Analysis

  • max time kernel
    298s
  • max time network
    289s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 06:22

General

  • Target

    uni/Uni - Copy (16) - Copy.exe

  • Size

    409KB

  • MD5

    b70fdac25a99501e3cae11f1b775249e

  • SHA1

    3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71

  • SHA256

    51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246

  • SHA512

    43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44

  • SSDEEP

    12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

panel-slave.gl.at.ply.gg:57059

panel-slave.gl.at.ply.gg:27892

Mutex

$Sxr-rpL8EItHN3pqIQQVy2

Attributes
  • encryption_key

    Lme7VBS3l58VwLM69PNM

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (16) - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (16) - Copy.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (16) - Copy.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:2736
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2140
      • C:\Users\Admin\AppData\Local\Temp\PZRfCY8jUAvx.exe
        "C:\Users\Admin\AppData\Local\Temp\PZRfCY8jUAvx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2188
      • C:\Windows\SysWOW64\SCHTASKS.exe
        "SCHTASKS.exe" /create /tn "$77Client.exe" /tr "'C:\Users\Admin\AppData\Roaming\SubDir\Client.exe'" /sc onlogon /rl HIGHEST
        3⤵
        • Creates scheduled task(s)
        PID:348
    • C:\Windows\SysWOW64\SCHTASKS.exe
      "SCHTASKS.exe" /create /tn "$77Uni - Copy (16) - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (16) - Copy.exe'" /sc onlogon /rl HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:2464
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x48c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1088
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\WatchRedo.aif"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1524
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\WatchRedo.aif"
    1⤵
      PID:888
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\InstallMount.mht
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2272

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7268667255797d113cdf359a77162314

      SHA1

      9756f47415082683d8b2c3c98ce2435704f0a99f

      SHA256

      52a0b6fa91dce8fc874dc0344ca1a335bd312a5a5b969d4f1eec8e4dc9599752

      SHA512

      9aad323f4f9e6e20023d608a31ce0cc6c48d44dca4e6f8d31f313be00b925d420cba43e31376fd366d22904ca053ef7349815d3c9e221f8f38458e9aea88ddb8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      07ce9730ccf1bd1e63e05d3ff4b02fa2

      SHA1

      2584c81634c50092f2e2b71a70bc5a1c7b351eca

      SHA256

      2c6c3b97ba2478b1165f6c63b9826fc6270a8a7ce8779146cc423fa231196a81

      SHA512

      5264bbf7510976ade6acb206d557ac836f7c23baa5dfa8f9c756c450e711ddb3102063e739363219616dd5ded6e1ab6c6f7d290b9a84109dc4fb7a7eb2daf4a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f123e0d4eaab269eb0ddc82117be70ac

      SHA1

      fc499ffaaf1ec2f0e75e9702fd6eb736d63e1b15

      SHA256

      0199f93b6a3bdbbbef0b2a1a3d686c1d20801089f876cb8d9099f1b1542f83eb

      SHA512

      45d589c5478a9d5c371297e9c122cfc4c7b833840d8b264f37a01213890d8aaca4b10d66cd2ba038c555061823cd45f1fceb5ea826cb63051b9ef95a18fd3b3c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ecded4e40c179d6814aced7b41ae3a32

      SHA1

      ba8f84c2dfe24845bbe21831e1f06113829a48d5

      SHA256

      ced1236e646ad23401ddc8697fedb719ff1e0c41177ac2a4653432bb4913d577

      SHA512

      0de57c4a1d0c8eb0ca7d23374fc6029baae3b5786d1287ff1d21d2c53fc686187cfd63a3271802bd2be7d6cbeda40a314865e699411d61c2d83d10c4d68b6938

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      60d7d96d0bee1ce0d4074a1fa63db9bb

      SHA1

      cbbc89c5de19abeedc730134500ecea0734764f6

      SHA256

      e2b0924fd608cadbf6d0abef4d4a4c1d2c2c802c9812db79d1377cd589c10327

      SHA512

      e4467039d9d2d74167e261d0282c4b6a8b538116d125d222f4b20c5cd27f9d19a498035dfd15f177076a09975b9449427f6f7c82f4121341a727d44ebeed1c9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a157696cf543ad4fff6334d175666f82

      SHA1

      a4beea931496d5828e34a997e760f2ff85ad3cef

      SHA256

      8e4386d6d8a5d50b3a35b17a279efeb82048aeb431381613b2419d4ad8f28c81

      SHA512

      3f43ecf4d317e4314213d0caf7dfcab1c8249ff6bc274ed543959801bead7a10e7f5c9509f7c969096f88590faef5d4b1fb2341dfefc55a64a6525e04e594099

