Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:16

General

  • Target

    c3aaa8d0678c59cfe55a289d29c5b3d1.exe

  • Size

    5.9MB

  • MD5

    c3aaa8d0678c59cfe55a289d29c5b3d1

  • SHA1

    2c592322b164e7fa9282bfdb7a650dbe4d41492c

  • SHA256

    c18fdffa9d1b4bc8ae2f14f8685b9dcad5d250760d0fe059c522115dac9a3d24

  • SHA512

    e36f85f15ee3e026fcac40603e8985277f1196d2435cb95c24ffa9afc1dbd09c69474be0d601c7b6a6c67bec203369cfb1e67aa6db1ae1a0056910b12bd70408

  • SSDEEP

    98304:ByeUxPQ0JMLyWIvqrhH05I8TderKjHDFUh9HkEXJfw4G:ByeU11Rvqmu8TWKnF6N/1w3

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3aaa8d0678c59cfe55a289d29c5b3d1.exe
    "C:\Users\Admin\AppData\Local\Temp\c3aaa8d0678c59cfe55a289d29c5b3d1.exe"
    1⤵
    • UAC bypass
    • Drops file in Drivers directory
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2772
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2380
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2388
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1948
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2228
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1544
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3040
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2136
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2376
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:404
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:344
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1268
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1540
    • C:\Windows\Temp\Crashpad\reports\System.exe
      "C:\Windows\Temp\Crashpad\reports\System.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2436
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9779b5bb-45f0-4b02-a727-f372049eb23f.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Windows\Temp\Crashpad\reports\System.exe
          C:\Windows\Temp\Crashpad\reports\System.exe
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2068
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c982d9b9-0cef-4ea9-8843-d2a7ea73a59c.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1948
            • C:\Windows\Temp\Crashpad\reports\System.exe
              C:\Windows\Temp\Crashpad\reports\System.exe
              6⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:972
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\326515ee-2668-495a-aec9-ed109e05039e.vbs"
                7⤵
                  PID:660
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fda28be3-54f5-4c35-8a1e-f078c2b5cf96.vbs"
                  7⤵
                    PID:1596
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fc4b379c-72f7-4997-863e-625bd9f12804.vbs"
                5⤵
                  PID:2836
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\48aef2f1-6b34-42e8-820d-bed39d46a0a7.vbs"
              3⤵
                PID:2116
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\WmiPrvSE.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:576
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\WmiPrvSE.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1660
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\WmiPrvSE.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2836
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Templates\WmiPrvSE.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2852
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default\Templates\WmiPrvSE.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1768
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Templates\WmiPrvSE.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2412
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Windows\Temp\Crashpad\reports\System.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:624
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Temp\Crashpad\reports\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2008
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Windows\Temp\Crashpad\reports\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2028
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\System.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:660
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1176
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2328

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\System.exe

            Filesize

            5.9MB

            MD5

            57a118cbb4c885205529395a9071e238

            SHA1

            a7f1cc710828e2da9aea4390518d8e3141db4df7

            SHA256

            9cd61ced727ad1106b99ae675a3271daa45054602a9cd4913ea24cb0b96b922b

            SHA512

            32b2f4d2f781e20451f0076c61b21f403c7c5c1548931a10c1b99d33b5ea56e10d805b06c8436726f054f6a6ec30aafa26d3ba65896183d595ab2e2092a5d715

          • C:\Users\Admin\AppData\Local\Temp\326515ee-2668-495a-aec9-ed109e05039e.vbs

            Filesize

            718B

            MD5

            79c1472567b3904e4cc35f654884ec22

            SHA1

            dc6c1ae4d348026577162c20a38bcf772c8a918b

            SHA256

            8137e1d4562797f55bb5b825268270bdfa7365fa90477017ac3f6983b0b431a7

            SHA512

            af706c9d8e757191a32ace4a5577493bdd3084807b8d1fb52173cd05af23accfc4aec55e4d36b0365d7cb29de2286eb4eccbf5954a53a13cc656b845dd62a9ae

          • C:\Users\Admin\AppData\Local\Temp\48aef2f1-6b34-42e8-820d-bed39d46a0a7.vbs

            Filesize

            495B

            MD5

            f211ea8770894efdf28e5fd9551b0a24

            SHA1

            d784dfc113742c94472887a1a63e9e395b14557f

            SHA256

            5151be6b63b4a1c7553e8d3ef86515af50fa843adcdb078a0ad37c1d1e924503

            SHA512

            f200af24483fccd1569bc847df5937d36b0c2b913f2b3a7352ef44a5ebfa853987d1f974f1b332e59090e5917fb977eb4bd9f831acc12666a508963bb4179af0

