Analysis

  • max time kernel
    146s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2024 06:36

General

  • Target

    svhoste.exe

  • Size

    502KB

  • MD5

    a9c9735f6e34482c1cdd09e347a98787

  • SHA1

    6214e43cdc3fd17978955abf9c01a8d8c3ea791e

  • SHA256

    533d8476431fefd3f83fd39d66366277b2420a549cb01e9232f558b2617871fc

  • SHA512

    084b40e683d88e8eda7a60047f1a640310455986629a63382b3b6ffa6a91f295b47963e2ba52115cb113f57f1f727f2adb98f910a9adca1596af242f266b4a50

  • SSDEEP

    6144:sTEgdc0YeX1uRabMR0FdOWbYZTR9UbGzcEKVb8F9ywLlqlHcTR3t:sTEgdfYzRa9uza6FL4lHcdt

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Target

C2

127.0.0.1:6070

affasdqa.ddns.net:6070

haffasdqa.duckdns.org:6070

Mutex

670d21b7-71ed-4958-9ba7-a58fa54d8203

Attributes
  • encryption_key

    25B2622CE0635F9A273AB61B1B7D7B94220AC509

  • install_name

    svhoste.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svhoste

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 11 IoCs
  • Executes dropped EXE 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 10 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\svhoste.exe
    "C:\Users\Admin\AppData\Local\Temp\svhoste.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\svhoste.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2396
    • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:356
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2800
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\EsdU1iJBB54i.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2148
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2948
          • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2624
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\hsEJ70gI0w8H.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1348
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:1440
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:2984
                • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1636
                  • C:\Windows\system32\schtasks.exe
                    "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2692
                  • C:\Windows\system32\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\sOtDANcglnw3.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1052
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:1332
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:2012
                      • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2188
                        • C:\Windows\system32\schtasks.exe
                          "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:1804
                        • C:\Windows\system32\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\OqGn6nus7McT.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2240
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:1472
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:1088
                            • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:348
                              • C:\Windows\system32\schtasks.exe
                                "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:612
                              • C:\Windows\system32\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\t1orpXLZerCA.bat" "
                                11⤵
                                  PID:1836
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    12⤵
                                      PID:2264
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      12⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:276
                                    • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                                      "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                                      12⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2096
                                      • C:\Windows\system32\schtasks.exe
                                        "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                                        13⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2284
                                      • C:\Windows\system32\cmd.exe
                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\hWTdQlZFdlBf.bat" "
                                        13⤵
                                          PID:1188
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            14⤵
                                              PID:1584
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              14⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:592
                                            • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                                              "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                                              14⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2308
                                              • C:\Windows\system32\schtasks.exe
                                                "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                                                15⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2336
                                              • C:\Windows\system32\cmd.exe
                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\gZ3CDDVHkOyq.bat" "
                                                15⤵
                                                  PID:2884
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    16⤵
                                                      PID:2640
                                                    • C:\Windows\system32\PING.EXE
                                                      ping -n 10 localhost
                                                      16⤵
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      • Runs ping.exe
                                                      PID:2872
                                                    • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                                                      "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                                                      16⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2808
                                                      • C:\Windows\system32\schtasks.exe
                                                        "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                                                        17⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:2740
                                                      • C:\Windows\system32\cmd.exe
                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\CpIEdqUMRr6d.bat" "
                                                        17⤵
                                                          PID:1800
                                                          • C:\Windows\system32\chcp.com
                                                            chcp 65001
                                                            18⤵
                                                              PID:1928
                                                            • C:\Windows\system32\PING.EXE
                                                              ping -n 10 localhost
                                                              18⤵
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:2592
                                                            • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                                                              "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                                                              18⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2144
                                                              • C:\Windows\system32\schtasks.exe
                                                                "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                                                                19⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:1688
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\EQvDbDHXAE7H.bat" "
                                                                19⤵
                                                                  PID:2152
                                                                  • C:\Windows\system32\chcp.com
                                                                    chcp 65001
                                                                    20⤵
                                                                      PID:2920
                                                                    • C:\Windows\system32\PING.EXE
                                                                      ping -n 10 localhost
                                                                      20⤵
                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                      • Runs ping.exe
                                                                      PID:1288
                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                                                                      20⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2952
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                                                                        21⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:1756
                                                                      • C:\Windows\system32\cmd.exe
                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\zToalvNVFibA.bat" "
                                                                        21⤵
                                                                          PID:408
                                                                          • C:\Windows\system32\chcp.com
                                                                            chcp 65001
                                                                            22⤵
                                                                              PID:2060
                                                                            • C:\Windows\system32\PING.EXE
                                                                              ping -n 10 localhost
                                                                              22⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Runs ping.exe
                                                                              PID:2108
                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe
                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"
                                                                              22⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1604
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                "schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f
                                                                                23⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:2032