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      03b611cd5caf59c6c20aef69b279c3d7

      SHA1

      6c0721090798e0b8cf4159466ae04ec7012ac38c

      SHA256

      2939fd9f1bc52e8900060073d5033338cd297d715ba6da7467f08f70af4b113b

      SHA512

      4857cd7f3da4dc3ef0804be585baba116901888119369b2c078d972ac7afe5d95e38e7ff4022ba5f0d893ac8d4482b8ef719513107d009acfefd74dfa4d43e0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f9b9dba797c75efaa5ebb3115f28ef1c

      SHA1

      2442434054de092dbfdd7bf86231ab3564171b65

      SHA256

      13b08c90e66d71c5206475ea066a3c9276d55b69798008b7465ce4882c3f49df

      SHA512

      92388fe3430d78a20694005b5327277f69b0a90339d96d968a67e4a721a4df4d18e3118e53bac0f9aff1858d6f3117e61f353f13ad57f35774f7cb51c733a23b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      992aa0d253e9ac33eed411a05f7ddde3

      SHA1

      0cb5ea9e1abf8402fc8512f2589caf7543c36606

      SHA256

      626f0ee2cef24bd7ffd9aa5450f32e5581420bf4252a5309904486a0a0e802fb

      SHA512

      37cd82baf0db85678b42e736913e98dedaa472cb7910b33e65962d0e3ad7fdd11a46c1fca2824560176bf6a0f46b1f26306246039e0a40e1d18e928d5011c0b3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7b52caca84011207c880be8abbd21879

      SHA1

      94eed223a18b4fc16e68ddbbb49aa7315abf54e3

      SHA256

      052e3b5b3a4229729095f6f673c25a502dbd1048ea46d7f10b6d142449005e87

      SHA512

      9de3058684e6f03b2b638a9b9bcbafed5656da66303a30677a7fc70c6710ae9d926c5ece4f58805ff5e70f21656de0a7d0ac01995eee979c5e347cb1a96648e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c08dec0b0d5aa58ab49edadae7e989d2

      SHA1

      d4d04d7cf762355eca06359422d531ce5b42c5fd

      SHA256

      423c9dad43c84fae3ed49f19252f16565e43f7ac1c852d8cfca644dc9da243d7

      SHA512

      df83be23a0d89cb73974376713e68fa0e8cea3a0e2244685da4edcd9a3e4b0de0cf33c353dcb2fcd83eeb53e99220059c8ab8eab89dd5d6234880d9056884786

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      06ecf8978d9fde6f7c3686fa9e4e52f5

      SHA1

      3182521daebe79dfbafe807c3cfabd69cb8935cf

      SHA256

      adb2df7e2426d4c5d66ea3c1d3353053c5a962fe7b960ac5ddb783ae543c0474

      SHA512

      b456e0c588ff775baef74fe71aa51a13472df7eabc33f8cfb35839834286525d9102b3068fe9ca17de81613d097a3f2ae2862967e9dc44c9a0de6e86f2aa085f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      4744ae33e33f58a31a45bf3241a11a49

      SHA1

      6c21406aa81920a22970206e7f47a777b3698359

      SHA256

      5373b1de5228499e73f8f9c049df312606398c9c55b9361b7786f86d298b1455

      SHA512

      d92b4880fb9cfe2dfe89e25f2d15f3bd5f48def7b69311df96619f0139aaed0812349b44c3ae9e4c835c04825bea25138dcdd5f35fc917531cc015728310113c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7ac4734fb0751bbbfbb5040edf512da7

      SHA1

      34958eceaa7fe93b5b1ddf57ed027bdd146d328e

      SHA256

      e313e54a91570881b6a0025e9966852b76bf149401e20f1360467c71483300e3

      SHA512

      f8c764f8a0e49ffc4c44d92149ceb72bad66ab17017521f565e0337dbcbae38a0a43313750b144b6eb6ccd84bb736266c95ef7a4aff89b9801d309660883ad72

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e09fe1bda44e3c983edca4cf159ece1b

      SHA1

      57acfa8f43142489b241e38bba2d6b9a2b2a6da0

      SHA256

      ed3611e5fd98bfa575722648076a1fbaac07917fcac23d61ab2333385f5aaa62

      SHA512

      a99f5c793bf7249233fb0023337cfbf89ce1a6495004ff7059800e80176d185b550a9591ef8c5528479e4b6e343d2e77306f62a73621a5703f089d2a94259a52

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      43f2b65a2b7c85b338aa1995946b8f33

