Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 05:49

General

  • Target

    qauasariscrypted.exe

  • Size

    6.4MB

  • MD5

    eb0beafcb365cd20eb00ff9e19b73232

  • SHA1

    1a4470109418e1110588d52851e320ecefcba7de

  • SHA256

    31b494be325fc9c97031135886454b1370e5e3608c757f74784c6b6fb2fb5c99

  • SHA512

    8dff151e81b5ce3c4f51b1f24a6e7654c3008d81b6652e6d2f7fabc42d341e9db703b12f83ccf9471514498af3c1763ef97f132ad36302de8ccd984fbf52d52f

  • SSDEEP

    98304:DpgFmZKkYcZ4YSQrKF78eHm8Xdt6Zz55JJ9enfr:uFmZOcZtrKFFHm8t0NJJo

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

185.196.10.233:4782

Mutex

b0fcdfbd-bdd4-4a5d-8ab1-7217539d4db6

Attributes
  • encryption_key

    0EC03133971030F6D05E6D59F71626F6543BBE65

  • install_name

    gfdgfdg.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    fgfdhdgg

  • subdirectory

    gfgfgf

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qauasariscrypted.exe
    "C:\Users\Admin\AppData\Local\Temp\qauasariscrypted.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
      2⤵
        PID:2528
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe"
        2⤵
          PID:2776
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          2⤵
            PID:2716
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
              3⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2480
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:2
                4⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2228

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Execution

        Scripting

        1
        T1064

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Scripting

        1
        T1064

        Modify Registry

        2
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C
          Filesize

          579B

          MD5

          f55da450a5fb287e1e0f0dcc965756ca

          SHA1

          7e04de896a3e666d00e687d33ffad93be83d349e

          SHA256

          31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

          SHA512

          19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
          Filesize

          252B

          MD5

          1cc552a9bed6a649cf64e8392cec20c8

          SHA1

          16202da17db0da0b89a615c3ae03bcdaada8eef4

          SHA256

          ba7c114224b0b2ab5fff313496666a6baff2365af334b27056a791e8177e0b7d

          SHA512

          e388d58c6c6470f31f05e0fb6127e871bda5731b4fdf3f7ed0e3785964b04e2709657abf06b3689f121503a7496585f26372f2a8a33908744f6f4df344a4a848

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          36ed88ed22d806ae3f41d3177a9c69e9

          SHA1

          a45536764710290c75482e0c296572d9bcca7023

          SHA256

          9044b7aa140f1c005c3d63ec50d24ad2bb5e4974719bd59408681a32004bf569

          SHA512

          879df863b1b919beb9945fe6c14b3627f0616e26b4b75f25ebabba92259d1a7bff80086205f2ce974e8ae1d51bbf8a43c460f76a3b060595a7f05488f9d89cea

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          4b4f06a7ac5e8eaac446e7d695714e61

          SHA1

          cfc4cd5795c051f8d46b48e60f60efa58e3f77e7

          SHA256

          74f595494eec5c12bb4a2e634140d5a90ff0a2eaf61d5c2115bcf789b08ce4d3

          SHA512

          d4b890c08c38ac53c7d6a259fa5c222ac5d651a8c27040353132b45b8b9bdd3f6e2f8204fab4d0f0be0411225c663b992eaed29364dda643486cca053f2dc0bc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6e1282228fa7c67f62654f4ec3420ad5

          SHA1

          0b0e8020230c9a3fa4634619a41caee020c8833f

          SHA256

          e378382008516a87a5322fd61d2104dd68208705ce89713f05ffdd996abf582e

          SHA512

          420ed83f3210c4e8e6fe528ab55ff0ee67cf050bbf2178867636cf4cac13b84f13c94c9fbebc0a60a599ee7eb5a422ee1816befaad1b62e8aca1ef58d2fb3feb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          5efb6c6f060e272d1dd8a5fc5de599aa

