Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 07:53 UTC

General

  • Target

    eb508330fac21c2893627a6dcdd21f7112ea8a5b574d56e6624c93c14224443c.exe

  • Size

    4.2MB

  • MD5

    2acdb4828e203e87ea6087ca6e49bf98

  • SHA1

    90c63f344377a1797f925de778af87543201555c

  • SHA256

    eb508330fac21c2893627a6dcdd21f7112ea8a5b574d56e6624c93c14224443c

  • SHA512

    fdf8b962ad26b8bb4d9843ba40471718d07fe4cd18781feada5c6ebe20bb868af7f23ed885433307e357eaec175011a556a382076392a271b4e6f594608a656c

  • SSDEEP

    98304:+s1KgtX6PUl913lbPQnPAQTys2gRcwRkvQ+YcQpDEoRFqdvIR:sBUr117Qdys2g2wCucwR8vIR

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 14 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb508330fac21c2893627a6dcdd21f7112ea8a5b574d56e6624c93c14224443c.exe
    "C:\Users\Admin\AppData\Local\Temp\eb508330fac21c2893627a6dcdd21f7112ea8a5b574d56e6624c93c14224443c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1100
    • C:\Users\Admin\AppData\Local\Temp\eb508330fac21c2893627a6dcdd21f7112ea8a5b574d56e6624c93c14224443c.exe
      "C:\Users\Admin\AppData\Local\Temp\eb508330fac21c2893627a6dcdd21f7112ea8a5b574d56e6624c93c14224443c.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5104
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:836
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2768
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:636
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4280
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3224
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:1464
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:3724
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4348
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2332
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4712
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:2448
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4572
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3680
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:4960
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 924
          3⤵
          • Program crash
          PID:5104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2772 -ip 2772
      1⤵
        PID:5048
      • C:\Windows\windefender.exe
        C:\Windows\windefender.exe
        1⤵
        • Executes dropped EXE
        PID:2196

