Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    f2e7cee938a991ef6e4a0fcb64efc69a.exe

  • Size

    3.3MB

  • MD5

    f2e7cee938a991ef6e4a0fcb64efc69a

  • SHA1

    a256643993c2ad1e86be6209dd3cf457ba6e6865

  • SHA256

    b874ba54767cb863c42144303d87a6cba7c13b2cb36d10ecc714b226b1732d03

  • SHA512

    af637f0038ac2afe4ab315c514ceb79540c54c5cd59128a7a1726c022c3846e57fb5d762360b9db5f34605e7134203f058c693edfb8b5d9d07b86dbc346f451b

  • SSDEEP

    49152:7s51kZEsvhP4KUYTMb5C1JyWdLQqFxLCobXK45p4aE:7s5eaKhgKUFCo2LP15s

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 27 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2e7cee938a991ef6e4a0fcb64efc69a.exe
    "C:\Users\Admin\AppData\Local\Temp\f2e7cee938a991ef6e4a0fcb64efc69a.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5072
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2ryfxXmZBx.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:4956
        • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe
          "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe"
          3⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1292
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\be4451b6-e715-4386-8795-34d7a0b92748.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5436
            • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe
              "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe"
              5⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:3560
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3a4e92d7-3bfe-431a-9ae9-dd80f475584a.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2332
                • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe
                  "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe"
                  7⤵
                  • UAC bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:5892
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d0c6bbe1-ac17-4767-ae4d-ec12e47da5b3.vbs"
                    8⤵
                      PID:912
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f799eb6e-568b-47f3-b2f2-81d4545f7771.vbs"
                      8⤵
                        PID:548
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e885833b-612d-45b9-8263-9047d2f564c9.vbs"
                    6⤵
                      PID:5672
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9bda69bc-bcf6-440d-aff4-266b25210048.vbs"
                  4⤵
                    PID:5744
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\d25f591a00514bc9ba8441\SppExtComObj.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4536
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\SppExtComObj.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4768
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\d25f591a00514bc9ba8441\SppExtComObj.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4792
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\backgroundTaskHost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4500
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\backgroundTaskHost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4580
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\backgroundTaskHost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4676
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Defender\es-ES\TextInputHost.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4704
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\es-ES\TextInputHost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4716
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Defender\es-ES\TextInputHost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4588
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4844
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4860
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:5020
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4596
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4616
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:4800
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\d25f591a00514bc9ba8441\RuntimeBroker.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1132
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1736
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\d25f591a00514bc9ba8441\RuntimeBroker.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:5880
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Start Menu\OfficeClickToRun.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2624
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\OfficeClickToRun.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:5256
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Start Menu\OfficeClickToRun.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2056
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\d25f591a00514bc9ba8441\winlogon.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:5128
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\d25f591a00514bc9ba8441\winlogon.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1764
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\d25f591a00514bc9ba8441\winlogon.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:5884
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Desktop\SppExtComObj.exe'" /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:5008
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Public\Desktop\SppExtComObj.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2448
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Desktop\SppExtComObj.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1760

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe

              Filesize

              3.3MB

              MD5

              f2e7cee938a991ef6e4a0fcb64efc69a

              SHA1

              a256643993c2ad1e86be6209dd3cf457ba6e6865

              SHA256

              b874ba54767cb863c42144303d87a6cba7c13b2cb36d10ecc714b226b1732d03

              SHA512

              af637f0038ac2afe4ab315c514ceb79540c54c5cd59128a7a1726c022c3846e57fb5d762360b9db5f34605e7134203f058c693edfb8b5d9d07b86dbc346f451b

            • C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\sysmon.exe

              Filesize

              3.3MB

              MD5

              2ef88a705579b957f43eb6c6d0334cf3

              SHA1

              7aad3a74ad328bf739923dd7cbae17853e6d6e8f

              SHA256

              95a7aae2e804fd86356086475c3e45d6699ff221e183bf121188082b9ce354e8

              SHA512

              99a83760f69e1d96bf6b8babdeff9d37c66802f26d14569924ec49bcbbc298d045b66cdf7a175afe7a33a90662f17141ed0c6eb7643b26bc35e936def86d1118

            • C:\Program Files (x86)\Windows Defender\es-ES\TextInputHost.exe

              Filesize

              3.3MB

              MD5

              cb49c1c418a11b8ff24a767349a610db

              SHA1

              12270bccbf10b7f1bc12097059799f7f8c6f221a

              SHA256

              d2553911b41aab2269e2572bcda040f2824f656c05fe41107993787bf3ee2f03

              SHA512

              c9526008f7c34d421d77f8a4192d8d823e2c641a8d1f4963a63d470c0b9b9deced05756847d792769261d7002c7a13d570d7310b1a40f12d8924f307bf2d1025