          • C:\Users\Admin\AppData\Local\Temp\9779b5bb-45f0-4b02-a727-f372049eb23f.vbs

            Filesize

            719B

            MD5

            0646031e882dd17438af6bc24994d7ae

            SHA1

            f7017ed175b25317d9b2d78a64d6ce1a3348d5ad

            SHA256

            b56db6c95f7fbf7488618ed0d80f6e7c836c6f7113193a90f6bfbb76f2596b6b

            SHA512

            d4c4aba109241e5b1c313f6b761a6e717ee2d66ae3ad863165dc2d0709f2c11a7830d228383f3ad4b96c171654d3cda03357528952325a501b0d41f1a81c61b4

          • C:\Users\Admin\AppData\Local\Temp\RCX668.tmp

            Filesize

            5.9MB

            MD5

            c3aaa8d0678c59cfe55a289d29c5b3d1

            SHA1

            2c592322b164e7fa9282bfdb7a650dbe4d41492c

            SHA256

            c18fdffa9d1b4bc8ae2f14f8685b9dcad5d250760d0fe059c522115dac9a3d24

            SHA512

            e36f85f15ee3e026fcac40603e8985277f1196d2435cb95c24ffa9afc1dbd09c69474be0d601c7b6a6c67bec203369cfb1e67aa6db1ae1a0056910b12bd70408

          • C:\Users\Admin\AppData\Local\Temp\c982d9b9-0cef-4ea9-8843-d2a7ea73a59c.vbs

            Filesize

            719B

            MD5

            2b59979383be39aea152763792677cd9

            SHA1

            5cf4cb4fc1b81f1fd3e459b4b014bd463a8ca1e8

            SHA256

            440664ae61836f2a0f613a53169c7cec39973adb940ae5dfd9208aa95d4a8a2d

            SHA512

            f7dd6bd98105fd15fffefbdf12df0860be4803811b1b63f9697cae32d0be2295ea3f763e48bd9fb4173aee3d09b965406b3bf71540d74fc249712ed1548e33ed

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            2cb014e494aeec29a2fd5983cd6ab998

            SHA1

            a904207cc7da177b15089329bac6d4f5f1994b24

            SHA256

            98483a44b78d9504dd6991c3b61c411350a00184a3886f7c978961dffec18dcd

            SHA512

            baccdf6acc43235c9b3ec5ec2adad8d9e1c2e228057b4e4f1d368339dfc865a4169fb9dd7d8ac12ee2650cdff89bad6c01037212b047f5f085ae1ce01d1556fd

          • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Templates\WmiPrvSE.exe

            Filesize

            5.9MB

            MD5

            0779ef77b6c49de619389a50b04be5cc

            SHA1

            40bf5b73c0731ab3d5558fef95a9affa1632c87f

            SHA256

            5432df3beeb8ef3d3bd542a38dc078caf128d29a30836df158677dcfa7a0e1c5

            SHA512

            162f5dede7ea1d1a030ccd7e002f66f4cca1e2b682d978bff16fde76723fe0d097252258c543f6a9a9fec7fa089c585b5ef1d465e52d605f9d779c34334b8a17

