Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/05/2024, 01:42 UTC

General

  • Target

    fb5c5eb64b94fc54f3d3dc7e4aa3b814c471088b16dd3a9c95a9a5b7a3619336.exe

  • Size

    4.1MB

  • MD5

    1d376613cf4eaa65ecfb1c8fc808cb56

  • SHA1

    4145872c7772abd537e707d2217cd71010140bae

  • SHA256

    fb5c5eb64b94fc54f3d3dc7e4aa3b814c471088b16dd3a9c95a9a5b7a3619336

  • SHA512

    262d3c00e2f28c65b73814bb28787b8fd00461162edf58bb5a6d35dd0e91706becc0841898597b25d6985895cb1b1313581413517be00d5002e683c7a11ca88d

  • SSDEEP

    98304:CQGLdTw13YmTlGi/xMFRAVNS6wnhY59m5e0z8345g:CLpT0YNaxn5wu5s59YF

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 19 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb5c5eb64b94fc54f3d3dc7e4aa3b814c471088b16dd3a9c95a9a5b7a3619336.exe
    "C:\Users\Admin\AppData\Local\Temp\fb5c5eb64b94fc54f3d3dc7e4aa3b814c471088b16dd3a9c95a9a5b7a3619336.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:860
    • C:\Users\Admin\AppData\Local\Temp\fb5c5eb64b94fc54f3d3dc7e4aa3b814c471088b16dd3a9c95a9a5b7a3619336.exe
      "C:\Users\Admin\AppData\Local\Temp\fb5c5eb64b94fc54f3d3dc7e4aa3b814c471088b16dd3a9c95a9a5b7a3619336.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1680
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:1088
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1388
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:952
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4024
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4828
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:3160
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1784
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1960
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3424
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:2088
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2488
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1256
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:2400
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:412

    Network

    • flag-us
      DNS
      a3877b97-aeb7-4583-859a-5f7fa01d0516.uuid.alldatadump.org
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      a3877b97-aeb7-4583-859a-5f7fa01d0516.uuid.alldatadump.org
      IN TXT
      Response
    • flag-us
      DNS
      stun.sipgate.net
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      stun.sipgate.net
      IN A
      Response
      stun.sipgate.net
      IN CNAME
      stun.sipgate.cloud
      stun.sipgate.cloud
      IN CNAME
      a6adcb4b9bf816abe.awsglobalaccelerator.com
      a6adcb4b9bf816abe.awsglobalaccelerator.com
      IN A
      15.197.250.192
      a6adcb4b9bf816abe.awsglobalaccelerator.com
      IN A
      3.33.249.248
    • flag-us
      DNS
      nexusrules.officeapps.live.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      nexusrules.officeapps.live.com
      IN A
      Response
      nexusrules.officeapps.live.com
      IN CNAME
      prod.nexusrules.live.com.akadns.net
      prod.nexusrules.live.com.akadns.net
      IN A
      52.111.243.29
    • flag-us
      DNS
      server14.alldatadump.org
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      server14.alldatadump.org
      IN A
      Response
      server14.alldatadump.org
      IN A
      185.82.216.108
    • flag-us
      DNS
      29.243.111.52.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      29.243.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      cdn.discordapp.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      cdn.discordapp.com
      IN A
      Response
      cdn.discordapp.com
      IN A
      162.159.130.233
      cdn.discordapp.com
      IN A
      162.159.134.233
      cdn.discordapp.com
      IN A
      162.159.129.233
      cdn.discordapp.com
      IN A
      162.159.133.233
      cdn.discordapp.com
      IN A
      162.159.135.233
    • flag-us
      DNS
      carsalessystem.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      carsalessystem.com
      IN A
      Response
      carsalessystem.com
      IN A
      172.67.221.71
      carsalessystem.com
      IN A
      104.21.94.82
    • 162.159.130.233:443
      cdn.discordapp.com
      tls
      csrss.exe
      1.4kB
      6.0kB
      16
      16
    • 185.82.216.108:443
      server14.alldatadump.org
      tls
      csrss.exe
      1.6kB
      5.3kB
      13
      14
    • 172.67.221.71:443
      carsalessystem.com
      tls
      csrss.exe
      88.6kB
      1.9MB
      1443
      1449
    • 185.82.216.108:443
      server14.alldatadump.org
      tls
      csrss.exe
      1.9kB
      4.7kB
      11
      13
    • 52.111.236.21:443
      322 B
      7
    • 185.82.216.108:443
      server14.alldatadump.org
      tls
      csrss.exe
      1.8kB
      4.7kB
      10
      13
    • 185.82.216.108:443
      server14.alldatadump.org
      tls
      csrss.exe
      1.9kB
      4.7kB
      11
      13
    • 127.0.0.1:31465
      csrss.exe
    • 8.8.8.8:53
      a3877b97-aeb7-4583-859a-5f7fa01d0516.uuid.alldatadump.org
      dns
      csrss.exe
      241 B
      487 B
      3
      3

