Analysis

  • max time kernel
    11s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2023 01:35

General

  • Target

    Adobe Download Manager.exe

  • Size

    2.0MB

  • MD5

    c04ab7d36b2e6e8175fe2e0fa8dccf14

  • SHA1

    6516b7e30fc92ced182230288726e517251db430

  • SHA256

    bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413

  • SHA512

    c3bc065567b5d302c62c83a67426e465a7000aca9a99d3169c488d54ed9824972e327846109af12314d25ab10180c370468c63b11eb05aac1b3bed7d2110d753

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYP:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YB

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 14 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    PID:936
    • C:\Users\Admin\AppData\Local\Temp\vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
      2⤵
        PID:2068
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k
          3⤵
            PID:4472
        • C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe
          "C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"
          2⤵
            PID:3220
          • C:\Users\Admin\AppData\Local\Temp\windef.exe
            "C:\Users\Admin\AppData\Local\Temp\windef.exe"
            2⤵
              PID:3820
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
                3⤵
                • Creates scheduled task(s)
                PID:5056
              • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                3⤵
                  PID:3124
                  • C:\Windows\SysWOW64\schtasks.exe
                    "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                    4⤵
                    • Creates scheduled task(s)
                    PID:884
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2GnaZlEXSNRK.bat" "
                    4⤵
                      PID:1324
                      • C:\Windows\SysWOW64\PING.EXE
                        ping -n 10 localhost
                        5⤵
                        • Runs ping.exe
                        PID:2376
                      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                        5⤵
                          PID:4932
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 2004
                        4⤵
                        • Program crash
                        PID:4548
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                    2⤵
                    • Creates scheduled task(s)
                    PID:3068
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  1⤵
                    PID:4444
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3124 -ip 3124
                    1⤵
                      PID:4420
                    • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                      C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                      1⤵
                        PID:4024
                        • C:\Users\Admin\AppData\Local\Temp\windef.exe
                          "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                          2⤵
                            PID:4568
                            • C:\Windows\SysWOW64\schtasks.exe
                              "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
                              3⤵
                              • Creates scheduled task(s)
                              PID:3308
                            • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                              3⤵
                                PID:5012
                                • C:\Windows\SysWOW64\schtasks.exe
                                  "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                                  4⤵
                                  • Creates scheduled task(s)
                                  PID:2616
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Su4aUEOKt5zQ.bat" "
                                  4⤵
                                    PID:568
                                    • C:\Windows\SysWOW64\chcp.com
                                      chcp 65001
                                      5⤵
                                        PID:2088
                                      • C:\Windows\SysWOW64\PING.EXE
                                        ping -n 10 localhost
                                        5⤵
                                        • Runs ping.exe
                                        PID:4684
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 2312
                                      4⤵
                                      • Program crash
                                      PID:4064
                                • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                  "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
                                  2⤵
                                    PID:568
                                  • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                    "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"
                                    2⤵
                                      PID:4824
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                                      2⤵
                                      • Creates scheduled task(s)
                                      PID:348
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k
                                    1⤵
                                      PID:4436
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5012 -ip 5012
                                      1⤵
                                        PID:4236
                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                        1⤵
                                          PID:2396
                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                          1⤵
                                            PID:2240

                                          Network

                                          MITRE ATT&CK Matrix ATT&CK v13

                                          Execution

                                          Scheduled Task/Job

                                          1
                                          T1053

                                          Persistence

                                          Scheduled Task/Job

                                          1
                                          T1053

                                          Privilege Escalation

                                          Scheduled Task/Job

                                          1
                                          T1053

                                          Discovery

                                          Query Registry

                                          1
                                          T1012

                                          System Information Discovery

                                          2
                                          T1082

                                          Remote System Discovery

                                          1
                                          T1018

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windef.exe.log
                                            Filesize

                                            1KB

                                            MD5

                                            10eab9c2684febb5327b6976f2047587

                                            SHA1

                                            a12ed54146a7f5c4c580416aecb899549712449e

                                            SHA256

                                            f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

                                            SHA512

                                            7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

                                          • C:\Users\Admin\AppData\Local\Temp\2GnaZlEXSNRK.bat
                                            Filesize

                                            208B

                                            MD5

                                            18dc3eec49c6f28199520ed66ad4aef1

                                            SHA1

                                            39e33ec473436a34d08c36511c62445204da3ff4

                                            SHA256

                                            855510131737ff8a8e4fb41946d8ca0423395f035ac5050229619f8397e0a9fa

                                            SHA512

                                            0b10c27124a68fca9f811d598e2f48c9fcf618d81fa2178a4d706fb486145fc9cfdb783ee45400e45fe055a24ad08efda8ab3476c2a5213b13999b087431ccb1

                                          • C:\Users\Admin\AppData\Local\Temp\Su4aUEOKt5zQ.bat
                                            Filesize

