Analysis Overview
Threat Level: Known bad
The file https://mega.nz/file/zNxAlJpK#aj1s-SkIlCU0LxnlG-8kEE_JPN_mhFg-JnVXYNAQt7U was found to be: Known bad.
Malicious Activity Summary
Quasar RAT
Quasar payload
Executes dropped EXE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates system info in registry
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-01-14 18:29
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-01-14 18:29
Reported
2023-01-14 18:32
Platform
win7-20220901-en
Max time kernel
172s
Max time network
193s
Command Line
Signatures
Quasar RAT
Quasar payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Downloads\IXWare (2) (1).exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\IXWare (2) (1).exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\IXWare (2) (1).exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: 33 | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\Downloads\IXWare (2) (1).exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\Downloads\IXWare (2) (1).exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://mega.nz/file/zNxAlJpK#aj1s-SkIlCU0LxnlG-8kEE_JPN_mhFg-JnVXYNAQt7U
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb7f4f50,0x7fefb7f4f60,0x7fefb7f4f70
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1124 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1272 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1720 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2016 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3292 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3744 /prefetch:8
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x568
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4080 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4120 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4268 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4240 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4244 /prefetch:8
C:\Users\Admin\Downloads\IXWare (2) (1).exe
"C:\Users\Admin\Downloads\IXWare (2) (1).exe"
C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe
"C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=536 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1800 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3076 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2616 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=500 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,630887147502269724,13022807285005619147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1744 /prefetch:8
C:\Users\Admin\Downloads\IXWare (2) (1).exe
"C:\Users\Admin\Downloads\IXWare (2) (1).exe"
C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe
"C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | clients2.google.com | udp |
| N/A | 8.8.8.8:53 | accounts.google.com | udp |
| N/A | 8.8.8.8:53 | mega.nz | udp |
| N/A | 172.217.168.238:443 | clients2.google.com | tcp |
| N/A | 142.251.36.45:443 | accounts.google.com | tcp |
| N/A | 31.216.145.5:443 | mega.nz | tcp |
| N/A | 8.8.8.8:53 | edgedl.me.gvt1.com | udp |
| N/A | 34.104.35.123:80 | edgedl.me.gvt1.com | tcp |
| N/A | 8.8.8.8:53 | dns.google | udp |
| N/A | 8.8.8.8:53 | dns.google | udp |
| N/A | 8.8.4.4:443 | dns.google | tcp |
| N/A | 8.8.8.8:443 | dns.google | tcp |
| N/A | 8.8.4.4:443 | dns.google | udp |
| N/A | 172.217.168.202:443 | content-autofill.googleapis.com | tcp |
| N/A | 31.216.145.5:443 | mega.nz | tcp |
| N/A | 162.208.16.210:443 | na.static.mega.co.nz | tcp |
| N/A | 162.208.16.210:443 | tcp | |
| N/A | 216.58.208.99:443 | ssl.gstatic.com | tcp |
| N/A | 66.203.125.12:443 | g.api.mega.co.nz | tcp |
| N/A | 66.203.125.12:443 | g.api.mega.co.nz | tcp |
| N/A | 162.208.16.210:443 | na.static.mega.co.nz | tcp |
| N/A | 172.217.168.202:443 | udp | |
| N/A | 127.0.0.1:6341 | tcp | |
| N/A | 127.0.0.1:6341 | tcp | |
| N/A | 185.206.24.120:443 | tcp | |
| N/A | 185.206.24.120:443 | tcp | |
| N/A | 185.206.24.120:443 | tcp | |
| N/A | 8.8.8.8:443 | dns.google | tcp |
