Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2025 08:29

General

  • Target

    FatalityCrack/Fatality.exe

  • Size

    4.0MB

  • MD5

    fbd12d4ed9c24c092a1690cc37724957

  • SHA1

    9d8709497378bb43d7d77d74b4919a36c01c895a

  • SHA256

    27e56c30c96f880010fb2ec6151ca1176c7292541050ce3f2158b38e82f9f46c

  • SHA512

    829c07f37b99c563065ce84b1a0d721ac93e1b2092d358c297a001c163cd278f43d4f21661dbe7001ecba9841079ba66b57229041dc0698a9a28975ca7c5c2a0

  • SSDEEP

    98304:hBaYSF0HWypBty+P/AGcGFvK/NWIpskZHDRgx3iS:hB/Hhp6CK/Nv5kyS

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FatalityCrack\Fatality.exe
    "C:\Users\Admin\AppData\Local\Temp\FatalityCrack\Fatality.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\Fatality2.exe
      "C:\Users\Admin\AppData\Local\Temp\Fatality2.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\comSavesCommon\sc70IAxKPvTolc.vbe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\comSavesCommon\0DO98.bat" "
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\comSavesCommon\providerCrt.exe
            "C:\comSavesCommon\providerCrt.exe"
            5⤵
            • UAC bypass
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2748
            • C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe
              "C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe"
              6⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:896
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c3c26817-273e-415c-b18e-993da5101c9f.vbs"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1404
                • C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe
                  "C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe"
                  8⤵
                  • UAC bypass
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:1044
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a97f5dd1-394d-41b6-aa16-df538cba72f9.vbs"
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2948
                    • C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe
                      "C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe"
                      10⤵
                      • UAC bypass
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:2508
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ded0dd61-0258-439c-9e14-4f004a066af8.vbs"
                        11⤵
                          PID:1940
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f6715d62-0c8c-4c7c-94ff-7afec94366c2.vbs"
                          11⤵
                            PID:1876
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fa8b52ac-88c0-4eb9-bb03-0fecca8b8a6e.vbs"
                        9⤵
                          PID:2496
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\77d2ba87-ed14-4b22-81e1-d8df04fb8f07.vbs"
                      7⤵
                        PID:3048
            • C:\Users\Admin\AppData\Local\Temp\fatality.exe
              "C:\Users\Admin\AppData\Local\Temp\fatality.exe"
              2⤵
              • Executes dropped EXE
              PID:2824
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Windows\Web\Wallpaper\Windows\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2968
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Web\Wallpaper\Windows\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2988
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\Web\Wallpaper\Windows\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1504
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3016
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2460
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2804
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\comSavesCommon\lsm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3028
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\comSavesCommon\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2272
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\comSavesCommon\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2352
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2152
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2424
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2112
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\conhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1060
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\conhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2348
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\conhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1940
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dllhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2812
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1384
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1984
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:708
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2356
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Media Player\en-US\cmd.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1652
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Mail\winlogon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1268
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:960
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Mail\winlogon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1360
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\WmiPrvSE.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2264
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\WmiPrvSE.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2492
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\WmiPrvSE.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1816
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Windows\es-ES\services.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1756
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\es-ES\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3064
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Windows\es-ES\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1968

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\77d2ba87-ed14-4b22-81e1-d8df04fb8f07.vbs

            Filesize

            509B

            MD5

            8a36121b5e56542756581c1fa0a0a334

            SHA1

            82634aca01682fd9215f04eccb5f36cd5f64ce86

            SHA256

            81d66ba3287cb9e129028bf9f8ed97502c0cc198ae4d5ba07da33dfd47a25c35

            SHA512

            967c91c4cc3dfac01c6ab7439f54ef70039c357ea911dcfce715c0d9af5c8c95fa52d717ccfc7d0a2e9caa508ff310ea6b17f5e9ba9b9503dd54634c7c349258

          • C:\Users\Admin\AppData\Local\Temp\Fatality2.exe

            Filesize

            3.3MB

            MD5

            d7a497c51a219967de0636c63d0b6ff7

            SHA1

            b2a027f0139135dca65c417ee9d1f5963c965825

            SHA256

            3f7dbeb177934d53205b93a27b9f4262fe0f46aaf090326cb8e2069d90d0414c

            SHA512

            728a0ce0e6e2e60f3bc69786f7d69939b171279d07aafcc37720156954bd96d707a035bffe0497463bb0483c82a03c57c5b33624a3114526d12dd43fa509c921

