Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 14:01

General

  • Target

    3614F4C4B137E627F03D0118F4779D52.exe

  • Size

    1.8MB

  • MD5

    3614f4c4b137e627f03d0118f4779d52

  • SHA1

    07120124f394eddb46c3c2a985063718d17fc48d

  • SHA256

    4acc21ce239f8eadca573c53b92cc49b96a9d7b96f7cfe4a5511847148839a2a

  • SHA512

    bfc1cb74b69f1bc0e47eefee7614760edfe068ac9471ed211a87d4b1a47f8f2e784db2beb79b23988ba7810d525eb2463f75eacf0df9f560a2d2e0e52a0e7c7f

  • SSDEEP

    24576:wwkCsYsgFFuqj/oBxyALwMosh651ZBvISmXqD0Z+rtyumwwI3PXGSfaeiLUb+7xE:B5kBTXYD3Yo0ZKy7IfXGfLU67x6sg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe
    "C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zzvbhcd4\zzvbhcd4.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES881C.tmp" "c:\Windows\System32\CSC4A2E756CF434BC4AF7CCB60B72FA9C0.TMP"
        3⤵
          PID:528
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\3614F4C4B137E627F03D0118F4779D52.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3184
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\explorer.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2992
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PolicyDefinitions\es-ES\spoolsv.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:4740
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\Accessories\uk-UA\sihost.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1976
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe'
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:4972
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PK0m16PcNq.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3348
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:2372
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4244
          • C:\Program Files\Windows NT\Accessories\uk-UA\sihost.exe
            "C:\Program Files\Windows NT\Accessories\uk-UA\sihost.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:3096
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D523" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\3614F4C4B137E627F03D0118F4779D52.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3168
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D52" /sc ONLOGON /tr "'C:\Users\Default User\3614F4C4B137E627F03D0118F4779D52.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4020
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D523" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\3614F4C4B137E627F03D0118F4779D52.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3776
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Documents\explorer.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3076
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Public\Documents\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2596
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Documents\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3288
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\PolicyDefinitions\es-ES\spoolsv.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2720
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\es-ES\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4976
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\PolicyDefinitions\es-ES\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4564
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:944
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:232
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1852
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows NT\Accessories\uk-UA\sihost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4748
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\uk-UA\sihost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1600
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows NT\Accessories\uk-UA\sihost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:5104
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D523" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1544
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D52" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:948
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "3614F4C4B137E627F03D0118F4779D523" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\AppData\Local\Temp\3614F4C4B137E627F03D0118F4779D52.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4148

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        750e4be22a6fdadd7778a388198a9ee3

        SHA1

        8feb2054d8a3767833dd972535df54f0c3ab6648

        SHA256

        26209c196c9c45202d27468ea707b2b46f375bb612d50271924a28f9210df6a1

        SHA512

        b0415087dfc32908b449b876b395a607698b0f7b72031916b6fe7c002e4b163ba318b7e85c8ce41f007429e666974c04967bc14345e3f4614e34d94f5c8ae804

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        cadef9abd087803c630df65264a6c81c

        SHA1

        babbf3636c347c8727c35f3eef2ee643dbcc4bd2

        SHA256

        cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

        SHA512

        7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        77d622bb1a5b250869a3238b9bc1402b

        SHA1

        d47f4003c2554b9dfc4c16f22460b331886b191b

        SHA256

        f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

        SHA512

        d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        6d3e9c29fe44e90aae6ed30ccf799ca8

        SHA1

        c7974ef72264bbdf13a2793ccf1aed11bc565dce

        SHA256

        2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

        SHA512

        60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

      • C:\Users\Admin\AppData\Local\Temp\PK0m16PcNq.bat

        Filesize

        184B

        MD5

        0bdfc7328a2001f303de977ff3f66065

        SHA1

        4d6907e048b1d8530935bbde30b4ebd5108d8d67

        SHA256

        e20ce35cd1de8295aece67faedc9f5b5b23fdecec397e5455eec9e9065e0f7e5

        SHA512

        ed21d7bf280e61180b0afbad2adf13d3a4bd5591d06e75ca5d3770b46f5d8d9df1564c7d79a642f4b9dcccc825abbe0e9ab8203e7e34b76f1d764ec09986a811

      • C:\Users\Admin\AppData\Local\Temp\RES881C.tmp

        Filesize

        1KB

        MD5

        e3fc29287e1547a1c8ff1c785d13a8c3

        SHA1

        757f18c86a9aa3559fa7cbaaef5448b87fa0e5f0

        SHA256

        04a29d5f8d6bda91bd8f81833a0fb4ec44b508613d51d326ea010f96d37f6a96

        SHA512

        962912ed25f01aa49c30f382f3b142955f8d8b4874fb2bb6bdc86261be6587e9525f48f4cd82f136bffc0a195168369c1da8c633a3a9edd1a693985fa3b1d74c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5cyvcrbq.nkg.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Default\3614F4C4B137E627F03D0118F4779D52.exe

