Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 02:51 UTC

General

  • Target

    b8454f9bd7d91e7b04eda20436dcebb5.exe

  • Size

    512KB

  • MD5

    b8454f9bd7d91e7b04eda20436dcebb5

  • SHA1

    119374f36cd329d9ed74c44b36216056119ac9fd

  • SHA256

    312d5d5661561fe40af4281524c7a872f8b3f0ff26710a52efbec4a04825cfb6

  • SHA512

    07c680adfb17d7ec4da89c1560d488727a01baf107110a88cec9ec0c886fc94be0df3b589d73e723d6c286ea48fa1a99fe35eb329cc9c9e379e0516db6fe4187

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6E:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5R

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8454f9bd7d91e7b04eda20436dcebb5.exe
    "C:\Users\Admin\AppData\Local\Temp\b8454f9bd7d91e7b04eda20436dcebb5.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Windows\SysWOW64\szdhqtoxxu.exe
      szdhqtoxxu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Windows\SysWOW64\ltqtvzde.exe
        C:\Windows\system32\ltqtvzde.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2980
    • C:\Windows\SysWOW64\yxlvxpmghwrtuws.exe
      yxlvxpmghwrtuws.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1720
    • C:\Windows\SysWOW64\ltqtvzde.exe
      ltqtvzde.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4020
    • C:\Windows\SysWOW64\nssfifmetvqzm.exe
      nssfifmetvqzm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3372
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3540
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2240,i,16875000905773190493,11379096115878622792,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3976

    Network

    • flag-us
      DNS
      196.249.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      196.249.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      74.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      74.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      74.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      74.32.126.40.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      241.154.82.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      241.154.82.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      97.32.109.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.32.109.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      97.32.109.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.32.109.52.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      41.110.16.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      41.110.16.96.in-addr.arpa
      IN PTR
      Response
      41.110.16.96.in-addr.arpa
      IN PTR
      a96-16-110-41deploystaticakamaitechnologiescom
    • flag-us
      DNS
      97.17.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.17.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      157.123.68.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      157.123.68.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      66.112.168.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      66.112.168.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      48.229.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      48.229.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      15.164.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      15.164.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      217.135.221.88.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      217.135.221.88.in-addr.arpa
      IN PTR
      Response
      217.135.221.88.in-addr.arpa
      IN PTR
      a88-221-135-217deploystaticakamaitechnologiescom
    • flag-us
      DNS
      228.249.119.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      228.249.119.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      28.118.140.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      28.118.140.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      241.150.49.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      241.150.49.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      104.241.123.92.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      104.241.123.92.in-addr.arpa
      IN PTR
      Response
      104.241.123.92.in-addr.arpa
      IN PTR
      a92-123-241-104deploystaticakamaitechnologiescom
    • flag-us
      DNS
      180.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      180.178.17.96.in-addr.arpa
      IN PTR
      Response
      180.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-180deploystaticakamaitechnologiescom
    • flag-us
      DNS
      194.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      194.178.17.96.in-addr.arpa
      IN PTR
      Response
      194.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-194deploystaticakamaitechnologiescom
    • flag-us
      DNS
      119.110.54.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      119.110.54.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      171.39.242.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      171.39.242.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      88.156.103.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      88.156.103.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      240.221.184.93.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.221.184.93.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      240.221.184.93.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.221.184.93.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.134.221.88.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.134.221.88.in-addr.arpa
      IN PTR
      Response
      18.134.221.88.in-addr.arpa
      IN PTR
      a88-221-134-18deploystaticakamaitechnologiescom
    • 216.58.212.202:443
      46 B
      40 B
      1
      1
    • 13.107.246.64:443
      46 B
      40 B
      1
      1
    • 8.8.8.8:53
      196.249.167.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      196.249.167.52.in-addr.arpa

    • 8.8.8.8:53
      74.32.126.40.in-addr.arpa
      dns
      142 B
      157 B
      2
      1

      DNS Request

      74.32.126.40.in-addr.arpa

      DNS Request

      74.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      241.154.82.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      241.154.82.20.in-addr.arpa

    • 8.8.8.8:53
      97.32.109.52.in-addr.arpa
      dns
      142 B
      145 B
      2
      1

      DNS Request

      97.32.109.52.in-addr.arpa

      DNS Request

      97.32.109.52.in-addr.arpa

    • 8.8.8.8:53
      41.110.16.96.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      41.110.16.96.in-addr.arpa

    • 8.8.8.8:53
      97.17.167.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      97.17.167.52.in-addr.arpa

