Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2025, 18:18 UTC

General

  • Target

    iamsupersmart.exe

  • Size

    3.1MB

  • MD5

    dda3d825becc420ec452daaff079f6b4

  • SHA1

    903ab84afdb605cb965f087d10c2ec84f6facbc3

  • SHA256

    0492d6d567045871e1ee3c888f02e38848020a07a261615a931782419bd3cbe3

  • SHA512

    4ab3cc498ae01aa2ecf1b351746a7bb35cbae4975a1f24805a070c6421415972c0b443fb92f5f6e61d7362921c86e37e2983fd77f62d61ec229c941cd3d4209e

  • SSDEEP

    49152:Nv+lL26AaNeWgPhlmVqvMQ7XSK5qOH9oGdRjvTHHB72eh2NT:NvuL26AaNeWgPhlmVqkQ7XSKkOd

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

meming-28826.portmap.host:28826

Mutex

6396d47d-b301-4dbd-a1c2-f92271440b4b

Attributes
  • encryption_key

    B323B6B4414256836290414EF6F85AFA580A2B68

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System Notification Tray

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\iamsupersmart.exe
    "C:\Users\Admin\AppData\Local\Temp\iamsupersmart.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4628
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4132
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oIcVIfV4s9Kx.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:4904
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4776
          • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:3024
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OlD9SxNwKavA.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4548
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:1108
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:3628
                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4876
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2508
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Si55dqhwbJYW.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1548
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:3972
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:3064
                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1416
                        • C:\Windows\SYSTEM32\schtasks.exe
                          "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:4292
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ktOdRji7XDHx.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2976
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:1736
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:2184
                            • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                              10⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2504
                              • C:\Windows\SYSTEM32\schtasks.exe
                                "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:992
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xtFzmz0JtqkY.bat" "
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3092
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:2840
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:4776
                                  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                    "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                    12⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:2396
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                      13⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2232
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\auuJTO2IbR6K.bat" "
                                      13⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:3656
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:3768
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:4924
                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                          14⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4020
                                          • C:\Windows\SYSTEM32\schtasks.exe
                                            "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                            15⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:832
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DG8dali1YQzC.bat" "
                                            15⤵
                                              PID:1160
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                16⤵
                                                  PID:5024
                                                • C:\Windows\system32\PING.EXE
                                                  ping -n 10 localhost
                                                  16⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:3936
                                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                  16⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2984
                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                    "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                    17⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3780
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3Ug0PBAYuEvo.bat" "
                                                    17⤵
                                                      PID:4592
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        18⤵
                                                          PID:5012
                                                        • C:\Windows\system32\PING.EXE
                                                          ping -n 10 localhost
                                                          18⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:1412
                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                          18⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3008
                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                            "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                            19⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3540
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tT6ZwAdzVW9d.bat" "
                                                            19⤵
                                                              PID:4976
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                20⤵
                                                                  PID:988
                                                                • C:\Windows\system32\PING.EXE
                                                                  ping -n 10 localhost
                                                                  20⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:4972
                                                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                  20⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2344
                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                    "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                    21⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:4624
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xf63haTDP9YN.bat" "
                                                                    21⤵
                                                                      PID:4232
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        22⤵
                                                                          PID:980
                                                                        • C:\Windows\system32\PING.EXE
                                                                          ping -n 10 localhost
                                                                          22⤵
                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                          • Runs ping.exe
                                                                          PID:2072
                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                          22⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3120
                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                            "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                            23⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:4720
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sbp4Yf5se25E.bat" "
                                                                            23⤵
                                                                              PID:3612
                                                                              • C:\Windows\system32\chcp.com
                                                                                chcp 65001
                                                                                24⤵
                                                                                  PID:2476
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  ping -n 10 localhost
                                                                                  24⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:2792
                                                                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                  24⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3876
                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                    "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                    25⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:3656
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pFXhuHrOYYHQ.bat" "
                                                                                    25⤵
                                                                                      PID:4736
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        26⤵
                                                                                          PID:5024
                                                                                        • C:\Windows\system32\PING.EXE
                                                                                          ping -n 10 localhost
                                                                                          26⤵
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          • Runs ping.exe
                                                                                          PID:4644
                                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                          26⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:3448
                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                            "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                            27⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:4708
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7SNKRfmP8IVe.bat" "
                                                                                            27⤵
                                                                                              PID:4860
                                                                                              • C:\Windows\system32\chcp.com
                                                                                                chcp 65001
                                                                                                28⤵
                                                                                                  PID:4916
                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                  ping -n 10 localhost
                                                                                                  28⤵
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  • Runs ping.exe
                                                                                                  PID:3556
                                                                                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                  28⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2712
                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                    "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                    29⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:3052
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y5QzQgw6fWQe.bat" "
                                                                                                    29⤵
                                                                                                      PID:4608
                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                        chcp 65001
                                                                                                        30⤵
                                                                                                          PID:3984
                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                          ping -n 10 localhost
                                                                                                          30⤵
                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                          • Runs ping.exe
                                                                                                          PID:4276
                                                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                          30⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2192
                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                            "schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                            31⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:1748
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J2K8IGsR06h2.bat" "
                                                                                                            31⤵
                                                                                                              PID:3292
                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                chcp 65001
                                                                                                                32⤵
                                                                                                                  PID:4976
                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                  ping -n 10 localhost
                                                                                                                  32⤵
                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                  • Runs ping.exe
                                                                                                                  PID:992

