

    MD5

    e5a75024a01a32d6a0a1c734c96aed55

    SHA1

    b878ffe609627f95b8be8b4b090dc7d1ba0d0c94

    SHA256

    a0240c6c501e230301b1410a013298922e4db4b5b08537d7df7ccdc722a3e1fd

    SHA512

    0d67416c80eec5f93ec4884f00e729b2f8d56c8107c49e63cb7118106064c7b66b9d0d482be5c55c4ab312935a8ccda1b1cbb309bfdbffbffce843ac48ac5179

  • C:\Users\Default\Videos\lsass.exe

    Filesize

    2.7MB

    MD5

    ba65161e6e83ddc896f9a5461f93d8f1

    SHA1

    51ecdadd3f065686e9fc6394685d968215cf4029

    SHA256

    b8b5f7e2edc5114c9554dde3723b6f6221e4ec5ae0379c7feff8e2bc7398507d

    SHA512

    264f88cce23bcaa16394f7d22e443bccb5a10ba080acee2d71daaddee24f9e9b3c14435a971d52c4fbf22d83e7fed7a9eea0d55179db88096724b6e32808dacd

  • C:\Users\Default\Videos\lsass.exe

    Filesize

    2.7MB

    MD5

    f323707aed4b3b6dce94fe407380ab4a

    SHA1

    f366b74529ca2a19f73e5e32df18cdb0f6efdf3c

    SHA256

    b2c78fabd226e740aa7cdca7ae2510d18d145bb5743d5c36c467ea01667078f5

    SHA512

    12a0b9740e7b26df09240d64c0ea6c7481b562c3b60c62c9fc4a0babfa4d6b1e4d5e69df1f8a680705d6c8f69f411b9268b93d0f1be86a7db86b05adb0b6e580

  • C:\Users\Default\smss.exe

    Filesize

    2.7MB

    MD5

    6796dc80cde5ae67c231fe2d807456d2

    SHA1

    d24920ccfd6ee0c027e4267f73bd3d558f8800a6

    SHA256

    ed2dd00eaa481f3d127fff741879ba207853f7f91eb2e6fde7f5cee7f77b79ec

    SHA512

    17c23bbebb6beb927a4b4cc8d8acc2d9b90cca1d6cedfd4606233f9ffc70668548ff0d027543b6f45ee8eb850a2e95abaecbfc33989eeed93c329cc860146d04

  • C:\Users\Default\sppsvc.exe

    Filesize

    2.7MB

    MD5

    61bf85986773cab42c8ebc4486eb8c2b

    SHA1

    f84b75cec62fc0391ddc7e2b72614278bd59b8c0

    SHA256

    f06eb377f64df333de374a4d05d13dbbfc6d58c2098c81d23fbf0e8390d03ee1

    SHA512

    5b70e010e5dd13e97ac47487f1a6f7fdcda078ab64c61369d531bd854680aba57d15209d6fc13295444baa2b2c46daeabf1f3f2a2ddb48522eb68a7999f38506

  • C:\Windows\en-US\winlogon.exe

    Filesize

    2.7MB

    MD5

    2bb9ce127d5dea7eeb91933df0bf87b3

    SHA1

    b3d16f2a7a5f7c6dd6cd3fff17e2dd0cfc6912cf

    SHA256

    308df8ec8a7e0fe0ac7b1e749e5c924939394f4038223efc45ae250412717e44

    SHA512

    645de274a43465661214da9d4a0a46f0e606810adec9aa468418dfb5a861cc38fc2e5e014759e1a2a9f41693e349dd5b50cd8b72fad0bd07afb04fd6dd3c9ee5

  • memory/1128-237-0x0000000000610000-0x0000000000622000-memory.dmp

    Filesize

    72KB

  • memory/1128-236-0x00000000007E0000-0x0000000000836000-memory.dmp

    Filesize

    344KB

  • memory/1128-235-0x00000000002D0000-0x0000000000584000-memory.dmp

    Filesize

    2.7MB

  • memory/2244-8-0x0000000000640000-0x0000000000648000-memory.dmp

    Filesize

    32KB

  • memory/2244-9-0x0000000000A90000-0x0000000000A9A000-memory.dmp

    Filesize

    40KB

  • memory/2244-15-0x0000000000B70000-0x0000000000B7C000-memory.dmp

    Filesize

    48KB

  • memory/2244-14-0x0000000000B60000-0x0000000000B68000-memory.dmp

    Filesize

    32KB

  • memory/2244-13-0x0000000000AD0000-0x0000000000AD8000-memory.dmp

    Filesize

    32KB

  • memory/2244-16-0x0000000000B80000-0x0000000000B8E000-memory.dmp

    Filesize

    56KB

  • memory/2244-17-0x0000000000B90000-0x0000000000B9C000-memory.dmp

    Filesize

    48KB

  • memory/2244-18-0x0000000001280000-0x000000000128A000-memory.dmp

    Filesize

    40KB

  • memory/2244-19-0x0000000001290000-0x000000000129C000-memory.dmp

    Filesize

    48KB

  • memory/2244-11-0x0000000000A80000-0x0000000000A88000-memory.dmp

    Filesize

    32KB

  • memory/2244-10-0x0000000001320000-0x0000000001376000-memory.dmp

    Filesize

    344KB

  • memory/2244-12-0x0000000000AA0000-0x0000000000AB2000-memory.dmp

    Filesize

    72KB

  • memory/2244-0-0x000007FEF55B3000-0x000007FEF55B4000-memory.dmp

    Filesize

    4KB

  • memory/2244-7-0x0000000000620000-0x0000000000636000-memory.dmp

    Filesize

    88KB

  • memory/2244-6-0x0000000000310000-0x0000000000320000-memory.dmp

    Filesize

    64KB

  • memory/2244-191-0x000007FEF55B3000-0x000007FEF55B4000-memory.dmp

    Filesize

    4KB

  • memory/2244-5-0x0000000000300000-0x0000000000308000-memory.dmp

    Filesize

    32KB

  • memory/2244-215-0x000007FEF55B0000-0x000007FEF5F9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2244-4-0x00000000002E0000-0x00000000002FC000-memory.dmp

    Filesize

    112KB

  • memory/2244-3-0x00000000002D0000-0x00000000002DE000-memory.dmp

    Filesize

    56KB

  • memory/2244-234-0x000007FEF55B0000-0x000007FEF5F9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2244-2-0x000007FEF55B0000-0x000007FEF5F9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2244-1-0x0000000001380000-0x0000000001634000-memory.dmp

    Filesize

    2.7MB