Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    450s
  • max time network
    446s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    25/11/2024, 06:53

General

  • Target

    https://github.com/quasar/Quasar

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    5000

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

10.127.0.245:4782

Mutex

6d69c6a9-27bb-4ef5-b6df-e6a19f94c7b7

Attributes
  • encryption_key

    713C190CF6B65E580BF73EB6C6A77D6F23DA0415

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/quasar/Quasar
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3804
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x134,0x7fff2b1246f8,0x7fff2b124708,0x7fff2b124718
      2⤵
        PID:4080
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:5004
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3880
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
          2⤵
            PID:1176
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:1
            2⤵
              PID:4804
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:1
              2⤵
                PID:5012
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:8
                2⤵
                  PID:2280
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                  2⤵
                  • Drops file in Program Files directory
                  PID:1448
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6725f5460,0x7ff6725f5470,0x7ff6725f5480
                    3⤵
                      PID:784
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4220
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:1
                    2⤵
                      PID:3796
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                      2⤵
                        PID:4396
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:1
                        2⤵
                          PID:4744
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:1
                          2⤵
                            PID:920
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:1
                            2⤵
                              PID:3332
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6488 /prefetch:8
                              2⤵
                                PID:3188
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4696
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8041266717789945641,5915891116123785154,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=900 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2440
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:5116
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:5044
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:976
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap3621:84:7zEvent31559
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:3716
                                  • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
                                    "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4468
                                    • C:\Windows\explorer.exe
                                      "C:\Windows\explorer.exe" /select, "C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12"
                                      2⤵
                                        PID:3716
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                      1⤵
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4580
                                    • C:\Windows\system32\cmd.exe
                                      "C:\Windows\system32\cmd.exe"
                                      1⤵
                                        PID:5436
                                        • C:\Windows\system32\ipconfig.exe
                                          ipconfig
                                          2⤵
                                          • Gathers network information
                                          PID:5764
                                      • C:\Users\Admin\Desktop\Client-built.exe
                                        "C:\Users\Admin\Desktop\Client-built.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Adds Run key to start application
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5592
                                        • C:\Windows\SYSTEM32\cmd.exe
                                          "cmd" /K CHCP 437
                                          2⤵
                                            PID:5308
                                            • C:\Windows\system32\chcp.com
                                              CHCP 437
                                              3⤵
                                                PID:5032
                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
                                            "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:5652
                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
                                            "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5832
                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
                                            "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:1044

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Quasar.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            f6c287509481140fda8116c8e831b7d6

                                            SHA1

                                            781f9e972037007da6ebe92d0e9ba51f4fd5d714

                                            SHA256

                                            a23d0654fdd344a19d1c8e0feb6f4e1803292a4d033773e14dad26e17dbff661

                                            SHA512

                                            63ec7882fd46ecc88e50672478533be670a77dd4f8056418db59d3ce6e776e44f5a39a89ee99e092fcfb9be61079cb34f20fa8a3a5c59b342afe05e113fa8ab2

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            b5fffb9ed7c2c7454da60348607ac641

                                            SHA1

                                            8d1e01517d1f0532f0871025a38d78f4520b8ebc

                                            SHA256

                                            c8dddfb100f2783ecbb92cec7f878b30d6015c2844296142e710fb9e10cc7c73

                                            SHA512

                                            9182a7b31363398393df0e9db6c9e16a14209630cb256e16ccbe41a908b80aa362fc1a736bdfa94d3b74c3db636dc51b717fc31d33a9fa26c3889dec6c0076a7

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            32d05d01d96358f7d334df6dab8b12ed

                                            SHA1

                                            7b371e4797603b195a34721bb21f0e7f1e2929da

                                            SHA256

                                            287349738fb9020d95f6468fa4a98684685d0195ee5e63e717e4b09aa99b402e

                                            SHA512

                                            e7f73b1af7c7512899728708b890acd25d4c68e971f84d2d5bc24305f972778d8bced6a3c7e3d9f977cf2fc82e0d9e3746a6ccb0f9668a709ac8a4db290c551c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            1KB

                                            MD5

                                            f93b6fce855a72eac5f1c47e1950b809

                                            SHA1

                                            e661e1d8655c4203bf98434d2eda5da99031a948

                                            SHA256

                                            fa7146fe01ae31e050c3d6a7bcd5f595fc38467d143b7af82a31acbde9d9539c

                                            SHA512

                                            8b1c03d02f99c7b280b281b2c14a609f6877febb7c9b2e1db4cd23a4a9316f717fc7cc1fc9d9f60451138a15ac93a519b3b0d0722649512eda4b4f5dcc06b81c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57e7df.TMP