          • memory/972-196-0x0000000000DA0000-0x0000000000DB2000-memory.dmp

            Filesize

            72KB

          • memory/2068-180-0x0000000000E60000-0x0000000001758000-memory.dmp

            Filesize

            9.0MB

          • memory/2068-182-0x0000000000E50000-0x0000000000E62000-memory.dmp

            Filesize

            72KB

          • memory/2068-183-0x000000001B5A0000-0x000000001B5B2000-memory.dmp

            Filesize

            72KB

          • memory/2436-162-0x0000000000C90000-0x0000000001588000-memory.dmp

            Filesize

            9.0MB

          • memory/2772-13-0x0000000000B60000-0x0000000000B6C000-memory.dmp

            Filesize

            48KB

          • memory/2772-35-0x000000001B9A0000-0x000000001B9A8000-memory.dmp

            Filesize

            32KB

          • memory/2772-15-0x0000000000B70000-0x0000000000B80000-memory.dmp

            Filesize

            64KB

          • memory/2772-16-0x0000000000B80000-0x0000000000B8A000-memory.dmp

            Filesize

            40KB

          • memory/2772-17-0x000000001B470000-0x000000001B4C6000-memory.dmp

            Filesize

            344KB

          • memory/2772-18-0x0000000000D20000-0x0000000000D2C000-memory.dmp

            Filesize

            48KB

          • memory/2772-19-0x0000000000D30000-0x0000000000D38000-memory.dmp

            Filesize

            32KB

          • memory/2772-20-0x0000000000D40000-0x0000000000D4C000-memory.dmp

            Filesize

            48KB

          • memory/2772-21-0x00000000011D0000-0x00000000011D8000-memory.dmp

            Filesize

            32KB

          • memory/2772-23-0x00000000011E0000-0x00000000011F2000-memory.dmp

            Filesize

            72KB

          • memory/2772-24-0x0000000001310000-0x000000000131C000-memory.dmp

            Filesize

            48KB

          • memory/2772-25-0x00000000013A0000-0x00000000013AC000-memory.dmp

            Filesize

            48KB

          • memory/2772-27-0x000000001B4C0000-0x000000001B4CC000-memory.dmp

            Filesize

            48KB

          • memory/2772-26-0x00000000013B0000-0x00000000013B8000-memory.dmp

            Filesize

            32KB

          • memory/2772-28-0x000000001B8B0000-0x000000001B8BC000-memory.dmp

            Filesize

            48KB

          • memory/2772-29-0x000000001B8D0000-0x000000001B8D8000-memory.dmp

            Filesize

            32KB

          • memory/2772-30-0x000000001B8C0000-0x000000001B8CC000-memory.dmp

            Filesize

            48KB

          • memory/2772-31-0x000000001B8E0000-0x000000001B8EA000-memory.dmp

            Filesize

            40KB

          • memory/2772-32-0x000000001B970000-0x000000001B97E000-memory.dmp

            Filesize

            56KB

          • memory/2772-33-0x000000001B980000-0x000000001B988000-memory.dmp

            Filesize

            32KB

          • memory/2772-34-0x000000001B990000-0x000000001B99E000-memory.dmp

            Filesize

            56KB

          • memory/2772-14-0x0000000000AC0000-0x0000000000AC8000-memory.dmp

            Filesize

            32KB

          • memory/2772-36-0x000000001BAB0000-0x000000001BABC000-memory.dmp

            Filesize

            48KB

          • memory/2772-37-0x000000001BAC0000-0x000000001BAC8000-memory.dmp

            Filesize

            32KB

          • memory/2772-38-0x000000001BAD0000-0x000000001BADA000-memory.dmp

            Filesize

            40KB

          • memory/2772-39-0x000000001BAE0000-0x000000001BAEC000-memory.dmp

            Filesize

            48KB

          • memory/2772-0-0x000007FEF58C3000-0x000007FEF58C4000-memory.dmp

            Filesize

            4KB

          • memory/2772-11-0x0000000000A30000-0x0000000000A38000-memory.dmp

            Filesize

            32KB

          • memory/2772-12-0x0000000000B50000-0x0000000000B62000-memory.dmp

            Filesize

            72KB

          • memory/2772-10-0x0000000000A10000-0x0000000000A26000-memory.dmp

            Filesize

            88KB

          • memory/2772-1-0x00000000013C0000-0x0000000001CB8000-memory.dmp

            Filesize

            9.0MB

          • memory/2772-2-0x00000000002C0000-0x00000000002C1000-memory.dmp

            Filesize

            4KB

          • memory/2772-9-0x00000000004D0000-0x00000000004E0000-memory.dmp

            Filesize

            64KB

          • memory/2772-168-0x000007FEF58C0000-0x000007FEF62AC000-memory.dmp

            Filesize

            9.9MB

          • memory/2772-8-0x00000000004C0000-0x00000000004C8000-memory.dmp

            Filesize

            32KB

          • memory/2772-7-0x0000000000490000-0x00000000004AC000-memory.dmp

            Filesize

            112KB

          • memory/2772-6-0x0000000000480000-0x0000000000488000-memory.dmp

            Filesize

            32KB

          • memory/2772-5-0x0000000000470000-0x000000000047E000-memory.dmp

            Filesize

            56KB

          • memory/2772-4-0x0000000000460000-0x000000000046E000-memory.dmp

            Filesize

            56KB

          • memory/2772-3-0x000007FEF58C0000-0x000007FEF62AC000-memory.dmp

            Filesize

            9.9MB

          • memory/3040-127-0x0000000001E00000-0x0000000001E08000-memory.dmp

            Filesize

            32KB

          • memory/3040-116-0x000000001B6B0000-0x000000001B992000-memory.dmp

            Filesize

            2.9MB