            • C:\Recovery\WindowsRE\RuntimeBroker.exe

              Filesize

              3.3MB

              MD5

              a4472e8fb7d2633ba3ad94aaac30921d

              SHA1

              0523dccef5ac38bf6b164f9df027627d54ac44ca

              SHA256

              aacbd3d62d42d47cf8476e543fa06ee79f0dbe7d110a65360cf05fd1f111c1f9

              SHA512

              9bc839d3b17b718da71cca5c51ff1d435182ddf98570023b7ed6d096f8b16b5b4416d7df470b2f01c22e6e8314775dccca76cbf9f8272d672932d816f58d62bb

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sysmon.exe.log

              Filesize

              1KB

              MD5

              49b64127208271d8f797256057d0b006

              SHA1

              b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

              SHA256

              2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

              SHA512

              f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

            • C:\Users\Admin\AppData\Local\Temp\2ryfxXmZBx.bat

              Filesize

              249B

              MD5

              67ea93bb5e0a79891dd1f0700aadd39b

              SHA1

              ad02f167c9e7b475f82c533d8795705056907529

              SHA256

              8cad197809a686a1ebdce21c234535ae96ed1abc9291f7de19bd9d45c10c4d5b

              SHA512

              c0b0141f0139750f50304c1721048ad72bda00b33e7512535df486216fa2f413b6394c677de7ed47c146e502feda19200a53d52f36858d5e4a56285938d0d7b0

            • C:\Users\Admin\AppData\Local\Temp\3a4e92d7-3bfe-431a-9ae9-dd80f475584a.vbs

              Filesize

              760B

              MD5

              73d4b760631179a8ee49ba0c8cf7bcbb

              SHA1

              a04403601e1b1225b492790225a606b28eb9afdf

              SHA256

              40b213b92c3f97e1c4b4b0b278ce2d06cd6eee791ebe3d5d6e99202c1df94323

              SHA512

              1ad3e375fca58b89403dfebb5022f58a346709a5d30c6ffe061f23dcf719ff5ea094d5bc809322b3d696e498c025c067b564bc86466232a25ad8487041b07a73

            • C:\Users\Admin\AppData\Local\Temp\9bda69bc-bcf6-440d-aff4-266b25210048.vbs

              Filesize

              536B

              MD5

              615975efbfa7c6b8d5bcef61dd95901c

              SHA1

              0040c48d876158f450b6c664e920b9d6774f7bd8

              SHA256

              223f1fb66cad726617eb253d425f6465debb2ea56b8086ca80ad0dded2c5bbb5

              SHA512

              ea3abbeb3ed770b94cb0ff5cac1b5139a40440b61538a71024dd0a814a36ebb307e49b84fd010dc719bdd6c90d28678cf304453895e215e31f37b76e602343a7

            • C:\Users\Admin\AppData\Local\Temp\be4451b6-e715-4386-8795-34d7a0b92748.vbs

              Filesize

              760B

              MD5

              225a4eb3f83c80f8ed2f53d57b0297d9

              SHA1

              279632b176b8327993508277aed94f7a3b25cd7e

              SHA256

              5b897d7abb7b4dc50acbd24025c72386032601783495bebbec16917525f5290a

              SHA512

              227343a735b6cf608417159a6930ca6918daacb2c8d638b926e4213a981774d1a8cced196f3e42ac5074a337899d286fd57db8a65eae664c7a998f5b4f91ab7d

            • C:\Users\Admin\AppData\Local\Temp\d0c6bbe1-ac17-4767-ae4d-ec12e47da5b3.vbs

              Filesize

              760B

              MD5

              8ce2f41a4956e1f8266869c7a077d588

              SHA1

              eba9896bc8d1a8478719d528042eaaece11dd4f1

              SHA256

              9ff22db5efb24465f84041a78672a4e4e7d96a2e48cde27855e20d1cd99d6006

              SHA512

              377a17d894aa58435a4a00978723b00c37aec60af32ef385c3abd072c13a5085f5a4bc3b0d3dd27ae3b979665917a1d7928822e208194c94175483d69aa3d7d3