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\CpIEdqUMRr6d.bat

                                    Filesize

                                    208B

                                    MD5

                                    a630f0ccadb191b8ba78de2ca2b40d38

                                    SHA1

                                    706f1abdd18433da8b85da2cb5ea3cc9bc48e722

                                    SHA256

                                    801584ee0ea51c10b5c8e89d88ce1202cb31c4b2de6a90271ee932dfdcb053eb

                                    SHA512

                                    3328cb72ae5d68166cc764dba1665de58867324d3a1fe628ef4688e889e238306d54635728a3e609ad88778c5e4a0a9149b1299bd0cbcd1bef3d4b24f747ff38

                                  • C:\Users\Admin\AppData\Local\Temp\EQvDbDHXAE7H.bat

                                    Filesize

                                    208B

                                    MD5

                                    ddf4e4ee563c2ea506679a8a685995a1

                                    SHA1

                                    3d0ea4f976f1a33a5c04e410a061ac60fd968ec4

                                    SHA256

                                    ee85fff3bf0f3cd64a4981c06f73d22ab0271541c7be02afc9e471d87649ba6b

                                    SHA512

                                    0dcf5a91a69177a0329d0bc9d391dc4f38645a711c73e8e6ff15dcb60599c5052acc88b186eaad29dbe0722fa16c4c9ff73458846237a62772fa2dbb084e7044

                                  • C:\Users\Admin\AppData\Local\Temp\EsdU1iJBB54i.bat

                                    Filesize

                                    208B

                                    MD5

                                    85abeaf0f64b8fa323db6f9b9a8afed8

                                    SHA1

                                    c07856d6257281307a4e3a2fdb00c9d709b7c249

                                    SHA256

                                    6260abce626c407bdcb1ccecf980dda5d0ca66bc7f679fdc2a41e3235a7a2529

                                    SHA512

                                    3c5dcd97723504622afd8c1a81186a50c60d90b8c4cf378bffd2fa2972b9b4c30ceb7cbcbe0eae50081b528a9ba56a51e931d3046bce968d148b48a7c268b64e

                                  • C:\Users\Admin\AppData\Local\Temp\OqGn6nus7McT.bat

                                    Filesize

                                    208B

                                    MD5

                                    3af357955566b609d813e3d7f5c47b1b

                                    SHA1

                                    2ecb0448e566abff31daf23b47f158cf8e9cf7cb

                                    SHA256

                                    1065c8ceddde3722d0de5bbf11392513c0e362dd2bfbc65a2c169a0cfbfaa730

                                    SHA512

                                    dd383aa4c5681666c10cdd886d7630823c6a8ad9dfd059287eab176b17a808c429f269418d2c69fb9a3afca17daabbed6a863502a6b0b61f1eec4f9c5ddf710c

                                  • C:\Users\Admin\AppData\Local\Temp\gZ3CDDVHkOyq.bat

                                    Filesize

                                    208B

                                    MD5

                                    518fdd003bab918d5226ab37dfd3a985

                                    SHA1

                                    fa1eb77acf9c21d9a46c989c7b51bb3d53c424be

                                    SHA256

                                    95c72cfe44e6bfb988d28efbfa64ff87f5ad0a1d2eb47c3d037ece204cc6af37

                                    SHA512

                                    88466d7cedd31f05c5eb3385f6504b901bcb06840004cc6e0b20a110a7698b2af5cd0dea6a287d1cd9f3305a584c80933e792b2621a5d90408b88be750ebe00a

                                  • C:\Users\Admin\AppData\Local\Temp\hWTdQlZFdlBf.bat

                                    Filesize

                                    208B

                                    MD5

                                    a2cfd240acd004d7fe6a507a046737d8

                                    SHA1

                                    15adeecf2c47c8699f9c617d135f0175ea4a85bf

                                    SHA256

                                    a794110c3cad9f8c7e9dcbff4c8dc682aa801494aac543816e25823d018ee367

                                    SHA512

                                    d196cb73d0cbedc3280245b3ead0ab04d9a8e9942ff08bee0e117d9c7ef7a271ab3166fab165d60ddb69606273c35e5ac7240a9f6e2e3f3c91ecba800cc76bf1

