Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/04/2024, 16:22 UTC

General

  • Target

    2024-04-29_ff1b04dac9fc38e6c6447935348df6c0_mafia.exe

  • Size

    486KB

  • MD5

    ff1b04dac9fc38e6c6447935348df6c0

  • SHA1

    d85500146f62a8b35e4f2dd7f2f0db37e46e0856

  • SHA256

    398df32ac6aecb1df14e99719da96ca8018bf86048513a5a1891569e9bc3337f

  • SHA512

    1c62dab7b5a3e5903588fff43d8c0554ca5e16048f8bbe2ebf3e94bf8e9ec4e0af8819e87c860f824c2fb4134172a07176df2fac49cf4fa1cac2ddd0ade97e89

  • SSDEEP

    12288:pNrIik39CxP94TcFNhoTPbw0ZDy0WMxSU/:pNrU39Cx1vFNuTTwAy0WMU8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-29_ff1b04dac9fc38e6c6447935348df6c0_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-29_ff1b04dac9fc38e6c6447935348df6c0_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\3076.tmp
      "C:\Users\Admin\AppData\Local\Temp\3076.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-29_ff1b04dac9fc38e6c6447935348df6c0_mafia.exe E1CEA24C6A0A998353D055CCDC0C285A01E9A7ED57F19C94A65851CDCCD4A71C2B00DE336F0E6E656B61E92624B3B81D1FC3A58B3F484882042097A71BCDBF3D
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-29_ff1b04dac9fc38e6c6447935348df6c0_mafia.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:5044