                                            208B

                                            MD5

                                            b9af2e091be9a75f6118521993bd7ea2

                                            SHA1

                                            1d09f5b683a19dd23714b7a89e019a237ef5eaa8

                                            SHA256

                                            eba6a3fee21eb1865e38742a1dd61c3bdd79bbacbe18dc8fd6aa263267eb7440

                                            SHA512

                                            89a856d0e64e463fec2e6e6e24af2a8b9d324be98e56f7333cfe00634cf00b19af87c77ac1247593fa5a2afe29ba91968ac77b35ed9bb52983e9a80c5e18c4ed

                                          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                            Filesize

                                            176KB

                                            MD5

                                            fd732f6505118c2c91b2e678ba15e9b2

                                            SHA1

                                            ce9af5a4551e2cbc420edf8ef3f554c5ba63abb4

                                            SHA256

                                            72c7928f827193d723b090841b015f55d1a8c9b10b222be544b032306a16ad37

                                            SHA512

                                            dc87171a23940cb37671b9e3903795c9af19ba5917b710464d75561b297632c471672d3258cedf8429ffa4acc3794b42241469c13cf6ebc0c087c0d5e4aeb8ec

                                          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                            Filesize

                                            69KB

                                            MD5

                                            2eb3a57548f19b0326e1581e75cc56a2

                                            SHA1

                                            ed2a93369d36df19826718c37a0ff8d008a2932b

                                            SHA256

                                            52a21aabb6c517259adf75ad943c7abb0e12c4827b1f02f3bd697456327d68f6

                                            SHA512

                                            e3e0d0e8cc52f794ef7f1ffa98a23a29c2c0224c1044878ea26475935439f6c0fedcabb36717a23ef2afecb4c1ae31c22d2fcbe0e93e3d10543aaa1b3847fb78

                                          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                            Filesize

                                            102KB

                                            MD5

                                            8cac212a9dc723fea81f035dbb174147

                                            SHA1

                                            266967508a0cbb1c67e839d086d149e001edbcf5

                                            SHA256

                                            d83c2ae1af4763f26cf0e90c99fa93f8bbfc91f8608815f6011128abf79af29a

                                            SHA512

                                            0f4a7249925465fb375404efae6ddd3ab1d8e8e4507e0d386181b01c00218924e381756afd401ce007a78bc81423e57b8979bcc288c1a422bc4ec136dfd2a8a5

                                          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                            Filesize

                                            59KB

                                            MD5

                                            de6fd2d0709a0e8bf7d53c62ef9b0827

                                            SHA1

                                            0fbbf1cb0fe3f44d6f2d24d2cb63e3d01f6fab65

                                            SHA256

                                            237e528affdc5dcf9eb36bfbb5ce76bb3182515d1058990b223eb5e0a03dde12

                                            SHA512

                                            3c5ce7e19b7b438d144c072426ca9b63586290024ca761af8241ef372562fe2589ceb2223fc3f491ff71669144c29435b58141ff5c5a186a064a5814606c113a

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            178KB

                                            MD5

                                            b382c148e18e6fcc7ea9996f32a34558

                                            SHA1

                                            01a527a954f0c9ca5518897530af12f6564ac333

                                            SHA256

                                            a1137680226dad2df9f6cddb3145c077de32e09561fb1ad63b0cee8fdf2fe3ef

                                            SHA512

                                            0d74aff9f73777caa6a6c17db600d1b61c3edac5d8e315a40612b26e1b062bc2f5908fc4dd4855a92dab7075299efc8f4da750a47747f37297e11b31078b3073

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            29KB

                                            MD5

                                            f186489bc10e37fccee84eaa0e06144b

                                            SHA1

                                            4b351b6d85a569f44c097e1bb5fc66823b41ebef

                                            SHA256

                                            d361a5360622c1675803149a2e69ff1bbdaebdc402d639cbf5ae423b8533a23d

                                            SHA512

                                            94266314550862b423ff6ccee576eb351dac5aca41a8964244fc9ffcd85c8450cda896a78d824eb484ba90ce13584871eecdaf61a328ad195c4ea42e2ff5399d

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            149KB

                                            MD5

                                            3b2b3831fc57a0c03d80fee6c3fd5032

                                            SHA1

                                            59f848cd64e1faba7b6a867d7272306c041147ec

                                            SHA256

                                            a9218930d9a9587a133b44776dc479560b3a1f147d648e78defce5618bd1952a

                                            SHA512

                                            aaa71431b94871124d44bbc60eed2efc9151b1ad8f553842e4142ad72f36f66b3403c14550dc345277da9b4a9f78e1fa7ed713dba1caffdeca885faa90246917

