Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/05/2024, 23:21 UTC

General

  • Target

    187a80af7213cff8d7778899ae1a679df16917d744d6bc0bcc593e72c678659d.exe

  • Size

    4.1MB

  • MD5

    2b1114fdb89b86c6cd33be425f09ea4a

  • SHA1

    25d982b39a264cd9b4b336c4e0d1729aa4f5c6ad

  • SHA256

    187a80af7213cff8d7778899ae1a679df16917d744d6bc0bcc593e72c678659d

  • SHA512

    c6624f9bbc25b2e4f56feec46dee599dcf0ed6ff5a4c21c2c7fd4c099f4347ae1ea6dde91baa5600ef19ae6ce60229246a323cd6f8fa0c9d8184d6ec0cdb4253

  • SSDEEP

    98304:PM/EmSBi2U836aQ7T+NOHAd2U4SvMS0Qb1S3aNOYAF0BRB40OFss:PR5hU83ZQZH62N+Mm1SqPK0ths

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 19 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\187a80af7213cff8d7778899ae1a679df16917d744d6bc0bcc593e72c678659d.exe
    "C:\Users\Admin\AppData\Local\Temp\187a80af7213cff8d7778899ae1a679df16917d744d6bc0bcc593e72c678659d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2792
    • C:\Users\Admin\AppData\Local\Temp\187a80af7213cff8d7778899ae1a679df16917d744d6bc0bcc593e72c678659d.exe
      "C:\Users\Admin\AppData\Local\Temp\187a80af7213cff8d7778899ae1a679df16917d744d6bc0bcc593e72c678659d.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1084
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:4028
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2088
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4328
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3248
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:2172
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4976
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2452
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3632
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2852
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:5016
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4332
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2740
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:4324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 932
        2⤵
        • Program crash
        PID:1784
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4392 -ip 4392
      1⤵
        PID:2240
      • C:\Windows\windefender.exe
        C:\Windows\windefender.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:1484

      Network

      • flag-us
        DNS
        a2447586-ee9e-4dd0-a2e6-4459fda03ecd.uuid.datadumpcloud.org
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        a2447586-ee9e-4dd0-a2e6-4459fda03ecd.uuid.datadumpcloud.org
        IN TXT
        Response
      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        stun.sipgate.net
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        stun.sipgate.net
        IN A
        Response
        stun.sipgate.net
        IN CNAME
        stun.sipgate.cloud
        stun.sipgate.cloud
        IN CNAME
        a6adcb4b9bf816abe.awsglobalaccelerator.com
        a6adcb4b9bf816abe.awsglobalaccelerator.com
        IN A
        15.197.250.192
        a6adcb4b9bf816abe.awsglobalaccelerator.com
        IN A
        3.33.249.248
      • flag-us
        DNS
        carsalessystem.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        carsalessystem.com
        IN A
        Response
        carsalessystem.com
        IN A
        104.21.94.82
        carsalessystem.com
        IN A
        172.67.221.71
      • flag-us
        DNS
        233.130.159.162.in-addr.arpa
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        233.130.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        nexusrules.officeapps.live.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        nexusrules.officeapps.live.com
        IN A
        Response
        nexusrules.officeapps.live.com
        IN CNAME
        prod.nexusrules.live.com.akadns.net
        prod.nexusrules.live.com.akadns.net
        IN A
        52.111.236.21
      • flag-us
        DNS
        server2.datadumpcloud.org
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        server2.datadumpcloud.org
        IN A
        Response
        server2.datadumpcloud.org
        IN A
        185.82.216.104
      • flag-us
        DNS
        82.94.21.104.in-addr.arpa
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        82.94.21.104.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        cdn.discordapp.com
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        cdn.discordapp.com
        IN A
        Response
        cdn.discordapp.com
        IN A
        162.159.130.233
        cdn.discordapp.com
        IN A
        162.159.129.233
        cdn.discordapp.com
        IN A
        162.159.133.233
        cdn.discordapp.com
        IN A
        162.159.135.233
        cdn.discordapp.com
        IN A
        162.159.134.233
      • flag-us
        DNS
        192.250.197.15.in-addr.arpa
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        192.250.197.15.in-addr.arpa
        IN PTR
        Response
        192.250.197.15.in-addr.arpa
        IN PTR
        a6adcb4b9bf816abeawsglobalacceleratorcom
      • flag-us
        DNS
        21.236.111.52.in-addr.arpa
        csrss.exe
        Remote address:
        8.8.8.8:53
        Request
        21.236.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        104.216.82.185.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.216.82.185.in-addr.arpa
        IN PTR
        Response
        104.216.82.185.in-addr.arpa
        IN PTR
        dedic-mariadebommarez-1201693hosted-by-itldccom
      • 162.159.130.233:443
        cdn.discordapp.com
        tls
        csrss.exe
        1.3kB
        5.3kB
        15
        17
      • 185.82.216.104:443
        server2.datadumpcloud.org
        tls
        csrss.exe
        1.9kB
        5.9kB
        15
        16
      • 104.21.94.82:443
        carsalessystem.com
        tls
        csrss.exe
        102.5kB
        2.2MB
        1682
        1625
      • 185.82.216.104:443
        server2.datadumpcloud.org
        tls
        csrss.exe
        1.9kB
        4.7kB
        11
        13
      • 8.8.8.8:53
        a2447586-ee9e-4dd0-a2e6-4459fda03ecd.uuid.datadumpcloud.org
        dns
        csrss.exe
        447 B
        811 B
        6
        6