    • 8.8.8.8:53
      157.123.68.40.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      157.123.68.40.in-addr.arpa

    • 8.8.8.8:53
      66.112.168.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      66.112.168.52.in-addr.arpa

    • 8.8.8.8:53
      48.229.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      48.229.111.52.in-addr.arpa

    • 8.8.8.8:53
      15.164.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      15.164.165.52.in-addr.arpa

    • 8.8.8.8:53
      217.135.221.88.in-addr.arpa
      dns
      73 B
      139 B
      1
      1

      DNS Request

      217.135.221.88.in-addr.arpa

    • 8.8.8.8:53
      228.249.119.40.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      228.249.119.40.in-addr.arpa

    • 8.8.8.8:53
      28.118.140.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      28.118.140.52.in-addr.arpa

    • 8.8.8.8:53
      241.150.49.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      241.150.49.20.in-addr.arpa

    • 8.8.8.8:53
      104.241.123.92.in-addr.arpa
      dns
      73 B
      139 B
      1
      1

      DNS Request

      104.241.123.92.in-addr.arpa

    • 8.8.8.8:53
      180.178.17.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      180.178.17.96.in-addr.arpa

    • 8.8.8.8:53
      194.178.17.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      194.178.17.96.in-addr.arpa

    • 8.8.8.8:53
      119.110.54.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      119.110.54.20.in-addr.arpa

    • 8.8.8.8:53
      171.39.242.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      171.39.242.20.in-addr.arpa

    • 8.8.8.8:53
      88.156.103.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      88.156.103.20.in-addr.arpa

    • 8.8.8.8:53
      240.221.184.93.in-addr.arpa
      dns
      146 B
      288 B
      2
      2

      DNS Request

      240.221.184.93.in-addr.arpa

      DNS Request

      240.221.184.93.in-addr.arpa

    • 8.8.8.8:53
      18.134.221.88.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      18.134.221.88.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      95e006cb61513e35f10b3426d262ec0d

      SHA1

      6f01f072bde839df3bc7b6d2e993d4e89a2e823a

      SHA256

      b3f830dc3e2f161d52257240075702ce122c40d99b38e7c39732d5791a106de5

      SHA512

      4672311fbab7657a32328017a02fd672be11fc8071f85351f3f9f64967b8fc7dbbe9725399ba27b9dd49c767446647d5555c6aaebee32dcbfad37c2335f7a2f1

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      42e4bf03d037ed082160ea0e92d8daf6

      SHA1

      515db8beb6326f1121a88c7d173a546a5b018492

      SHA256

      0e3d4ceba641a79187b89737820a732ef56a87ba36692f0899c3cd84470608a3

      SHA512

      6d2dc1f7c45b35e3b7807306a22b54ba1db0353e4996cbba28a908b5aec483224750c2bc46267e44ad95ef4456cdf80a83c582b6a82f549cdf1d32e87de2fa85

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      239B

      MD5

      12b138a5a40ffb88d1850866bf2959cd

      SHA1

      57001ba2de61329118440de3e9f8a81074cb28a2

      SHA256

      9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

      SHA512

      9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      13a266d88a988a7b4c5e1fb80862ceaf

      SHA1

      8fba7fb9725307d16a77e039beb4bd9093e43362

      SHA256

      7ea273cfc8b82f8983ba6f807aecbc34023ae7a60f0c040141da409a754fc6cd

      SHA512

      30fc0d57ecf21e3d11f4eee6f46cd0142794acdb9c2318f23578049d2830eb9beb402981a70ce7086e257bcb94097fc0aa063cc078d53c61232a96eaa42311d6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      d334aeec7622f8a583ec8872cf207d56

      SHA1

      96e42e8b594f37cf76333e63b9276c60c23bc4e6

      SHA256

      fe91887637d5b27cc846e9458721e8ffc4078927447e39b7b1f2be8226b17d46

      SHA512

      d2203b97dc1a70f37bd77d67a11b7c60fa25a9e2a90c2f5e6470481d6b50a9635cf9fdc557e2462b4046a0b0105e13d8c150ddc76c911c3a0b217a3ed866d6d7

    • C:\Users\Admin\Desktop\RemoveHide.doc.exe

      Filesize

      512KB

      MD5

      01f406ca97b35d3f8c2e8082be61e04f

      SHA1

      6947c2061d51ae421f702acde85a16a1a9696372

      SHA256

      eb944d588a44141a5c3d9cf1b8b06a530c880ce3fb5c29253507cccbe3ad60e4

      SHA512

      20d27b9d6adeb1b0741c999347a8d57f2d3c38122221aea1fc478268dacbf4ea580770be959e2a8ec48ae8048ea193125db2e1f0ddcfb0903370d204810f7068

