Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2025 10:50

General

  • Target

    ad4f38154a9eba7ae3502976fce132e4.exe

  • Size

    2.6MB

  • MD5

    ad4f38154a9eba7ae3502976fce132e4

  • SHA1

    2727a173b987caf107b987c78cd0f4222c573c23

  • SHA256

    dbb551975191618313abbb0e81e5b011de0b7fa3e2a71a461bd0d195fa95c99b

  • SHA512

    67d150d404d29361dc71e1d22e647f317c393996cfd084126c4f462f444f9a1c43bfad88b6b6e84f0d886e330fae26fb00bda9c9af1fefffe7c63059e4b5b399

  • SSDEEP

    49152:/cXLxQvRkzreiqnHo052wLX6q8Zcqhezo73eY3R+CXS:/clQGzaieo052wLXd8Zcq0WeYB+C

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Executes dropped EXE 11 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 9 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad4f38154a9eba7ae3502976fce132e4.exe
    "C:\Users\Admin\AppData\Local\Temp\ad4f38154a9eba7ae3502976fce132e4.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\a7FH64vcYb.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2172
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2840
        • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
          "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GrsChc0jod.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:1784
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:796
              • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2012
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\imE7OxQXo6.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1480
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:2560
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      7⤵
                        PID:2556
                      • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                        "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1780
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HaE3Dx3E3n.bat"
                          8⤵
                          • Suspicious use of WriteProcessMemory
                          PID:900
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            9⤵
                              PID:2360
                            • C:\Windows\system32\w32tm.exe
                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                              9⤵
                                PID:2140
                              • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                                "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                                9⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:1660
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\diBg3fIzhe.bat"
                                  10⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:2992
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    11⤵
                                      PID:2032
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      11⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:1056
                                    • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                                      "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                                      11⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:2800
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aqn4VxW4jp.bat"
                                        12⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:2628
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          13⤵
                                            PID:2848
                                          • C:\Windows\system32\PING.EXE
                                            ping -n 10 localhost
                                            13⤵
                                            • System Network Configuration Discovery: Internet Connection Discovery
                                            • Runs ping.exe
                                            PID:1752
                                          • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                                            "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                                            13⤵
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2872
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Q8sISb3ARb.bat"
                                              14⤵
                                                PID:2384
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  15⤵
                                                    PID:2924
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 10 localhost
                                                    15⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:2868
                                                  • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                                                    "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                                                    15⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2188
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5kD435lcwQ.bat"
                                                      16⤵
                                                        PID:1124
                                                        • C:\Windows\system32\chcp.com
                                                          chcp 65001
                                                          17⤵
                                                            PID:1004
                                                          • C:\Windows\system32\PING.EXE
                                                            ping -n 10 localhost
                                                            17⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:1712
                                                          • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                                                            "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                                                            17⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:996
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OEffu0Lctr.bat"
                                                              18⤵
                                                                PID:2376
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp 65001
                                                                  19⤵
                                                                    PID:2368
                                                                  • C:\Windows\system32\PING.EXE
                                                                    ping -n 10 localhost
                                                                    19⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    • Runs ping.exe
                                                                    PID:1060
                                                                  • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                                                                    "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                                                                    19⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2104
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\21MOevrO8R.bat"
                                                                      20⤵
                                                                        PID:1592
                                                                        • C:\Windows\system32\chcp.com
                                                                          chcp 65001
                                                                          21⤵
                                                                            PID:2840
                                                                          • C:\Windows\system32\PING.EXE
                                                                            ping -n 10 localhost
                                                                            21⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:2696
                                                                          • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                                                                            "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                                                                            21⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2948
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TipjmLA2pW.bat"
                                                                              22⤵
                                                                                PID:3028
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  23⤵
                                                                                    PID:1576
                                                                                  • C:\Windows\system32\PING.EXE
                                                                                    ping -n 10 localhost
                                                                                    23⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    • Runs ping.exe
                                                                                    PID:1388
                                                                                  • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe
                                                                                    "C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe"
                                                                                    23⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2900

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\dwm.exe

                                        Filesize

                                        2.6MB

                                        MD5

                                        ad4f38154a9eba7ae3502976fce132e4

                                        SHA1

                                        2727a173b987caf107b987c78cd0f4222c573c23

                                        SHA256

                                        dbb551975191618313abbb0e81e5b011de0b7fa3e2a71a461bd0d195fa95c99b

                                        SHA512

                                        67d150d404d29361dc71e1d22e647f317c393996cfd084126c4f462f444f9a1c43bfad88b6b6e84f0d886e330fae26fb00bda9c9af1fefffe7c63059e4b5b399

