Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 20:54

General

  • Target

    EclipseIsSoHot.exe

  • Size

    3.1MB

  • MD5

    d270f2b20a6fae8a39ee7b6d9ffecae1

  • SHA1

    d05036a246aa89c8c5ff4827a7a055df65c0eacc

  • SHA256

    389d7381073945558533fbf409f2bce03d5267e5545ecf91c4208b7646165db9

  • SHA512

    ab8d5207d36078d0cdeec67d23c0883ddb89568976cc94c80a491e9b5dc4eb54d68d3df0f2ea46a0c875bc85b8f44a31fb23888babc421f9a6893876a750b9a9

  • SSDEEP

    49152:9vzt62XlaSFNWPjljiFa2RoUYItTR16rbR3boGdDJTHHB72eh2NT:9vh62XlaSFNWPjljiFXRoUYItTR16B

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Darius

C2

Eclipse:80

Mutex

df9a6e4a-c51f-4a16-b5ba-97e6c913f325

Attributes
  • encryption_key

    F438346FAEF700E396AC7AE5D82BB12BBAC49EC0

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 12 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
    "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\01nYNp36rcts.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3280
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1776
        • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
          "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4200
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Mq39X5Dwez7d.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:4812
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:5116
              • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                5⤵
                • Checks computer location settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2900
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z7NEdX97sMJ1.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4436
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:1436
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      7⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:4376
                    • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                      "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                      7⤵
                      • Checks computer location settings
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:1764
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wcuQ0dPy5ZXD.bat" "
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3956
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          9⤵
                            PID:4444
                          • C:\Windows\system32\PING.EXE
                            ping -n 10 localhost
                            9⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:4768
                          • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                            "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                            9⤵
                            • Checks computer location settings
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of WriteProcessMemory
                            PID:740
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YqmnFxIKUqMQ.bat" "
                              10⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1640
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                11⤵
                                  PID:2228
                                • C:\Windows\system32\PING.EXE
                                  ping -n 10 localhost
                                  11⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:2864
                                • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                                  "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                                  11⤵
                                  • Checks computer location settings
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of WriteProcessMemory
                                  PID:772
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mThBBFtjlsxq.bat" "
                                    12⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3512
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      13⤵
                                        PID:1012
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 10 localhost
                                        13⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:5036
                                      • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                                        "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                                        13⤵
                                        • Checks computer location settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        • Suspicious use of WriteProcessMemory
                                        PID:64
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NbzOhq1anjho.bat" "
                                          14⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:2996
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            15⤵
                                              PID:2328
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              15⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:4452
                                            • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                                              "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                                              15⤵
                                              • Checks computer location settings
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              • Suspicious use of WriteProcessMemory
                                              PID:2164
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r9yuKqQhZQHA.bat" "
                                                16⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:5024
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  17⤵
                                                    PID:4744
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 10 localhost
                                                    17⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:3456
                                                  • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                                                    17⤵
                                                    • Checks computer location settings
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:4472
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\q1sbeGE6BXrn.bat" "
                                                      18⤵
                                                        PID:1596
                                                        • C:\Windows\system32\chcp.com
                                                          chcp 65001
                                                          19⤵
                                                            PID:2096
                                                          • C:\Windows\system32\PING.EXE
                                                            ping -n 10 localhost
                                                            19⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:4852
                                                          • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                                                            19⤵
                                                            • Checks computer location settings
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SendNotifyMessage
                                                            PID:2080
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oUgsBfrMNmsk.bat" "
                                                              20⤵
                                                                PID:3364
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp 65001
                                                                  21⤵
                                                                    PID:60
                                                                  • C:\Windows\system32\PING.EXE
                                                                    ping -n 10 localhost
                                                                    21⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    • Runs ping.exe
                                                                    PID:2228
                                                                  • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                                                                    21⤵
                                                                    • Checks computer location settings
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:2808
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jw0L7zHSRBh6.bat" "
                                                                      22⤵
                                                                        PID:2176
                                                                        • C:\Windows\system32\chcp.com
                                                                          chcp 65001
                                                                          23⤵
                                                                            PID:4780
                                                                          • C:\Windows\system32\PING.EXE
                                                                            ping -n 10 localhost
                                                                            23⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:4812
                                                                          • C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\EclipseIsSoHot.exe"
                                                                            23⤵
                                                                            • Checks computer location settings
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SendNotifyMessage
                                                                            PID:1704
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7L2lcJf0jXvL.bat" "
                                                                              24⤵
                                                                                PID:688
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  25⤵
                                                                                    PID:3200
                                                                                  • C:\Windows\system32\PING.EXE
                                                                                    ping -n 10 localhost
                                                                                    25⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    • Runs ping.exe
                                                                                    PID:4420