                                                  Network

                                                  • flag-us
                                                    DNS
                                                    8.8.8.8.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    8.8.8.8.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                    8.8.8.8.in-addr.arpa
                                                    IN PTR
                                                    dnsgoogle
                                                  • flag-us
                                                    DNS
                                                    133.211.185.52.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    133.211.185.52.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    98.250.22.2.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    98.250.22.2.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                    98.250.22.2.in-addr.arpa
                                                    IN PTR
                                                    a2-22-250-98deploystaticakamaitechnologiescom
                                                  • flag-us
                                                    DNS
                                                    134.32.126.40.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    134.32.126.40.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    5.114.82.104.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    5.114.82.104.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                    5.114.82.104.in-addr.arpa
                                                    IN PTR
                                                    a104-82-114-5deploystaticakamaitechnologiescom
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    241.42.69.40.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    241.42.69.40.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    50.23.12.20.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    50.23.12.20.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    83.137.101.95.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    83.137.101.95.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                    83.137.101.95.in-addr.arpa
                                                    IN PTR
                                                    a95-101-137-83deploystaticakamaitechnologiescom
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    214.72.21.2.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    214.72.21.2.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                    214.72.21.2.in-addr.arpa
                                                    IN PTR
                                                    a2-21-72-214deploystaticakamaitechnologiescom
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    24.113.50.184.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    24.113.50.184.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                    24.113.50.184.in-addr.arpa
                                                    IN PTR
                                                    a184-50-113-24deploystaticakamaitechnologiescom
                                                  • flag-us
                                                    DNS
                                                    22.236.111.52.in-addr.arpa
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    22.236.111.52.in-addr.arpa
                                                    IN PTR
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  • flag-us
                                                    DNS
                                                    meming-28826.portmap.host
                                                    Client.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    meming-28826.portmap.host
                                                    IN A
                                                    Response
                                                  No results found
                                                  • 8.8.8.8:53
                                                    8.8.8.8.in-addr.arpa
                                                    dns
                                                    66 B
                                                    90 B
                                                    1
                                                    1

                                                    DNS Request

                                                    8.8.8.8.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    133.211.185.52.in-addr.arpa
                                                    dns
                                                    73 B
                                                    147 B
                                                    1
                                                    1

                                                    DNS Request

                                                    133.211.185.52.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    98.250.22.2.in-addr.arpa
                                                    dns
                                                    70 B
                                                    133 B
                                                    1
                                                    1

                                                    DNS Request

                                                    98.250.22.2.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    134.32.126.40.in-addr.arpa
                                                    dns
                                                    72 B
                                                    158 B
                                                    1
                                                    1

                                                    DNS Request

                                                    134.32.126.40.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    5.114.82.104.in-addr.arpa
                                                    dns
                                                    71 B
                                                    135 B
                                                    1
                                                    1

                                                    DNS Request

                                                    5.114.82.104.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    241.42.69.40.in-addr.arpa
                                                    dns
                                                    71 B
                                                    145 B
                                                    1
                                                    1

