Analysis

  • max time kernel
    5s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 14:56

General

  • Target

    New Text Document mod.exe

  • Size

    761KB

  • MD5

    c6040234ee8eaedbe618632818c3b1b3

  • SHA1

    68115f8c3394c782aa6ba663ac78695d2b80bf75

  • SHA256

    bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0

  • SHA512

    a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf

  • SSDEEP

    12288:mMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9mWej:mnsJ39LyjbJkQFMhmC+6GD9I

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Extracted

Family

quasar

Version

1.3.0.0

Botnet

School

C2

gamwtonxristo.ddns.net:1717

Mutex

QSR_MUTEX_M3Vba1npfJg3Ale25C

Attributes
  • encryption_key

    VtojWKM7f1XyCVdB41wL

  • install_name

    comctl32.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Defender Startup Scan

  • subdirectory

    Windows Defender

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

0.tcp.in.ngrok.io:14296

193.161.193.99:20466

Mutex

cc827307-beb6-456e-b5dd-e28a204ebd45

Attributes
  • encryption_key

    93486CAE624EBAD6626412E4A7DC6221B139DAA8

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Extracted

Family

xworm

Version

5.0

C2

137.184.74.73:5000

Mutex

XukSoXxFQFDQJQvq

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    System.exe

aes.plain

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

2.tcp.eu.ngrok.io:19695

Mutex

gonq3XlXWgiz

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 2 IoCs
  • Quasar RAT 4 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 6 IoCs
  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe
    "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"
    1⤵
    • Quasar RAT
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Temp\._cache_New Text Document mod.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_New Text Document mod.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Users\Admin\AppData\Local\Temp\a\ogpayload.exe
        "C:\Users\Admin\AppData\Local\Temp\a\ogpayload.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1220
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "Windows Defender Startup Scan" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\a\ogpayload.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2624
        • C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe
          "C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe"
          4⤵
            PID:964
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "Windows Defender Startup Scan" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender\comctl32.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:3948
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\98XZmpy1bJmm.bat" "
              5⤵
                PID:2300
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  6⤵
                    PID:404
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 10 localhost
                    6⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:844
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 2200
                  5⤵
                  • Program crash
                  PID:3896
            • C:\Users\Admin\AppData\Local\Temp\a\Client-base.exe
              "C:\Users\Admin\AppData\Local\Temp\a\Client-base.exe"
              3⤵
              • Executes dropped EXE
              PID:4400
              • C:\Windows\SYSTEM32\schtasks.exe
                "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                4⤵
                • Scheduled Task/Job: Scheduled Task
                PID:3440
            • C:\Users\Admin\AppData\Local\Temp\a\Servers.exe
              "C:\Users\Admin\AppData\Local\Temp\a\Servers.exe"
              3⤵
                PID:2476
                • C:\Windows\SYSTEM32\schtasks.exe
                  "schtasks" /create /tn "Server Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsLockerZAP\Windows Defender SmartScreen (32 bit).exe" /rl HIGHEST /f
                  4⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:824
                • C:\Users\Admin\AppData\Roaming\WindowsLockerZAP\Windows Defender SmartScreen (32 bit).exe
                  "C:\Users\Admin\AppData\Roaming\WindowsLockerZAP\Windows Defender SmartScreen (32 bit).exe"
                  4⤵
                    PID:2544
                    • C:\Windows\SYSTEM32\schtasks.exe
                      "schtasks" /create /tn "Server Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsLockerZAP\Windows Defender SmartScreen (32 bit).exe" /rl HIGHEST /f
                      5⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:4660
                • C:\Users\Admin\AppData\Local\Temp\a\FXServer.exe
                  "C:\Users\Admin\AppData\Local\Temp\a\FXServer.exe"
                  3⤵
                    PID:3036
                  • C:\Users\Admin\AppData\Local\Temp\a\mac.exe
                    "C:\Users\Admin\AppData\Local\Temp\a\mac.exe"
                    3⤵
                      PID:3872
                    • C:\Users\Admin\AppData\Local\Temp\a\Loader.exe
                      "C:\Users\Admin\AppData\Local\Temp\a\Loader.exe"
                      3⤵
                        PID:4960
                        • C:\Windows\System32\schtasks.exe
                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\ProgramData\System.exe"
                          4⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:2640
                      • C:\Users\Admin\AppData\Local\Temp\a\win.exe
                        "C:\Users\Admin\AppData\Local\Temp\a\win.exe"
                        3⤵
                          PID:2956
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\run.ps1"
                            4⤵
                            • Command and Scripting Interpreter: PowerShell
                            PID:1164
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 1688
                            4⤵
                            • Program crash
                            PID:4680
                        • C:\Users\Admin\AppData\Local\Temp\a\ciscotest.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\ciscotest.exe"
                          3⤵
                            PID:2312
                          • C:\Users\Admin\AppData\Local\Temp\a\Discord.exe
                            "C:\Users\Admin\AppData\Local\Temp\a\Discord.exe"
                            3⤵
                              PID:4928
                          • C:\ProgramData\Synaptics\Synaptics.exe
                            "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                            2⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:3056
                            • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                              "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2532
                        • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                          "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                          1⤵
                          • Checks processor information in registry
                          • Enumerates system info in registry
                          • Suspicious behavior: AddClipboardFormatListener
                          • Suspicious use of SetWindowsHookEx
                          PID:1452
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 964 -ip 964
                          1⤵
                            PID:1500
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2956 -ip 2956
                            1⤵
                              PID:3144