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        75.159.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        75.159.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        71.121.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        71.121.18.2.in-addr.arpa
        IN PTR
        Response
        71.121.18.2.in-addr.arpa
        IN PTR
        a2-18-121-71deploystaticakamaitechnologiescom
      • flag-us
        DNS
        146.78.124.51.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        146.78.124.51.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        9.228.82.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        9.228.82.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        26.35.223.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.35.223.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        59.128.231.4.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        59.128.231.4.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        29.81.57.23.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        29.81.57.23.in-addr.arpa
        IN PTR
        Response
        29.81.57.23.in-addr.arpa
        IN PTR
        a23-57-81-29deploystaticakamaitechnologiescom
      • flag-us
        DNS
        108.211.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        108.211.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        50.23.12.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        50.23.12.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        15.164.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        15.164.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        2.136.104.51.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        2.136.104.51.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        126.177.238.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        126.177.238.8.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        tse1.mm.bing.net
        Remote address:
        8.8.8.8:53
        Request
        tse1.mm.bing.net
        IN A
        Response
        tse1.mm.bing.net
        IN CNAME
        mm-mm.bing.net.trafficmanager.net
        mm-mm.bing.net.trafficmanager.net
        IN CNAME
        dual-a-0001.a-msedge.net
        dual-a-0001.a-msedge.net
        IN A
        204.79.197.200
        dual-a-0001.a-msedge.net
        IN A
        13.107.21.200
      • flag-us
        GET
        https://tse1.mm.bing.net/th?id=OADD2.10239317301329_158N7EC87NQCHAYN7&pid=21.2&w=1920&h=1080&c=4
        Remote address:
        204.79.197.200:443
        Request
        GET /th?id=OADD2.10239317301329_158N7EC87NQCHAYN7&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
        host: tse1.mm.bing.net
        accept: */*
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-length: 341990
        content-type: image/jpeg
        x-cache: TCP_HIT
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 0404A5643B264B99BB56CB7243BD177A Ref B: BRU30EDGE0606 Ref C: 2023-10-13T14:38:30Z
        date: Fri, 13 Oct 2023 14:38:30 GMT
      • flag-us
        GET
        https://tse1.mm.bing.net/th?id=OADD2.10239317301690_19HMV4L26ZBX2EBOQ&pid=21.2&w=1080&h=1920&c=4
        Remote address:
        204.79.197.200:443
        Request
        GET /th?id=OADD2.10239317301690_19HMV4L26ZBX2EBOQ&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
        host: tse1.mm.bing.net
        accept: */*
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-length: 501734
        content-type: image/jpeg
        x-cache: TCP_HIT
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: F27C5B9A417D4A708494B17F892504FD Ref B: BRU30EDGE0606 Ref C: 2023-10-13T14:38:30Z
        date: Fri, 13 Oct 2023 14:38:30 GMT
      • flag-us
        GET
        https://tse1.mm.bing.net/th?id=OADD2.10239317301623_1VUR2KBQVO06G93HJ&pid=21.2&w=1080&h=1920&c=4
        Remote address:
        204.79.197.200:443
        Request
        GET /th?id=OADD2.10239317301623_1VUR2KBQVO06G93HJ&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
        host: tse1.mm.bing.net
        accept: */*
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-length: 238322
        content-type: image/jpeg
        x-cache: TCP_HIT
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: DB24086ED2B740F38CA8F994D75DC214 Ref B: BRU30EDGE0606 Ref C: 2023-10-13T14:38:30Z
        date: Fri, 13 Oct 2023 14:38:30 GMT
      • flag-us
        GET
        https://tse1.mm.bing.net/th?id=OADD2.10239317301214_1PJAY06J5HO947G63&pid=21.2&w=1920&h=1080&c=4
        Remote address:
        204.79.197.200:443
        Request
        GET /th?id=OADD2.10239317301214_1PJAY06J5HO947G63&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
        host: tse1.mm.bing.net
        accept: */*
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-length: 202205
        content-type: image/jpeg
        x-cache: TCP_HIT
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 8649AEC03FD545AF8B244F205CE63422 Ref B: BRU30EDGE0606 Ref C: 2023-10-13T14:38:30Z
        date: Fri, 13 Oct 2023 14:38:30 GMT
      • flag-us
        GET
        https://tse1.mm.bing.net/th?id=OADD2.10239317301281_10M090P7WEZJN7Y3I&pid=21.2&w=1920&h=1080&c=4
        Remote address:
        204.79.197.200:443
        Request
        GET /th?id=OADD2.10239317301281_10M090P7WEZJN7Y3I&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
        host: tse1.mm.bing.net
        accept: */*
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-length: 365744
        content-type: image/jpeg
        x-cache: TCP_HIT
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: A805482909FF4746BB1AE4F11E17864D Ref B: BRU30EDGE0606 Ref C: 2023-10-13T14:38:30Z
        date: Fri, 13 Oct 2023 14:38:30 GMT
      • flag-us
        GET
        https://tse1.mm.bing.net/th?id=OADD2.10239317301738_1X6L2VINPQJNWJA05&pid=21.2&w=1080&h=1920&c=4
        Remote address:
        204.79.197.200:443
        Request
        GET /th?id=OADD2.10239317301738_1X6L2VINPQJNWJA05&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
        host: tse1.mm.bing.net
        accept: */*
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-length: 526983
        content-type: image/jpeg
        x-cache: TCP_HIT
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 0FCAB1E9C556480C8C689A5E75FE2D56 Ref B: BRU30EDGE0606 Ref C: 2023-10-13T14:38:34Z
        date: Fri, 13 Oct 2023 14:38:34 GMT
      • flag-us
        DNS
        11.227.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        11.227.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        135.1.85.104.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        135.1.85.104.in-addr.arpa
        IN PTR
        Response
        135.1.85.104.in-addr.arpa
        IN PTR
        a104-85-1-135deploystaticakamaitechnologiescom
      • flag-us
        DNS
        119.110.54.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        119.110.54.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        1.202.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        1.202.248.87.in-addr.arpa
        IN PTR
        Response
        1.202.248.87.in-addr.arpa
        IN PTR
        https-87-248-202-1amsllnwnet
      • flag-us
        DNS
        2ac88b11-2447-4667-990a-5f0d64a15c3a.uuid.zaoshang.ru
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        2ac88b11-2447-4667-990a-5f0d64a15c3a.uuid.zaoshang.ru
        IN TXT
        Response
      • flag-us
        DNS
        254.22.238.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        254.22.238.8.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        89.65.42.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        89.65.42.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        stun2.l.google.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        stun2.l.google.com
        IN A
        Response
        stun2.l.google.com
        IN A
        74.125.24.127
      • flag-us
        DNS
        server6.zaoshang.ru
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        server6.zaoshang.ru
        IN A
        Response
        server6.zaoshang.ru
        IN A
        185.82.216.48
      • flag-us
        DNS
        cdn.discordapp.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        cdn.discordapp.com
        IN A
        Response
        cdn.discordapp.com
        IN A
        162.159.130.233
        cdn.discordapp.com
        IN A
        162.159.135.233
        cdn.discordapp.com
        IN A
        162.159.133.233
        cdn.discordapp.com
        IN A
        162.159.129.233
        cdn.discordapp.com
        IN A
        162.159.134.233
      • flag-us
        DNS
        127.24.125.74.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        127.24.125.74.in-addr.arpa
        IN PTR
        Response
        127.24.125.74.in-addr.arpa
        IN PTR
        sf-in-f1271e100net
      • flag-us
        DNS
        127.24.125.74.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        127.24.125.74.in-addr.arpa
        IN PTR
        Response
        127.24.125.74.in-addr.arpa
        IN PTR
        sf-in-f1271e100net
      • flag-us
        DNS
        walkinglate.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        walkinglate.com
        IN A
        Response
        walkinglate.com
        IN A
        188.114.96.0
        walkinglate.com
        IN A
        188.114.97.0
      • flag-us
        DNS
        233.130.159.162.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        233.130.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        233.130.159.162.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        233.130.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        48.216.82.185.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        48.216.82.185.in-addr.arpa
        IN PTR
        Response
        48.216.82.185.in-addr.arpa
        IN PTR
        davidcom
      • flag-us
        DNS
        48.216.82.185.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        48.216.82.185.in-addr.arpa
        IN PTR
        Response
        48.216.82.185.in-addr.arpa
        IN PTR
        davidcom
      • flag-us
        DNS
        0.96.114.188.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.96.114.188.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        0.96.114.188.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.96.114.188.in-addr.arpa
        IN PTR
        Response
      • 204.79.197.200:443
        tse1.mm.bing.net
        tls, http2
        1.2kB
        8.3kB
        16
        14
      • 204.79.197.200:443
        tse1.mm.bing.net
        tls, http2
        1.2kB
        8.3kB
        16
        14
      • 204.79.197.200:443
        https://tse1.mm.bing.net/th?id=OADD2.10239317301738_1X6L2VINPQJNWJA05&pid=21.2&w=1080&h=1920&c=4
        tls, http2
        76.7kB
        2.3MB
        1640
        1634