          SHA1

          aa6cdff969363ff6442db71bf3c3bb2e90482317

          SHA256

          4b7c85e5434fa8fd03da1c299a7a1d7a03c5ee98fb85e94b3cc946d3aae6d04d

          SHA512

          3d41bb3988e50f46fc744dfdb031d6b9676df2f722b10f46659821af359ff7b46a43d8f46d3ce12fb6ea322338bcf9164715c663d43089b52ff8787df3d68dd5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          71704388ff55c5a9c46ef18ebd44c87b

          SHA1

          4c63fc1456360546fc8e79c99fa20ebb9bec00f6

          SHA256

          cf6d7c3ccbfe8380dbf34855b89e6d1f2702d807182592c9cad24f2975e3f5dd

          SHA512

          3e2ca3d377ad8ec79eb08bea5ce203cca4fb70a43d34d646f70975e15ad7fb1a2236a4a23a491f32ac11964c737f20e8b6a483219f67dcbeb22130ddd134d46c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          ce956161b12c09c6833cb5f3e3ae3546

          SHA1

          c1a0e9809df05c5e4283dab6bc60499cfaf3ecc7

          SHA256

          405c76886180041f95076b24a8baa57460bf805abf899cff690768728d39b2a4

          SHA512

          90ad7adc8319dacce2a01b0aba08e556a1169f555b51e962cfdcac2279b9ec9abe337968c02d94fe6fc83bfdaa2623a190a23f15065aa10e2356537b188a7710

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          472d1a01ab51a9ac477c7f212e1f9406

          SHA1

          d131ccdc649fcf8b91db2574b460c486d88ab4a6

          SHA256

          3d6909f52923e6372cb070f7030469624a45824f9a663b2c394866ecbf824ef9

          SHA512

          047485c9b8830f71adbb41f4f1f71a5c8300a49445336f362e9ff41d45b8bc889e2238b3d13cfa6d3613432c9c99d82dab812ba88ec4d998ec6621a13ea3003f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          862e59f47725a72bf9e920730da9d0e7

          SHA1

          187b5b1663290c65b8cbc7cae2e34af82b61a235

          SHA256

          d75a0ffa46f456473252bb2ea20392826ecbaef1ef1f44918f231d016f3b355d

          SHA512

          1a9542a9e377e834089a139d99b5726af7cb545b52992c521f88d4e28fb09f895e584994e379de9043a2b003e89bbea5e49f513c9edd4446871cb7be063e3638

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          8d52561512d423aa5341aef69113b871

          SHA1

          396abb31161a9ebff6f24f6cd3902f7d5287de21

          SHA256

          af95727caebdb9987e3baaa9bce52d95317636cc989b07ace1b7465b11042a33

          SHA512

          75ba9d579864d1b056a43254cd34ac1901c95485d9bec3367045434c5f2ba6539dfd90f7deeab6dfb84b781a87b8cfbde52f9324384002c97f252bc1c373b304

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          02b1e1095be7edac0249e16894b0d5dc

          SHA1

          7b4266c75e7ff667ef7db8088fed9f49ed46d347

          SHA256

          00ba7b188ab70ec04ca0df77f55b308e8833b2a8d8612487af46c3446cbd1c80

          SHA512

          b59feb2ac58ea34fb92e5fc822b5ceec92d45f9533bb391a1dfc9725b167dc05ccaf2d47b126db005cd24db62d5f8078ff05e156eb1a07079d54994b2ffed7ab

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          b8c4f699583e925bee5a048ac0d5050a

          SHA1

          9390fe42bb2fb8a7cf25499b55dfeba7b40515bc

          SHA256

          32e664a3c2d0715bfb6e005a99f7b2e3d058269add3a1bd94b559150275dd0a8

          SHA512

          c4a750e60011da121acd8b415c41847002057d49101c92be9f93dda115122fe17be0ceb217a864f7a1330127db7a892f6e3b205bd1967447baf4d4e22a3834b6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          372404ddef66350f4f7f8778da7a6809