                                            Filesize

                                            48B

                                            MD5

                                            5f47e8e749e0d2c9cd89aac2cf809cb2

                                            SHA1

                                            55c0e2e14bb9bb0b6d274867c084fd49b799462c

                                            SHA256

                                            5f7bb0b7c438fabb13de1f219daf38ed81b5f8e453c2d43579567fd12213f28e

                                            SHA512

                                            f4a3e9f3e2d10769bbfe2d06f9b225600552b1ff7f803ef2d39dc365ee164a63de5fd42fe1874f06273d2e8638f58d3009df72fe8dc0dc4fb75496585f9d6a5d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                            Filesize

                                            70KB

                                            MD5

                                            e5e3377341056643b0494b6842c0b544

                                            SHA1

                                            d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                            SHA256

                                            e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                            SHA512

                                            83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            580B

                                            MD5

                                            6e6b8b6e385d0e14f25ebc75e0aa7a88

                                            SHA1

                                            f1e9eda82f1eaf76cd1fee1880a0ee63453a369c

                                            SHA256

                                            9d0d4105535612e4822632d6043b09dfd441053df43783e7a304f675ead181a2

                                            SHA512

                                            65bacd171a9edc5965c28fd993f6d6afb058fe94dd7997cbbab6b915d2e8d95d9f37a627b306ec97d2091f1fb03548d3df6d6b68ad290435ea1a1b29429468e9

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58a301.TMP

                                            Filesize

                                            59B

                                            MD5

                                            2800881c775077e1c4b6e06bf4676de4

                                            SHA1

                                            2873631068c8b3b9495638c865915be822442c8b

                                            SHA256

                                            226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                            SHA512

                                            e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            e21992a0a356ed70341638166687702c

                                            SHA1

                                            ffe26cc82fa6d9e3772a908fc53c2e1a6e941fa5

                                            SHA256

                                            50fb2ea565f539717610f4f1d9df6818887ffd9a198d85a7053030b7244b6e19

                                            SHA512

                                            228a312922c6d0f5cb4b8fa68b43583105accead6d62a987c225faf668fdc896dc1c02c458a5f22dd38d9761152ec46f1de3f0ab5ff513ec8f1512a29509ae60

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            c47d6a3244c0fc4f7bf2393642020abf

                                            SHA1

                                            bfde4a3e055f9837e8f7af8665837a87bf57a3c6

                                            SHA256

                                            bd59a925cffaadffbc829b24b79cc1bde6a4d58007e99cf1d58f9c8356230d07

                                            SHA512

                                            c5161d3b25d582405506dd9045bc34c4569ac60c44c5e2842c280faa46618e55d9d8cad02088485d93c8e33e8719dfcdbb0e2e8ea1abd212f63531310494c740

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            6267b319c71c99dbab3636ccd6cc732b

                                            SHA1

                                            5940ad67e65b5873840123815b0e18b4b3dd0247

                                            SHA256

                                            67c8f9a37a5954d97f178aceacbe5aba6fa91c405c41ef7bb7ea164e0891bab7

                                            SHA512

                                            597fc936296b1052f90d56b43255c85198a1a64c507fafcc255717c9dd19dd224194e45711ea4fb66c110b0909ccc79a796156a618409052f967847dec7daa2c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            23ee91ccfe85aca6fe33cc9580286731

                                            SHA1

                                            2b0f174970bded36ce421d95bedaf5943f1cef51

                                            SHA256

                                            4427faa6a4ddea2ef105f6f02bf52b3b95a18ee4bea51561588770173a43e4f4

                                            SHA512

                                            de126375d5994ad49658a8bf8d754a7c338e253cb26d991ba8b1aad2c2828128a98109ece55539dad773f099e21cffa08e5aeb5af16259c3c8fbf9c5df9d9cf9

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                            Filesize

                                            24KB

                                            MD5

                                            6e466bd18b7f6077ca9f1d3c125ac5c2

                                            SHA1

                                            32a4a64e853f294d98170b86bbace9669b58dfb8

                                            SHA256

                                            74fc4f126c0a55211be97a17dc55a73113008a6f27d0fc78b2b47234c0389ddc

                                            SHA512

                                            9bd77ee253ce4d2971a4b07ed892526ed20ff18a501c6ba2a180c92be62e4a56d4bbf20ba3fc4fbf9cf6ce68b3817cb67013ad5f30211c5af44c1e98608cb9e3