        HTTP Request

        GET https://tse1.mm.bing.net/th?id=OADD2.10239317301329_158N7EC87NQCHAYN7&pid=21.2&w=1920&h=1080&c=4

        HTTP Request

        GET https://tse1.mm.bing.net/th?id=OADD2.10239317301690_19HMV4L26ZBX2EBOQ&pid=21.2&w=1080&h=1920&c=4

        HTTP Request

        GET https://tse1.mm.bing.net/th?id=OADD2.10239317301623_1VUR2KBQVO06G93HJ&pid=21.2&w=1080&h=1920&c=4

        HTTP Request

        GET https://tse1.mm.bing.net/th?id=OADD2.10239317301214_1PJAY06J5HO947G63&pid=21.2&w=1920&h=1080&c=4

        HTTP Request

        GET https://tse1.mm.bing.net/th?id=OADD2.10239317301281_10M090P7WEZJN7Y3I&pid=21.2&w=1920&h=1080&c=4

        HTTP Response

        200

        HTTP Response

        200

        HTTP Response

        200

        HTTP Response

        200

        HTTP Response

        200

        HTTP Request

        GET https://tse1.mm.bing.net/th?id=OADD2.10239317301738_1X6L2VINPQJNWJA05&pid=21.2&w=1080&h=1920&c=4