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\EclipseIsSoHot.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    8f0271a63446aef01cf2bfc7b7c7976b

                                    SHA1

                                    b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

                                    SHA256

                                    da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

                                    SHA512

                                    78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

                                  • C:\Users\Admin\AppData\Local\Temp\01nYNp36rcts.bat

                                    Filesize

                                    211B

                                    MD5

                                    2c563c35bc1bd18e34ec98944d6c0d9f

                                    SHA1

                                    9e2e95d363fec9ec9e484ba42ecc0dccb73e985a

                                    SHA256

                                    d016c7d123ec658c76bc8f1241e37a6ab5b43f1aa93e3373781f8fe271113892

                                    SHA512

                                    1bdd4a9fe736e04092bdf6c64e9d3a5fb25eda2317d176a7a51ec03bf7f544dfda71e34b48f50ab32cf3598e3c704572beef86d1bb0f7d1278d40cb2aabb6c09

                                  • C:\Users\Admin\AppData\Local\Temp\7L2lcJf0jXvL.bat

                                    Filesize

                                    211B

                                    MD5

                                    49916ac132ff802880bac9d74165b8f8

                                    SHA1

                                    732e80003387bdae08d28ac79917964d829eb870

                                    SHA256

                                    e1669413cc4a7a73a6756a62c0bb4b1f2dfa607fb22ae1bb031b13567e5a4203

                                    SHA512

                                    6e40009e4474a14c70d7cd1657e08910ead5603af35d5bb0169678680a890b636f3e40e399718ac88ea4517037eff8d5208f026a0117de81444b6ceec99896e2

                                  • C:\Users\Admin\AppData\Local\Temp\Mq39X5Dwez7d.bat

                                    Filesize

                                    211B

                                    MD5

                                    ca2b47691be8694004de40ac3de5f26a

                                    SHA1

                                    0ca0903cc374d3419d785c7ddfe08c80550d0ccf

                                    SHA256

                                    5ac119efcd6dd466ecd3655d5b08a65e7f5e6e18c2154c7bcb1d3a97bbe31c6c

                                    SHA512

                                    54bf2a02fb1a19b3e2fc2c5aa152662467aee0b5454bb7c2950b0523f3e03a627aad5db935e05f23b5f1f0071337b869a16deb8063a0de8095275dd257081d22

                                  • C:\Users\Admin\AppData\Local\Temp\NbzOhq1anjho.bat

                                    Filesize

                                    211B

                                    MD5

                                    2fffad4ff21268b32017508ac0f940ad

                                    SHA1

                                    dbd251cb76e0b85dde17b853e83b452a42504add

                                    SHA256

                                    584e83253ac5ebabed9a2f1c88d2a5fdaf84112dc34a4d44cbeaa721d8c5a407

                                    SHA512

                                    876306f0e6b5cf956d74b2204e2609b00166faf23ca4ffc7af773c0b2466074fad50fa1b6d2af61e8b30fbb6a31a2a123d7cfe1999067da3c46eedd3caa57c90

                                  • C:\Users\Admin\AppData\Local\Temp\YqmnFxIKUqMQ.bat

                                    Filesize

                                    211B

                                    MD5

                                    37fd1fdd311a67aef57a707bd548c14b

                                    SHA1

                                    a51ba86a61f73a4b000ca2e5bdc953648223d9f1

                                    SHA256

                                    f9178dc8bff62452399ecf332b562d2cca418758c0e20fe9188038beadc781dc

                                    SHA512

                                    0aa59591a10a9039bf66f34a4a7d6d61db895bde3e265a000deab1945563176f79d5651bedfcdf5dbaf32bd67c86a464ee9af0d78651bcf8b7e002619c29bafd

                                  • C:\Users\Admin\AppData\Local\Temp\jw0L7zHSRBh6.bat

                                    Filesize

                                    211B

                                    MD5

                                    598b7d26840da077b9d4c4c52f630c94

                                    SHA1

                                    d454398f8c229c717f5412d6ed9bfe6e1b6aa464

                                    SHA256

                                    61164c597f98e5496987659b6fcad051d88715bc1882ce061099eea5ffe3d011

                                    SHA512

                                    194f62807b1bd51450f6bfb1d9de9d53e88de769ab4b02e44d5846865c8787aadeecdbcc4381459e3f37bb0c40301f0f0cf29098259745b9032ef347a4373e66

