Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/01/2025, 02:46

250114-c9pv5avjfz 10

14/01/2025, 02:24

250114-cv7sdswpbj 10

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2025, 02:24

General

  • Target

    3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714.exe

  • Size

    16.0MB

  • MD5

    5aa236eabe65a1e444f1eb31fb330eba

  • SHA1

    b6a8d5362991511526ea5a2b86ad70f05e70652c

  • SHA256

    3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714

  • SHA512

    0ab8e56f1f8a09491d96416bdc2798874ff153ef56c6476cd9eda9fe0744e77f56132073524f1a2719a75d5dea8dcd5706ee1497867f8b3e62c9a52641afc0be

  • SSDEEP

    98304:mjHzjFPB6n2gC9U851tTRIXDNgn+ojsSw9y4Q1vL3NPt:yHHFPgns9BvpyNgnNW4

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Disables Task Manager via registry modification
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714.exe
    "C:\Users\Admin\AppData\Local\Temp\3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XenoSetup(1).exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2808
    • C:\Users\Admin\AppData\Local\Temp\XenoSetup(1).exe
      "C:\Users\Admin\AppData\Local\Temp\XenoSetup(1).exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Windows\SysWOW64\reg.exe
            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2084
          • C:\portBrokerDll\DriverbrokerCrtDhcp.exe
            "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2080
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\l4u14jf0\l4u14jf0.cmdline"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3536
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC8EA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB4F5319C70F6439D8365EBF4FEB2473.TMP"
                7⤵
                  PID:3580
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3u3jri1x\3u3jri1x.cmdline"
                6⤵
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:3616
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC919.tmp" "c:\Windows\System32\CSCEAE4264724974A3D9310C73A4237713.TMP"
                  7⤵
                    PID:3660
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\J8CIVguw39.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3800
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:3836
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      7⤵
                        PID:3844
                      • C:\Windows\System32Local\csrss.exe
                        "C:\Windows\System32Local\csrss.exe"
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3916
            • C:\Users\Admin\AppData\Local\Temp\Xeno.exe
              "C:\Users\Admin\AppData\Local\Temp\Xeno.exe"
              2⤵
              • Executes dropped EXE
              PID:1244
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\System32Local\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3448
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32Local\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3476
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\System32Local\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3512
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 11 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3704
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "DriverbrokerCrtDhcp" /sc ONLOGON /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3732
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 13 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3760

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\J8CIVguw39.bat

            Filesize

            210B

            MD5

            affe47cb97c58e7937347ed3c85f194d

            SHA1

            b1550893e1c3fb9bf9acf368157206799d17d3ae

            SHA256

            275186f02c8b6295650f52fe61ced2cbff5c93b6d023abd72310d077f7d67da3

            SHA512

            cabcc3ae7a264679ed90a3eca59440bb008ae199a4b15725e47b37b9f0e6ebd9f1c975c40312649d6fc01e9c285b7603605c08abd1653f118dbce040742d546b

          • C:\Users\Admin\AppData\Local\Temp\RESC8EA.tmp

            Filesize

            1KB

            MD5

            bc32c8d2116db748c4ce858ef2d12d32

            SHA1

            bb432d563233f228c948e2c92d04341459a7d694

            SHA256

            9f5db39fe7675111b0f064955a285942998f3f3572b9c559a3331b6ba8833947

            SHA512

            a8bddb171aaf33c9ebbc708a733ca946dd30d6df5e7b99d167488515f2cf69098a08e5a408a3b92d7a00f9374fced0d07a38c180fd05bf7e43de58f2f985ad25

          • C:\Users\Admin\AppData\Local\Temp\RESC919.tmp

            Filesize

            1KB

            MD5

            9167a7a4768ce00b585a44a0e6f3ab8f

            SHA1

            f4bcd4f4fad06207fb97166fca89802785ac0b28

            SHA256

            8c715e2153a801bf23720e735ef1b4369677b343885c719b4871ad4ef34f2099

            SHA512

            096d74c1a449a6a82ef6cba4ec95b7b50dde5a08a07f0bb77ef00b175d67e35ad0411cb65d649798aa799758540bff7e535648cd04d9e7ecf20088dd5e415d11

          • C:\Users\Admin\AppData\Local\Temp\XenoSetup(1).exe

            Filesize

            3.5MB

            MD5

            bcf49847a74e554a807294d4f5adfa62

            SHA1

            c6f105b28ac3bc7dd2e4a444cf96edbcdc45febf

            SHA256

            eae94b757fe5e150f8f1039140feebc969788bd2c0ef7fe2d4675a81f6dc9898

            SHA512

            489cf5844853a4ba7489386a545d0369e1eca835a70053aa6e408aed7f42eaa26684859ddf50b874c643c53ae050dcd3d1a27e887e413c8db8636818ba7dcdcf