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                            Filesize

                                            24KB

                                            MD5

                                            ac2b76299740efc6ea9da792f8863779

                                            SHA1

                                            06ad901d98134e52218f6714075d5d76418aa7f5

                                            SHA256

                                            cc35a810ed39033fa4f586141116e74e066e9c0c3a8c8a862e8949e3309f9199

                                            SHA512

                                            eec3c24ce665f00cd28a2b60eb496a685ca0042c484c1becee89c33c6b0c93d901686dc0142d3c490d349d8b967ecbbd2f45d26c64052fb41aad349100bd8f77

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            46295cac801e5d4857d09837238a6394

                                            SHA1

                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                            SHA256

                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                            SHA512

                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                                            Filesize

                                            41B

                                            MD5

                                            5af87dfd673ba2115e2fcf5cfdb727ab

                                            SHA1

                                            d5b5bbf396dc291274584ef71f444f420b6056f1

                                            SHA256

                                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                            SHA512

                                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            933d9797ca3a1cc920694d50e4e121c8

                                            SHA1

                                            22dfedcdc3d4de57346ee21c6bb166fcab1b0d88

                                            SHA256

                                            c9f51ad86f132c97ea24bb660b9613b8fb7269a9ae833b78e0e9db5d9162d1c4

                                            SHA512

                                            0b29f267f256a387ac1c77d0defb5050efab87f87bf2bef5ae03301a5f2b1a149e6ffe29210fcf24e561cfe733c8fea960b05cd2d07f86e7a77876a6e1179c69

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            40f207f1aac4f7ebea74a9aa0b9a28fd

                                            SHA1

                                            ecf6e6abb60267548f13760d47a88ef9baf756d8

                                            SHA256

                                            a6f781237c6769d71d708c8e9d0abdb86845fa0aa548441ee05d9dfee99861f5

                                            SHA512

                                            fb6a8c2f026eb6805f87191382ed08c675697ca86adda478242da3d72430f4781d5c50d684fbcd4a65ef1d6b0fd2fd3fd9bedf69db0348271b777bdaa6cda135

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ebf6.TMP

                                            Filesize

                                            1KB

                                            MD5

                                            90b4f08a292461f1c2dac4e0465c6886

                                            SHA1

                                            85720c768ee71cf573c4eb4bea569fdcb6224f04

                                            SHA256

                                            cf194589c406914ca83e56cc564e80c1b9283ddec6cf6a88e038531ee73e0536

                                            SHA512

                                            500257c4420ddbadeb5f0923959dff8faf077cd753ee84cfdf4fdd49e83bd8e41860e45eae4cc1c125cc2574328afbee18770bb0a694d21858ab99787b5b62f1

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            206702161f94c5cd39fadd03f4014d98

                                            SHA1

                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                            SHA256

                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                            SHA512

                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            88f82ef6dfa873b915c40ae0619a9e89

                                            SHA1

                                            14c7c636747082e06275d07797e788ab6bc81bdc

                                            SHA256

                                            ff24971c74094df230b536a0eeabcf06215a24838cc0a181962f1193b850ae90

                                            SHA512

                                            aaea6cb76d125453ee1549574c3f585f19e41aef040445643b2269597bd592918705e4e51c9c200e9ad1f90988ec0d772e162bb6c3711d5e80b30ca7e65255ae

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            8KB

                                            MD5

                                            a6bf345bc7cf0d188b4f1310da510110

                                            SHA1

                                            e1ab2cc045f449f69bb2671b196aa2f39b2bafb4

                                            SHA256

                                            e19e982f23ed96daa69e56550569fad1feffdf64a9144efb7208b23700da631c

                                            SHA512

                                            ededd163b72c02c143c3d9a6886f6ec0980e5d25175c877875120f2884a8a046a6238e36d29befdf8a880acf420c16b6fdc456f9fe8f5022125bf3cbfb004a33

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2319007114-3335580451-2147236418-1000\8abffd71065fcdda7c37964c11798ff3_80a3676e-3a1b-46a8-b68e-cfc55ef45206

