Resubmissions

14-01-2025 02:46

250114-c9pv5avjfz 10

14-01-2025 02:24

250114-cv7sdswpbj 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2025 02:24

General

  • Target

    3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714.exe

  • Size

    16.0MB

  • MD5

    5aa236eabe65a1e444f1eb31fb330eba

  • SHA1

    b6a8d5362991511526ea5a2b86ad70f05e70652c

  • SHA256

    3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714

  • SHA512

    0ab8e56f1f8a09491d96416bdc2798874ff153ef56c6476cd9eda9fe0744e77f56132073524f1a2719a75d5dea8dcd5706ee1497867f8b3e62c9a52641afc0be

  • SSDEEP

    98304:mjHzjFPB6n2gC9U851tTRIXDNgn+ojsSw9y4Q1vL3NPt:yHHFPgns9BvpyNgnNW4

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714.exe
    "C:\Users\Admin\AppData\Local\Temp\3d79293d371d3393d83f0d6205c35263baa3618a6f3ccba4fcefbee999d4a714.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XenoSetup(1).exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3556
    • C:\Users\Admin\AppData\Local\Temp\XenoSetup(1).exe
      "C:\Users\Admin\AppData\Local\Temp\XenoSetup(1).exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\portBrokerDll\2jfojLJgRy.vbe"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Windows\SysWOW64\reg.exe
            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3036
          • C:\portBrokerDll\DriverbrokerCrtDhcp.exe
            "C:\portBrokerDll/DriverbrokerCrtDhcp.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:428
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pk0cpgut\pk0cpgut.cmdline"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4572
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES198E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE870EC789C0140DD8E8BE342346DA2F2.TMP"
                7⤵
                  PID:4380
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\av2nxsnu\av2nxsnu.cmdline"
                6⤵
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:3260
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES19FB.tmp" "c:\Windows\System32\CSC85E57A2DED594EF88060AAF8C79EE523.TMP"
                  7⤵
                    PID:2228
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8FDNTGovKl.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2396
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:2012
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      7⤵
                        PID:4404
                      • C:\portBrokerDll\DriverbrokerCrtDhcp.exe
                        "C:\portBrokerDll\DriverbrokerCrtDhcp.exe"
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3084
            • C:\Users\Admin\AppData\Local\Temp\Xeno.exe
              "C:\Users\Admin\AppData\Local\Temp\Xeno.exe"
              2⤵
              • Executes dropped EXE
              PID:1128
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Windows\System32Local\unsecapp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4772
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Windows\System32Local\unsecapp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4208
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Windows\System32Local\unsecapp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4808
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 9 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3880
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "DriverbrokerCrtDhcp" /sc ONLOGON /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3216
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "DriverbrokerCrtDhcpD" /sc MINUTE /mo 10 /tr "'C:\portBrokerDll\DriverbrokerCrtDhcp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4124

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DriverbrokerCrtDhcp.exe.log

            Filesize

            1KB

            MD5

            a6cd1c3e645a5feb627a00f125da9fc8

            SHA1

            61d3b101c5e286ff21cc62a0e21484e556835317

            SHA256

            fbbf9453956534a33bd6f75f61926c50fd62bfca4976b818ccca5b8260fd4917

            SHA512

            5e70d82849172c3b978172ead140a5a9a3e6ee91a570e998f3b0536e788dad22499deef0685f9cd22f6aa15ba315d65600750414f6e21fd6a851c0bd70e11518

          • C:\Users\Admin\AppData\Local\Temp\8FDNTGovKl.bat

            Filesize

            216B

            MD5

            87c9a45e105da02aa54619ef01bf11b1

            SHA1

            c29d1e5e4529e2e547f00f21932af80805a85fd2

            SHA256

            6b585f68cdbf401c1afb325906519f0434ae5353ef68bb4cab7fda0c2886cc42

            SHA512

            4194e279a147e26d4828d4a842ca3bfdc903e06a490c2759d8f72c532f7455da26cc6d2dcab70512a98f239ac32ba800c02d37b91ef45636a8d1fcc62a628534