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\Synaptics\Synaptics.exe

                              Filesize

                              761KB

                              MD5

                              c6040234ee8eaedbe618632818c3b1b3

                              SHA1

                              68115f8c3394c782aa6ba663ac78695d2b80bf75

                              SHA256

                              bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0

                              SHA512

                              a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf

                            • C:\Users\Admin\AppData\Local\Temp\._cache_New Text Document mod.exe

                              Filesize

                              8KB

                              MD5

                              69994ff2f00eeca9335ccd502198e05b

                              SHA1

                              b13a15a5bea65b711b835ce8eccd2a699a99cead

                              SHA256

                              2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

                              SHA512

                              ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

                            • C:\Users\Admin\AppData\Local\Temp\2SEr6hjo.xlsm

                              Filesize

                              17KB

                              MD5

                              e566fc53051035e1e6fd0ed1823de0f9

                              SHA1

                              00bc96c48b98676ecd67e81a6f1d7754e4156044

                              SHA256

                              8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

                              SHA512

                              a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

                            • C:\Users\Admin\AppData\Local\Temp\98XZmpy1bJmm.bat

                              Filesize

                              219B

                              MD5

                              71d0c3acbf50b533264329492d967714

                              SHA1

                              adef96ca82af526678fa717128d308db4df1906c

                              SHA256

                              e7fd51c4f3f33ce78b2b7481c1b0bcc17cfe9504431bb6d581afb0cffcf2555b

                              SHA512

                              a7885f203b4d0e17d3d2883293310604ce223dd7ac5182e7e4553cde0ad518c58f0afa28869257280fff082b9ed475d54f63c121676065ec81f85b999807da17

                            • C:\Users\Admin\AppData\Local\Temp\ECA75E00

                              Filesize

                              21KB

                              MD5

                              5ab374f9af7d94646f2abaa46a4782fd

                              SHA1

                              0cad4b0a81aee3d8eeaa9cb022171babb3ebc72b

                              SHA256

                              42f60fd5662fea2c8025e59bf18ef5794e6b32e0066fcfe12ac68ee3d7b9bde7

                              SHA512

                              9ba9f82df4f20d3b6675112c33ac1480a08faaa96f9c5e36a51b461fad449559d6e3ff304e7eeac2584a2c901a006fc8bed18ad4d836a33f2a082e5b5a06fcb7