Network

  • flag-us
    DNS
    g.bing.com
    Remote address:
    8.8.8.8:53
    Request
    g.bing.com
    IN A
    Response
    g.bing.com
    IN CNAME
    g-bing-com.dual-a-0034.a-msedge.net
    g-bing-com.dual-a-0034.a-msedge.net
    IN CNAME
    dual-a-0034.a-msedge.net
    dual-a-0034.a-msedge.net
    IN A
    204.79.197.237
    dual-a-0034.a-msedge.net
    IN A
    13.107.21.237
  • flag-us
    GET
    https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8yuV2DTsX_h1xC5E2TUSDsDVUCUx8UQeci6Mb5flOrcCqBUJZF_2Azs3VZddCi0skG-v2tEdc6dhtyNJqvDW1mFUSxg4wKTchrfXADLC1pY8h9hDWD09cEjyjj39dgwR88unLn-CJPwMc-oyTJ2gCFfFFd-7rVhSvYgckW6sEqghRWjHt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dcd30e260dcde18497a42844b7774c973&TIME=20240426T132736Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8yuV2DTsX_h1xC5E2TUSDsDVUCUx8UQeci6Mb5flOrcCqBUJZF_2Azs3VZddCi0skG-v2tEdc6dhtyNJqvDW1mFUSxg4wKTchrfXADLC1pY8h9hDWD09cEjyjj39dgwR88unLn-CJPwMc-oyTJ2gCFfFFd-7rVhSvYgckW6sEqghRWjHt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dcd30e260dcde18497a42844b7774c973&TIME=20240426T132736Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MUID=13A7E890FEBF6E700BDBFCE0FF5F6FB7; domain=.bing.com; expires=Sat, 24-May-2025 16:22:08 GMT; path=/; SameSite=None; Secure; Priority=High;
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 379FE83DAE7F4555B62E18CC41A16CD0 Ref B: LON04EDGE1006 Ref C: 2024-04-29T16:22:08Z
    date: Mon, 29 Apr 2024 16:22:07 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8yuV2DTsX_h1xC5E2TUSDsDVUCUx8UQeci6Mb5flOrcCqBUJZF_2Azs3VZddCi0skG-v2tEdc6dhtyNJqvDW1mFUSxg4wKTchrfXADLC1pY8h9hDWD09cEjyjj39dgwR88unLn-CJPwMc-oyTJ2gCFfFFd-7rVhSvYgckW6sEqghRWjHt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dcd30e260dcde18497a42844b7774c973&TIME=20240426T132736Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8yuV2DTsX_h1xC5E2TUSDsDVUCUx8UQeci6Mb5flOrcCqBUJZF_2Azs3VZddCi0skG-v2tEdc6dhtyNJqvDW1mFUSxg4wKTchrfXADLC1pY8h9hDWD09cEjyjj39dgwR88unLn-CJPwMc-oyTJ2gCFfFFd-7rVhSvYgckW6sEqghRWjHt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dcd30e260dcde18497a42844b7774c973&TIME=20240426T132736Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=13A7E890FEBF6E700BDBFCE0FF5F6FB7; _EDGE_S=SID=3B53B690170964730745A2E016E465E3
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MSPTC=zTKapd2lXY1ZCPySBkyqI0Ne9y-ynwP2gpDuLavqoTw; domain=.bing.com; expires=Sat, 24-May-2025 16:22:08 GMT; path=/; Partitioned; secure; SameSite=None
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 4B548172C16D40839D41C6144D94590A Ref B: LON04EDGE1006 Ref C: 2024-04-29T16:22:08Z
    date: Mon, 29 Apr 2024 16:22:07 GMT
  • flag-nl
    GET
    https://www.bing.com/aes/c.gif?RG=cfa1be2e1f2c49df825c2f614003a674&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T132736Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893
    Remote address:
    23.62.61.97:443
    Request
    GET /aes/c.gif?RG=cfa1be2e1f2c49df825c2f614003a674&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T132736Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893 HTTP/2.0
    host: www.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=13A7E890FEBF6E700BDBFCE0FF5F6FB7
    Response
    HTTP/2.0 200
    cache-control: private,no-store
    pragma: no-cache
    vary: Origin
    p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 0CA882C491F046EF84F49249A1C0B67A Ref B: AMS04EDGE3305 Ref C: 2024-04-29T16:22:08Z
    content-length: 0
    date: Mon, 29 Apr 2024 16:22:08 GMT
    set-cookie: _EDGE_S=SID=3B53B690170964730745A2E016E465E3; path=/; httponly; domain=bing.com
    set-cookie: MUIDB=13A7E890FEBF6E700BDBFCE0FF5F6FB7; path=/; httponly; expires=Sat, 24-May-2025 16:22:08 GMT
    alt-svc: h3=":443"; ma=93600
    x-cdn-traceid: 0.5d3d3e17.1714407728.212f5fce
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    237.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    237.197.79.204.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    97.61.62.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.61.62.23.in-addr.arpa
    IN PTR
    Response
    97.61.62.23.in-addr.arpa
    IN PTR
    a23-62-61-97deploystaticakamaitechnologiescom
  • flag-us
    DNS
    76.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    76.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    97.32.109.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.32.109.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    8.167.79.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.167.79.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    26.165.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    26.165.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    29.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.243.111.52.in-addr.arpa
    IN PTR
    Response
  • 204.79.197.237:443
    https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8yuV2DTsX_h1xC5E2TUSDsDVUCUx8UQeci6Mb5flOrcCqBUJZF_2Azs3VZddCi0skG-v2tEdc6dhtyNJqvDW1mFUSxg4wKTchrfXADLC1pY8h9hDWD09cEjyjj39dgwR88unLn-CJPwMc-oyTJ2gCFfFFd-7rVhSvYgckW6sEqghRWjHt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dcd30e260dcde18497a42844b7774c973&TIME=20240426T132736Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E
    tls, http2
    2.5kB
    9.0kB
    19
    17

    HTTP Request

    GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8yuV2DTsX_h1xC5E2TUSDsDVUCUx8UQeci6Mb5flOrcCqBUJZF_2Azs3VZddCi0skG-v2tEdc6dhtyNJqvDW1mFUSxg4wKTchrfXADLC1pY8h9hDWD09cEjyjj39dgwR88unLn-CJPwMc-oyTJ2gCFfFFd-7rVhSvYgckW6sEqghRWjHt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dcd30e260dcde18497a42844b7774c973&TIME=20240426T132736Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8yuV2DTsX_h1xC5E2TUSDsDVUCUx8UQeci6Mb5flOrcCqBUJZF_2Azs3VZddCi0skG-v2tEdc6dhtyNJqvDW1mFUSxg4wKTchrfXADLC1pY8h9hDWD09cEjyjj39dgwR88unLn-CJPwMc-oyTJ2gCFfFFd-7rVhSvYgckW6sEqghRWjHt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dcd30e260dcde18497a42844b7774c973&TIME=20240426T132736Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E