        HTTP Response

        200
      • 204.79.197.200:443
        tse1.mm.bing.net
        tls, http2
        1.2kB
        8.3kB
        16
        14
      • 204.79.197.200:443
        tse1.mm.bing.net
        tls, http2
        1.2kB
        8.3kB
        16
        14
      • 162.159.130.233:443
        cdn.discordapp.com
        tls
        csrss.exe
        1.1kB
        4.7kB
        12
        12
      • 185.82.216.48:443
        server6.zaoshang.ru
        tls
        csrss.exe
        1.8kB
        8.8kB
        14
        16
      • 188.114.96.0:443
        walkinglate.com
        tls
        csrss.exe
        76.9kB
        2.2MB
        1334
        1617
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        75.159.190.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        75.159.190.20.in-addr.arpa

      • 8.8.8.8:53
        71.121.18.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        71.121.18.2.in-addr.arpa

      • 8.8.8.8:53
        146.78.124.51.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        146.78.124.51.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        9.228.82.20.in-addr.arpa
        dns
        70 B
        156 B
        1
        1

        DNS Request

        9.228.82.20.in-addr.arpa

      • 8.8.8.8:53
        26.35.223.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        26.35.223.20.in-addr.arpa

      • 8.8.8.8:53
        59.128.231.4.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        59.128.231.4.in-addr.arpa

      • 8.8.8.8:53
        29.81.57.23.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        29.81.57.23.in-addr.arpa

      • 8.8.8.8:53
        108.211.229.192.in-addr.arpa
        dns
        74 B
        145 B
        1
        1

        DNS Request

        108.211.229.192.in-addr.arpa

      • 8.8.8.8:53
        50.23.12.20.in-addr.arpa
        dns
        70 B
        156 B
        1
        1

        DNS Request

        50.23.12.20.in-addr.arpa

      • 8.8.8.8:53
        15.164.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        15.164.165.52.in-addr.arpa

      • 8.8.8.8:53
        2.136.104.51.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        2.136.104.51.in-addr.arpa

      • 8.8.8.8:53
        126.177.238.8.in-addr.arpa
        dns
        72 B
        126 B
        1
        1

        DNS Request

        126.177.238.8.in-addr.arpa

      • 8.8.8.8:53
        tse1.mm.bing.net
        dns
        62 B
        173 B
        1
        1

        DNS Request

        tse1.mm.bing.net

        DNS Response

        204.79.197.200
        13.107.21.200

      • 8.8.8.8:53
        11.227.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        11.227.111.52.in-addr.arpa

      • 8.8.8.8:53
        135.1.85.104.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        135.1.85.104.in-addr.arpa

      • 8.8.8.8:53
        119.110.54.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        119.110.54.20.in-addr.arpa

      • 8.8.8.8:53
        1.202.248.87.in-addr.arpa
        dns
        71 B
        116 B
        1
        1

        DNS Request

        1.202.248.87.in-addr.arpa

      • 8.8.8.8:53
        2ac88b11-2447-4667-990a-5f0d64a15c3a.uuid.zaoshang.ru
        dns
        csrss.exe
        99 B
        156 B
        1
        1

        DNS Request

        2ac88b11-2447-4667-990a-5f0d64a15c3a.uuid.zaoshang.ru

      • 8.8.8.8:53
        254.22.238.8.in-addr.arpa
        dns
        71 B
        125 B
        1
        1

        DNS Request

        254.22.238.8.in-addr.arpa

      • 8.8.8.8:53
        89.65.42.20.in-addr.arpa
        dns
        70 B
        156 B
        1
        1

        DNS Request

        89.65.42.20.in-addr.arpa

      • 8.8.8.8:53
        stun2.l.google.com
        dns
        csrss.exe
        64 B
        80 B
        1
        1

        DNS Request

        stun2.l.google.com

        DNS Response

        74.125.24.127

      • 8.8.8.8:53
        server6.zaoshang.ru
        dns
        csrss.exe
        65 B
        81 B
        1
        1

        DNS Request

        server6.zaoshang.ru

        DNS Response

        185.82.216.48

      • 8.8.8.8:53
        cdn.discordapp.com
        dns
        csrss.exe
        64 B
        144 B
        1
        1

        DNS Request

        cdn.discordapp.com

        DNS Response

        162.159.130.233
        162.159.135.233
        162.159.133.233
        162.159.129.233
        162.159.134.233

      • 74.125.24.127:19302
        stun2.l.google.com
        csrss.exe
        96 B
        120 B
        2
        2
      • 8.8.8.8:53
        127.24.125.74.in-addr.arpa
        dns
        144 B
        212 B
        2
        2