          • C:\Users\Admin\AppData\Local\Temp\RES198E.tmp

            Filesize

            1KB

            MD5

            65a57fb8599dfbda22286beed79d4194

            SHA1

            74054bfaeb21388b0d5879b967528baf3ce1586d

            SHA256

            941e9410b14c3f7ca205afbd6dcb7dd60d627b68c5b347d162952e003a67dece

            SHA512

            4a65fa9cd34cf61aa8cc8f417a34b4eeedce05fcc27fee5a5b97835afeda688857bb1e58db072cc6022b2ad74e8fa6b6386d03b702d67d4a3c00ac7ac3ba6e43

          • C:\Users\Admin\AppData\Local\Temp\RES19FB.tmp

            Filesize

            1KB

            MD5

            1927b100af795f8a0e1a466367e255b3

            SHA1

            c5418b0896f728db9420043016eccc38bba440d0

            SHA256

            63a06015b8c951b6194a4560f2b808093c12c2180a033208174adc2ec715ea77

            SHA512

            aaa5a1152d1095c1d5b3369b765ef3129d2e9144cfbb3a82c0b16f28bdc5104f832075ef69fd59403fcec5b5204b7b4cc5306d6992da53ea31df69ea6d7ef0f8

          • C:\Users\Admin\AppData\Local\Temp\Xeno.exe

            Filesize

            3.5MB

            MD5

            056586e6a4d9b97c77fd606b2a63f604

            SHA1

            b13e10949df28f3944c68b950617a641ea20491b

            SHA256

            4d3b4ef0ec929ebd649637f55aabd856954e3d6424ac337a17ee4bb65ec2e8f3

            SHA512

            da2c4066a7975ede5c1645d6cd82f0499b452a021d18aa86ad64130efc9f1da2270be30a7af89b4cce97b0eb13c27f55f37c70db5f2f6aa4a2b5a54dcae72cc0

          • C:\Users\Admin\AppData\Local\Temp\XenoSetup(1).exe

            Filesize

            3.5MB

            MD5

            bcf49847a74e554a807294d4f5adfa62

            SHA1

            c6f105b28ac3bc7dd2e4a444cf96edbcdc45febf

            SHA256

            eae94b757fe5e150f8f1039140feebc969788bd2c0ef7fe2d4675a81f6dc9898

            SHA512

            489cf5844853a4ba7489386a545d0369e1eca835a70053aa6e408aed7f42eaa26684859ddf50b874c643c53ae050dcd3d1a27e887e413c8db8636818ba7dcdcf

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4wgyv1je.mqy.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\portBrokerDll\2jfojLJgRy.vbe

            Filesize

            237B

            MD5

            851d51cdee60a57d4aef51ea7f466436

            SHA1

            34a13967e69d21091850d4f0dffb2bce88c80e0c

            SHA256

            5d612089c06bbe2b32de8bfcc3e0ba1e0ef2155cd6cde83b280797c6061ca269

            SHA512

            7fed60da3ed3ff2a26b8b4cadf0cf6cd3e28259a4a7ec7e3ba97509fa47b7ca75753ca49edf2f218ae323830977c2ecdfb2f05b6fa5de303038c31012926e953

          • C:\portBrokerDll\Ac4k16M5JuZ3cBUzCeuZfRwt20LYrImECkDEo2qhe7JRV.bat

            Filesize

            194B

            MD5

            69c0edf85b6d3ab82c42e82ef04f50f7

            SHA1

            7acb4d2454d9e04db488c2ee4352cfece1b8ae58

            SHA256

            3041cc5e5c4251ea1eddccaa5d145446719d6e86dcfd3bc40bc23c80b3102ec2

            SHA512

            04877f967609e6efb4a8c4f99c4130b3894eb223f390d32c6e2248abaf1bdff71f539f122635f18fa432648b927cc597dd7bdaa52284824f8c57c7909f7dca21

          • C:\portBrokerDll\DriverbrokerCrtDhcp.exe

            Filesize

            3.3MB

            MD5

            c9d8bce0425ed81346b9a43f148d948b

            SHA1

            d3bcb8f02ef3732ffa70fc798cd4ad3d77bbbde6

            SHA256

            884de0ba4d113a1674b112f76b7d6af9bb11c562d6b58155e974e549694e0f58

            SHA512

            60e0d21db0518d66f4546dceb978b15d2eb87347cc1676b7420eb2a6c4c1c6fa947d31ae8cb70ce880b76f931702aaab51c46f559dd91a49c9a4bdc83b75368b