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yqufxodf.0ek.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\a\02.08.2022.exe

                              Filesize

                              234KB

                              MD5

                              f6cd645f9c34789c5e8371e8b518871c

                              SHA1

                              6eac61bd26cb167b5987d94b369a9034e3979464

                              SHA256

                              1a03d1b4b859424531b81e5c6e0278bad00f1995767d45055727d68de7cf3a3a

                              SHA512

                              335931727d7e1c2d2ece2e8a505feb9ef17413ea82af883ab80028a83007ffc55823888db842938a9ea5b340b0779c79b608d0c8afbb7c82056fe5f3d75e3131

                            • C:\Users\Admin\AppData\Local\Temp\a\Client-base.exe

                              Filesize

                              3.1MB

                              MD5

                              21ce4cd2ce246c86222b57b93cdc92bd

                              SHA1

                              9dc24ad846b2d9db64e5bbea1977e23bb185d224

                              SHA256

                              273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678

                              SHA512

                              ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6

                            • C:\Users\Admin\AppData\Local\Temp\a\Discord.exe

                              Filesize

                              45KB

                              MD5

                              9dcd35fe3cafec7a25aa3cdd08ded1f4

                              SHA1

                              13f199bfd3f8b2925536144a1b42424675d7c8e4

                              SHA256

                              ce4f85d935fe68a1c92469367b945f26c40c71feb656ef844c30a5483dc5c0be

                              SHA512

                              9a4293b2f2d0f1b86f116c5560a238ea5910454d5235aedb60695254d7cc2c3b1cd9dd1b890b9f94249ee0ca25a9fb457a66ca52398907a6d5775b0d2e2b70d3

                            • C:\Users\Admin\AppData\Local\Temp\a\FXServer.exe

                              Filesize

                              264KB

                              MD5

                              4ed8aa9db458acc0d65765ec16bb1346

                              SHA1

                              bc3434dee8225a7b1e18ffa4654a3de098dfc11c

                              SHA256

                              c80871c2c51b513894b20774fc1da5c7c0b46fb57d5085ef08eb2ebd02c11dea

                              SHA512

                              4918ab97ef2ac6573ae5e30705c5d4b411953e71c04109f57b61ca2fdbaec180578e03f940f16cd42be2d305cad20d3a5f8451ea0940cde8288b638502ab4cfb

                            • C:\Users\Admin\AppData\Local\Temp\a\Loader.exe

                              Filesize

                              35KB

                              MD5

                              c95261eab6c76d4e65624919ccb13cd7

                              SHA1

                              9daad5cc07c35f96061ffec077454c99508f2532

                              SHA256

                              6a8a6457a46f87a5d42d578b4807bee42305920cbf1bfb0402d8f3ae0c91ae30

                              SHA512

                              92acd72ccee4ed8d7f66abb2e1b0520f76310d13634578aa46ce28229316ecbd6603bc6b9febe0fa91852c589f043fc3870229a921ac27020feb79f6b0dc4417

                            • C:\Users\Admin\AppData\Local\Temp\a\Servers.exe

                              Filesize

                              3.1MB

                              MD5

                              ff8c68c60f122eb7f8473106d4bcf26c

                              SHA1

                              0efa03e7412e7e15868c93604372d2b2e6b80662

                              SHA256

                              5ff2becf2c56500cb71898f661c863e647a96af33db38d84d7921dc7dbf4f642

                              SHA512

                              ab92ef844a015c3fcbfba313872b922bff54184b25623ed34f4829bd66a95af081cdeefd35425a4d3b9d9085ccf8c25045cf6093d74a5c8c35012c1b7546688e

