Analysis

  • max time kernel
    11s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    08-02-2025 19:46

General

  • Target

    8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b.exe

  • Size

    3.2MB

  • MD5

    4735bb00bcb92c0c5d85599e289925ef

  • SHA1

    90dee1ecc8721777366e9c0d2d3c9fc2df6a925b

  • SHA256

    8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b

  • SHA512

    673a67e73f8d3a31403cee50234d3160afe3eda75f75935677f9da0e955e28e67d9265c1a23c80b0fab7bd1aaa85ece8e3bf1bf085e76d9cbbd498a34a77287e

  • SSDEEP

    98304:BjxkN1YiQ2DmsiJb0D2OG5Mbser0ZAY8pD1X0C:B161YitDZiJoZgAY8pDl0

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 45 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b.exe
    "C:\Users\Admin\AppData\Local\Temp\8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3132
    • C:\Program Files\Internet Explorer\de-DE\RuntimeBroker.exe
      "C:\Program Files\Internet Explorer\de-DE\RuntimeBroker.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:964
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f18bfa01-479f-40f4-8d46-6a9a456f8418.vbs"
        3⤵
          PID:3632
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\67324ed0-e59d-493e-a5e7-b6be292e7421.vbs"
          3⤵
            PID:1400
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3956
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2020
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1544
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 10 /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\SearchApp.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3104
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\SearchApp.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4504
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\SearchApp.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3392
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Users\Public\lsass.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4888
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Public\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4692
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Users\Public\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1088
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Internet Explorer\de-DE\RuntimeBroker.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:224
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\de-DE\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4916
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\de-DE\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4624
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Windows\Help\Windows\ContentStore\en-US\sppsvc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3308
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Help\Windows\ContentStore\en-US\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4620
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Windows\Help\Windows\ContentStore\en-US\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:536
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4532
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3816
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\StartMenuExperienceHost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4228
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Crashpad\attachments\RuntimeBroker.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1068
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Crashpad\attachments\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4072
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files\Crashpad\attachments\RuntimeBroker.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2628
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Users\Default\SendTo\taskhostw.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3708
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Default\SendTo\taskhostw.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2356
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Users\Default\SendTo\taskhostw.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2956
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Documents\csrss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4420
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\Documents\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:5052
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Documents\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2944
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\Registry.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2224
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\Registry.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2920
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\Registry.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2688
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\upfc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4372
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:116
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2200
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files\VideoLAN\lsass.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1652
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4848
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\VideoLAN\lsass.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1680
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\explorer.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2304
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4720
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Portable Devices\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4684
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\OfficeClickToRun.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1232
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\All Users\OfficeClickToRun.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4600
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\OfficeClickToRun.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2964
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\SppExtComObj.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3884
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\SppExtComObj.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1924
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\uk-UA\SppExtComObj.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4496
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\67324ed0-e59d-493e-a5e7-b6be292e7421.vbs

        Filesize

        510B

        MD5

        2c717db69856ee363fa7ebdb2228cfb7

        SHA1

        627aa5d5c7121499c6105049336a4656f3d6d05f

        SHA256

        8a7ddf407fca82aa44cf16cbdad3880c46865811390eecffb65d325aa0a852bd

        SHA512

        82916ccde0f91ba100b5e14946332265f7969b3727b9da93f0744fbd3bccbc980c6a2070d87ddebaf648e86f9354dd3fccd8a6fba43f1b0423c812abe14a9f38

      • C:\Users\Admin\AppData\Local\Temp\f18bfa01-479f-40f4-8d46-6a9a456f8418.vbs

        Filesize

        733B

        MD5

        8b72d6ffef2471da5faee0ee253246be

        SHA1

        aa89727fd1b7bba6a222eda9e258fd3f121f7d45

        SHA256

        eb24e76ab8912742a225c2b500cd7d216c559d108dbdff1a9ca69bccc5584432

        SHA512

        22dc27bf4c6736aea5599812d2e487c7232fede6229d18d16b616e0a7e70684346913cc2e655432da61a4c43a8ffefbb8c7a548eb6f191a7f045b1a9b3cb3b94

      • C:\Windows\Help\Windows\ContentStore\en-US\sppsvc.exe

        Filesize

        3.2MB

        MD5

        4735bb00bcb92c0c5d85599e289925ef

        SHA1

        90dee1ecc8721777366e9c0d2d3c9fc2df6a925b

        SHA256

        8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b

        SHA512

        673a67e73f8d3a31403cee50234d3160afe3eda75f75935677f9da0e955e28e67d9265c1a23c80b0fab7bd1aaa85ece8e3bf1bf085e76d9cbbd498a34a77287e

      • memory/964-91-0x000000001EF80000-0x000000001F142000-memory.dmp

        Filesize

        1.8MB

      • memory/964-81-0x000000001C9E0000-0x000000001C9F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-22-0x000000001C630000-0x000000001C642000-memory.dmp