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCE870EC789C0140DD8E8BE342346DA2F2.TMP

            Filesize

            1KB

            MD5

            dc289c30c143fd2f8e608119ae4846a0

            SHA1

            2f0d6888b80d26d9ff52b5decdd63963255e5113

            SHA256

            37aac241c050fb90090b36441ae1f198d11a0da4ee5f30e3332673f3c6ecf40a

            SHA512

            68bffd2b69ee9d5857fc9d5b2a71561a985738b5fe0768fc7dd23a753c976529158042f2a239ffe74ed99b5bd4b469fd2220a990d20a742935f5560a55f2d6fd

          • \??\c:\Users\Admin\AppData\Local\Temp\av2nxsnu\av2nxsnu.0.cs

            Filesize

            369B

            MD5

            f7512468af0aab84a8abaf9c21d204b6

            SHA1

            966168932d0d102252df0b88b7c16f4d89a416ae

            SHA256

            ae21936ac2389cbac65e21164f3ab1a83cb7d96ff74bac67c1da9c2afbed320f

            SHA512

            2f38c64f5e8347e1e97caa5de4e90a7fdc641c60da4d806353da8d22d6dfb5bc5ed2823bcf068ce8bf19368630c06febf948d65b89a3cd1c67949356eba3bab4

          • \??\c:\Users\Admin\AppData\Local\Temp\av2nxsnu\av2nxsnu.cmdline

            Filesize

            235B

            MD5

            5655e6b649de339b0debc151c9d40888

            SHA1

            fd1fcae73eadce10afa13ed5a6783592f25f669d

            SHA256

            31717ac933e056e9fa6c73d0912f123be4c27ad6f37e25d23ef1a9c5a042a8a9

            SHA512

            bfd0edff8c054ad1d95406dc51a1d9a047e57163eee9bbcfa610b1ebf91ac5bd2ab252e5439718d893a8786f61a67c5f181e36427944788d5483a247df024c5b

          • \??\c:\Users\Admin\AppData\Local\Temp\pk0cpgut\pk0cpgut.0.cs

            Filesize

            389B

            MD5

            0e74252ce901de6e335520dfe18aef09

            SHA1

            cf6fba8de800ac15a10184d7d8f801820cf90bdc

            SHA256

            e1f27515f6a284b17d8368cca40c6db17d4ec2d245ab73c7b15c09e9119f3993

            SHA512

            b1a96a8238071dcdd99c93e376abb1f7bee279f9916c6a3895378dbcba15f25f30480be8feb2ea885223fec1e8520b30a75d321cacdcfd41a1ba0ce31a00b5fe

          • \??\c:\Users\Admin\AppData\Local\Temp\pk0cpgut\pk0cpgut.cmdline

            Filesize

            255B

            MD5

            2118cacc6c041feee0492b42d03ea32a

            SHA1

            bd2f33ee233632edb9310ad0a021b50f00f0458d

            SHA256

            696021e6a7c2ac811edb12d3764d19e1a259c19eeecd7f5c6801d8d2620737c8

            SHA512

            02002e87e5e9cb19bec544b2f1bbd7065960294ff21e9f43f94afa63f3b8e003fd744ef01ce30e787a67c04acd01c57ec47560c7def8f1f92420fcc495674762

          • \??\c:\Windows\System32\CSC85E57A2DED594EF88060AAF8C79EE523.TMP

            Filesize

            1KB

            MD5

            634e281a00b7b9f516c3048badfa1530

            SHA1

            af6369715ce2fe9b99609e470d4f66698880a35a

            SHA256

            0d990336ae793f3f6903048004c8d707d7a7191927bd7df46b7fe887116506c8

            SHA512

            1cb35fa0759f5362c9c7eee5546710874121005a3924bcfec2cf33ac90a257a807ce7ec0db7bc84dcb327604d708009449c34f52560ed936b54eeba49be7d27b

          • memory/428-61-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-3615-0x0000000002910000-0x000000000292C000-memory.dmp

            Filesize

            112KB

          • memory/428-69-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-79-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-92-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-109-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-107-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-105-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-103-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-101-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-99-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-97-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-95-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-93-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-87-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-85-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-83-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-81-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-77-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-75-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-73-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-72-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-89-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-67-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-65-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-63-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-55-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-59-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-57-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-117-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-115-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-113-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-111-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-3611-0x00000000028E0000-0x0000000002906000-memory.dmp