          • C:\portBrokerDll\2jfojLJgRy.vbe

            Filesize

            237B

            MD5

            851d51cdee60a57d4aef51ea7f466436

            SHA1

            34a13967e69d21091850d4f0dffb2bce88c80e0c

            SHA256

            5d612089c06bbe2b32de8bfcc3e0ba1e0ef2155cd6cde83b280797c6061ca269

            SHA512

            7fed60da3ed3ff2a26b8b4cadf0cf6cd3e28259a4a7ec7e3ba97509fa47b7ca75753ca49edf2f218ae323830977c2ecdfb2f05b6fa5de303038c31012926e953

          • C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat

            Filesize

            194B

            MD5

            69c0edf85b6d3ab82c42e82ef04f50f7

            SHA1

            7acb4d2454d9e04db488c2ee4352cfece1b8ae58

            SHA256

            3041cc5e5c4251ea1eddccaa5d145446719d6e86dcfd3bc40bc23c80b3102ec2

            SHA512

            04877f967609e6efb4a8c4f99c4130b3894eb223f390d32c6e2248abaf1bdff71f539f122635f18fa432648b927cc597dd7bdaa52284824f8c57c7909f7dca21

          • \??\c:\Users\Admin\AppData\Local\Temp\3u3jri1x\3u3jri1x.0.cs

            Filesize

            366B

            MD5

            9f33a0633ba7ac31daa7508375e76bcb

            SHA1

            58338c8ccbd756380208ff6b00ac96e552cf336c

            SHA256

            226b422e780df05ddec140353b84d47312317bcdedf1e273a912dc320f29b18c

            SHA512

            5bcbed9817f750e74646adf3359c63a4f860b409e1d14f3651e0d178d6099e47ca6a9478b50074978fbeb08ae08d88de83813f24f3d437fb6e49427ab71987b4

          • \??\c:\Users\Admin\AppData\Local\Temp\3u3jri1x\3u3jri1x.cmdline

            Filesize

            235B

            MD5

            287c52243345363d503f9c44a649312d

            SHA1

            38fdc0cfbf4b95bd6c9208899fa2e9b0cb8906db

            SHA256

            dfd75ddfd2a3e61325fe282904333f0b2609348f967aec2f79cbea8dd469651f

            SHA512

            89c2500991443114e9868278ed73947bdd370bdde4f751b3197bb45fd0952089664ee1f0ec0141238ca5cca1979883b73d48388f44e9e646522065b902c63266

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCB4F5319C70F6439D8365EBF4FEB2473.TMP

            Filesize

            1KB

            MD5

            dc289c30c143fd2f8e608119ae4846a0

            SHA1

            2f0d6888b80d26d9ff52b5decdd63963255e5113

            SHA256

            37aac241c050fb90090b36441ae1f198d11a0da4ee5f30e3332673f3c6ecf40a

            SHA512

            68bffd2b69ee9d5857fc9d5b2a71561a985738b5fe0768fc7dd23a753c976529158042f2a239ffe74ed99b5bd4b469fd2220a990d20a742935f5560a55f2d6fd

          • \??\c:\Users\Admin\AppData\Local\Temp\l4u14jf0\l4u14jf0.0.cs

            Filesize

            386B

            MD5

            ec2b2da2434a077948b3588dc8608225

            SHA1

            16acb74e7244688e66b4c9ecbd65681b0fdfcd03

            SHA256

            09d74391e24e7492961d4069143bc17fd670327e6be74cdca81626ced76ce700

            SHA512

            2d04276939bd142e5c442efe29355a1e0e79a7a43e8bcd296dafcf5d30280cfefd5b726a0eec61bdad9a2f574c9bb210b54f3aae47431e11fc23ec4a95bf5c58

          • \??\c:\Users\Admin\AppData\Local\Temp\l4u14jf0\l4u14jf0.cmdline

            Filesize

            255B

            MD5

            58439f2cd275f7095914a909224519be

            SHA1

            5dbbf978de75d3787950198c47525c641c18822d

            SHA256

            b69e8f82d656b13b967c2707c9931382379273c27ac8ed5b612ab0ca20a70b2d

            SHA512

            8c8f19e9a9eeb7c44d9d26733b541581d40666be909786f9180a0f6d9c18f848e90a696c98d64e4b40fe89a499247a69e9a599bda69531bacb2e09d6dad9cb38

          • \??\c:\Windows\System32\CSCEAE4264724974A3D9310C73A4237713.TMP

            Filesize

            1KB

            MD5

            b74f131aab310dc6e37b43e729c24199

            SHA1

            bade4cf35d7e80e79880396c1fdd518d9ab78bdf

            SHA256

            5fdff2a34cc18e36619ff327b292a8255286dc102d85074b7fc625ccbdbe1858

            SHA512

            733cb12c94d0a8bedc9a38c073dff2fc46553854d7e835767aaa749b4754beef77fa3bc8232eab21c92bc808c08b150cafe5c035bb33d82292fbf76fec55d885

          • \Users\Admin\AppData\Local\Temp\Xeno.exe

            Filesize

            3.5MB

            MD5

            056586e6a4d9b97c77fd606b2a63f604

            SHA1

            b13e10949df28f3944c68b950617a641ea20491b

            SHA256

            4d3b4ef0ec929ebd649637f55aabd856954e3d6424ac337a17ee4bb65ec2e8f3

            SHA512

            da2c4066a7975ede5c1645d6cd82f0499b452a021d18aa86ad64130efc9f1da2270be30a7af89b4cce97b0eb13c27f55f37c70db5f2f6aa4a2b5a54dcae72cc0