        DNS Request

        127.24.125.74.in-addr.arpa

        DNS Request

        127.24.125.74.in-addr.arpa

      • 8.8.8.8:53
        walkinglate.com
        dns
        csrss.exe
        61 B
        93 B
        1
        1

        DNS Request

        walkinglate.com

        DNS Response

        188.114.96.0
        188.114.97.0

      • 8.8.8.8:53
        233.130.159.162.in-addr.arpa
        dns
        148 B
        272 B
        2
        2

        DNS Request

        233.130.159.162.in-addr.arpa

        DNS Request

        233.130.159.162.in-addr.arpa

      • 8.8.8.8:53
        48.216.82.185.in-addr.arpa
        dns
        144 B
        190 B
        2
        2

        DNS Request

        48.216.82.185.in-addr.arpa

        DNS Request

        48.216.82.185.in-addr.arpa

      • 8.8.8.8:53
        0.96.114.188.in-addr.arpa
        dns
        142 B
        266 B
        2
        2

        DNS Request

        0.96.114.188.in-addr.arpa

        DNS Request

        0.96.114.188.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zvekru3i.cqm.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        968cb9309758126772781b83adb8a28f

        SHA1

        8da30e71accf186b2ba11da1797cf67f8f78b47c

        SHA256

        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

        SHA512

        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        fb4b8d3b8b56773621441014a17fc2f7

        SHA1

        1757449762420f715e2cabbaa46d248ffe15fc75

        SHA256

        f2907484859242472f9f9a5c8ca084874e826c049d6806b9dfe30d91851ad24e

        SHA512

        e34f2d48c77038b660b971dd7ba3ecbcc35465c1ff0ae2fd73ca8053afd31096fc34c0e33fe05af9d5e6c3c6451379aa5753ffb793eaea8606ca9c1e03e1cb09

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        1c814aa0fc4750875739e79da1e5d1f0

        SHA1

        9f68e07a8cc235a12fd839b00caae41a4f0f7889

        SHA256

        4b5479f22ef3accbd6d2fb01b8cf6b598af57d35a953e6da2eb1d15fb0df2b1f

        SHA512

        e83a3c8eb0ca622ccf9f7ee763aa53200692c5628877788522d693321922c3025505ea86a32576739b296bb25e306ffffd56eea3e5cde8dfcfa1807b5962ad0c

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        d38b7acd5df857d2e31c876a57c0cd15

        SHA1

        40152d4d2aee73aa9a3fc190b91422f50dbfb1e9

        SHA256

        0dded9b03b0f565230cbdeab633ed323cd9c542840a0d9daa3356cd5a2d152e5

        SHA512

        425814185ee87c0418cf6d526ea4f30910f5515b0285e6815ea160bc87cb24d353d96ab2e3f659c7fe137a13d97b0582240c24fd61c6045b1654bf710ab374da

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        a000d3f05d64c54d7e5960b25eeb589c

        SHA1

        1ce3afbcae5109829e5b6f40ef33c80399aff1a7

        SHA256

        08bfbf3bf821832dbf04b264d13de1eeaeda041ca3e4f3a41174af3298c5231f

        SHA512

        4d6341c570211380ef3a338a398f30fb88a28a0b682598a59670df8c4fe3b14c32470f66de21ec9b734191fe7f440f2274bbeeea393346ca2c246deb6b2df314

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        f9188e0aba85127b297d561d198c33cc

        SHA1

        dadcd6be77e7b15b65c239afdb503f0671963365

        SHA256

        f919bc56c3272d84f3493b69ab7e6268420951fb2f591ecf43754601fd73fb1c

        SHA512

        0d40b445932128200dd1ef87219df760e0d7d00fef8db5fefef81ce81f1d60b0fbbe1755db03cedf74ce42f7d29863b2ed5cbdc4b865a829e43d62df0610b970

      • C:\Windows\rss\csrss.exe

        Filesize

        4.2MB

        MD5

        2acdb4828e203e87ea6087ca6e49bf98

        SHA1

        90c63f344377a1797f925de778af87543201555c

        SHA256

        eb508330fac21c2893627a6dcdd21f7112ea8a5b574d56e6624c93c14224443c

        SHA512

        fdf8b962ad26b8bb4d9843ba40471718d07fe4cd18781feada5c6ebe20bb868af7f23ed885433307e357eaec175011a556a382076392a271b4e6f594608a656c