                            • C:\Users\Admin\AppData\Local\Temp\a\ciscotest.exe

                              Filesize

                              72KB

                              MD5

                              0076324b407d0783137badc7600327a1

                              SHA1

                              29e6cb1f18a43b8e293539d50272898a8befa341

                              SHA256

                              55c727a9806966ec83f22702c1101c855a004c5658cf60e3c3499f895b994583

                              SHA512

                              96b08dd1a7abccefabe3568637c17f6ae2c04349488db8dc05b9dcaaaef6a041c36fa4a1f1841096d6622b9775099c7c7eb1497c57581cb444afeb481563cae4

                            • C:\Users\Admin\AppData\Local\Temp\a\mac.exe

                              Filesize

                              28KB

                              MD5

                              2d3c280f66396febc80ee3024da80f8e

                              SHA1

                              70bda33b1a7521800a2c620cda4cf4b27487fa28

                              SHA256

                              a7e4b2fd9cdb85f383f78ffe973776d40262d53727d0c58ea92c200ec1a7bd6d

                              SHA512

                              26b38d618238336e36fd79f1e63b7c59490ca3e5616306da3ae3e0907415a1746aac638930e01f93529b16f3fe7968d48f5557d6bf32385f82a7bf1f944cf4ad

                            • C:\Users\Admin\AppData\Local\Temp\a\ogpayload.exe

                              Filesize

                              507KB

                              MD5

                              4e7b96fe3160ff171e8e334c66c3205c

                              SHA1

                              ad9dbdfb52d3c2ee9a57fe837605ec233db43a7f

                              SHA256

                              e698a786c4dcd964e54903a98bfaa0638ce8f52e02658f1223805c6e3b1ca83c

                              SHA512

                              2e8968ce87a1670ff6b49f92beaee8c7d1b2fd94bc216507e255bb2a54d4073fbbd20b39e188fd40eb049da59bf27f9aed729c390525232e4a904e71e10f9b48

                            • C:\Users\Admin\AppData\Local\Temp\a\win.exe

                              Filesize

                              6KB

                              MD5

                              f391621b64e5287aa53ba37dfc327138

                              SHA1

                              5b82777d9cba4567dc1a111fd93e3ef7639ac7af

                              SHA256

                              7f7488259f1de363018c36626ad42f8d2f9671f91542cb21eb5f1d7fbf5c20f6

                              SHA512

                              b26f78c81db0ae7f7e294b56416ff136d747b76d1009df928401b0e4eebc6774acc4cb5ff8dd55c52edd8370ab154ce60fa9bb0bac2752cc769f47c83b4eb254

                            • C:\Users\Admin\AppData\Local\Temp\run.ps1

                              Filesize

                              165B

                              MD5

                              288c58f3580883f4312443d845fd0323

                              SHA1

                              00932e3b83213e92770f07020df5c849728a3f1a

                              SHA256

                              c942c6f38a8b4fe90b563918279596c5c0c0ae86f2283720bccb650c87dd7420

                              SHA512

                              5096c123a16ce023354561da280c44f3e53f6b702679223ec20fd6fb4586db152e85ce581d7dcc54535e2ce6c9e3e3edc6c17d61585b8431583cd099bd7fc6e9

                            • memory/964-291-0x00000000064A0000-0x00000000064AA000-memory.dmp

                              Filesize

                              40KB

                            • memory/964-291-0x00000000064A0000-0x00000000064AA000-memory.dmp

                              Filesize

                              40KB

                            • memory/1164-416-0x00000000074B0000-0x0000000007B2A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/1164-412-0x0000000005DB0000-0x0000000005DFC000-memory.dmp

                              Filesize

                              304KB

                            • memory/1164-410-0x0000000005870000-0x0000000005BC4000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1164-417-0x00000000062B0000-0x00000000062CA000-memory.dmp

                              Filesize

                              104KB

                            • memory/1164-400-0x00000000054A0000-0x0000000005506000-memory.dmp

                              Filesize

                              408KB

                            • memory/1164-412-0x0000000005DB0000-0x0000000005DFC000-memory.dmp

                              Filesize

                              304KB

                            • memory/1164-396-0x0000000004E70000-0x0000000005498000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/1164-411-0x0000000005D90000-0x0000000005DAE000-memory.dmp