          SHA1

          28118384692373d0e41524d70d36a80c1c678373

          SHA256

          3fe53f233a33bb384e9405d8ecb156e2b5b91fb87404b3fdb63032e9eeb78636

          SHA512

          b5593ab616c193b15420ccec05e83a74885e20e0200496d47be6cf1966a343789b241d7e3131813e1095495559cf4c73e10cc96281bba24f2262a46021978b00

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          4009cb5cb860067bef4638bd187188bf

          SHA1

          cccc17d93a29d95950ffe8420be9b17a2fd817c0

          SHA256

          9aa69b1f2e7afffe3be3e39071139c64e31ec419b75d9c8ed41baf4d00a46abb

          SHA512

          a9da1e4659537ca2a6733488644ea3553645bcb5699a8cccd015da8791cd5f6a342b79e4ecf85fa27e6bc83ebad7de0f3ce5949bdc7fe2b682c67efba3b880e2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          3bf2238e2c21eb756e84f8f067831356

          SHA1

          9d339a01e0e38ea2313aa8645bc72ef5b0a93c28

          SHA256

          4b066a957164dfce75dd2ddfc9b07cda1d3a250b9335937461d8c16620905114

          SHA512

          a2a61e8195fda5e1f8e0427425ed3c53fc71cf2c16db8caeb6b37e77f0e6a6210e3bbb96b2a171b0266fbb2d9c458270e774a22b444ed1d11177d0d1108a506d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          07d8b0272b05adbe6896c4b416377e6e

          SHA1

          7d7b09ea75675118f8977e24b31efaa10db64299

          SHA256

          c4b382b65e4a7211d3fa95697cc5e934dc83734f1e25c7705c1d1f1f5662bdcc

          SHA512

          dc15aaa69129f91d6855e4a21bcfacd759f12837dc1b4b760fe6aaf50900843900ce9fd78db522f86be40ee448dcb7a8c9f07dfa421f32de821abe33a3220cec

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          be686ccd5e2e493d195c9ea29504e87e

          SHA1

          965e538fba1cc67e6a50beff60a55ed8b0950d60

          SHA256

          ea672f4714af30788a304a770c83384ca66c5367d4f3bfc6c0db1079187c1117

          SHA512

          d2f5476fd4f6a62afba06f8a194d1d3f3b337c8454bd2edccda9b09865a1934f9f02ac365f057b67636c7b9f85dc9cc9a5d1f1f5e0a687bb8fef18c881ed7739

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          b362e09b1e92e7d902b6be92d02ef653

          SHA1

          65a18296b3daee1c6a86dff3ddbff0aabe7b7c40

          SHA256

          91e5a2ad56b3890f31d8c52e8bd486a6bde20bcfe9f6700729c02a3284a08a61

          SHA512

          69814e18582588f0c208edbc521acd3c032304814902cd2966b306b4ddff8cbfa8c90159a6a4834a6901c43de349e1257650ee5d75152a0151e1ac232a40d1de

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          c945f93d805efd149a028ff21d8bdd58

          SHA1

          a09655845830748560624cf3d2a9ad78bed283fd

          SHA256

          3e8cb043b940b44a5fb20d717c9ac63002030e4f7ee44d26c1823b11bb197075

          SHA512

          49a1a30ddc012279222c1f38305e0533f24d4cbfab5f16cde75e8fbf6413e342737714f2ae2fcd0cf432869719c38e4c4850b4e2a69384dc07ec329adab9419d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          f2d0b6b1e8fb97bb969998f0ae9464bc

          SHA1

          fbdb868ee0f60cce6cbf64890cecbc126f99da2b

          SHA256

          28412f23078edea5af7f169150e7592df69d0d1489eb35d2cf8dcce5b2b1cf87

          SHA512

          dcaeefaf7676db41274b4c7d4e50cc07056a329e6e37efa6fc7e410ebcc17c05bf073614d3315773411c3dfc3cf6e813c4ef21fad8362428946f1df0cccb3483

