Analysis

  • max time kernel
    18s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 19:36

General

  • Target

    3c09914d1be33c74bd5aca8378266a1304f3de4d913f9aa20da4d9d5fa92e136.exe

  • Size

    2.0MB

  • MD5

    773c9514739f9416a4f90606ac02d05c

  • SHA1

    304b07a8a2c2337113bc856701b686bf415f6892

  • SHA256

    3c09914d1be33c74bd5aca8378266a1304f3de4d913f9aa20da4d9d5fa92e136

  • SHA512

    bf02ba9ef4d72aee202b46200d1975a61429521fac782f03790e61277903c1c36123629cf8fb2fa33d138cda1f028851e269fabef1bccae1471c0862cab8514d

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYh:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yf

Malware Config

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT 3 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar payload 4 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 3 IoCs
  • Detects executables containing common artifacts observed in infostealers 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c09914d1be33c74bd5aca8378266a1304f3de4d913f9aa20da4d9d5fa92e136.exe
    "C:\Users\Admin\AppData\Local\Temp\3c09914d1be33c74bd5aca8378266a1304f3de4d913f9aa20da4d9d5fa92e136.exe"
    1⤵
    • Quasar RAT
    • Checks computer location settings
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
        • Maps connected drives based on registry
        PID:3312
    • C:\Users\Admin\AppData\Local\Temp\windef.exe
      "C:\Users\Admin\AppData\Local\Temp\windef.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3156
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:3512
      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:5084
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\es2boG9n5P8D.bat" "
          4⤵
            PID:2640
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
                PID:4792
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                5⤵
                • Runs ping.exe
                PID:3096
              • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                5⤵
                  PID:404
                  • C:\Windows\SysWOW64\schtasks.exe
                    "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                    6⤵
                    • Creates scheduled task(s)
                    PID:4456
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ziLLexGXXOLp.bat" "
                    6⤵
                      PID:2340
                      • C:\Windows\SysWOW64\chcp.com
                        chcp 65001
                        7⤵
                          PID:3476
                        • C:\Windows\SysWOW64\PING.EXE
                          ping -n 10 localhost
                          7⤵
                          • Runs ping.exe
                          PID:4360
                        • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                          "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                          7⤵
                            PID:4600
                            • C:\Windows\SysWOW64\schtasks.exe
                              "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                              8⤵
                              • Creates scheduled task(s)
                              PID:4656
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yKN5P0PjOQuM.bat" "
                              8⤵
                                PID:5020
                                • C:\Windows\SysWOW64\chcp.com
                                  chcp 65001
                                  9⤵
                                    PID:4840
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping -n 10 localhost
                                    9⤵
                                    • Runs ping.exe
                                    PID:3924
                                  • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                    "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                                    9⤵
                                      PID:2164
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                                        10⤵
                                        • Creates scheduled task(s)
                                        PID:3100
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\omoR4WUvWvf1.bat" "
                                        10⤵
                                          PID:3604
                                          • C:\Windows\SysWOW64\chcp.com
                                            chcp 65001
                                            11⤵
                                              PID:4744
                                            • C:\Windows\SysWOW64\PING.EXE
                                              ping -n 10 localhost
                                              11⤵
                                              • Runs ping.exe
                                              PID:1500
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 2000
                                            10⤵
                                            • Program crash
                                            PID:1156
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 2236
                                        8⤵
                                        • Program crash
                                        PID:1168
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 2264
                                    6⤵
                                    • Program crash
                                    PID:3392
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 2276
                                4⤵
                                • Program crash
                                PID:1412
                          • C:\Users\Admin\AppData\Local\Temp\3c09914d1be33c74bd5aca8378266a1304f3de4d913f9aa20da4d9d5fa92e136.exe
                            "C:\Users\Admin\AppData\Local\Temp\3c09914d1be33c74bd5aca8378266a1304f3de4d913f9aa20da4d9d5fa92e136.exe"
                            2⤵
                              PID:2532
                            • C:\Windows\SysWOW64\schtasks.exe
                              "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                              2⤵
                              • Creates scheduled task(s)
                              PID:4328
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4804 -ip 4804
                            1⤵
                              PID:652
                            • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                              C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                              1⤵
                                PID:5032
                                • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                  "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
                                  2⤵
                                    PID:4176
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k
                                      3⤵
                                        PID:2880
                                    • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                      "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                                      2⤵
                                        PID:4528
                                      • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                        "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"
                                        2⤵
                                          PID:4688
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                                          2⤵
                                          • Creates scheduled task(s)
                                          PID:4532
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 404 -ip 404
                                        1⤵
                                          PID:2700
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4600 -ip 4600
                                          1⤵
                                            PID:212
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2164 -ip 2164
                                            1⤵
                                              PID:3300