            • memory/1292-175-0x0000000000100000-0x000000000044E000-memory.dmp

              Filesize

              3.3MB

            • memory/3560-188-0x000000001C140000-0x000000001C152000-memory.dmp

              Filesize

              72KB

            • memory/5072-21-0x000000001C130000-0x000000001C13C000-memory.dmp

              Filesize

              48KB

            • memory/5072-26-0x000000001C3F0000-0x000000001C3F8000-memory.dmp

              Filesize

              32KB

            • memory/5072-14-0x000000001C090000-0x000000001C0E6000-memory.dmp

              Filesize

              344KB

            • memory/5072-15-0x000000001B800000-0x000000001B80C000-memory.dmp

              Filesize

              48KB

            • memory/5072-16-0x000000001B820000-0x000000001B828000-memory.dmp

              Filesize

              32KB

            • memory/5072-17-0x000000001C0E0000-0x000000001C0EC000-memory.dmp

              Filesize

              48KB

            • memory/5072-18-0x000000001C0F0000-0x000000001C0F8000-memory.dmp

              Filesize

              32KB

            • memory/5072-19-0x000000001C100000-0x000000001C112000-memory.dmp

              Filesize

              72KB

            • memory/5072-20-0x000000001C660000-0x000000001CB88000-memory.dmp

              Filesize

              5.2MB

            • memory/5072-24-0x000000001C160000-0x000000001C16C000-memory.dmp

              Filesize

              48KB

            • memory/5072-23-0x000000001C150000-0x000000001C158000-memory.dmp

              Filesize

              32KB

            • memory/5072-22-0x000000001C140000-0x000000001C14C000-memory.dmp

              Filesize

              48KB

            • memory/5072-0-0x00007FFDE7DF3000-0x00007FFDE7DF5000-memory.dmp

              Filesize

              8KB

            • memory/5072-25-0x000000001C170000-0x000000001C17C000-memory.dmp

              Filesize

              48KB

            • memory/5072-27-0x000000001C500000-0x000000001C50C000-memory.dmp

              Filesize

              48KB

            • memory/5072-31-0x000000001C400000-0x000000001C40E000-memory.dmp

              Filesize

              56KB

            • memory/5072-30-0x000000001C2A0000-0x000000001C2A8000-memory.dmp

              Filesize

              32KB

            • memory/5072-29-0x000000001C290000-0x000000001C29E000-memory.dmp

              Filesize

              56KB

            • memory/5072-28-0x000000001C280000-0x000000001C28A000-memory.dmp

              Filesize

              40KB

            • memory/5072-13-0x000000001B7F0000-0x000000001B7FA000-memory.dmp

              Filesize

              40KB

            • memory/5072-35-0x000000001C3E0000-0x000000001C3EA000-memory.dmp

              Filesize

              40KB

            • memory/5072-34-0x000000001C3D0000-0x000000001C3D8000-memory.dmp

              Filesize

              32KB

            • memory/5072-33-0x000000001C3C0000-0x000000001C3CC000-memory.dmp

              Filesize

              48KB

            • memory/5072-32-0x000000001C3B0000-0x000000001C3B8000-memory.dmp

              Filesize

              32KB

            • memory/5072-36-0x000000001C410000-0x000000001C41C000-memory.dmp

              Filesize

              48KB

            • memory/5072-12-0x000000001B810000-0x000000001B820000-memory.dmp

              Filesize

              64KB

            • memory/5072-11-0x000000001B7E0000-0x000000001B7F2000-memory.dmp

              Filesize

              72KB

            • memory/5072-7-0x0000000002D60000-0x0000000002D68000-memory.dmp

              Filesize

              32KB

            • memory/5072-170-0x00007FFDE7DF0000-0x00007FFDE88B1000-memory.dmp

              Filesize

              10.8MB

            • memory/5072-10-0x000000001B7D0000-0x000000001B7D8000-memory.dmp

              Filesize

              32KB

            • memory/5072-8-0x000000001B7A0000-0x000000001B7B0000-memory.dmp

              Filesize

              64KB

            • memory/5072-9-0x000000001B7B0000-0x000000001B7C6000-memory.dmp

              Filesize

              88KB

            • memory/5072-6-0x000000001BF40000-0x000000001BF90000-memory.dmp

              Filesize

              320KB

            • memory/5072-5-0x0000000002D40000-0x0000000002D5C000-memory.dmp

              Filesize

              112KB

            • memory/5072-4-0x0000000002CD0000-0x0000000002CD8000-memory.dmp

              Filesize

              32KB

            • memory/5072-3-0x0000000002CC0000-0x0000000002CCE000-memory.dmp

              Filesize

              56KB

            • memory/5072-2-0x00007FFDE7DF0000-0x00007FFDE88B1000-memory.dmp

              Filesize

              10.8MB

            • memory/5072-1-0x0000000000900000-0x0000000000C4E000-memory.dmp

              Filesize

              3.3MB