                              Filesize

                              120KB

                            • memory/1164-399-0x0000000004DC0000-0x0000000004DE2000-memory.dmp

                              Filesize

                              136KB

                            • memory/1164-410-0x0000000005870000-0x0000000005BC4000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1164-399-0x0000000004DC0000-0x0000000004DE2000-memory.dmp

                              Filesize

                              136KB

                            • memory/1164-417-0x00000000062B0000-0x00000000062CA000-memory.dmp

                              Filesize

                              104KB

                            • memory/1164-387-0x00000000047C0000-0x00000000047F6000-memory.dmp

                              Filesize

                              216KB

                            • memory/1164-411-0x0000000005D90000-0x0000000005DAE000-memory.dmp

                              Filesize

                              120KB

                            • memory/1164-387-0x00000000047C0000-0x00000000047F6000-memory.dmp

                              Filesize

                              216KB

                            • memory/1164-396-0x0000000004E70000-0x0000000005498000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/1164-400-0x00000000054A0000-0x0000000005506000-memory.dmp

                              Filesize

                              408KB

                            • memory/1164-416-0x00000000074B0000-0x0000000007B2A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/1220-216-0x0000000005600000-0x0000000005666000-memory.dmp

                              Filesize

                              408KB

                            • memory/1220-211-0x0000000005D20000-0x00000000062C4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/1220-211-0x0000000005D20000-0x00000000062C4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/1220-216-0x0000000005600000-0x0000000005666000-memory.dmp

                              Filesize

                              408KB

                            • memory/1220-237-0x00000000062F0000-0x0000000006302000-memory.dmp

                              Filesize

                              72KB

                            • memory/1220-253-0x0000000006830000-0x000000000686C000-memory.dmp

                              Filesize

                              240KB

                            • memory/1220-237-0x00000000062F0000-0x0000000006302000-memory.dmp

                              Filesize

                              72KB

                            • memory/1220-212-0x0000000005770000-0x0000000005802000-memory.dmp

                              Filesize

                              584KB

                            • memory/1220-253-0x0000000006830000-0x000000000686C000-memory.dmp

                              Filesize

                              240KB

                            • memory/1220-212-0x0000000005770000-0x0000000005802000-memory.dmp

                              Filesize

                              584KB

                            • memory/1220-210-0x0000000000C60000-0x0000000000CE6000-memory.dmp

                              Filesize

                              536KB

                            • memory/1220-210-0x0000000000C60000-0x0000000000CE6000-memory.dmp

                              Filesize

                              536KB

                            • memory/1368-129-0x00007FF97C043000-0x00007FF97C045000-memory.dmp

                              Filesize

                              8KB

                            • memory/1368-130-0x0000000000C30000-0x0000000000C38000-memory.dmp

                              Filesize

                              32KB

                            • memory/1368-384-0x00007FF97C043000-0x00007FF97C045000-memory.dmp

                              Filesize

                              8KB

                            • memory/1368-384-0x00007FF97C043000-0x00007FF97C045000-memory.dmp

                              Filesize

                              8KB

                            • memory/1368-130-0x0000000000C30000-0x0000000000C38000-memory.dmp

                              Filesize

                              32KB

                            • memory/1368-129-0x00007FF97C043000-0x00007FF97C045000-memory.dmp

                              Filesize

                              8KB

                            • memory/1452-198-0x00007FF957CB0000-0x00007FF957CC0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-192-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-194-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-193-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-208-0x00007FF957CB0000-0x00007FF957CC0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-196-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-195-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-208-0x00007FF957CB0000-0x00007FF957CC0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-192-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-198-0x00007FF957CB0000-0x00007FF957CC0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-194-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-193-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-196-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/1452-195-0x00007FF95A230000-0x00007FF95A240000-memory.dmp