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            125KB

                                            MD5

                                            89c23c98cb746254c7bb4db49dc9bfb9

                                            SHA1

                                            5e0b58cc535c1083a4140432da8b1475bc0bacdc

                                            SHA256

                                            1fe281e75984e1a0ef2e4f969e446c3e40295a5d87238d5ef87d796233287b45

                                            SHA512

                                            be81bd6d4c4836112c461336dd3ac8e9fdd12c35d552d18cf9c34cba76566a6460e9ca9e9f07136e7326ab5d2555d85de69e1af651bfea0b8a682da368371deb

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            53KB

                                            MD5

                                            e10e976d5129e1c118d56205ba3f900a

                                            SHA1

                                            82a37255def6b5ecede59e9347393adba81a5e34

                                            SHA256

                                            2898a55df71d20dcebeab6d4ae06b6ab189f180bee11d7316a93aa9b6654fd1f

                                            SHA512

                                            ef69797a0ef95b65e6ad8ad09cf0ad45544f4ecdb94c3dcea2de45322bebe9371965ebb997f3c3ccca359f313baa5dbe59be263d0f3328b10544ab26e35de9e2

                                          • C:\Users\Admin\AppData\Roaming\Logs\12-23-2023
                                            Filesize

                                            224B

                                            MD5

                                            c1163279ede01afde527f34d8055f80c

                                            SHA1

                                            c4573669f01c58620eb240ab4416d4a853b7a56e

                                            SHA256

                                            06e93a990672ed6ae6813507d3719f3683b6ba3993af06796ec3b5a650c17efd

                                            SHA512

                                            4d1a56f65fc762d8c82a25c7531d04c399686ad1b8c87ed8cb018812c7ce5d8d87b9747b068cbd8658e54b700cd40dc0f3bcab7e7c84da8d61db831c767fe111

                                          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                            Filesize

                                            102KB

                                            MD5

                                            f43de2338b5fb48a861a70ae794b396b

                                            SHA1

                                            716a3e20e49cc536df82583c415b370809b4adcc

                                            SHA256

                                            1284a15399400078cf6a81d4fda57d3577146a2de4a86cada7abdbb6ef1066d6

                                            SHA512

                                            cde643bbccd2e51dbee55acf4f29ea809d242097756b82d2acf28e53c5f90de0be1a9d21ceb778b5b7946c907c56743a21465058ba9bcd60b37298dc2aa00ac5

                                          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                            Filesize

                                            39KB

                                            MD5

                                            29e60b96c536c82d895a13aeb068f7d3

                                            SHA1

                                            a4f59360eb9577c451673174660236ea8f79aed4

                                            SHA256

                                            8d9a1ce29c74fa9cd98d085c7a1bfebc10454fbf2e2d94264a426a1dbdd38fe6

                                            SHA512

                                            3a14c57080eaca45abb746c8adef85751b5c1b7ec61fbb77e8de81770ce42b067bf6afdb90b40934c87007530c488f69b2f0e83d3d7916f8888200a4b7b2bbd8

                                          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                            Filesize

                                            17KB

                                            MD5

                                            aeb7d697187b14aa6865eff4abc40797

                                            SHA1

                                            e390dd44e0dead22e558f2173b99ab480705f47f

                                            SHA256

                                            56f04af163b41e49d7a58482d5e35e4f9f77d501549f11fc005291b9cb216d78

                                            SHA512

                                            96215f1af441a985cb52e2160d3c1cfdead1cc8dbfa8e38fc9d78cff44171052de42447880a3d2982d2fc58fc0150fd530d527b96e4bccb5f5b66618f327b4fa

                                          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                            Filesize

                                            57KB

                                            MD5

                                            a0cf3019665fa4b90512c5adfeb5d727

                                            SHA1

                                            97a90b1a4935210e90ddc925eb37f03e862b004c

                                            SHA256

                                            82be070a13f8b86b61094243559a36db9b661722d75ec08d3091ecab42428c07

                                            SHA512

                                            15b21970ca0dacc54df6063447db4f18aa988eb655fece3ec4d7584e94d2f5640abedd2483f21160ae98f13132970a3226ffe4a53ffdf2ca277c8a3e6a14f8ca

                                          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                            Filesize

                                            87KB

                                            MD5

                                            5dbde52b7722de3381936b65ce74e0a8

                                            SHA1

                                            90c7551a17ad953ee24158e955e709411f89084e

                                            SHA256

                                            36fce72fc3b0aef80af851462d2fd7d040de4b549d43f080bef8ce7dc644b67e

                                            SHA512

                                            7974cbac8c24d0ead4d2879556e99209fbcbe283c9200bae1856f595b4b1c8d248a019f3e17908ca606699cfadf9c7d196d668049ba6800ec7863852ad159a4c

                                          • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                            Filesize