          • \portBrokerDll\DriverbrokerCrtDhcp.exe

            Filesize

            3.3MB

            MD5

            c9d8bce0425ed81346b9a43f148d948b

            SHA1

            d3bcb8f02ef3732ffa70fc798cd4ad3d77bbbde6

            SHA256

            884de0ba4d113a1674b112f76b7d6af9bb11c562d6b58155e974e549694e0f58

            SHA512

            60e0d21db0518d66f4546dceb978b15d2eb87347cc1676b7420eb2a6c4c1c6fa947d31ae8cb70ce880b76f931702aaab51c46f559dd91a49c9a4bdc83b75368b

          • memory/2080-44-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-3606-0x0000000000630000-0x000000000063E000-memory.dmp

            Filesize

            56KB

          • memory/2080-78-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-76-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-74-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-72-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-70-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-68-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-66-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-64-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-62-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-60-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-58-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-56-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-98-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-54-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-94-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-92-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-90-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-88-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-46-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-38-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-52-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-48-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-82-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-36-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-3592-0x0000000000330000-0x0000000000356000-memory.dmp

            Filesize

            152KB

          • memory/2080-3594-0x0000000000280000-0x000000000028E000-memory.dmp

            Filesize

            56KB

          • memory/2080-3598-0x0000000000290000-0x00000000002A0000-memory.dmp

            Filesize

            64KB

          • memory/2080-3602-0x00000000002A0000-0x00000000002B0000-memory.dmp

            Filesize

            64KB

          • memory/2080-3600-0x00000000006D0000-0x00000000006E8000-memory.dmp

            Filesize

            96KB

          • memory/2080-3604-0x0000000000620000-0x0000000000630000-memory.dmp

            Filesize

            64KB

          • memory/2080-3596-0x0000000000360000-0x000000000037C000-memory.dmp

            Filesize

            112KB

          • memory/2080-80-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-3608-0x0000000000640000-0x000000000064C000-memory.dmp

            Filesize

            48KB

          • memory/2080-3610-0x00000000006F0000-0x00000000006FE000-memory.dmp

            Filesize

            56KB

          • memory/2080-3612-0x0000000000BD0000-0x0000000000BE2000-memory.dmp

            Filesize

            72KB

          • memory/2080-3614-0x0000000000700000-0x0000000000710000-memory.dmp

            Filesize

            64KB

          • memory/2080-3616-0x0000000000BF0000-0x0000000000C06000-memory.dmp

            Filesize

            88KB

          • memory/2080-3618-0x0000000002030000-0x0000000002042000-memory.dmp

            Filesize

            72KB

          • memory/2080-3620-0x0000000000BB0000-0x0000000000BBE000-memory.dmp

            Filesize

            56KB

          • memory/2080-3624-0x0000000000C10000-0x0000000000C20000-memory.dmp

            Filesize

            64KB

          • memory/2080-3622-0x0000000000BC0000-0x0000000000BD0000-memory.dmp

            Filesize

            64KB

          • memory/2080-3626-0x0000000002150000-0x00000000021AA000-memory.dmp

            Filesize

            360KB

          • memory/2080-3628-0x0000000002050000-0x000000000205E000-memory.dmp

            Filesize

            56KB

          • memory/2080-3630-0x0000000002060000-0x0000000002070000-memory.dmp

            Filesize

            64KB

          • memory/2080-3634-0x00000000020A0000-0x00000000020B8000-memory.dmp

            Filesize

            96KB

          • memory/2080-3638-0x000000001AC40000-0x000000001AC8E000-memory.dmp

            Filesize

            312KB

          • memory/2080-3636-0x0000000002080000-0x000000000208C000-memory.dmp

            Filesize

            48KB

          • memory/2080-3632-0x0000000002070000-0x000000000207E000-memory.dmp

            Filesize

            56KB

          • memory/2080-86-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-96-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-84-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-50-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-42-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-40-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-35-0x000000001AD90000-0x000000001B129000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-34-0x000000001AD90000-0x000000001B130000-memory.dmp

            Filesize

            3.6MB

          • memory/2080-33-0x0000000000C20000-0x0000000000C28000-memory.dmp

            Filesize

            32KB

          • memory/2192-0-0x000007FEF5793000-0x000007FEF5794000-memory.dmp

            Filesize

            4KB

          • memory/2192-1-0x0000000001010000-0x0000000001392000-memory.dmp

            Filesize

            3.5MB

          • memory/2808-6-0x0000000002CB0000-0x0000000002D30000-memory.dmp

            Filesize

            512KB

          • memory/2808-7-0x000000001B730000-0x000000001BA12000-memory.dmp

            Filesize

            2.9MB

          • memory/2808-8-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

            Filesize

            32KB

          • memory/3916-3673-0x0000000000EF0000-0x0000000000EF8000-memory.dmp

            Filesize

            32KB