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windef.exe.log

                                              Filesize

                                              1KB

                                              MD5

                                              10eab9c2684febb5327b6976f2047587

                                              SHA1

                                              a12ed54146a7f5c4c580416aecb899549712449e

                                              SHA256

                                              f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

                                              SHA512

                                              7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

                                            • C:\Users\Admin\AppData\Local\Temp\es2boG9n5P8D.bat

                                              Filesize

                                              208B

                                              MD5

                                              5c03890e0f87e1038a87807be4c52fc8

                                              SHA1

                                              0865e0ccefd10b5f1516ad39676f95b45a996ca2

                                              SHA256

                                              f0eb1ad521c25b8b7d1b30aec5e2d8707776129cfa92ac1d9409a5e998d24745

                                              SHA512

                                              3e480cdd9661cc8fc7b12393077938ae4dd7e605061faf995de4f8cf5d1d8d8f29e144e30bbb3e6487f4487aac5be31e3f69dc6a3e58d8fad8af9a158555138c

                                            • C:\Users\Admin\AppData\Local\Temp\omoR4WUvWvf1.bat

                                              Filesize

                                              208B

                                              MD5

                                              88f61b2b5a6a9018ce8ef8a0e3ae87b9

                                              SHA1

                                              4a3f550b6b74cec187c2085785559f75b9ba9df6

                                              SHA256

                                              612ddb08ee23dabf306165c6d9569dc6675daa55620700d821522c7568f55ff4

                                              SHA512

                                              2e71ea7ba91e6b78736793de3bf689179bd5cc9e21c84f6d9ba2920e0abecd34a86486a164c2c3691bd2b7ba06aa93aadf58ab58f53babdb0a9e3b8f7b1ff73a

                                            • C:\Users\Admin\AppData\Local\Temp\vnc.exe

                                              Filesize

                                              405KB

                                              MD5

                                              b8ba87ee4c3fc085a2fed0d839aadce1

                                              SHA1

                                              b3a2e3256406330e8b1779199bb2b9865122d766

                                              SHA256

                                              4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

                                              SHA512

                                              7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

                                            • C:\Users\Admin\AppData\Local\Temp\windef.exe

                                              Filesize

                                              349KB

                                              MD5

                                              b4a202e03d4135484d0e730173abcc72

                                              SHA1

                                              01b30014545ea526c15a60931d676f9392ea0c70

                                              SHA256

                                              7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                                              SHA512

                                              632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

                                            • C:\Users\Admin\AppData\Local\Temp\yKN5P0PjOQuM.bat

                                              Filesize

                                              208B

                                              MD5

                                              c99e9e3ea0b257c0efb0ec3d167b0e36

                                              SHA1

                                              9c4eabff70bcf7e738b7100ceff94cc23b809c21

                                              SHA256

                                              aa9ec0bb7de80e4f04e55c86dbf69193766a549718766611baf2671188d900ec

                                              SHA512

                                              7bcfa0f27d2361bada46fa50d12dfd282c3c53aca7f8f2be75822d575f0f7eb1b391ea7afbe03440d5f3decf04905b9e7a197a91748545a7eb75c52edcc12dbe

                                            • C:\Users\Admin\AppData\Local\Temp\ziLLexGXXOLp.bat

                                              Filesize

                                              208B

                                              MD5

                                              dba4fe63354b291f5faf98880969aaa3

                                              SHA1

                                              cb9e6e9c40a04e501872afa304c7daeddfaede87

                                              SHA256

                                              23c202c3a332a1af7eb20debde2b7f5a79ada45237c4bc6c79815c0be4575690

                                              SHA512

                                              598856fd365b7cc7a673c14e9b002e5b49a18031f5c24ee1705b1ea11c328eea79819cc44d855b21abbbfb96652a3d2a62f0cd97a5ce8f317bd88de8311bb05f

                                            • C:\Users\Admin\AppData\Roaming\Logs\04-09-2024

                                              Filesize

                                              224B

                                              MD5

                                              dc5c5bbaad737a6799ef5b66967481df

                                              SHA1

                                              032a9174b4dbda5edafdbe2a849786dc8d6bc0cc

                                              SHA256

                                              826a5b3388d42775b2df7e866608e4370fcaf0475b641e4412560064f1184908

                                              SHA512

                                              3b561cc3f4fb75dc6bac087d22d7b1351178347e50e503be2165fc4a4b1d873b89238cf2c76a35051555f95c71bf4951c605cf69687961bea09454e8652a616a