        Filesize

        72KB

      • memory/3132-24-0x000000001C660000-0x000000001C668000-memory.dmp

        Filesize

        32KB

      • memory/3132-7-0x00000000030C0000-0x00000000030DC000-memory.dmp

        Filesize

        112KB

      • memory/3132-8-0x000000001BB20000-0x000000001BB70000-memory.dmp

        Filesize

        320KB

      • memory/3132-9-0x00000000030E0000-0x00000000030E8000-memory.dmp

        Filesize

        32KB

      • memory/3132-10-0x000000001BAD0000-0x000000001BAE6000-memory.dmp

        Filesize

        88KB

      • memory/3132-11-0x000000001BAF0000-0x000000001BAF8000-memory.dmp

        Filesize

        32KB

      • memory/3132-12-0x000000001C180000-0x000000001C192000-memory.dmp

        Filesize

        72KB

      • memory/3132-13-0x000000001BB10000-0x000000001BB1C000-memory.dmp

        Filesize

        48KB

      • memory/3132-14-0x000000001BB00000-0x000000001BB08000-memory.dmp

        Filesize

        32KB

      • memory/3132-15-0x000000001C590000-0x000000001C5A0000-memory.dmp

        Filesize

        64KB

      • memory/3132-16-0x000000001C5A0000-0x000000001C5AA000-memory.dmp

        Filesize

        40KB

      • memory/3132-17-0x000000001C5B0000-0x000000001C606000-memory.dmp

        Filesize

        344KB

      • memory/3132-18-0x000000001C600000-0x000000001C60C000-memory.dmp

        Filesize

        48KB

      • memory/3132-19-0x000000001C610000-0x000000001C618000-memory.dmp

        Filesize

        32KB

      • memory/3132-20-0x000000001C720000-0x000000001C72C000-memory.dmp

        Filesize

        48KB

      • memory/3132-21-0x000000001C620000-0x000000001C628000-memory.dmp

        Filesize

        32KB

      • memory/3132-0-0x00007FFFC23D3000-0x00007FFFC23D5000-memory.dmp

        Filesize

        8KB

      • memory/3132-23-0x000000001CC60000-0x000000001D188000-memory.dmp

        Filesize

        5.2MB

      • memory/3132-6-0x00000000030B0000-0x00000000030B8000-memory.dmp

        Filesize

        32KB

      • memory/3132-25-0x000000001C670000-0x000000001C67C000-memory.dmp

        Filesize

        48KB

      • memory/3132-26-0x000000001C680000-0x000000001C688000-memory.dmp

        Filesize

        32KB

      • memory/3132-27-0x000000001C690000-0x000000001C69C000-memory.dmp

        Filesize

        48KB

      • memory/3132-28-0x000000001C6A0000-0x000000001C6AC000-memory.dmp

        Filesize

        48KB

      • memory/3132-29-0x000000001C930000-0x000000001C938000-memory.dmp

        Filesize

        32KB

      • memory/3132-30-0x000000001C6B0000-0x000000001C6BC000-memory.dmp

        Filesize

        48KB

      • memory/3132-31-0x000000001C6C0000-0x000000001C6CA000-memory.dmp

        Filesize

        40KB

      • memory/3132-34-0x000000001C6F0000-0x000000001C6FE000-memory.dmp

        Filesize

        56KB

      • memory/3132-33-0x000000001C6E0000-0x000000001C6E8000-memory.dmp

        Filesize

        32KB

      • memory/3132-32-0x000000001C6D0000-0x000000001C6DE000-memory.dmp

        Filesize

        56KB

      • memory/3132-35-0x000000001C700000-0x000000001C708000-memory.dmp

        Filesize

        32KB

      • memory/3132-36-0x000000001C710000-0x000000001C718000-memory.dmp

        Filesize

        32KB

      • memory/3132-37-0x000000001CA40000-0x000000001CA4A000-memory.dmp

        Filesize

        40KB

      • memory/3132-38-0x000000001C940000-0x000000001C94C000-memory.dmp

        Filesize

        48KB

      • memory/3132-5-0x00000000017A0000-0x00000000017AE000-memory.dmp

        Filesize

        56KB

      • memory/3132-80-0x00007FFFC23D0000-0x00007FFFC2E91000-memory.dmp

        Filesize

        10.8MB

      • memory/3132-4-0x0000000001790000-0x000000000179E000-memory.dmp

        Filesize

        56KB

      • memory/3132-3-0x000000001C190000-0x000000001C294000-memory.dmp

        Filesize

        1.0MB

      • memory/3132-2-0x00007FFFC23D0000-0x00007FFFC2E91000-memory.dmp

        Filesize

        10.8MB

      • memory/3132-1-0x0000000000B40000-0x0000000000E7E000-memory.dmp

        Filesize

        3.2MB