                                                    DNS Request

                                                    241.42.69.40.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    50.23.12.20.in-addr.arpa
                                                    dns
                                                    70 B
                                                    156 B
                                                    1
                                                    1

                                                    DNS Request

                                                    50.23.12.20.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    83.137.101.95.in-addr.arpa
                                                    dns
                                                    72 B
                                                    137 B
                                                    1
                                                    1

                                                    DNS Request

                                                    83.137.101.95.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    214.72.21.2.in-addr.arpa
                                                    dns
                                                    70 B
                                                    133 B
                                                    1
                                                    1

                                                    DNS Request

                                                    214.72.21.2.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    24.113.50.184.in-addr.arpa
                                                    dns
                                                    72 B
                                                    137 B
                                                    1
                                                    1

                                                    DNS Request

                                                    24.113.50.184.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    22.236.111.52.in-addr.arpa
                                                    dns
                                                    72 B
                                                    158 B
                                                    1
                                                    1

                                                    DNS Request

                                                    22.236.111.52.in-addr.arpa

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  • 8.8.8.8:53
                                                    meming-28826.portmap.host
                                                    dns
                                                    Client.exe
                                                    71 B
                                                    164 B
                                                    1
                                                    1

                                                    DNS Request

                                                    meming-28826.portmap.host

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    8f0271a63446aef01cf2bfc7b7c7976b

                                                    SHA1

                                                    b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

                                                    SHA256

                                                    da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

                                                    SHA512

                                                    78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

                                                  • C:\Users\Admin\AppData\Local\Temp\3Ug0PBAYuEvo.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    40c3af791077764f5ab701f75069e734

                                                    SHA1

                                                    26ef8e50b605b26d4b6b9e56c2e7df54d4d5e7d8

                                                    SHA256

                                                    52591bb09609d73e87c0e11e511a5b1e160067fddfa72df7c3439bdb9cda610d

                                                    SHA512

                                                    8eb5dbbfe6a89adfcb4ac131944ae1f0c2517da2746668e65668f12d800a7602b4fd45d21e8652bf3ebad3d9737d5d0bf06a999af571c94d6beb3d6ce018fbec

                                                  • C:\Users\Admin\AppData\Local\Temp\7SNKRfmP8IVe.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    697b9445f8924006e3cb8a631fb5d96d

                                                    SHA1

                                                    57731cec49aa38c641275cef82a511ad6a4864ab

                                                    SHA256

                                                    aa6586f224ae7b4e2efac6fe1f52b7b094de6c0c076c3bd81773090c064d9b6b

                                                    SHA512

                                                    73bf24503c6f2269c4a5609daf82976509dd8c9faede033bf4942ae7bcb073b40314e85776a7565e1c7490b73de7d718c49c6392bb231d8dce8f97ca6a1b23fb

                                                  • C:\Users\Admin\AppData\Local\Temp\DG8dali1YQzC.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    8f2a1a154cae0e77c5cc80b7280510ba

                                                    SHA1

                                                    4366f007a7bcf1bc46f2f63d526513727fe1a9f7

                                                    SHA256

                                                    cbfc699e0eac94b73e18f50d6eef0c5284b65a26ebbfc15254de99d1d9636900

                                                    SHA512

                                                    254b36d77c3af43d3216cdd03f4b268ac23bdef2d55668cd2ec596b6eb2077b9a4c309102e9a2e227f35c92ad63e0066a1a26df77d80be2f6bd5ad06e9a33f71

                                                  • C:\Users\Admin\AppData\Local\Temp\J2K8IGsR06h2.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    c0b01a3376165c94a02b64db0e3409a0

                                                    SHA1

                                                    531e664050d198b28cb46cbb583d697480617a44

                                                    SHA256

                                                    7e57fb158c7edb1fe8726a37f646ce4267535fa1d39dc16c591b8be5eae94cf6

                                                    SHA512

                                                    5f169886b9d0a03adf80c93d510f8fd09af1c13e007dd68d3ebdde7c926ebccfbf740a2d283a148a5d7e4956699ab87c91a669cbb2c5e215b6022ef2b06a8bf4