                                      • C:\Users\Admin\AppData\Local\Temp\21MOevrO8R.bat

                                        Filesize

                                        184B

                                        MD5

                                        345b1e097f21991092599f573fc3c9f9

                                        SHA1

                                        3f826720e2cb9a1dbcee86c61c9a97cd492c1283

                                        SHA256

                                        460cf756c8eeb9f51eb23dbe9c5d3252b5d5a09e4944491bd04d5957f67d03a4

                                        SHA512

                                        79bd88e3c228480c8c796e8b00e0d25b3daef6b7988825f1420749d91dd8016dc3ea441fdbab8b5ac16db2d843ab6bb7b226677b5b2d0ea994d6cb86b88eac01

                                      • C:\Users\Admin\AppData\Local\Temp\5kD435lcwQ.bat

                                        Filesize

                                        184B

                                        MD5

                                        00cdc5a5461c5e3f2ad253e675de87aa

                                        SHA1

                                        66d9bc914d7048122a2380d800a11b06581b6062

                                        SHA256

                                        5bd24b8e4bb1d93bc37511b841b09d1dcd46c5a3c49aa2bf4db46f315cfcf34a

                                        SHA512

                                        3582b8e787d5af1b9651b2231158157da5b6ece07113ba37bbfb311f2cfe13bf5487c26ec89e546ec46dc028ca9756ab841b89731c3f2a5d4081eccfe8ffe2ea

                                      • C:\Users\Admin\AppData\Local\Temp\GrsChc0jod.bat

                                        Filesize

                                        184B

                                        MD5

                                        287c18a28d7a356e46ef8f28989bd613

                                        SHA1

                                        5642b76b6cbc9f3f41f5003637d8cebfebc4c4f8

                                        SHA256

                                        a9f02144692e2f68650420b7710e8ece48faf64c5483d86d08a500fd47182a7d

                                        SHA512

                                        dc66eb1e9fec0025786c94055f95f35f91a72f77bf3b00fd4c1ff94b804436b85c50167bdb4f06b328b43c932da498dfc4bd38a4751d5ce74812579b8296bdf6

                                      • C:\Users\Admin\AppData\Local\Temp\HaE3Dx3E3n.bat

                                        Filesize

                                        232B

                                        MD5

                                        b1d036d4350d8224517b4c37cd16b343

                                        SHA1

                                        5e14d05a3f51ecd28152213f0186eb3fac0333cf

                                        SHA256

                                        f0bd16acaddc62d742246b377cb4b90a225040ba8d91fc759f3dbbcede9ff410

                                        SHA512

                                        25b901ac8b3473f74cf61d7a53854500e553213243de739c60e8065dfaa23e6dc6f89cb9798804a3a613232ae5ff9172ea32f9c0633eb19dbf7356b8b6758cb1

                                      • C:\Users\Admin\AppData\Local\Temp\OEffu0Lctr.bat

                                        Filesize

                                        184B

                                        MD5

                                        9de6fedfe894f3eaf7add5e436787d0c

                                        SHA1

                                        a583d06d15b24283a2e114e59ed671ad330919d3

                                        SHA256

                                        1ba79c66da7d2e986c0dfb319707bf59d47a4bc0edcd44ca6c9ec60d5ce02abc

                                        SHA512

                                        e9d46620c3321f2f7988c83963a1e411ef27058fb8cc44a4fb3b864e9eabc75f4d891e9443bd92fdef6c42314cc1e586c9d546c4cfdd72d0a3819acfa3e5e9bc

                                      • C:\Users\Admin\AppData\Local\Temp\Q8sISb3ARb.bat

                                        Filesize

                                        184B

                                        MD5

                                        e5895b6fb65f2ddb3d7b1db09490bdc5

                                        SHA1

                                        8bbbe008138851f40825297d80eb341bbb513248

                                        SHA256

                                        576dbb6acec91a85fc94b70f481b8dc247f3d8210f3ca65cddf7941678f969b3

                                        SHA512

                                        ff08d77b04449ba2accc491fa875c7cd5856d6ec1e869c4b82ceb502925121cda656b960020ab2d6c0f19bdda6e879e62699d0227edbf1687e8e963acd485990

                                      • C:\Users\Admin\AppData\Local\Temp\TipjmLA2pW.bat

                                        Filesize

                                        184B

                                        MD5

                                        0a50ac64c43bc7ca7e44805556d5a466

                                        SHA1

                                        1000c7891cf466f1e5e80dedcc52dd1aa3ed100d

                                        SHA256

                                        83884e7377c9af417b1f4bf28e345dea93c9e3fad1a8384468877806d52760ee

                                        SHA512

                                        ce90e8c095ec9734807bd6ff819730a158ce0f738a56564af5ba04709654fb86aacf84f4084de1d725e6f027f87f45e4ed0ed39d69dca97f08f1c1d396fe232f