    HTTP Response

    204
  • 23.62.61.97:443
    https://www.bing.com/aes/c.gif?RG=cfa1be2e1f2c49df825c2f614003a674&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T132736Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893
    tls, http2
    1.4kB
    5.3kB
    16
    10

    HTTP Request

    GET https://www.bing.com/aes/c.gif?RG=cfa1be2e1f2c49df825c2f614003a674&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T132736Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893

    HTTP Response

    200
  • 8.8.8.8:53
    g.bing.com
    dns
    56 B
    151 B
    1
    1

    DNS Request

    g.bing.com

    DNS Response

    204.79.197.237
    13.107.21.237

  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    237.197.79.204.in-addr.arpa
    dns
    73 B
    143 B
    1
    1

    DNS Request

    237.197.79.204.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    97.61.62.23.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    97.61.62.23.in-addr.arpa

  • 8.8.8.8:53
    76.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    76.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    97.32.109.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.32.109.52.in-addr.arpa

  • 8.8.8.8:53
    8.167.79.40.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    8.167.79.40.in-addr.arpa

  • 8.8.8.8:53
    26.165.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    26.165.165.52.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    29.243.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    29.243.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2024-04-29_ff1b04dac9fc38e6c6447935348df6c0_mafia.docx

    Filesize

    21KB

    MD5

    7079891932a64f097abafd233055a1e9

    SHA1

    246d95feafe67689d49a5a4cadba18d3ac1914e5

    SHA256

    c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1

    SHA512

    6e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a

  • C:\Users\Admin\AppData\Local\Temp\3076.tmp

    Filesize

    486KB

    MD5

    292b951ffdcbbe9be571d32b9819a7c5

    SHA1

    7b0f6b89a7940e33068db5bc7a2cc2a7562ce0d5

    SHA256

    3074c507ec8fe7b14023dc586b54ba4a8095f794544b48c708948aa7211af34e

    SHA512

    2c34cabf4da51a00b4bad37ead38d8bed8a97264efe0a3c9de058881d0a6f83fd7d1edebf53cbf5e4b8b20a921ffdc44ec7b1e64ed7c65212405f92c09e66f95

  • memory/1188-6-0x0000000000360000-0x00000000003E2000-memory.dmp

    Filesize

    520KB

  • memory/1188-0-0x0000000000360000-0x00000000003E2000-memory.dmp

    Filesize

    520KB

  • memory/5044-22-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-20-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-13-0x00007FFF254F0000-0x00007FFF25500000-memory.dmp

    Filesize

    64KB

  • memory/5044-16-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-15-0x00007FFF254F0000-0x00007FFF25500000-memory.dmp

    Filesize

    64KB

  • memory/5044-14-0x00007FFF254F0000-0x00007FFF25500000-memory.dmp

    Filesize

    64KB

  • memory/5044-18-0x00007FFF254F0000-0x00007FFF25500000-memory.dmp

    Filesize

    64KB

  • memory/5044-17-0x00007FFF254F0000-0x00007FFF25500000-memory.dmp

    Filesize

    64KB

  • memory/5044-19-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-38-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-21-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-28-0x00007FFF233E0000-0x00007FFF233F0000-memory.dmp

    Filesize

    64KB

  • memory/5044-23-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-24-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-25-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5044-26-0x00007FFF233E0000-0x00007FFF233F0000-memory.dmp

    Filesize

    64KB

  • memory/5044-27-0x00007FFF65470000-0x00007FFF65665000-memory.dmp

    Filesize

    2.0MB

  • memory/5052-5-0x00000000005C0000-0x0000000000642000-memory.dmp

    Filesize

    520KB

  • memory/5052-12-0x00000000005C0000-0x0000000000642000-memory.dmp

    Filesize

    520KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.