                                  • C:\Users\Admin\AppData\Local\Temp\hsEJ70gI0w8H.bat

                                    Filesize

                                    208B

                                    MD5

                                    54773c15ed7f32a01c46fe9f43511e25

                                    SHA1

                                    5671484745c9f7b40daaea676a22faf2a3636b48

                                    SHA256

                                    fb59b1bad68071608c94e04eada0e6e11ec0b2e815aa89b83f16d5b2a07ae28a

                                    SHA512

                                    74f7b7cb339737d5732aed12696582cfaece6fe62881c11e68fdd26d01e0e3057ebf62bc3761cd81834f9be5e2a54dbd9502a229a7c630b69f51ee1786ebf8ca

                                  • C:\Users\Admin\AppData\Local\Temp\sOtDANcglnw3.bat

                                    Filesize

                                    208B

                                    MD5

                                    b69b4d2782adeed7ddf1ed21745766f8

                                    SHA1

                                    45b5a169d1b256e83f18f2ea1c3e73a63e620fe8

                                    SHA256

                                    903554f53fec23d8892bf980a923de2130dd6125c903c14ef613c3d8a13841b4

                                    SHA512

                                    417d0a86ff5434db9d41c94edcbeb410dd818f5c30b6d79609979cbb8c5286723fc8752e2e47e8de94dd3fbb7dd734accf20f3f45a88c49d7f0cb5fae8037883

                                  • C:\Users\Admin\AppData\Local\Temp\t1orpXLZerCA.bat

                                    Filesize

                                    208B

                                    MD5

                                    0333e0744f72fcca30c6270386fc8fe0

                                    SHA1

                                    5025167acf339960af0bc3550d0d54ee2da4bf16

                                    SHA256

                                    667b6f54b0df350296f829eae26892154c1111994e99bfad960ab87765833950

                                    SHA512

                                    e311d6941ba63f55cbe4bc6cfa2ad188ca64a7ac6bf90ce9095e4490520c31e455cbeb3b2587e104602a82a821f03cb31155a5bd0af293132583d41d106e26ab

                                  • C:\Users\Admin\AppData\Local\Temp\zToalvNVFibA.bat

                                    Filesize

                                    208B

                                    MD5

                                    36999cf6f0c0fbe84f8fb623d7862a97

                                    SHA1

                                    04a0f690124b46adff048dd108bcd78e95d18ef8

                                    SHA256

                                    e47c826fb26e44aedce0dc202077cf60d2aa0373f732096d61f8547494e99d47

                                    SHA512

                                    c098ce129401e42cbd04eb9e8eee990815ee882c2ef6bd9fd6cffa94c556757ad4924e369e97836241b441ff7ff187375a898cbd2a1e026695915e27fac48731

                                  • C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe

                                    Filesize

                                    502KB

                                    MD5

                                    a9c9735f6e34482c1cdd09e347a98787

                                    SHA1

                                    6214e43cdc3fd17978955abf9c01a8d8c3ea791e

                                    SHA256

                                    533d8476431fefd3f83fd39d66366277b2420a549cb01e9232f558b2617871fc

                                    SHA512

                                    084b40e683d88e8eda7a60047f1a640310455986629a63382b3b6ffa6a91f295b47963e2ba52115cb113f57f1f727f2adb98f910a9adca1596af242f266b4a50

                                  • memory/348-54-0x0000000000270000-0x00000000002F4000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/356-9-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/356-8-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/356-19-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/356-7-0x00000000008B0000-0x0000000000934000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/1604-121-0x0000000001220000-0x00000000012A4000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/2096-65-0x00000000008E0000-0x0000000000964000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/2120-2-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/2120-0-0x000007FEF5B43000-0x000007FEF5B44000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2120-1-0x0000000000DE0000-0x0000000000E64000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/2120-10-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

                                    Filesize

                                    9.9MB

                                  • memory/2144-98-0x0000000001160000-0x00000000011E4000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/2188-43-0x0000000001230000-0x00000000012B4000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/2308-76-0x0000000001120000-0x00000000011A4000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/2652-22-0x0000000000BE0000-0x0000000000C64000-memory.dmp

                                    Filesize

                                    528KB

                                  • memory/2952-109-0x0000000000250000-0x00000000002D4000-memory.dmp

                                    Filesize

                                    528KB