                                      • C:\Users\Admin\AppData\Local\Temp\a7FH64vcYb.bat

                                        Filesize

                                        184B

                                        MD5

                                        591af6b5ce6eee650bb7c90b992c394b

                                        SHA1

                                        c2f421c585979277dbc24c316eddfa0117288bc4

                                        SHA256

                                        2001fa16c16178a7f2c9065ee0b5980eb74f148b6830494bfbea1525e864d66c

                                        SHA512

                                        62486ad5a9ad3ab9b8513709c6f23844228a8fbc10c09ab891fc267ac761dee9795d105f216ceb49d196a4eda5f6095cc17ba42d81f2034aaa9db53b84cc438a

                                      • C:\Users\Admin\AppData\Local\Temp\aqn4VxW4jp.bat

                                        Filesize

                                        184B

                                        MD5

                                        faf257dfe80c55b5aac0d0ce4d2312aa

                                        SHA1

                                        7c63c4d36c5bde099464b14d530c2b14cf26d76d

                                        SHA256

                                        a2cf183f2b8debbb915761f8a54a1db92283bb381b0c620ff2e17650aaf63e38

                                        SHA512

                                        c08723e4fde2aea101f9a5fec0a3310eb3d8fc242dead98564d26aca74e39389bbbba956c7a821cb46e4ccbea21ca07128f70ae3c4e80f238978c8da3ffbc570

                                      • C:\Users\Admin\AppData\Local\Temp\diBg3fIzhe.bat

                                        Filesize

                                        184B

                                        MD5

                                        40f8b713a4a4c7943c993eb073289e8b

                                        SHA1

                                        60c8e24d32136426a9dee02f9add2f988e6553fc

                                        SHA256

                                        222bcaa2623cf0b596364daa6890f9b2dc1c8a9855005fd88f70950694ab10b6

                                        SHA512

                                        1ad8470582eaed32f94c080702620d07c8f3da9cfe1332c3e1632dd5e740eab9c14709c0bc15caee328da101cfd73d897f04c6df3a0d607dc2bb1097ab68e465

                                      • C:\Users\Admin\AppData\Local\Temp\imE7OxQXo6.bat

                                        Filesize

                                        232B

                                        MD5

                                        374a67dca7483c768b1bc6f7fc401348

                                        SHA1

                                        73086fff46134bbada2f0b2287bb8224da5d06d8

                                        SHA256

                                        032f33995ed4561fea939e1d83b33c45d81ef1a5e71a00115a04e3302ccd4b2c

                                        SHA512

                                        829e19fec8c4f09540aad0b1b5d299e9f5d08156ade60f38467c7f96f4a4604bd19ec972fb78f11f525bc83b24a2b8d0623751bb462906ed0212ebf8b92511ac

                                      • memory/996-187-0x00000000010C0000-0x000000000135C000-memory.dmp

                                        Filesize

                                        2.6MB

                                      • memory/1660-112-0x0000000000370000-0x000000000060C000-memory.dmp

                                        Filesize

                                        2.6MB

                                      • memory/1780-93-0x0000000000350000-0x00000000005EC000-memory.dmp

                                        Filesize

                                        2.6MB

                                      • memory/2012-74-0x00000000013B0000-0x000000000164C000-memory.dmp

                                        Filesize

                                        2.6MB

                                      • memory/2188-168-0x0000000000DF0000-0x000000000108C000-memory.dmp

                                        Filesize

                                        2.6MB

                                      • memory/2364-17-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-8-0x00000000006E0000-0x00000000006FC000-memory.dmp

                                        Filesize

                                        112KB

                                      • memory/2364-29-0x00000000008B0000-0x00000000008BE000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/2364-31-0x00000000021E0000-0x00000000021F8000-memory.dmp

                                        Filesize

                                        96KB

                                      • memory/2364-33-0x00000000008C0000-0x00000000008CC000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2364-35-0x00000000022F0000-0x000000000233E000-memory.dmp

                                        Filesize

                                        312KB

                                      • memory/2364-21-0x00000000006D0000-0x00000000006E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2364-24-0x00000000008F0000-0x0000000000902000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2364-52-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-1-0x0000000000090000-0x000000000032C000-memory.dmp

                                        Filesize

                                        2.6MB

                                      • memory/2364-25-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-22-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-19-0x00000000008D0000-0x00000000008E2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2364-27-0x0000000000700000-0x0000000000710000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2364-16-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-0-0x000007FEF5983000-0x000007FEF5984000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2364-11-0x0000000000890000-0x00000000008A8000-memory.dmp

                                        Filesize

                                        96KB

                                      • memory/2364-2-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-12-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-14-0x00000000006C0000-0x00000000006CE000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/2364-15-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-9-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-6-0x00000000006B0000-0x00000000006BE000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/2364-4-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2364-3-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/2740-55-0x0000000000E20000-0x00000000010BC000-memory.dmp

                                        Filesize

                                        2.6MB

                                      • memory/2800-131-0x0000000000AD0000-0x0000000000D6C000-memory.dmp

                                        Filesize

                                        2.6MB