                              Filesize

                              64KB

                            • memory/2476-308-0x0000000000820000-0x0000000000B44000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2476-308-0x0000000000820000-0x0000000000B44000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/2956-379-0x00000000006D0000-0x00000000006D8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2956-379-0x00000000006D0000-0x00000000006D8000-memory.dmp

                              Filesize

                              32KB

                            • memory/3036-317-0x00007FF6FDE00000-0x00007FF6FDE4C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3036-317-0x00007FF6FDE00000-0x00007FF6FDE4C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3056-131-0x0000000000540000-0x0000000000541000-memory.dmp

                              Filesize

                              4KB

                            • memory/3056-414-0x0000000000540000-0x0000000000541000-memory.dmp

                              Filesize

                              4KB

                            • memory/3056-413-0x0000000000400000-0x00000000004C4000-memory.dmp

                              Filesize

                              784KB

                            • memory/3056-131-0x0000000000540000-0x0000000000541000-memory.dmp

                              Filesize

                              4KB

                            • memory/3056-414-0x0000000000540000-0x0000000000541000-memory.dmp

                              Filesize

                              4KB

                            • memory/3056-413-0x0000000000400000-0x00000000004C4000-memory.dmp

                              Filesize

                              784KB

                            • memory/3872-340-0x0000000000080000-0x000000000008E000-memory.dmp

                              Filesize

                              56KB

                            • memory/3872-368-0x000000001C500000-0x000000001C52A000-memory.dmp

                              Filesize

                              168KB

                            • memory/3872-357-0x00000000022E0000-0x0000000002302000-memory.dmp

                              Filesize

                              136KB

                            • memory/3872-340-0x0000000000080000-0x000000000008E000-memory.dmp

                              Filesize

                              56KB

                            • memory/3872-369-0x000000001C500000-0x000000001C524000-memory.dmp

                              Filesize

                              144KB

                            • memory/3872-357-0x00000000022E0000-0x0000000002302000-memory.dmp

                              Filesize

                              136KB

                            • memory/3872-369-0x000000001C500000-0x000000001C524000-memory.dmp

                              Filesize

                              144KB

                            • memory/3872-368-0x000000001C500000-0x000000001C52A000-memory.dmp

                              Filesize

                              168KB

                            • memory/4400-282-0x000000001BE40000-0x000000001BE90000-memory.dmp

                              Filesize

                              320KB

                            • memory/4400-255-0x0000000000780000-0x0000000000AA4000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/4400-288-0x000000001BF50000-0x000000001C002000-memory.dmp

                              Filesize

                              712KB

                            • memory/4400-288-0x000000001BF50000-0x000000001C002000-memory.dmp

                              Filesize

                              712KB

                            • memory/4400-282-0x000000001BE40000-0x000000001BE90000-memory.dmp

                              Filesize

                              320KB

                            • memory/4400-255-0x0000000000780000-0x0000000000AA4000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/4928-0-0x0000000002360000-0x0000000002361000-memory.dmp

                              Filesize

                              4KB

                            • memory/4928-398-0x00000000002B0000-0x00000000002C2000-memory.dmp

                              Filesize

                              72KB

                            • memory/4928-127-0x0000000000400000-0x00000000004C4000-memory.dmp

                              Filesize

                              784KB

                            • memory/4928-398-0x00000000002B0000-0x00000000002C2000-memory.dmp

                              Filesize

                              72KB

                            • memory/4928-0-0x0000000002360000-0x0000000002361000-memory.dmp

                              Filesize

                              4KB

                            • memory/4928-127-0x0000000000400000-0x00000000004C4000-memory.dmp

                              Filesize

                              784KB

                            • memory/4960-352-0x0000000000EE0000-0x0000000000EF0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4960-352-0x0000000000EE0000-0x0000000000EF0000-memory.dmp

                              Filesize

                              64KB