          • C:\Users\Admin\AppData\Local\Temp\a97f5dd1-394d-41b6-aa16-df538cba72f9.vbs

            Filesize

            733B

            MD5

            0eed227a5bfdec368850e785f9f4609a

            SHA1

            91e977c2add5ab97ec0d609cc1187f7211dd9507

            SHA256

            8422c6817bbd5855b53c310ffc9318136dfa6bfb9fc637cb940c9793d2373d46

            SHA512

            25b26fe146e5dd1f51f6c4195084587947f2c0fa612c132cd67146fe7710a2002e16ce90a6dd280c644fd11bc205e8b12693e134c94f0e64df3bf1c260a6aae6

          • C:\Users\Admin\AppData\Local\Temp\c3c26817-273e-415c-b18e-993da5101c9f.vbs

            Filesize

            732B

            MD5

            376253be674899c257827b9d9cff5ab8

            SHA1

            2492beee3a48856f59ce72e69b2de12b664b61e9

            SHA256

            1048690bc99796670982168467f76cab2594c95a442da1321cdadf95e002bc16

            SHA512

            039f347fa24b914ba1403586076341c633c23590d0f176de845cc9bbcde41a9934e30a3663cbc9f203284290b689a80276dd6fd1af259c3abf85d2abf5a771a0

          • C:\Users\Admin\AppData\Local\Temp\ded0dd61-0258-439c-9e14-4f004a066af8.vbs

            Filesize

            733B

            MD5

            220e22851e9cea746cb0ac12ef80aa6c

            SHA1

            a7a244985c078c2b60b0f8e43ba9ec2c04c93f1d

            SHA256

            b1c5863c84b8c86fd5231c686b58c87b2e6b0ca8b7e2fc2335241314ceb77a83

            SHA512

            e1030e00e2268647bbbac89835e03cfa6b26809645828f8c958ac3e83d60901c41d8e9cd3bd26419ce22f502250aeae44ef2f8e928a90e2a4f3192e0260316f5

          • C:\Users\Admin\AppData\Local\Temp\fatality.exe

            Filesize

            2.0MB

            MD5

            b5ae62edbf81a0dec30fedcc6d136245

            SHA1

            9f89cca56f20cb73503e068f5bb115fdda0cf272

            SHA256

            5cd7137393dddb5cd41a55429871f443dcf6c2791eeaaade4fdb43f7a07c8865

            SHA512

            3e525757ca541897e3766f73e53f21ac4ba1147ee33cc5df2117131808de8e6a3c576d8799e22dc3c76afe163102cc8517a3834388c1f06365e892a389166cc7

          • C:\comSavesCommon\0DO98.bat

            Filesize

            35B

            MD5

            287a1d2eb08c19f2c25d7f2ae9f2514c

            SHA1

            02848644d030ea07622280f44c4de07a995ee18e

            SHA256

            a1c6a60f1b7ddb527a30dad1c3073916f7068a2fdbb2b15598f3905b42cbb52a

            SHA512

            e5a31793fb0f147fd10344caf7527a1a827a5aaab9b8f12c18d6fb067312b43346b4f82f099450158a5aa1552cfbe9dc811d801861fe4c8f61e0c493f32f428b

          • C:\comSavesCommon\sc70IAxKPvTolc.vbe

            Filesize

            197B

            MD5

            b0e77cae01fcf490ba345155c34c462d

            SHA1

            8b1a27868b122c54db4b55a1f9bb11ae1f9a8d9b

            SHA256

            aabe1b22990d934e5723fdd4199bb2a22d5b58c25151698f66a83646e86fb278

            SHA512

            b1f8519895d6c5c92acdf124c82530debedaa9c0f673b92babc92ceceb4f8c579f8060f093bbe6c20bbc6358ce29735dcca5d0338a9deafe508a43b160b25363

          • \comSavesCommon\providerCrt.exe

            Filesize

            3.0MB

            MD5

            d6ad419407e01490a6423c86dc133a2b

            SHA1

            3f281e19055eb89000bccdffe11243663134c762

            SHA256

            9055ac76247c7b28a3f66bef41ec65e280b5a729862bc36789fa41e5ae7c53ce

            SHA512

            6da8a0e699a922f9e7f335467540f92fadc79ea7bd840ebc2d86e9be3909421c9c494da7df5c72ad5ef2a818f718ca67886de7b45da93e6cb050ebefb0a6119d