                                            Filesize

                                            3KB

                                            MD5

                                            35ce8067b977be9258afb8ceaa99cee3

                                            SHA1

                                            669dd3aa04e19c165492ba41e64ef11f1c817c18

                                            SHA256

                                            b5f64e1685cfd3b490bb2e00d8b3a816ee728d36f500216d76e75d659136cbb4

                                            SHA512

                                            dfa6e431d3409ef54bedab69d5eebfeb5052640af6dc1ee0b345aedb638336a8e9c1b32b5892afdf62fc0c67a864fc7bdf1ac2d81aa1be1f81fcc94a40e695d8

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                            Filesize

                                            3KB

                                            MD5

                                            e9fbddb1459a66e7fac36d4de316790f

                                            SHA1

                                            f33000170e35520410ab3a22437110fcdccc7496

                                            SHA256

                                            6ab0183b72b7115bd03fd23cae62d5ebbf342685ce00eba76123449d5997d1a3

                                            SHA512

                                            4daaf239684fafd218770fb0fbd2129cd199c416089fd88295d5187c45fb015efa6e2afe8bf9b55dd0ee49ddd0e09130b3725440b2445791713b7a4434b9d1b4

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                            Filesize

                                            3KB

                                            MD5

                                            4156e591d083458a8f49fb8fe3ef481f

                                            SHA1

                                            dd97d911a498bbc1e6b12c47970a3d0c97569c91

                                            SHA256

                                            4ccf14537eb42d75fb21b837fa207e5165fc08699cf2055422579c27b47a835f

                                            SHA512

                                            a92966630bd3fa34d3c449d36d2deb677b55c960ee4cbdfa0b98418f22c0871825fa5b7b5c7711e520554e19c6fd8c4ee2ab17c5e869e0ecd73ccb33e95eb571

                                          • C:\Users\Admin\Desktop\Client-built.exe

                                            Filesize

                                            3.1MB

                                            MD5

                                            417db7249d43a2951403cf69085683b3

                                            SHA1

                                            91fdf6382eee38d53b9cff135679bc3dd60beb99

                                            SHA256

                                            d82bbff709a35f6ab5089855b17ce87f934f278f151922ef89991e45528162d6

                                            SHA512

                                            2841d63d94b901fb846855faff89001baa4485986eaecd6c0d7d557b06f80293c47a968e258de5804e7c60b9a197250cf94499a3d652ab3ad4383a427d3c0c81

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\BouncyCastle.Crypto.dll

                                            Filesize

                                            3.2MB

                                            MD5

                                            0cf454b6ed4d9e46bc40306421e4b800

                                            SHA1

                                            9611aa929d35cbd86b87e40b628f60d5177d2411

                                            SHA256

                                            e51721dc0647f4838b1abc592bd95fd8cb924716e8a64f83d4b947821fa1fa42

                                            SHA512

                                            85262f1bc67a89911640f59a759b476b30ca644bd1a1d9cd3213cc8aae16d7cc6ea689815f19b146db1d26f7a75772ceb48e71e27940e3686a83eb2cf7e46048

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Gma.System.MouseKeyHook.dll

                                            Filesize

                                            56KB

                                            MD5

                                            bfb3bd1cb571360435100bfa6ed2b997

                                            SHA1

                                            1325e8dd76180a165117e04da4ee4a020e996880

                                            SHA256

                                            a67a424013544c8270c12633e2e1e287cd5cf0b3f2e81e8d8204b37a03da59ef

                                            SHA512

                                            ae5a88a9e86b9e64b8c289213f814586dfa5fe5e0cc21bdbc3e48c36d81fa9e763c6e78f24e40df07696228270ad72f408846125e61e33cae867ef8ff88a3c15

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Mono.Cecil.dll

                                            Filesize

                                            350KB

                                            MD5

                                            de69bb29d6a9dfb615a90df3580d63b1

                                            SHA1

                                            74446b4dcc146ce61e5216bf7efac186adf7849b

                                            SHA256

                                            f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

                                            SHA512

                                            6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Open.Nat.dll

                                            Filesize

                                            68KB

                                            MD5

                                            cc6f6503d29a99f37b73bfd881de8ae0

                                            SHA1

                                            92d3334898dbb718408f1f134fe2914ef666ce46

                                            SHA256

                                            0b1e0d8f87f557b52315d98c1f4727e539f5120d20b4ca9edba548983213fbb5

                                            SHA512

                                            7f4c0a35b612b864ad9bc6a46370801ed7433424791622bf77bf47d6a776cb6a49e4977b34725ead5d0feaa1c9516db2ca75cb8872c77a8f2fab6c37740b681f