        DNS Request

        a2447586-ee9e-4dd0-a2e6-4459fda03ecd.uuid.datadumpcloud.org

        DNS Request

        8.8.8.8.in-addr.arpa

        DNS Request

        stun.sipgate.net

        DNS Response

        15.197.250.192
        3.33.249.248

        DNS Request

        carsalessystem.com

        DNS Response

        104.21.94.82
        172.67.221.71

        DNS Request

        233.130.159.162.in-addr.arpa

        DNS Request

        nexusrules.officeapps.live.com

        DNS Response

        52.111.236.21

      • 8.8.8.8:53
        server2.datadumpcloud.org
        dns
        csrss.exe
        142 B
        220 B
        2
        2

        DNS Request

        server2.datadumpcloud.org

        DNS Response

        185.82.216.104

        DNS Request

        82.94.21.104.in-addr.arpa

      • 8.8.8.8:53
        cdn.discordapp.com
        dns
        csrss.exe
        209 B
        431 B
        3
        3

        DNS Request

        cdn.discordapp.com

        DNS Response

        162.159.130.233
        162.159.129.233
        162.159.133.233
        162.159.135.233
        162.159.134.233

        DNS Request

        192.250.197.15.in-addr.arpa

        DNS Request

        21.236.111.52.in-addr.arpa

      • 15.197.250.192:3478
        stun.sipgate.net
        csrss.exe
        48 B
        124 B
        1
        1
      • 8.8.8.8:53
        104.216.82.185.in-addr.arpa
        dns
        73 B
        136 B
        1
        1

        DNS Request

        104.216.82.185.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u4dt4ts2.zos.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d0c46cad6c0778401e21910bd6b56b70

        SHA1

        7be418951ea96326aca445b8dfe449b2bfa0dca6

        SHA256

        9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

        SHA512

        057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        f95eaa3c35c1a4dc7a05a16bef520eeb

        SHA1

        1a73896860bd1249bf27b239c2a5067d6bafac9e

        SHA256

        a920b81bba45ae18aeb10c01cf5957697c94bcd212d09479927a681cae46c18f

        SHA512

        296498ccf0e42c8449ff4e7a64af43b32521009eb1f597089fbd12877f7f4e493e1db23725a2192d7489cb3b2b5511b955d6550f88d7d5e9d71b4b63b24362f7

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        b180f298b874486f1410d1a7681df001

        SHA1

        057372b23d0de26fedf98f8efafe2bbba7b02107

        SHA256

        8451f2cb30308cea0ccb07bc8b80d88ba1cf21a1f4bda1d153ffa72ddb394844

        SHA512

        5c491c4c58581fc45501ac9cac38b0e9d793a731950fd1f9a7bb330a3df89941ac30a880600eaff1a8569223f4afd727139a21a00dc872e54b293c93429f1f3b

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        ac30e31344e40395a911ad30e272fb33

        SHA1

        9e5f82c94822e4bf9d20205e990fdb636102259f

        SHA256

        2931effd86a53a260098530e55500ddb5074394d2374397a8abd96ea596f6aaf

        SHA512

        eebee2e4e07761c66c026fa38df0fcf4e9067c6ef8f477a4e2b64436d163818aabaa64bf2c962da3061d251c4a2ef233248da8dc4f20909cc219fcfa361c41ab

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        1edc49c2a889b99ee506a8678db397c9

        SHA1

        72ec348a338328b6a0dde62fd0f05647ac3e2113

        SHA256

        cd3261416e9ccdb979736cb1d40128cf0a1a314c3297fc029b003be7fc7149e2

        SHA512

        aec589cb4153f2bd07a7efacf6d82d29a235da8715501874b6becf28284ebed004688ddb540db8dacbbdb8b9bbf55a8ed44beabf94bb03089f1135d772749c71