      • C:\Windows\rss\csrss.exe

        Filesize

        4.2MB

        MD5

        2acdb4828e203e87ea6087ca6e49bf98

        SHA1

        90c63f344377a1797f925de778af87543201555c

        SHA256

        eb508330fac21c2893627a6dcdd21f7112ea8a5b574d56e6624c93c14224443c

        SHA512

        fdf8b962ad26b8bb4d9843ba40471718d07fe4cd18781feada5c6ebe20bb868af7f23ed885433307e357eaec175011a556a382076392a271b4e6f594608a656c

      • C:\Windows\windefender.exe

        Filesize

        2.0MB

        MD5

        8e67f58837092385dcf01e8a2b4f5783

        SHA1

        012c49cfd8c5d06795a6f67ea2baf2a082cf8625

        SHA256

        166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

        SHA512

        40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

      • C:\Windows\windefender.exe

        Filesize

        2.0MB

        MD5

        8e67f58837092385dcf01e8a2b4f5783

        SHA1

        012c49cfd8c5d06795a6f67ea2baf2a082cf8625

        SHA256

        166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

        SHA512

        40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

      • C:\Windows\windefender.exe

        Filesize

        2.0MB

        MD5

        8e67f58837092385dcf01e8a2b4f5783

        SHA1

        012c49cfd8c5d06795a6f67ea2baf2a082cf8625

        SHA256

        166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

        SHA512

        40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

      • memory/636-136-0x0000000074A80000-0x0000000075230000-memory.dmp

        Filesize

        7.7MB

      • memory/1100-37-0x0000000007250000-0x000000000726A000-memory.dmp

        Filesize

        104KB

      • memory/1100-54-0x0000000007540000-0x000000000754A000-memory.dmp

        Filesize

        40KB

      • memory/1100-24-0x00000000057C0000-0x0000000005B14000-memory.dmp

        Filesize

        3.3MB

      • memory/1100-32-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

        Filesize

        304KB

      • memory/1100-31-0x0000000005E00000-0x0000000005E1E000-memory.dmp

        Filesize

        120KB

      • memory/1100-33-0x0000000006410000-0x0000000006454000-memory.dmp

        Filesize

        272KB

      • memory/1100-34-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/1100-35-0x0000000006FA0000-0x0000000007016000-memory.dmp

        Filesize

        472KB

      • memory/1100-36-0x00000000078D0000-0x0000000007F4A000-memory.dmp

        Filesize

        6.5MB

      • memory/1100-17-0x0000000005620000-0x0000000005686000-memory.dmp

        Filesize

        408KB

      • memory/1100-16-0x0000000004E20000-0x0000000004E42000-memory.dmp

        Filesize

        136KB

      • memory/1100-39-0x000000007F4E0000-0x000000007F4F0000-memory.dmp

        Filesize

        64KB

      • memory/1100-40-0x00000000073F0000-0x0000000007422000-memory.dmp

        Filesize

        200KB

      • memory/1100-41-0x0000000070840000-0x000000007088C000-memory.dmp

        Filesize

        304KB

      • memory/1100-42-0x0000000070FA0000-0x00000000712F4000-memory.dmp

        Filesize

        3.3MB

      • memory/1100-52-0x00000000073D0000-0x00000000073EE000-memory.dmp

        Filesize

        120KB

      • memory/1100-53-0x0000000007430000-0x00000000074D3000-memory.dmp

        Filesize

        652KB

      • memory/1100-18-0x0000000005690000-0x00000000056F6000-memory.dmp

        Filesize

        408KB

      • memory/1100-55-0x0000000007600000-0x0000000007696000-memory.dmp

        Filesize

        600KB

      • memory/1100-56-0x0000000007560000-0x0000000007571000-memory.dmp

        Filesize

        68KB

      • memory/1100-57-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/1100-58-0x00000000075A0000-0x00000000075AE000-memory.dmp