| N/A | 8.8.8.8:443 | dns.google | udp |
| N/A | 142.250.179.206:443 | sb-ssl.google.com | tcp |
| N/A | 8.8.8.8:53 | pimveldhof-60417.portmap.host | udp |
| N/A | 193.161.193.99:60417 | pimveldhof-60417.portmap.host | tcp |
| N/A | 8.8.8.8:443 | dns.google | udp |
| N/A | 193.161.193.99:60417 | pimveldhof-60417.portmap.host | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| N/A | 193.161.193.99:60417 | pimveldhof-60417.portmap.host | tcp |
| N/A | 8.8.8.8:443 | dns.google | udp |
| N/A | 142.250.179.163:443 | update.googleapis.com | tcp |
| N/A | 8.8.8.8:53 | edgedl.me.gvt1.com | udp |
| N/A | 34.104.35.123:80 | edgedl.me.gvt1.com | tcp |
| N/A | 193.161.193.99:60417 | pimveldhof-60417.portmap.host | tcp |
| N/A | 193.161.193.99:60417 | pimveldhof-60417.portmap.host | tcp |
| N/A | 142.250.179.163:443 | udp | |
| N/A | 193.161.193.99:60417 | pimveldhof-60417.portmap.host | tcp |
Files
\??\pipe\crashpad_1128_QJINRPWSCZGLEYDA
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\Downloads\IXWare (2) (1).exe
| MD5 | 485bb76fca2d5b339e3a4f3ce1b45fce |
| SHA1 | c5bdd971c60e9b21b34c25407e49ddee7065aa31 |
| SHA256 | 92d18d636576cf5a0cf770ce552df78141ad89592dccef1b55c15ba48e81875b |
| SHA512 | b36d5497aad0473f7e8d4d9a110bacd4d1185bcd6b9fb37c3df1509eb65d7fd1bb4f06e0c59e381ed73a1fc6c2d32708efe67a434251636b2d7c673d19e9cbfd |
memory/2360-55-0x0000000000000000-mapping.dmp
C:\Users\Admin\Downloads\IXWare (2) (1).exe
| MD5 | 485bb76fca2d5b339e3a4f3ce1b45fce |
| SHA1 | c5bdd971c60e9b21b34c25407e49ddee7065aa31 |
| SHA256 | 92d18d636576cf5a0cf770ce552df78141ad89592dccef1b55c15ba48e81875b |
| SHA512 | b36d5497aad0473f7e8d4d9a110bacd4d1185bcd6b9fb37c3df1509eb65d7fd1bb4f06e0c59e381ed73a1fc6c2d32708efe67a434251636b2d7c673d19e9cbfd |
memory/2360-58-0x0000000001330000-0x00000000013B8000-memory.dmp
memory/2360-59-0x000007FEFC591000-0x000007FEFC593000-memory.dmp
C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe
| MD5 | 485bb76fca2d5b339e3a4f3ce1b45fce |
| SHA1 | c5bdd971c60e9b21b34c25407e49ddee7065aa31 |
| SHA256 | 92d18d636576cf5a0cf770ce552df78141ad89592dccef1b55c15ba48e81875b |
| SHA512 | b36d5497aad0473f7e8d4d9a110bacd4d1185bcd6b9fb37c3df1509eb65d7fd1bb4f06e0c59e381ed73a1fc6c2d32708efe67a434251636b2d7c673d19e9cbfd |
memory/2404-60-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe
| MD5 | 485bb76fca2d5b339e3a4f3ce1b45fce |
| SHA1 | c5bdd971c60e9b21b34c25407e49ddee7065aa31 |
| SHA256 | 92d18d636576cf5a0cf770ce552df78141ad89592dccef1b55c15ba48e81875b |
| SHA512 | b36d5497aad0473f7e8d4d9a110bacd4d1185bcd6b9fb37c3df1509eb65d7fd1bb4f06e0c59e381ed73a1fc6c2d32708efe67a434251636b2d7c673d19e9cbfd |
memory/2404-63-0x0000000000880000-0x0000000000908000-memory.dmp
\??\PIPE\samr
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
memory/2948-66-0x0000000000000000-mapping.dmp
C:\Users\Admin\Downloads\IXWare (2) (1).exe
| MD5 | 485bb76fca2d5b339e3a4f3ce1b45fce |
| SHA1 | c5bdd971c60e9b21b34c25407e49ddee7065aa31 |
| SHA256 | 92d18d636576cf5a0cf770ce552df78141ad89592dccef1b55c15ba48e81875b |
| SHA512 | b36d5497aad0473f7e8d4d9a110bacd4d1185bcd6b9fb37c3df1509eb65d7fd1bb4f06e0c59e381ed73a1fc6c2d32708efe67a434251636b2d7c673d19e9cbfd |
memory/3004-69-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe
| MD5 | 485bb76fca2d5b339e3a4f3ce1b45fce |
| SHA1 | c5bdd971c60e9b21b34c25407e49ddee7065aa31 |
| SHA256 | 92d18d636576cf5a0cf770ce552df78141ad89592dccef1b55c15ba48e81875b |
| SHA512 | b36d5497aad0473f7e8d4d9a110bacd4d1185bcd6b9fb37c3df1509eb65d7fd1bb4f06e0c59e381ed73a1fc6c2d32708efe67a434251636b2d7c673d19e9cbfd |
C:\Users\Admin\AppData\Roaming\SubDir\IXWare.exe
| MD5 | 485bb76fca2d5b339e3a4f3ce1b45fce |
| SHA1 | c5bdd971c60e9b21b34c25407e49ddee7065aa31 |
| SHA256 | 92d18d636576cf5a0cf770ce552df78141ad89592dccef1b55c15ba48e81875b |
| SHA512 | b36d5497aad0473f7e8d4d9a110bacd4d1185bcd6b9fb37c3df1509eb65d7fd1bb4f06e0c59e381ed73a1fc6c2d32708efe67a434251636b2d7c673d19e9cbfd |
memory/3004-72-0x0000000000FD0000-0x0000000001058000-memory.dmp