          • memory/896-81-0x0000000000E90000-0x000000000119A000-memory.dmp

            Filesize

            3.0MB

          • memory/1044-92-0x0000000000200000-0x000000000050A000-memory.dmp

            Filesize

            3.0MB

          • memory/1924-13-0x000007FEF5700000-0x000007FEF60EC000-memory.dmp

            Filesize

            9.9MB

          • memory/1924-0-0x000007FEF5703000-0x000007FEF5704000-memory.dmp

            Filesize

            4KB

          • memory/1924-2-0x000007FEF5700000-0x000007FEF60EC000-memory.dmp

            Filesize

            9.9MB

          • memory/1924-1-0x0000000000060000-0x0000000000460000-memory.dmp

            Filesize

            4.0MB

          • memory/2508-105-0x0000000000FD0000-0x0000000000FE2000-memory.dmp

            Filesize

            72KB

          • memory/2508-104-0x0000000000FE0000-0x00000000012EA000-memory.dmp

            Filesize

            3.0MB

          • memory/2748-41-0x00000000024A0000-0x00000000024A8000-memory.dmp

            Filesize

            32KB

          • memory/2748-49-0x000000001AF40000-0x000000001AF4A000-memory.dmp

            Filesize

            40KB

          • memory/2748-38-0x0000000000D20000-0x0000000000D2C000-memory.dmp

            Filesize

            48KB

          • memory/2748-39-0x0000000000D30000-0x0000000000D38000-memory.dmp

            Filesize

            32KB

          • memory/2748-40-0x0000000002490000-0x000000000249C000-memory.dmp

            Filesize

            48KB

          • memory/2748-36-0x0000000000D10000-0x0000000000D1A000-memory.dmp

            Filesize

            40KB

          • memory/2748-42-0x00000000024B0000-0x00000000024C2000-memory.dmp

            Filesize

            72KB

          • memory/2748-43-0x00000000024C0000-0x00000000024CC000-memory.dmp

            Filesize

            48KB

          • memory/2748-44-0x0000000002640000-0x0000000002648000-memory.dmp

            Filesize

            32KB

          • memory/2748-45-0x0000000002650000-0x000000000265C000-memory.dmp

            Filesize

            48KB

          • memory/2748-46-0x000000001AA60000-0x000000001AA6C000-memory.dmp

            Filesize

            48KB

          • memory/2748-47-0x000000001AF30000-0x000000001AF38000-memory.dmp

            Filesize

            32KB

          • memory/2748-48-0x000000001AA70000-0x000000001AA7C000-memory.dmp

            Filesize

            48KB

          • memory/2748-37-0x00000000025D0000-0x0000000002626000-memory.dmp

            Filesize

            344KB

          • memory/2748-50-0x000000001AF50000-0x000000001AF5E000-memory.dmp

            Filesize

            56KB

          • memory/2748-51-0x000000001AF60000-0x000000001AF6E000-memory.dmp

            Filesize

            56KB

          • memory/2748-52-0x000000001AF90000-0x000000001AF98000-memory.dmp

            Filesize

            32KB

          • memory/2748-53-0x000000001AFA0000-0x000000001AFAA000-memory.dmp

            Filesize

            40KB

          • memory/2748-54-0x000000001B030000-0x000000001B03C000-memory.dmp

            Filesize

            48KB

          • memory/2748-35-0x0000000000D00000-0x0000000000D0C000-memory.dmp

            Filesize

            48KB

          • memory/2748-34-0x0000000000B50000-0x0000000000B66000-memory.dmp

            Filesize

            88KB

          • memory/2748-33-0x0000000000A40000-0x0000000000A48000-memory.dmp

            Filesize

            32KB

          • memory/2748-32-0x0000000000570000-0x000000000058C000-memory.dmp

            Filesize

            112KB

          • memory/2748-31-0x0000000000560000-0x0000000000568000-memory.dmp

            Filesize

            32KB

          • memory/2748-30-0x00000000004D0000-0x00000000004DE000-memory.dmp

            Filesize

            56KB

          • memory/2748-29-0x00000000004C0000-0x00000000004CE000-memory.dmp

            Filesize

            56KB

          • memory/2748-28-0x0000000000D80000-0x000000000108A000-memory.dmp

            Filesize

            3.0MB