        Filesize

        56KB

      • memory/1100-59-0x00000000075B0000-0x00000000075C4000-memory.dmp

        Filesize

        80KB

      • memory/1100-60-0x00000000076A0000-0x00000000076BA000-memory.dmp

        Filesize

        104KB

      • memory/1100-61-0x00000000075E0000-0x00000000075E8000-memory.dmp

        Filesize

        32KB

      • memory/1100-64-0x00000000749A0000-0x0000000075150000-memory.dmp

        Filesize

        7.7MB

      • memory/1100-15-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/1100-13-0x0000000004F80000-0x00000000055A8000-memory.dmp

        Filesize

        6.2MB

      • memory/1100-12-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/1100-10-0x00000000749A0000-0x0000000075150000-memory.dmp

        Filesize

        7.7MB

      • memory/1100-6-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/1100-5-0x00000000749A0000-0x0000000075150000-memory.dmp

        Filesize

        7.7MB

      • memory/1100-4-0x0000000004910000-0x0000000004946000-memory.dmp

        Filesize

        216KB

      • memory/2196-279-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/2768-121-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/2768-123-0x0000000070940000-0x000000007098C000-memory.dmp

        Filesize

        304KB

      • memory/2768-108-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/2768-109-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/2768-119-0x0000000005B10000-0x0000000005E64000-memory.dmp

        Filesize

        3.3MB

      • memory/2768-107-0x0000000074A80000-0x0000000075230000-memory.dmp

        Filesize

        7.7MB

      • memory/2768-122-0x000000007F320000-0x000000007F330000-memory.dmp

        Filesize

        64KB

      • memory/2768-135-0x0000000074A80000-0x0000000075230000-memory.dmp

        Filesize

        7.7MB

      • memory/2768-124-0x00000000710E0000-0x0000000071434000-memory.dmp

        Filesize

        3.3MB

      • memory/2772-167-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2772-104-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2772-70-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2772-69-0x0000000002A50000-0x0000000002E4B000-memory.dmp

        Filesize

        4.0MB

      • memory/2772-68-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/2772-66-0x0000000002A50000-0x0000000002E4B000-memory.dmp

        Filesize

        4.0MB

      • memory/3016-38-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/3016-1-0x0000000002B90000-0x0000000002F94000-memory.dmp

        Filesize

        4.0MB

      • memory/3016-2-0x0000000002FA0000-0x000000000388B000-memory.dmp

        Filesize

        8.9MB

      • memory/3016-3-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/3016-7-0x0000000002B90000-0x0000000002F94000-memory.dmp

        Filesize

        4.0MB

      • memory/3016-8-0x0000000002FA0000-0x000000000388B000-memory.dmp

        Filesize

        8.9MB

      • memory/3016-9-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/3016-67-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4280-261-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4280-280-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4280-278-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4280-269-0x0000000000400000-0x0000000000D1B000-memory.dmp

        Filesize

        9.1MB

      • memory/4572-277-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/5104-73-0x0000000003350000-0x0000000003360000-memory.dmp

        Filesize

        64KB

      • memory/5104-85-0x0000000003350000-0x0000000003360000-memory.dmp

        Filesize

        64KB

      • memory/5104-86-0x0000000070940000-0x000000007098C000-memory.dmp

        Filesize

        304KB

      • memory/5104-84-0x0000000006A30000-0x0000000006A7C000-memory.dmp

        Filesize

        304KB

      • memory/5104-87-0x0000000071100000-0x0000000071454000-memory.dmp

        Filesize

        3.3MB

      • memory/5104-97-0x0000000007B80000-0x0000000007C23000-memory.dmp

        Filesize

        652KB

      • memory/5104-98-0x0000000007E80000-0x0000000007E91000-memory.dmp

        Filesize

        68KB

      • memory/5104-71-0x0000000074A80000-0x0000000075230000-memory.dmp

        Filesize

        7.7MB

      • memory/5104-72-0x0000000003350000-0x0000000003360000-memory.dmp

        Filesize

        64KB

      • memory/5104-99-0x0000000007EF0000-0x0000000007F04000-memory.dmp

        Filesize

        80KB

      • memory/5104-100-0x0000000074A80000-0x0000000075230000-memory.dmp

        Filesize

        7.7MB

      • memory/5104-103-0x0000000074A80000-0x0000000075230000-memory.dmp

        Filesize

        7.7MB

      • memory/5104-83-0x0000000006320000-0x0000000006674000-memory.dmp

        Filesize

        3.3MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.