      SHA1

      295b6f49d27f988c0ee082b394e500be745bad52

      SHA256

      4296fb27734759317f8ff33c1a846511aea0507dcc42a5de276425ae85243869

      SHA512

      d5f4fed999d9db4e68465875afbfbf7608ed2079d4b1fa9f4eca8b309df1310eb455e906e16c53ca3f60fc8e2f4770888c065d9ca0ed8f719923a9722cd5969a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      58451100278ae86dd5548789956513d5

      SHA1

      22a688fd8220fb97e4f6e794f7f81f861a1c84fc

      SHA256

      6cd12818b81ad0f758bec020b64d215519b9ea6df3ab01850b4c4a08c7a59904

      SHA512

      bfc443cafff358e37572667b14994d3b255afd2c1bc38372c9bbd2497d343ac8f94d2af84926aa0ce8714946b208c90aa0b2529f7b7d589ee79ade111dc9533d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6cf665ac0a4d227b2ef0492b36a79a8a

      SHA1

      6d530f2c075f423b52dfca48279ce489316563cb

      SHA256

      0e3be2267b298b60faf2a54ae1a5578cd17105c46a768890e6244f01d9cc7bb4

      SHA512

      efafa8bfee6d7b67bc037ce32e4159266281773ae31bf953f22660e5f443dc9f6d35ad9d4d67df2d06ba5146d8347dc82f30fdb0bb502c0639044c9a969f8505

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b759dcf82d51b6bece065c97608499c7

      SHA1

      0b0ef0e790435ba629b963c6db26d830cea9f9dd

      SHA256

      6eb806b00d00b6f2e5833ef8fd2286bec97f8b2895a05a107ff39927bc5298a9

      SHA512

      98e853dceca2171b3407c6d33e4cf072ae98eae30f90780e954c52cfbeef3e0a72a2eadeceb40f7d6c1bf948d4ed3ea9d60d7888de3ab06ef42480a3b761ac4c

    • C:\Users\Admin\AppData\Local\Temp\Cab90ED.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab91D9.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\PZRfCY8jUAvx.exe
      Filesize

      277KB

      MD5

      dac0c5b2380cbdd93b46763427c9f8df

      SHA1

      038089e1a0ac8375be797fc3ce7ae719abc72834

      SHA256

      d02538788fb57f568ece292f5fc20e9775c86d504de67f57e22534f84adc73c6

      SHA512

      05cc1f6bf25a6545a06c735ae7a4a7fc25489bdb9fbc8d5797be623982662c4a93cba2d20bfe14313ef1548eaaa691e55fabdd8e3d3e45de9ab42dc62f9a7023

    • C:\Users\Admin\AppData\Local\Temp\Tar91ED.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Roaming\SubDir\Client.exe
      Filesize