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          8ecc8977d1a91b59d32ed3eace75c54c

          SHA1

          d0280486f55e445938d464145e5ea7105cdb1eaf

          SHA256

          7b8990957353f903eb53a2bf21880e67dd6120961433e72c46b185b2bea93470

          SHA512

          7f61ccfa8baa620c16ff31946e505afecbb0df475bb829e7dd8ce836194281532bf532b38a8d6572ffe655f0dafd4c9994a2c55c5896bd4d20f612c9b921c98a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6ebb6a625ebd0414db0571e3056a2a14

          SHA1

          3f823341edc7a1b22d44b056bb13f5e872a286cb

          SHA256

          882875272907459fbfda24f4a462c3a81a49cd8bf5757dc0ede0931d8a467087

          SHA512

          4c02e2d5b0531d96c240fd271b87669e6675926ed406f7582faa7926a8ab82697d85e2cd5cbe5770c5dc08cebd315162b02b257a2bfd6f3918349ae53d4923fc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          307fef12dadba9902fe1183db2081cbd

          SHA1

          16899983e54889d7bd7753c07705c5a4e6718c86

          SHA256

          c3c5f7b6bd8e065a5e0f04d8b7b27aacd5f9938b1b660a6a1888ba8a1dab3982

          SHA512

          f4039f47fbce7097609755d302719f9212eea90ef7ae715a0367b0c57b1b338b68ca4c62340a64d578f02f0aff268be37f83b4736b4060c408e031fa65d0b602

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          b1458fa157beb98990ad645cae6166dc

          SHA1

          d826d0787e08dcf6c85216328ec11b9b502e462d

          SHA256

          eb52b418e532e8219c732eb137032090d229c501d03e8385226e3fa8a2db5a0d

          SHA512

          912f57f4fc30be2b277507b1b520efecc15b5e356d89176df3931629d6b22471ef4325de23137c0c0d502a11ca8d4566b22d1c890a0b13c29694ad394f88e269

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          8cb3e266d8807e6e29245c904d4424a8

          SHA1

          3fa3c6ce7732a92c32a12010437357ecf89a7041

          SHA256

          3276fc064079d90e478bc14d7b5ac14f6dee97737bb73a0b047bf450bf4031d4

          SHA512

          0dbd75ef7570bc5f58a10ac6fe5d21fbec3e640f3ccc4f4a36dd0a7b84bd822d2db3c2fad40b14341aa157634ac7598680e96baf898c671091ade126a28ddb31

        • C:\Users\Admin\AppData\Local\Temp\CabC10F.tmp
          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\CabC1FC.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\TarC241.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • memory/2528-12-0x0000000000400000-0x0000000000724000-memory.dmp
          Filesize

          3.1MB

        • memory/2528-5-0x0000000000400000-0x0000000000724000-memory.dmp
          Filesize

          3.1MB

        • memory/2528-10-0x0000000000400000-0x0000000000724000-memory.dmp
          Filesize

          3.1MB

        • memory/2528-8-0x0000000000400000-0x0000000000724000-memory.dmp
          Filesize

          3.1MB

        • memory/2560-30-0x0000000000400000-0x0000000000724000-memory.dmp
          Filesize

          3.1MB

        • memory/2748-19-0x0000000002680000-0x0000000002700000-memory.dmp
          Filesize

          512KB

        • memory/2748-24-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmp
          Filesize

          9.6MB

        • memory/2748-15-0x0000000002360000-0x0000000002368000-memory.dmp
          Filesize

          32KB

        • memory/2748-14-0x000000001B300000-0x000000001B5E2000-memory.dmp
          Filesize

          2.9MB

        • memory/2748-9-0x0000000002680000-0x0000000002700000-memory.dmp
          Filesize

          512KB

        • memory/2748-7-0x0000000002680000-0x0000000002700000-memory.dmp
          Filesize

          512KB

        • memory/2748-6-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmp
          Filesize

          9.6MB