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                            Filesize

                                            242B

                                            MD5

                                            4e346f9a3dedb3bd621792eb4f8cb0e4

                                            SHA1

                                            4456f7d035150293569db7133a2c0981702ed955

                                            SHA256

                                            31dafdfc540064433b644ed17a1b1ba9790eafbcc45fee83a3fe9650c281432f

                                            SHA512

                                            798d9751788e9b77dbd20951212e32c814cd4d13548d3bb1b7d4a1ad102c6934f575adc6c1561cbdc18cd1c329f8ce760190149a84d07ed467eadfca7048ac25

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                            Filesize

                                            690B

                                            MD5

                                            664d6409706ccb09977b5565021876fb

                                            SHA1

                                            b4aba97eee04d193ab7e6b083476c433386d2c28

                                            SHA256

                                            d597c2b379c32b2d6a162d8d9695c2c6be57e457ff2d1f6870a3042dfa85b4da

                                            SHA512

                                            fdb28138224c5802ddbf4f11866949b912c2bb05a765f176e62ca5724dadf415bd0c50783596d7d62ace5a28bb434b0545b659f1760a51bfcfccf7c376673b23

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                            Filesize

                                            690B

                                            MD5

                                            4d7fe45ace5d00836bb1e11c539f81b9

                                            SHA1

                                            b02c4ec352504c21ff6c3fcb4db9bf00b5ae8391

                                            SHA256

                                            df372a8e390e3ca370a14e504103aea7137e6ac0b8945b92d5ea23fc1f59a5af

                                            SHA512

                                            26d8bd2a620d4584666c44aa093a39d6b5be304d1b2569071d24e94932d86f0db4987dc26074440e1bf0485ebbd7daaad6636be8039e6e080b9c0abd5b7caa89

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                            Filesize

                                            1KB

                                            MD5

                                            b69d22a88d00908259077856a19af0d7

                                            SHA1

                                            9f2688ccbc7d8e0f6a6e3fcae82b78c980327721

                                            SHA256

                                            e8d5bc2a8c01319d857a6dfabd7b74463827d415ca891a01aedabbb9eaea1f66

                                            SHA512

                                            b6f3ea6f3e672aaab04547efecf4e6cdf919ea628db53e1d020e1129dfd17e08438950f12e655c5602bbe068fbe6da8ae1b5049a3b3c8f4f90cb7b0748213412

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.Common.dll

                                            Filesize

                                            62KB

                                            MD5

                                            2185564051ea2e046d9f711ed3cd93ff

                                            SHA1

                                            2f2d7fd470da6d126582ad80df2802aabd6c9cea

                                            SHA256

                                            de930a748e4dc08c851ba0a22afce8dcfd0f15f23b291f9306c8ef6ccd7460a2

                                            SHA512

                                            00af241c1f89b478e66d758db26ed0a413b690d695abf91211b5cbc3985133632327ea0fc41140bd61d02271b6aa278a8e8f539d8ca6ce94972aef50c1a9c868

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe

                                            Filesize

                                            1.2MB

                                            MD5

                                            12ebf922aa80d13f8887e4c8c5e7be83

                                            SHA1

                                            7f87a80513e13efd45175e8f2511c2cd17ff51e8

                                            SHA256

                                            43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e

                                            SHA512

                                            fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe.config

                                            Filesize

                                            176B

                                            MD5

                                            c8cd50e8472b71736e6543f5176a0c12

                                            SHA1

                                            0bd6549820de5a07ac034777b3de60021121405e

                                            SHA256

                                            b44739eeff82db2b575a45b668893e2fe8fdd24a709cbf0554732fd3520b2190

                                            SHA512

                                            6e8f77fcca5968788cc9f73c9543ce9ab7b416372bc681093aa8a3aad43af1f06c56fcbc296c7897a3654b86a6f9d0e8b0fe036677cf290957924377bc177d9f

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\Vestris.ResourceLib.dll

                                            Filesize

                                            76KB

                                            MD5

                                            944ce5123c94c66a50376e7b37e3a6a6

                                            SHA1

                                            a1936ac79c987a5ba47ca3d023f740401f73529b

                                            SHA256

                                            7da3f0e77c4dddc82df7c16c8c781fade599b7c91e3d32eefbce215b8f06b12a

                                            SHA512

                                            4c034ff51cc01567f3cb0796575528ca44623b864eb606266bcf955a9259ed26b20bec0086d79038158d3a5af2ada0a90f59d7c6aae9e545294fe77825dbe08b