      409KB

      MD5

      b70fdac25a99501e3cae11f1b775249e

      SHA1

      3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71

      SHA256

      51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246

      SHA512

      43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44

    • memory/888-27-0x000007FEF7690000-0x000007FEF76C4000-memory.dmp
      Filesize

      208KB

    • memory/888-30-0x000007FEF6AA0000-0x000007FEF6AB7000-memory.dmp
      Filesize

      92KB

    • memory/888-26-0x000000013F330000-0x000000013F428000-memory.dmp
      Filesize

      992KB

    • memory/888-28-0x000007FEF5E20000-0x000007FEF60D4000-memory.dmp
      Filesize

      2.7MB

    • memory/888-29-0x000007FEF77C0000-0x000007FEF77D8000-memory.dmp
      Filesize

      96KB

    • memory/888-36-0x000007FEF6710000-0x000007FEF6721000-memory.dmp
      Filesize

      68KB

    • memory/1524-46-0x000007FEF66B0000-0x000007FEF66CD000-memory.dmp
      Filesize

      116KB

    • memory/1524-64-0x000007FEF4860000-0x000007FEF4888000-memory.dmp
      Filesize

      160KB

    • memory/1524-61-0x000007FEF4910000-0x000007FEF497F000-memory.dmp
      Filesize

      444KB

    • memory/1524-60-0x000007FEF4980000-0x000007FEF49E7000-memory.dmp
      Filesize

      412KB

    • memory/1524-59-0x000007FEF49F0000-0x000007FEF4A20000-memory.dmp
      Filesize

      192KB

    • memory/1524-58-0x000007FEF4A20000-0x000007FEF4A38000-memory.dmp
      Filesize

      96KB

    • memory/1524-57-0x000007FEF6450000-0x000007FEF6461000-memory.dmp
      Filesize

      68KB

    • memory/1524-56-0x000007FEF6470000-0x000007FEF648B000-memory.dmp
      Filesize

      108KB

    • memory/1524-55-0x000007FEF6490000-0x000007FEF64A1000-memory.dmp
      Filesize

      68KB

    • memory/1524-54-0x000007FEF64B0000-0x000007FEF64C1000-memory.dmp
      Filesize

      68KB

    • memory/1524-53-0x000007FEF64D0000-0x000007FEF64E1000-memory.dmp
      Filesize

      68KB

    • memory/1524-52-0x000007FEF65D0000-0x000007FEF65E8000-memory.dmp
      Filesize

      96KB

    • memory/1524-51-0x000007FEF64F0000-0x000007FEF6511000-memory.dmp
      Filesize

      132KB

    • memory/1524-50-0x000007FEF6520000-0x000007FEF655F000-memory.dmp
      Filesize

      252KB

    • memory/1524-49-0x000007FEF4A40000-0x000007FEF5AEB000-memory.dmp
      Filesize

      16.7MB

    • memory/1524-42-0x000007FEF6AA0000-0x000007FEF6AB7000-memory.dmp
      Filesize

      92KB

    • memory/1524-41-0x000007FEF77C0000-0x000007FEF77D8000-memory.dmp
      Filesize

      96KB

    • memory/1524-40-0x000007FEF5E20000-0x000007FEF60D4000-memory.dmp
      Filesize

      2.7MB

    • memory/1524-39-0x000007FEF7690000-0x000007FEF76C4000-memory.dmp
      Filesize

      208KB

    • memory/1524-38-0x000000013F330000-0x000000013F428000-memory.dmp
      Filesize

      992KB

    • memory/1524-63-0x000007FEF4890000-0x000007FEF48E6000-memory.dmp
      Filesize

      344KB

    • memory/1524-62-0x000007FEF48F0000-0x000007FEF4901000-memory.dmp
      Filesize

      68KB

    • memory/1524-65-0x000007FEF4830000-0x000007FEF4854000-memory.dmp
      Filesize

      144KB

    • memory/1524-66-0x000007FEF4810000-0x000007FEF4827000-memory.dmp
      Filesize

      92KB

    • memory/1524-67-0x000007FEF47E0000-0x000007FEF4803000-memory.dmp
      Filesize

      140KB

    • memory/1524-68-0x000007FEF47C0000-0x000007FEF47D1000-memory.dmp
      Filesize

      68KB

    • memory/1524-70-0x000007FEF3560000-0x000007FEF36D8000-memory.dmp
      Filesize

      1.5MB

    • memory/1524-69-0x000007FEF47A0000-0x000007FEF47B2000-memory.dmp
      Filesize

      72KB

    • memory/1524-43-0x000007FEF6710000-0x000007FEF6721000-memory.dmp
      Filesize

      68KB

    • memory/1524-44-0x000007FEF66F0000-0x000007FEF6707000-memory.dmp
      Filesize

      92KB

    • memory/1524-45-0x000007FEF66D0000-0x000007FEF66E1000-memory.dmp
      Filesize

      68KB

    • memory/1524-47-0x000007FEF6690000-0x000007FEF66A1000-memory.dmp
      Filesize

      68KB

    • memory/1524-556-0x000007FEF4A40000-0x000007FEF5AEB000-memory.dmp
      Filesize

      16.7MB

    • memory/1524-48-0x000007FEF5AF0000-0x000007FEF5CF0000-memory.dmp
      Filesize

      2.0MB

    • memory/2004-0-0x00000000745AE000-0x00000000745AF000-memory.dmp
      Filesize

      4KB

    • memory/2004-14-0x00000000745A0000-0x0000000074C8E000-memory.dmp
      Filesize

      6.9MB

    • memory/2004-2-0x00000000745A0000-0x0000000074C8E000-memory.dmp
      Filesize

      6.9MB

    • memory/2004-1-0x0000000000D10000-0x0000000000D7C000-memory.dmp
      Filesize

      432KB

    • memory/2760-16-0x00000000745A0000-0x0000000074C8E000-memory.dmp
      Filesize

      6.9MB

    • memory/2760-15-0x00000000745A0000-0x0000000074C8E000-memory.dmp
      Filesize

      6.9MB

    • memory/2760-11-0x00000000745A0000-0x0000000074C8E000-memory.dmp
      Filesize

      6.9MB

    • memory/2760-12-0x00000000745A0000-0x0000000074C8E000-memory.dmp
      Filesize

      6.9MB

    • memory/2760-10-0x0000000000920000-0x000000000098C000-memory.dmp
      Filesize

      432KB

    • memory/2760-1257-0x00000000745A0000-0x0000000074C8E000-memory.dmp
      Filesize

      6.9MB