                                                  • C:\Users\Admin\AppData\Local\Temp\OlD9SxNwKavA.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    b32653ca30d0af87c6688c1dd738f6f1

                                                    SHA1

                                                    00dc7aa100464aa5d44c912cc33de4aefc83bcce

                                                    SHA256

                                                    ae61513038782c1f6f550598e780446daaad6c48b0574412a670ce9349d7a96e

                                                    SHA512

                                                    1e4cc912b6ba0c1fed9fc5282a56aa7d53c77a0f3c4564d82d872a285bda6547d89deddf799814c55f7c43f6d47f420f5d49a95d34eff744c29566cd626721fc

                                                  • C:\Users\Admin\AppData\Local\Temp\Sbp4Yf5se25E.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    911e8f0a405b5ac92a965a67f6395d0f

                                                    SHA1

                                                    d3445d064e438756b8fb853b200b87b4f11494da

                                                    SHA256

                                                    67cceb18455f8b81f11f732ae865e35f989d85d0a1c418a4560cdc157f82b758

                                                    SHA512

                                                    4e5b4e8281d4672302ba28f035a5aa76be874d6f2337bea49b634e2d6c11e302561b1157c019df17f335e0dfbae16fd2605385297c040e6ebe15327075a5bb43

                                                  • C:\Users\Admin\AppData\Local\Temp\Si55dqhwbJYW.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    b9c981d5897a0fb2ce757eaf1b6af48e

                                                    SHA1

                                                    7f4a3fb5a36e2f31e43b1ee0327cd883e860df9c

                                                    SHA256

                                                    69e3deabfe2dccb7569e917a9681a7db1bb1b3260bbf52ff002a2670a9c2968e

                                                    SHA512

                                                    01ef554e86eb4eb0ce58d78d91c6ac2fbcf4bb23e634dbf23cff1a00dcfa1cbb9bea3c048d9c1c141a24d006029d65e0d2cae82467e82d758b4eda799a98a180

                                                  • C:\Users\Admin\AppData\Local\Temp\auuJTO2IbR6K.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    cf135e791e569acf215c5666d5b6880f

                                                    SHA1

                                                    026d0e98df8f3ddc1a92b33957af3905da36ae2a

                                                    SHA256

                                                    3fb457e3f5c91eeaa012625caeea59cc89622f29d95b9d8ff82c0af87cedcbe6

                                                    SHA512

                                                    5210f9e24b0bdb3375df4664262de5d2416076898151ab5af036b1e5f3939c9962f58a166aa1fcb5ae3e7e1f261c4f606b5f7b4597ba699c222308f0f39135f9

                                                  • C:\Users\Admin\AppData\Local\Temp\ktOdRji7XDHx.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    c9ec7f8e6e00e86e219393491c62d974

                                                    SHA1

                                                    8d488c15a5ad1c99d3519899ff7ef4d522a95099

                                                    SHA256

                                                    7268fb52c10f693e1f46f99290dec22b8959c266ce474f56691a8040923539b9

                                                    SHA512

                                                    2c342b7f0fcfc15c7e373edca38f24d61fc8ff1d094bc37575834fa6713dc81e1376a505929d447044b3b3c03b82580628f9b145c39d61e1dc0807bb1037e307

                                                  • C:\Users\Admin\AppData\Local\Temp\oIcVIfV4s9Kx.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    8959c5d75077dab60595daa344dcd85a

                                                    SHA1

                                                    e8f65880ebd554ccc1b752665b1fbc9c30d60c71

                                                    SHA256

                                                    ae3b3a034e04c41ff5e62eb6d255c22775e8b9e3f04c9d3b6a8f3dc3487fc602

                                                    SHA512

                                                    0bb7843c8930e6604970d01d9e8d690e092a557adf26f66efbd8a8bd0f1e2312fc74022cbb1c9f859851e1eb18c9043c2a52c8ee845a3dbb0f2a250665446146

                                                  • C:\Users\Admin\AppData\Local\Temp\pFXhuHrOYYHQ.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    cac691d6aff3ec9fde0e5609e911a69c