    • C:\Windows\SysWOW64\ltqtvzde.exe

      Filesize

      512KB

      MD5

      e76fd408dc8947eb4eece5cc20022e47

      SHA1

      85e3bdc0c52469afbe3f5946d0cf88945255592f

      SHA256

      7fc4ce6f22b366e5c19d9a55a70f1be47265a9859e5c715bd32f0a68056161d4

      SHA512

      bec0d48738e9ed075ef0f091595a47195e54e9280cae50b6f738dc8d20513e2934cd37f2d4af1f84e87cff186746e0a3640a2886cd8294b57d47b0bb55b7378b

    • C:\Windows\SysWOW64\nssfifmetvqzm.exe

      Filesize

      512KB

      MD5

      bdbe3757b5834abd418a5c1dfb4124b2

      SHA1

      beb5f50c7f7911c8eca329d0c8e74d572d11dc37

      SHA256

      da171507e034dea4f2cf89b37c03cf4ed285c60b0780cdb73877eba52b1bff60

      SHA512

      bdcbca20c1b8fcd0395d36047c9024fc42c8c08621250fe694c4025c7a2f55ece9c604af5ce431c5737f3c0b307de24eecbb8bd23edd417b58f5424e020a1940

    • C:\Windows\SysWOW64\szdhqtoxxu.exe

      Filesize

      512KB

      MD5

      61ba3208aeb2549037e4989b4fc01362

      SHA1

      35aa93b62a01ea2c40161bea7a1ad0a7ea839efd

      SHA256

      bf9d36ff311747909dbad0927402bf6f5e9c0dff0f580ab5051402ce75345ae1

      SHA512

      31a16b92463a74aa18011b261eb348664b3c86bfdf4e53cbc5a99aad136c90ce86837f40fb0f3202d17c512e2a5937fcb4960bbfd6383297a0ddaf02f6484d8e

    • C:\Windows\SysWOW64\yxlvxpmghwrtuws.exe

      Filesize

      512KB

      MD5

      f985394266bd714c8d582f3af268d326

      SHA1

      84193597f05d03cae5ae83281574980fcf321868

      SHA256

      ac471799fe3f83c5e0f02a43eaaba9c3369afe706c683353327d2ebcd822e8b0

      SHA512

      b60e8e72d7b14b3da2304e21db800846ffc9386d33bae6d40c21881ae03296100cf4d4bc94e5296221a6f65b6818ce7249341e35721c8c31eca36bc95353faa3

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      7a4e1b8036065ac994dd48ff3a0a10af

      SHA1

      c89f26d905afeed5e409f060e99880532e6cc4a7

      SHA256

      bceeb73d980acb964e73ab84b27d3ac14bef840ca32a90fc6de3f2e21859a22e

      SHA512

      4e0b3df7e5ebc5bacb89e61e591593f4a95b35b1897acdcda626b6ea6232f1c178e623baa41972f3426f8d9bb43ebefbc61641e2ed24270d3a10724164f8a202

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      21ecf4cc226b208132d7dcf68a1c29d1

      SHA1

      134facff94f93dd24a8af7272c208d73a42c6252

      SHA256

      7baa2a19154b7c3958de68afc78b626294e0f587ef6b7aec0cc82285c9fc9674

      SHA512

      e149679cd64acbcf50ec7bbd579cdeb18c25e08dd67b9987aa5661fe0f646714a26b233dc7a885c72e5334d9f740fcaeafeee7551950c3354fc991d11cb5a2be

    • memory/3164-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/3540-52-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-39-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-48-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-49-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-50-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-51-0x00007FFBA3630000-0x00007FFBA3640000-memory.dmp

      Filesize

      64KB

    • memory/3540-44-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-53-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-54-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-55-0x00007FFBA3630000-0x00007FFBA3640000-memory.dmp

      Filesize

      64KB

    • memory/3540-46-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-41-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-42-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-40-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-38-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-47-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-95-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-96-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-97-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-37-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-36-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-35-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-136-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-137-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-139-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-138-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-140-0x00007FFBA5E30000-0x00007FFBA5E40000-memory.dmp

      Filesize

      64KB

    • memory/3540-141-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    • memory/3540-142-0x00007FFBE5DB0000-0x00007FFBE5FA5000-memory.dmp

      Filesize

      2.0MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.