                                  • C:\Users\Admin\AppData\Local\Temp\mThBBFtjlsxq.bat

                                    Filesize

                                    211B

                                    MD5

                                    c44a5e4b7f0774f9d301ac3a3cb82547

                                    SHA1

                                    a744467d5b9c9ba3010338a7f9766810f51107c0

                                    SHA256

                                    627c119b88d9f0382678b2a3d200435d3b58a44b1dcf7a75bd7b0846542e6c76

                                    SHA512

                                    c4667be2389bb5028d977a373aa4ab76ea7a821038d1d63b0144adeb70d8ceae4d0a9e8226d1c9f9abdbe8cfa9c471547beba3c8cfe7311ae3378933d16454a3

                                  • C:\Users\Admin\AppData\Local\Temp\oUgsBfrMNmsk.bat

                                    Filesize

                                    211B

                                    MD5

                                    fe6d28680c7762aaf7c3cbbe34286dd9

                                    SHA1

                                    a8e18b0a7d1a2ef3e063469bb82f261da3314e29

                                    SHA256

                                    23270d818f2a44897699e3155ba49f26c07b12f84c1424225532ba48418d4ebe

                                    SHA512

                                    963516efea386a273a697c49456ecbc9ba597f0639da4c46a83493acfa5c51c87b5ebbf62105caa4566274be7d9a6fbce69eda1583493e07e1b93ec69f5f44a5

                                  • C:\Users\Admin\AppData\Local\Temp\q1sbeGE6BXrn.bat

                                    Filesize

                                    211B

                                    MD5

                                    bac2278101f628706fdc289bd0e7b9f6

                                    SHA1

                                    70d9313c9a8b1c0105c057d5bb69fc6c337bbc42

                                    SHA256

                                    b56cd99f1c60355469d34ccb96879e95a88b6093649566b7abd07e548f42aad1

                                    SHA512

                                    19b71b9f43c3d4af044ebc050ba8b2f64a3930a8ba15989234d01728f2da67eaf61e1696b4d17a7730ae321955b34319639ee8a2c2f1820f64f63f5418b4b9af

                                  • C:\Users\Admin\AppData\Local\Temp\r9yuKqQhZQHA.bat

                                    Filesize

                                    211B

                                    MD5

                                    9040cc743c8ae7d49d9be1099f65373e

                                    SHA1

                                    f367864cafa658da766539023fb51d4144d162a4

                                    SHA256

                                    b0446a092c09be4202009311cd70bf9b7139158349648c102717e6b8007d509c

                                    SHA512

                                    2d13bb9375fa6fadfd197342018186c050d49a2d693e77c6a76d7eff25833a5fc429cda785594b94c922366b7efa7745af093c9e06757945d2a24da35d7b24fd

                                  • C:\Users\Admin\AppData\Local\Temp\wcuQ0dPy5ZXD.bat

                                    Filesize

                                    211B

                                    MD5

                                    c5d55f4802107a543af71fc9802a679e

                                    SHA1

                                    59b54ed44b25c31fe40f66d195a8ff7167efac13

                                    SHA256

                                    5f531b7da0fc4d75f12f16623cd91abaf8fa5017396a2d5b958b05a2ff6b9278

                                    SHA512

                                    71824db35f1a065f0eea22b47276d701f72a941ede93fe5bfb53b7684c5a6f18c1338cdb0b136f5045c3138866a83b8c05494215e0ebc04773b12795be139462

                                  • C:\Users\Admin\AppData\Local\Temp\z7NEdX97sMJ1.bat

                                    Filesize

                                    211B

                                    MD5

                                    f273919cf3227abd230d2747ba04ab63

                                    SHA1

                                    d4b69fcbfe19eb497b95656d747862729eaa8bd6

                                    SHA256

                                    639089a5ea7285a3e3c411f0380759299f87c9750609dfea1dda776f732954a1

                                    SHA512

                                    5903416d0bcb436c1e6a6931257b88f0b74b802b0500ab0d225c2574084bd8d12ec69319d5fbfda796574f6b014ad3590df7ffd5052e0da8f62bb5dfba4b753f

                                  • memory/3980-10-0x00007FFCC7F00000-0x00007FFCC89C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3980-4-0x000000001C480000-0x000000001C532000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/3980-0-0x00007FFCC7F03000-0x00007FFCC7F05000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/3980-3-0x000000001C370000-0x000000001C3C0000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/3980-2-0x00007FFCC7F00000-0x00007FFCC89C1000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3980-1-0x0000000000950000-0x0000000000C74000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/4200-11-0x00007FFCC7FD3000-0x00007FFCC7FD5000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/4200-17-0x00007FFCC7FD0000-0x00007FFCC8A91000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4200-13-0x00007FFCC7FD0000-0x00007FFCC8A91000-memory.dmp

                                    Filesize

                                    10.8MB