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\client.bin

                                            Filesize

                                            3.1MB

                                            MD5

                                            f4d16cfe4cad388255e43f258329f805

                                            SHA1

                                            fe7cc6c9eb76b5ad97867b46d053fae601fd4a2d

                                            SHA256

                                            8fb6ae3496d4ac025eab443d3e322b0faa3461d25b54093c9205d35746e3250e

                                            SHA512

                                            867045eac0f7765e6bea51e62bc4ed68b1e81ce6c2843d2e08714eb391a8ac94c2571c09828286252248400ea5c12bffa50a25c8ec5ad9e6d0bb836320ec188f

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\protobuf-net.dll

                                            Filesize

                                            282KB

                                            MD5

                                            abc82ae4f579a0bbfa2a93db1486eb38

                                            SHA1

                                            faa645b92e3de7037c23e99dd2101ef3da5756e5

                                            SHA256

                                            ca6608346291ec82ee4acf8017c90e72db2ee7598015f695120c328d25319ec6

                                            SHA512

                                            e06ee564fdd3fe2e26b0dec744a969a94e4b63a2e37692a7dcc244cb7949b584d895e9d3766ea52c9fe72b7a31dacf4551f86ea0d7c987b80903ff43be9faed3

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12

                                            Filesize

                                            4KB

                                            MD5

                                            6d1dd7ba051b011ee7b580270de12bee

                                            SHA1

                                            ff295be1ed1cacf01071c60c158f088a1e856097

                                            SHA256

                                            7b924bca3673bc82c960a52b04905159ea88d55964b5a709f9d669e5bb6c46c5

                                            SHA512

                                            86d5e706357da03f40541dc5772d80088ec08f7ef0b9e3c5c7dfc468ee6003b2c20743165aaeff394c5cd0e3380b6e4e039d53af294a52720428905e822b095f

                                          • C:\Users\Admin\Desktop\Quasar v1.4.1\settings.xml

                                            Filesize

                                            371B

                                            MD5

                                            482b40c0d7aa8a3d1bbf44e34b4d2ca5

                                            SHA1

                                            d6d24c92b01a2d8a1e9cd5a15669443091f1c7a7

                                            SHA256

                                            40adac53b3488585f0bd0dfc919d7d145184d4b78ee7641d721bfdf141571c31

                                            SHA512

                                            64774f6c520ba1b99c353d79747e78d07dce9220ba9d4a0d81d8abd6d593ef32941b73d7795e1666b0777571bca194d9ac7b6b4394c1b2bde32387ea4ee2f813

                                          • C:\Users\Admin\Downloads\Unconfirmed 618524.crdownload

                                            Filesize

                                            3.3MB

                                            MD5

                                            13aa4bf4f5ed1ac503c69470b1ede5c1

                                            SHA1

                                            c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

                                            SHA256

                                            4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

                                            SHA512

                                            767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

                                          • memory/4468-432-0x00000258795C0000-0x00000258795D6000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/4468-434-0x000002587DAB0000-0x000002587DDDE000-memory.dmp

                                            Filesize

                                            3.2MB

                                          • memory/4468-527-0x000002587B340000-0x000002587B39E000-memory.dmp

                                            Filesize

                                            376KB

                                          • memory/4468-430-0x0000025877900000-0x0000025877A38000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/4468-470-0x000002587F2A0000-0x000002587F2EC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4468-468-0x000002587F360000-0x000002587F412000-memory.dmp

                                            Filesize

                                            712KB

                                          • memory/4468-466-0x000002587CED0000-0x000002587CEE8000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/4468-529-0x000002587B2E0000-0x000002587B2FA000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/4468-467-0x000002587F250000-0x000002587F2A0000-memory.dmp

                                            Filesize

                                            320KB

                                          • memory/4580-632-0x0000000005EA0000-0x000000000628C000-memory.dmp

                                            Filesize

                                            3.9MB

                                          • memory/4580-495-0x0000000005EA0000-0x000000000628C000-memory.dmp

                                            Filesize

                                            3.9MB

                                          • memory/5592-629-0x0000000000920000-0x0000000000C44000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/5592-640-0x000000001C910000-0x000000001C922000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/5592-641-0x000000001C970000-0x000000001C9AC000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/5832-652-0x00000242A0DC0000-0x00000242A0DD2000-memory.dmp

                                            Filesize

                                            72KB