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        3d5947c8f353df980ec222bc14592d5d

        SHA1

        491a1eafed5fcc881b0d568d21188322e6e144dc

        SHA256

        557086850901015c04b12f3eeaf5e34fa938e2b889cdaa42294ad5089f829f83

        SHA512

        ac89892ca87ef4af6f8b7bd62d3ebfd09a8842f31699b9c5580c9e5b4dca00918fc4a6ec0734b68c1a7d3ab02654f97680fdfaf272b99c8d46c5a62011620999

      • C:\Windows\rss\csrss.exe

        Filesize

        4.1MB

        MD5

        2b1114fdb89b86c6cd33be425f09ea4a

        SHA1

        25d982b39a264cd9b4b336c4e0d1729aa4f5c6ad

        SHA256

        187a80af7213cff8d7778899ae1a679df16917d744d6bc0bcc593e72c678659d

        SHA512

        c6624f9bbc25b2e4f56feec46dee599dcf0ed6ff5a4c21c2c7fd4c099f4347ae1ea6dde91baa5600ef19ae6ce60229246a323cd6f8fa0c9d8184d6ec0cdb4253

      • C:\Windows\windefender.exe

        Filesize

        2.0MB

        MD5

        8e67f58837092385dcf01e8a2b4f5783

        SHA1

        012c49cfd8c5d06795a6f67ea2baf2a082cf8625

        SHA256

        166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

        SHA512

        40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

      • memory/1084-66-0x0000000070590000-0x00000000705DC000-memory.dmp

        Filesize

        304KB

      • memory/1084-78-0x0000000007260000-0x0000000007275000-memory.dmp

        Filesize

        84KB

      • memory/1084-77-0x0000000007210000-0x0000000007221000-memory.dmp

        Filesize

        68KB

      • memory/1084-76-0x0000000006ED0000-0x0000000006F74000-memory.dmp

        Filesize

        656KB

      • memory/1084-64-0x00000000058F0000-0x0000000005C47000-memory.dmp

        Filesize

        3.3MB

      • memory/1084-67-0x0000000070710000-0x0000000070A67000-memory.dmp

        Filesize

        3.3MB

      • memory/1084-65-0x0000000005D00000-0x0000000005D4C000-memory.dmp

        Filesize

        304KB

      • memory/1384-226-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-199-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-243-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-217-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-219-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-221-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-238-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-233-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-231-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-245-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1384-248-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1484-224-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/1484-220-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/1484-213-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/2088-90-0x00000000055A0000-0x00000000058F7000-memory.dmp