            Filesize

            152KB

          • memory/428-3613-0x0000000002780000-0x000000000278E000-memory.dmp

            Filesize

            56KB

          • memory/428-54-0x000000001B300000-0x000000001B699000-memory.dmp

            Filesize

            3.6MB

          • memory/428-3616-0x000000001C350000-0x000000001C3A0000-memory.dmp

            Filesize

            320KB

          • memory/428-3618-0x0000000002790000-0x00000000027A0000-memory.dmp

            Filesize

            64KB

          • memory/428-3620-0x0000000002930000-0x0000000002948000-memory.dmp

            Filesize

            96KB

          • memory/428-3622-0x00000000027A0000-0x00000000027B0000-memory.dmp

            Filesize

            64KB

          • memory/428-3624-0x00000000027B0000-0x00000000027C0000-memory.dmp

            Filesize

            64KB

          • memory/428-3626-0x0000000002950000-0x000000000295E000-memory.dmp

            Filesize

            56KB

          • memory/428-3628-0x0000000002960000-0x000000000296C000-memory.dmp

            Filesize

            48KB

          • memory/428-3630-0x0000000002970000-0x000000000297E000-memory.dmp

            Filesize

            56KB

          • memory/428-3632-0x000000001B180000-0x000000001B192000-memory.dmp

            Filesize

            72KB

          • memory/428-3634-0x0000000002980000-0x0000000002990000-memory.dmp

            Filesize

            64KB

          • memory/428-3636-0x000000001B1A0000-0x000000001B1B6000-memory.dmp

            Filesize

            88KB

          • memory/428-3638-0x000000001B2D0000-0x000000001B2E2000-memory.dmp

            Filesize

            72KB

          • memory/428-3639-0x000000001C8D0000-0x000000001CDF8000-memory.dmp

            Filesize

            5.2MB

          • memory/428-3641-0x0000000002990000-0x000000000299E000-memory.dmp

            Filesize

            56KB

          • memory/428-3643-0x00000000029A0000-0x00000000029B0000-memory.dmp

            Filesize

            64KB

          • memory/428-3645-0x000000001C3A0000-0x000000001C3B0000-memory.dmp

            Filesize

            64KB

          • memory/428-3647-0x000000001C410000-0x000000001C46A000-memory.dmp

            Filesize

            360KB

          • memory/428-3649-0x000000001C3B0000-0x000000001C3BE000-memory.dmp

            Filesize

            56KB

          • memory/428-3651-0x000000001C3C0000-0x000000001C3D0000-memory.dmp

            Filesize

            64KB

          • memory/428-3653-0x000000001C3D0000-0x000000001C3DE000-memory.dmp

            Filesize

            56KB

          • memory/428-3655-0x000000001C470000-0x000000001C488000-memory.dmp

            Filesize

            96KB

          • memory/428-3657-0x000000001C3E0000-0x000000001C3EC000-memory.dmp

            Filesize

            48KB

          • memory/428-3659-0x000000001C4E0000-0x000000001C52E000-memory.dmp

            Filesize

            312KB

          • memory/428-53-0x000000001B300000-0x000000001B6A0000-memory.dmp

            Filesize

            3.6MB

          • memory/428-52-0x0000000000580000-0x0000000000588000-memory.dmp

            Filesize

            32KB

          • memory/3556-17-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

            Filesize

            10.8MB

          • memory/3556-14-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

            Filesize

            10.8MB

          • memory/3556-13-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

            Filesize

            10.8MB

          • memory/3556-12-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

            Filesize

            10.8MB

          • memory/3556-2-0x000002C233B20000-0x000002C233B42000-memory.dmp

            Filesize

            136KB

          • memory/4088-19-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

            Filesize

            10.8MB

          • memory/4088-1-0x0000000000FD0000-0x0000000001352000-memory.dmp

            Filesize

            3.5MB

          • memory/4088-0-0x00007FFA2AAA3000-0x00007FFA2AAA5000-memory.dmp

            Filesize

            8KB

          • memory/4088-46-0x00007FFA2AAA0000-0x00007FFA2B561000-memory.dmp

            Filesize

            10.8MB