Analysis

  • max time kernel
    128s
  • max time network
    83s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 19:33

General

  • Target

    SecuriteInfo.com.MSIL.Kryptik.VQE.8354.exe

  • Size

    588KB

  • MD5

    d812fe377e3818a3e95d9e594816eefd

  • SHA1

    4ccf31c0954dce97c385eeda0c4ff726a5cd696c

  • SHA256

    04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

  • SHA512

    74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • ServiceHost packer 17 IoCs

    Detects ServiceHost packer used for .NET malware

  • rezer0 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 5 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 113 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.MSIL.Kryptik.VQE.8354.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.MSIL.Kryptik.VQE.8354.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EWRLGxGpFw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCD5D.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2044
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.MSIL.Kryptik.VQE.8354.exe
      "{path}"
      2⤵
        PID:1732
      • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.MSIL.Kryptik.VQE.8354.exe
        "{path}"
        2⤵
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "Quasat Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.MSIL.Kryptik.VQE.8354.exe" /rl HIGHEST /f
          3⤵
          • Creates scheduled task(s)
          PID:1000
        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:876
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EWRLGxGpFw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpECBF.tmp"
            4⤵
            • Creates scheduled task(s)
            PID:1764
          • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
            "{path}"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1616
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "Quasat Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe" /rl HIGHEST /f
              5⤵
              • Creates scheduled task(s)
              PID:1820
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /tn "WINDOWSSYSTEMHOST" /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe" /sc MINUTE /MO 1
              5⤵
              • Creates scheduled task(s)
              PID:2044
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\BmbWmtJHXZZ1.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1732
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                6⤵
                  PID:1640
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • Runs ping.exe
                  PID:1624
                • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1988
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EWRLGxGpFw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2DE4.tmp"
                    7⤵
                    • Creates scheduled task(s)
                    PID:1548
                  • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
                    "{path}"
                    7⤵
                    • Executes dropped EXE
                    PID:1320
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1560
                5⤵
                • Loads dropped DLL
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1676
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {45ECE86D-C0D4-4A53-A0F5-F2D00BB1E546} S-1-5-21-293278959-2699126792-324916226-1000:TUICJFPF\Admin:Interactive:[1]
        1⤵
          PID:1000
          • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
            C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1768
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EWRLGxGpFw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4818.tmp"
              3⤵
              • Creates scheduled task(s)
              PID:1780
            • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
              "{path}"
              3⤵
              • Executes dropped EXE
              PID:1940
          • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
            C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1608
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EWRLGxGpFw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3ED4.tmp"
              3⤵
              • Creates scheduled task(s)
              PID:1780
            • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
              "{path}"
              3⤵
              • Executes dropped EXE
              PID:1984

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Initial Access

        Replication Through Removable Media

        1
        T1091

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Remote System Discovery

        1
        T1018

        Lateral Movement

        Replication Through Removable Media

        1
        T1091

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\BmbWmtJHXZZ1.bat
          MD5

          81ca1f5aa2d8bc1ea0147f0396f460bd

          SHA1

          c1998f4fab13ec1831fe10073645941b7ef41e64

          SHA256

          8d4bc8ca4c5d91d537f82189c8cba372f56c434dd14f46c6ca759a22780685e9

          SHA512

          1de38ed9f0abc61e6e4e2579af66aa58239944af14c132b8275e23b6c0fc8adb3f10fa49244927a23d4d9fc2873699a7f5a99849cf4a10993a1ee716e6555de2

        • C:\Users\Admin\AppData\Local\Temp\tmp2DE4.tmp
          MD5

          63a45e9a207cb81078c332d84c2e6a6f

          SHA1

          a248b4730e940173d88c2629b08cf81260291395

          SHA256

          792b37dafeecea06d3d9f67e6715391996463177166ed4234411fcb7d2bf0499

          SHA512

          6db3ff762075e19dad07b7f98c4cde6a11979f1a95f6f81e291daa2b8bdaf8197f214b33689804e4ea576981e253cd2b8ea17e14ca42123edae7e3ab8fd9a120

        • C:\Users\Admin\AppData\Local\Temp\tmp3ED4.tmp
          MD5

          63a45e9a207cb81078c332d84c2e6a6f

          SHA1

          a248b4730e940173d88c2629b08cf81260291395

          SHA256

          792b37dafeecea06d3d9f67e6715391996463177166ed4234411fcb7d2bf0499

          SHA512

          6db3ff762075e19dad07b7f98c4cde6a11979f1a95f6f81e291daa2b8bdaf8197f214b33689804e4ea576981e253cd2b8ea17e14ca42123edae7e3ab8fd9a120

        • C:\Users\Admin\AppData\Local\Temp\tmp4818.tmp
          MD5

          63a45e9a207cb81078c332d84c2e6a6f

          SHA1

          a248b4730e940173d88c2629b08cf81260291395

          SHA256

          792b37dafeecea06d3d9f67e6715391996463177166ed4234411fcb7d2bf0499

          SHA512

          6db3ff762075e19dad07b7f98c4cde6a11979f1a95f6f81e291daa2b8bdaf8197f214b33689804e4ea576981e253cd2b8ea17e14ca42123edae7e3ab8fd9a120

        • C:\Users\Admin\AppData\Local\Temp\tmpCD5D.tmp
          MD5

          63a45e9a207cb81078c332d84c2e6a6f

          SHA1

          a248b4730e940173d88c2629b08cf81260291395

          SHA256

          792b37dafeecea06d3d9f67e6715391996463177166ed4234411fcb7d2bf0499

          SHA512

          6db3ff762075e19dad07b7f98c4cde6a11979f1a95f6f81e291daa2b8bdaf8197f214b33689804e4ea576981e253cd2b8ea17e14ca42123edae7e3ab8fd9a120