                                            • C:\Users\Admin\AppData\Roaming\Logs\04-09-2024

                                              Filesize

                                              224B

                                              MD5

                                              f3b060c4dbfa38d4f6d4c4649507e57a

                                              SHA1

                                              0c61ea23729f4bd16dec708ee45223f5388d6cc9

                                              SHA256

                                              b8495dcbad0692127724a9aebcf245428ba60887c3ebf1f5e65653c786753b41

                                              SHA512

                                              0d0e2172533028e4cbb1c25bd157e040f0d82cd737ac6a531e8d5f0fd9a27bcfce9af0e8ba110c7f6840ccae5f8e1086fcead7218abcbadafa904a0177a8e616

                                            • C:\Users\Admin\AppData\Roaming\Logs\04-09-2024

                                              Filesize

                                              224B

                                              MD5

                                              525c325c667c81204db1990439d680f7

                                              SHA1

                                              e929e327b0aebae1e800b0be00dc96831ea195ca

                                              SHA256

                                              21669e0abd8121cf52f81758aaade841b22d8590f6cd1e2236f781c8936cd3b0

                                              SHA512

                                              02dd9fef7d0f74ee055903253cc312d11309071edd3ee072e8c77eacfd7ff51452cab2771dc80a61f2519e066833db5c51045e35eebb63750b6358c67cfedb9c

                                            • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe

                                              Filesize

                                              2.0MB

                                              MD5

                                              9650e6f204c9133c6213a19bcb496394

                                              SHA1

                                              7a52d8b9ac919a9cb226119fa975fc639ddff90c

                                              SHA256

                                              a0fe9f4efee30cec1b34f037623656010255101ad3d549de30e7a24d4900afb2

                                              SHA512

                                              5028da4a911b9cdc7b1d8cf41b7fc0bc1925bd80800f01656d89651dba592736355b52b45690fc5679662030d8117a5b1fec2988a91362f5db3bc6963c3ccb0c

                                            • memory/404-113-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/404-107-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/404-119-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/404-108-0x00000000051C0000-0x00000000051D0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/404-114-0x00000000051C0000-0x00000000051D0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2044-20-0x0000000004120000-0x0000000004121000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/2164-138-0x0000000004F10000-0x0000000004F20000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2164-133-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/2164-143-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/2164-134-0x0000000004F10000-0x0000000004F20000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2164-137-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/2532-28-0x0000000000400000-0x0000000000420000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/2532-19-0x0000000000400000-0x0000000000420000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/2880-95-0x0000000000E10000-0x0000000000EAC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/2880-89-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/2880-112-0x0000000000E10000-0x0000000000EAC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/2880-91-0x0000000000E10000-0x0000000000EAC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/2880-90-0x0000000000E10000-0x0000000000EAC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/3156-43-0x0000000004E80000-0x0000000004EE6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/3156-42-0x0000000004E00000-0x0000000004E10000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3156-44-0x0000000005E50000-0x0000000005E62000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3156-41-0x0000000004F10000-0x0000000004FA2000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/3156-37-0x00000000054C0000-0x0000000005A64000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/3156-31-0x0000000000500000-0x000000000055E000-memory.dmp

                                              Filesize

                                              376KB

                                            • memory/3156-29-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/3156-53-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/3156-45-0x0000000006290000-0x00000000062CC000-memory.dmp

                                              Filesize

                                              240KB

                                            • memory/3312-40-0x0000000000D70000-0x0000000000E0C000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/3312-57-0x0000000000D70000-0x0000000000E0C000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/3312-33-0x0000000000E10000-0x0000000000E11000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/3312-32-0x0000000000D70000-0x0000000000E0C000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/4528-86-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4528-111-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4528-87-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4600-126-0x0000000005380000-0x0000000005390000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4600-122-0x0000000005380000-0x0000000005390000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4600-125-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4600-131-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4600-121-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4804-64-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4804-59-0x00000000055A0000-0x00000000055B0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4804-58-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4804-56-0x0000000006C70000-0x0000000006C7A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/4804-54-0x00000000055A0000-0x00000000055B0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4804-52-0x0000000072A00000-0x00000000731B0000-memory.dmp

                                              Filesize

                                              7.7MB