        Filesize

        1.8MB

        MD5

        3614f4c4b137e627f03d0118f4779d52

        SHA1

        07120124f394eddb46c3c2a985063718d17fc48d

        SHA256

        4acc21ce239f8eadca573c53b92cc49b96a9d7b96f7cfe4a5511847148839a2a

        SHA512

        bfc1cb74b69f1bc0e47eefee7614760edfe068ac9471ed211a87d4b1a47f8f2e784db2beb79b23988ba7810d525eb2463f75eacf0df9f560a2d2e0e52a0e7c7f

      • \??\c:\Users\Admin\AppData\Local\Temp\zzvbhcd4\zzvbhcd4.0.cs

        Filesize

        390B

        MD5

        e11b2491927214ce9ec8ba00de89c5fd

        SHA1

        40b391c3ed900a66a246f7859082ab94014dc557

        SHA256

        db24651e68e4b36e26826f08903c57ce5cb62fcc6eac946708847b3870005af9

        SHA512

        824c74d47a55bc1f92ca7db7f65ca4e37bb2675629799529e16773ed848261f408aa764f392f7b4e1c8089f4342ffc108d77e567a7efa119ce3aee0a8ecf9837

      • \??\c:\Users\Admin\AppData\Local\Temp\zzvbhcd4\zzvbhcd4.cmdline

        Filesize

        235B

        MD5

        f3cad2297f1af0008dbc1dc3295b653e

        SHA1

        677a19c844073052eb2ff5e4f909ff91b7ef9285

        SHA256

        359db560d335fa570d65e0c1038a74aff7910bccb84ba327284f423ac11accaa

        SHA512

        f84f4ef99a92d0d93e7ae5881c035421b91ce2eb69689b7f44af1037ddfb50f5f183e85897e73c875226e141e22f25548437e793f27ead8e5959cadf01807e36

      • \??\c:\Windows\System32\CSC4A2E756CF434BC4AF7CCB60B72FA9C0.TMP

        Filesize

        1KB

        MD5

        65d5babddb4bd68783c40f9e3678613f

        SHA1

        71e76abb44dbea735b9faaccb8c0fad345b514f4

        SHA256

        d61a59849cacd91b8039a8e41a5b92a7f93e2d46c90791b9ba6b5f856008cd8f

        SHA512

        21223e9a32df265bb75093d1ebaa879880a947d25ac764f3452b9104893b05f2c8fe4150cb2465681df7a0554dcefdb7f623aaf54772ade878270f453ebc1bcf

      • memory/1976-67-0x0000023D31D80000-0x0000023D31DA2000-memory.dmp

        Filesize

        136KB

      • memory/1976-126-0x0000023D31DB0000-0x0000023D31FCC000-memory.dmp

        Filesize

        2.1MB

      • memory/2188-120-0x0000026C40970000-0x0000026C40B8C000-memory.dmp

        Filesize

        2.1MB

      • memory/2992-112-0x000001D46D220000-0x000001D46D43C000-memory.dmp

        Filesize

        2.1MB

      • memory/3096-135-0x000000001DD40000-0x000000001DE0D000-memory.dmp

        Filesize

        820KB

      • memory/3184-123-0x00000212B1020000-0x00000212B123C000-memory.dmp

        Filesize

        2.1MB

      • memory/3672-13-0x000000001B060000-0x000000001B078000-memory.dmp

        Filesize

        96KB

      • memory/3672-0-0x00007FFA102C3000-0x00007FFA102C5000-memory.dmp

        Filesize

        8KB

      • memory/3672-30-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-21-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-44-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-45-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-46-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-17-0x0000000000D10000-0x0000000000D1C000-memory.dmp

        Filesize

        48KB

      • memory/3672-52-0x000000001B530000-0x000000001B5FD000-memory.dmp

        Filesize

        820KB

      • memory/3672-15-0x0000000000D00000-0x0000000000D08000-memory.dmp

        Filesize

        32KB

      • memory/3672-68-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-31-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-1-0x0000000000220000-0x00000000003FE000-memory.dmp

        Filesize

        1.9MB

      • memory/3672-2-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-10-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-11-0x000000001B3E0000-0x000000001B430000-memory.dmp

        Filesize

        320KB

      • memory/3672-9-0x0000000002650000-0x000000000266C000-memory.dmp

        Filesize

        112KB

      • memory/3672-7-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-6-0x0000000000CE0000-0x0000000000CEE000-memory.dmp

        Filesize

        56KB

      • memory/3672-4-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/3672-3-0x00007FFA102C0000-0x00007FFA10D81000-memory.dmp

        Filesize

        10.8MB

      • memory/4740-113-0x00000296DB470000-0x00000296DB68C000-memory.dmp

        Filesize

        2.1MB

      • memory/4972-119-0x0000017EFDA60000-0x0000017EFDC7C000-memory.dmp

        Filesize

        2.1MB