        Filesize

        3.3MB

      • memory/2088-92-0x0000000070590000-0x00000000705DC000-memory.dmp

        Filesize

        304KB

      • memory/2088-93-0x0000000070730000-0x0000000070A87000-memory.dmp

        Filesize

        3.3MB

      • memory/2452-177-0x00000000058F0000-0x0000000005905000-memory.dmp

        Filesize

        84KB

      • memory/2452-154-0x0000000005570000-0x00000000058C7000-memory.dmp

        Filesize

        3.3MB

      • memory/2452-176-0x0000000006F90000-0x0000000006FA1000-memory.dmp

        Filesize

        68KB

      • memory/2452-175-0x0000000006D40000-0x0000000006DE4000-memory.dmp

        Filesize

        656KB

      • memory/2452-166-0x0000000070660000-0x00000000709B7000-memory.dmp

        Filesize

        3.3MB

      • memory/2452-165-0x0000000070410000-0x000000007045C000-memory.dmp

        Filesize

        304KB

      • memory/2452-164-0x0000000006050000-0x000000000609C000-memory.dmp

        Filesize

        304KB

      • memory/2792-22-0x0000000006CE0000-0x0000000006D2C000-memory.dmp

        Filesize

        304KB

      • memory/2792-20-0x0000000006550000-0x00000000068A7000-memory.dmp

        Filesize

        3.3MB

      • memory/2792-43-0x0000000007F50000-0x0000000007F61000-memory.dmp

        Filesize

        68KB

      • memory/2792-42-0x0000000007FE0000-0x0000000008076000-memory.dmp

        Filesize

        600KB

      • memory/2792-40-0x0000000007EE0000-0x0000000007EFA000-memory.dmp

        Filesize

        104KB

      • memory/2792-41-0x0000000007F20000-0x0000000007F2A000-memory.dmp

        Filesize

        40KB

      • memory/2792-4-0x000000007421E000-0x000000007421F000-memory.dmp

        Filesize

        4KB

      • memory/2792-5-0x00000000034A0000-0x00000000034D6000-memory.dmp

        Filesize

        216KB

      • memory/2792-39-0x0000000008520000-0x0000000008B9A000-memory.dmp

        Filesize

        6.5MB

      • memory/2792-6-0x0000000005CC0000-0x00000000062EA000-memory.dmp

        Filesize

        6.2MB

      • memory/2792-7-0x0000000074210000-0x00000000749C1000-memory.dmp

        Filesize

        7.7MB

      • memory/2792-24-0x0000000007D60000-0x0000000007D94000-memory.dmp

        Filesize

        208KB

      • memory/2792-8-0x0000000005A80000-0x0000000005AA2000-memory.dmp

        Filesize

        136KB

      • memory/2792-19-0x0000000074210000-0x00000000749C1000-memory.dmp

        Filesize

        7.7MB

      • memory/2792-9-0x0000000006360000-0x00000000063C6000-memory.dmp

        Filesize

        408KB

      • memory/2792-38-0x0000000074210000-0x00000000749C1000-memory.dmp

        Filesize

        7.7MB

      • memory/2792-21-0x0000000006920000-0x000000000693E000-memory.dmp

        Filesize

        120KB

      • memory/2792-23-0x0000000007920000-0x0000000007966000-memory.dmp

        Filesize

        280KB

      • memory/2792-45-0x0000000007FA0000-0x0000000007FB5000-memory.dmp

        Filesize

        84KB

      • memory/2792-25-0x0000000070480000-0x00000000704CC000-memory.dmp

        Filesize

        304KB

      • memory/2792-46-0x00000000080A0000-0x00000000080BA000-memory.dmp

        Filesize

        104KB

      • memory/2792-47-0x0000000008080000-0x0000000008088000-memory.dmp

        Filesize

        32KB

      • memory/2792-50-0x0000000074210000-0x00000000749C1000-memory.dmp

        Filesize

        7.7MB

      • memory/2792-27-0x0000000070600000-0x0000000070957000-memory.dmp

        Filesize

        3.3MB

      • memory/2792-44-0x0000000007F90000-0x0000000007F9E000-memory.dmp

        Filesize

        56KB

      • memory/2792-10-0x00000000063D0000-0x0000000006436000-memory.dmp

        Filesize

        408KB

      • memory/2792-26-0x0000000074210000-0x00000000749C1000-memory.dmp

        Filesize

        7.7MB

      • memory/2792-37-0x0000000007DC0000-0x0000000007E64000-memory.dmp

        Filesize

        656KB

      • memory/2792-36-0x0000000007DA0000-0x0000000007DBE000-memory.dmp

        Filesize

        120KB

      • memory/3248-140-0x00000000704F0000-0x000000007053C000-memory.dmp

        Filesize

        304KB

      • memory/3248-141-0x0000000070670000-0x00000000709C7000-memory.dmp

        Filesize

        3.3MB

      • memory/3248-137-0x0000000005C70000-0x0000000005FC7000-memory.dmp

        Filesize

        3.3MB

      • memory/3248-152-0x0000000005C30000-0x0000000005C45000-memory.dmp

        Filesize

        84KB

      • memory/3248-139-0x0000000006320000-0x000000000636C000-memory.dmp

        Filesize

        304KB

      • memory/3248-151-0x00000000075F0000-0x0000000007601000-memory.dmp

        Filesize

        68KB

      • memory/3248-150-0x0000000007420000-0x00000000074C4000-memory.dmp

        Filesize

        656KB

      • memory/3632-188-0x0000000070410000-0x000000007045C000-memory.dmp

        Filesize

        304KB

      • memory/3632-189-0x0000000070660000-0x00000000709B7000-memory.dmp

        Filesize

        3.3MB

      • memory/4328-112-0x0000000070590000-0x00000000705DC000-memory.dmp

        Filesize

        304KB

      • memory/4328-113-0x0000000070710000-0x0000000070A67000-memory.dmp

        Filesize

        3.3MB

      • memory/4332-215-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/4332-210-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/4392-53-0x0000000002E20000-0x000000000370B000-memory.dmp

        Filesize

        8.9MB

      • memory/4392-1-0x0000000002A20000-0x0000000002E1A000-memory.dmp

        Filesize

        4.0MB

      • memory/4392-52-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/4392-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/4392-2-0x0000000002E20000-0x000000000370B000-memory.dmp

        Filesize

        8.9MB

      • memory/4408-55-0x0000000002A20000-0x0000000002E1B000-memory.dmp

        Filesize

        4.0MB

      • memory/4408-127-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/4408-209-0x0000000002A20000-0x0000000002E1B000-memory.dmp

        Filesize

        4.0MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.