                                                    SHA1

                                                    071d8242ad96fafaa2d1488cfa7edbed156502d5

                                                    SHA256

                                                    d16fec18971386eea46878162101731233d72b882ea3199ff204ed4d6cfcc8f8

                                                    SHA512

                                                    9532f036a28141c99827fa54437eb08be227490413788757ca3f3ba95f9e6b286f03903879ae2087f6821b81f1f27982bc7905f6dfa97d8f45260df9b190d385

                                                  • C:\Users\Admin\AppData\Local\Temp\tT6ZwAdzVW9d.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    e8c625e05ae6f17a3346187c7226d032

                                                    SHA1

                                                    2515fd5a877b8ac74f27016e132ae87ad6d6d03c

                                                    SHA256

                                                    15f039df5aea6f98f19133b12ecbec0312a1e6a048fc3ae902c6ac239d564c21

                                                    SHA512

                                                    f2db2d69dd633c0b301149c55a2b7eaef59f3ad77fb5a29915f3467fe3e85afbc06f8a2893c6449bb0fd650c441fbc8d77b561f79daa9e2c07d5ba63b0e03f1d

                                                  • C:\Users\Admin\AppData\Local\Temp\xf63haTDP9YN.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    887a47eacf0954f114d62f659d27cff3

                                                    SHA1

                                                    d042db024217309e23756bc343496a5fbf502d02

                                                    SHA256

                                                    7254211c6345587971bea22736105847ac4fcfa14c3e61f914b731efc0d0be2b

                                                    SHA512

                                                    690f611c0a8d74279c77aad74172d33bcaa560776a6d49048aade6ea6fa96239d0c9dcf35b535fbaa399d8693b2480e82e9b67e06e5f63876a2a66fe9ab68c3e

                                                  • C:\Users\Admin\AppData\Local\Temp\xtFzmz0JtqkY.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    ce1764ac43e1c6d925c0a743aeb7576e

                                                    SHA1

                                                    262e3d514666794a46c2d71ee37a99ecbb27c953

                                                    SHA256

                                                    24722f6249124289d6f9e09eb8240023a0a18c84061902c5ff3ee96bf4a5158c

                                                    SHA512

                                                    a144f17bc0787daf2d5317b79ba65032f797aec892d1f7e2af954b972a53e1f38e67eb6e41a81c0433a63500afd58e75345a2d6ad77a887fb736962b47f259a9

                                                  • C:\Users\Admin\AppData\Local\Temp\y5QzQgw6fWQe.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    3a8958b61a73688552bccb683178ca1d

                                                    SHA1

                                                    a931e452390e48d6e6641f5d3fd10826e4447881

                                                    SHA256

                                                    b0f0c61cad2d6097a5de2cd75bbde3d5abb67f1b7e46f595d37e2a4e30f8fa43

                                                    SHA512

                                                    433b809876f48291257e304a8fa08add708dabe0a9bcf02a2c8748ffbbcfe4f7c5648d732fdcb06078601adcd9dcc1ca21bbe1683e94f0bd3ba5e810aa957e87

                                                  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    dda3d825becc420ec452daaff079f6b4

                                                    SHA1

                                                    903ab84afdb605cb965f087d10c2ec84f6facbc3

                                                    SHA256

                                                    0492d6d567045871e1ee3c888f02e38848020a07a261615a931782419bd3cbe3

                                                    SHA512

                                                    4ab3cc498ae01aa2ecf1b351746a7bb35cbae4975a1f24805a070c6421415972c0b443fb92f5f6e61d7362921c86e37e2983fd77f62d61ec229c941cd3d4209e

                                                  • memory/2320-1-0x0000000000470000-0x0000000000796000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2320-0-0x00007FFF26BA3000-0x00007FFF26BA5000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2320-2-0x00007FFF26BA0000-0x00007FFF27661000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2320-10-0x00007FFF26BA0000-0x00007FFF27661000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3980-13-0x000000001C250000-0x000000001C302000-memory.dmp

                                                    Filesize

                                                    712KB

                                                  • memory/3980-12-0x000000001BA40000-0x000000001BA90000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/3980-11-0x00007FFF26BA0000-0x00007FFF27661000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3980-19-0x00007FFF26BA0000-0x00007FFF27661000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3980-9-0x00007FFF26BA0000-0x00007FFF27661000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  We care about your privacy.

                                                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.