                                            94KB

                                            MD5

                                            511f68f93911fe72160ac9fb0878e451

                                            SHA1

                                            99e851c81975cff80a62d06b1bd59a78a6dd946a

                                            SHA256

                                            029dd620ff8e3550d1868caff83e1ac6ec0b6dc2c602c8998d13532c6b61a5d1

                                            SHA512

                                            02a91143235f54bc570e425ba37cf7aaac008c9a3cf9840bf20e3b903fe772482f9cafd974e07921a467a1eeb3b3c046df5240077f0313f8ae79f00003e4a3ad

                                          • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                            Filesize

                                            100KB

                                            MD5

                                            7aca40d680af3552e595fcdd1a10f048

                                            SHA1

                                            abec03c0f0e9716967c4b6088e7e1441c09457e4

                                            SHA256

                                            65cbe2abb7a0827cdcdc95fd3bf8ac84b078bed843c3648732763481782794fc

                                            SHA512

                                            c8ad2c5df009796c527d84f528aaef16cc3d1b031c29c30ef4cb7e46b84535405fa3d4c8e11d4e9569cb766ac40422c24c1ce7f3e0760983680e01ad0550062c

                                          • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                            Filesize

                                            87KB

                                            MD5

                                            3ebfb097d3ff492427c06522b5d5465e

                                            SHA1

                                            dd2fce8d02980571edbe0f47db0e7f2ab737b744

                                            SHA256

                                            0c5723cf25ac0c2827e99c8bda7a8818e101fdfc1a8d452caa3003828391699e

                                            SHA512

                                            d2f9876ebe4747708c287d583e730269153bb331f19c5297e17025a811093fd2c4d1841212ed1dbf7dae4ed2f9c691b05eae1a664ad10ea45513723c00c56036

                                          • memory/936-19-0x00000000010E0000-0x00000000010E1000-memory.dmp
                                            Filesize

                                            4KB

                                          • memory/3124-58-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/3124-64-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/3124-56-0x00000000069B0000-0x00000000069BA000-memory.dmp
                                            Filesize

                                            40KB

                                          • memory/3124-52-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/3124-59-0x0000000005220000-0x0000000005230000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/3124-54-0x0000000005220000-0x0000000005230000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/3220-35-0x0000000000400000-0x0000000000420000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/3220-18-0x0000000000400000-0x0000000000420000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/3820-44-0x0000000006A80000-0x0000000006A92000-memory.dmp
                                            Filesize

                                            72KB

                                          • memory/3820-45-0x0000000006EC0000-0x0000000006EFC000-memory.dmp
                                            Filesize

                                            240KB

                                          • memory/3820-43-0x00000000058E0000-0x0000000005946000-memory.dmp
                                            Filesize

                                            408KB

                                          • memory/3820-42-0x0000000005990000-0x00000000059A0000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/3820-41-0x0000000005840000-0x00000000058D2000-memory.dmp
                                            Filesize

                                            584KB

                                          • memory/3820-26-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/3820-40-0x0000000005DF0000-0x0000000006394000-memory.dmp
                                            Filesize

                                            5.6MB

                                          • memory/3820-29-0x0000000000EF0000-0x0000000000F4E000-memory.dmp
                                            Filesize

                                            376KB

                                          • memory/3820-53-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/4436-89-0x0000000000CA0000-0x0000000000D3C000-memory.dmp
                                            Filesize

                                            624KB

                                          • memory/4436-92-0x0000000000D40000-0x0000000000D41000-memory.dmp
                                            Filesize

                                            4KB

                                          • memory/4436-120-0x0000000000CA0000-0x0000000000D3C000-memory.dmp
                                            Filesize

                                            624KB

                                          • memory/4436-94-0x0000000000CA0000-0x0000000000D3C000-memory.dmp
                                            Filesize

                                            624KB

                                          • memory/4472-32-0x0000000000160000-0x0000000000161000-memory.dmp
                                            Filesize

                                            4KB

                                          • memory/4472-31-0x00000000000C0000-0x000000000015C000-memory.dmp
                                            Filesize

                                            624KB

                                          • memory/4472-57-0x00000000000C0000-0x000000000015C000-memory.dmp
                                            Filesize

                                            624KB

                                          • memory/4472-37-0x00000000000C0000-0x000000000015C000-memory.dmp
                                            Filesize

                                            624KB

                                          • memory/4568-86-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/4568-87-0x0000000005750000-0x0000000005760000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/4568-112-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/4932-114-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/4932-115-0x00000000057F0000-0x0000000005800000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/4932-119-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/5012-111-0x0000000004C80000-0x0000000004C90000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/5012-121-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/5012-122-0x0000000004C80000-0x0000000004C90000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/5012-110-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/5012-127-0x00000000729C0000-0x0000000073170000-memory.dmp
                                            Filesize

                                            7.7MB