        • C:\Users\Admin\AppData\Local\Temp\tmpECBF.tmp
          MD5

          63a45e9a207cb81078c332d84c2e6a6f

          SHA1

          a248b4730e940173d88c2629b08cf81260291395

          SHA256

          792b37dafeecea06d3d9f67e6715391996463177166ed4234411fcb7d2bf0499

          SHA512

          6db3ff762075e19dad07b7f98c4cde6a11979f1a95f6f81e291daa2b8bdaf8197f214b33689804e4ea576981e253cd2b8ea17e14ca42123edae7e3ab8fd9a120

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • C:\Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • \Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • \Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • \Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • \Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • \Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • \Users\Admin\AppData\Roaming\SubDir\Client91.exe
          MD5

          d812fe377e3818a3e95d9e594816eefd

          SHA1

          4ccf31c0954dce97c385eeda0c4ff726a5cd696c

          SHA256

          04a908a9e407549cb834e945f0afb49da90f7581bda7e2d2cd3871a55997d53b

          SHA512

          74def34678da15dd28dddc68095f1a0a92e4a82ecc305f4671ca01ddbafa1e6655d22d4bb989f2097eed159259580a598f2bc36c0b7394de1115298699b7ffd9

        • memory/876-20-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/876-21-0x00000000008D0000-0x00000000008D1000-memory.dmp
          Filesize

          4KB

        • memory/876-17-0x0000000000000000-mapping.dmp
        • memory/1000-15-0x0000000000000000-mapping.dmp
        • memory/1208-1-0x0000000001050000-0x0000000001051000-memory.dmp
          Filesize

          4KB

        • memory/1208-0-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1208-4-0x00000000006F0000-0x0000000000741000-memory.dmp
          Filesize

          324KB

        • memory/1208-3-0x0000000000220000-0x0000000000225000-memory.dmp
          Filesize

          20KB

        • memory/1320-77-0x000000000044943E-mapping.dmp
        • memory/1320-83-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1548-74-0x0000000000000000-mapping.dmp
        • memory/1608-104-0x0000000000000000-mapping.dmp
        • memory/1608-106-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1616-58-0x000000000044943E-mapping.dmp
        • memory/1616-53-0x000000000044943E-mapping.dmp
        • memory/1616-48-0x000000000044943E-mapping.dmp
        • memory/1616-49-0x000000000044943E-mapping.dmp
        • memory/1616-50-0x000000000044943E-mapping.dmp
        • memory/1616-62-0x000000000044943E-mapping.dmp
        • memory/1616-51-0x000000000044943E-mapping.dmp
        • memory/1616-63-0x000000000044943E-mapping.dmp
        • memory/1616-59-0x000000000044943E-mapping.dmp
        • memory/1616-61-0x000000000044943E-mapping.dmp
        • memory/1616-60-0x000000000044943E-mapping.dmp
        • memory/1616-28-0x000000000044943E-mapping.dmp
        • memory/1616-57-0x000000000044943E-mapping.dmp
        • memory/1616-56-0x000000000044943E-mapping.dmp
        • memory/1616-55-0x000000000044943E-mapping.dmp
        • memory/1616-54-0x000000000044943E-mapping.dmp
        • memory/1616-47-0x000000000044943E-mapping.dmp
        • memory/1616-52-0x000000000044943E-mapping.dmp
        • memory/1616-32-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1624-46-0x0000000000000000-mapping.dmp
        • memory/1640-39-0x0000000000000000-mapping.dmp
        • memory/1676-41-0x0000000001F10000-0x0000000001F21000-memory.dmp
          Filesize

          68KB

        • memory/1676-64-0x00000000027B0000-0x00000000027C1000-memory.dmp
          Filesize

          68KB

        • memory/1676-40-0x0000000000000000-mapping.dmp
        • memory/1728-8-0x000000000044943E-mapping.dmp
        • memory/1728-7-0x0000000000400000-0x000000000044E000-memory.dmp
          Filesize

          312KB

        • memory/1728-10-0x0000000000400000-0x000000000044E000-memory.dmp
          Filesize

          312KB

        • memory/1728-9-0x0000000000400000-0x000000000044E000-memory.dmp
          Filesize

          312KB

        • memory/1728-11-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1732-37-0x0000000000000000-mapping.dmp
        • memory/1764-25-0x0000000000000000-mapping.dmp
        • memory/1768-87-0x0000000000000000-mapping.dmp
        • memory/1768-89-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1780-111-0x0000000000000000-mapping.dmp
        • memory/1780-94-0x0000000000000000-mapping.dmp
        • memory/1820-35-0x0000000000000000-mapping.dmp
        • memory/1940-97-0x000000000044943E-mapping.dmp
        • memory/1940-101-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1984-114-0x000000000044943E-mapping.dmp
        • memory/1984-118-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1988-69-0x0000000074660000-0x0000000074D4E000-memory.dmp
          Filesize

          6.9MB

        • memory/1988-80-0x0000000000640000-0x0000000000670000-memory.dmp
          Filesize

          192KB

        • memory/1988-66-0x0000000000000000-mapping.dmp
        • memory/1988-67-0x0000000000000000-mapping.dmp
        • memory/2044-5-0x0000000000000000-mapping.dmp
        • memory/2044-36-0x0000000000000000-mapping.dmp