      DNS Request

      a3877b97-aeb7-4583-859a-5f7fa01d0516.uuid.alldatadump.org

      DNS Request

      stun.sipgate.net

      DNS Response

      15.197.250.192
      3.33.249.248

      DNS Request

      nexusrules.officeapps.live.com

      DNS Response

      52.111.243.29

    • 8.8.8.8:53
      server14.alldatadump.org
      dns
      csrss.exe
      142 B
      244 B
      2
      2

      DNS Request

      server14.alldatadump.org

      DNS Response

      185.82.216.108

      DNS Request

      29.243.111.52.in-addr.arpa

    • 8.8.8.8:53
      cdn.discordapp.com
      dns
      csrss.exe
      128 B
      240 B
      2
      2

      DNS Request

      cdn.discordapp.com

      DNS Response

      162.159.130.233
      162.159.134.233
      162.159.129.233
      162.159.133.233
      162.159.135.233

      DNS Request

      carsalessystem.com

      DNS Response

      172.67.221.71
      104.21.94.82

    • 15.197.250.192:3478
      stun.sipgate.net
      csrss.exe
      48 B
      124 B
      1
      1
    • 8.8.8.8:53

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vi4idk25.b4s.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      ac4917a885cf6050b1a483e4bc4d2ea5

      SHA1

      b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

      SHA256

      e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

      SHA512

      092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      15db4618b715cbde3c64c6cce31beeb3

      SHA1

      2fcd9fd44cbb43df66d1f7966d262728417be604

      SHA256

      62370d8837a0f2c473d0a8f1fda455efa2ea2927639b66f62afd066b29311cad

      SHA512

      f23d584be707ab3080dc2b56f4912a0d5989f151ed21b29e534652167e5c38e871eb129c58dafe1c448af89fa56210d1390f97d605aae31573a31e2d18386287

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      7077f5aa2984cf3e6b7ee2f7291010fd

      SHA1

      aa797e846c3739c0a8dba7ad45da0e963c8f6daf

      SHA256

      c64205b74215f638acf9562668c58f33ec95ce23cfbb8913c1b930ed454701b3

      SHA512

      16d338bdc7f96ce39d9270b292c4d239fe492e46e1fa0dc97920f1827fc055038e4ee185facc345af34dad121593fd9890a346dfd5ac5cf7840e3439ebcbf6d9

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      11604a0cd7916aef49d9adea150ca573

      SHA1

      113a4dc4a84d84fa37c7c530ba7241e0fc43d023

      SHA256

      e77e4ee24ceb7c777b46a9890ef6d85ac09e72388f6d37b1a871e58a6719c70a

      SHA512

      50902d227590a646573d13de80f5db5feb45f12f55dd1fa6bff2fef4f02339e1cedbdec54898e04c04371c45a0accb345cc127c92e5a8b94fdcc1277daf4233d

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      fd9a3324f4a6cdc2745489b88f5ea53a

      SHA1

      807f7427075a48042cc06915070b58725028b46d

      SHA256

      fe46d2c3f8b0ba0713b2e25d982b24f1462cad1b0f2b7859a3aa8a2256a9a42d

      SHA512

      ad382fc681e939cb138ea46dc27d4549e1da184dedb82b5a45974f9673dfc5da34c131a49ab1681520cc25915d8aa74eeb7166ed9ee30a2dc216d39cc0709276

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      106226c72bfdf0876d6a17e78a038b25

      SHA1

      544ea0828035d2305cef8856bbc4cb0928d63db5

      SHA256

      c316c9ad3b526c9979d43d195439e9ff2f0815d36182cfcc7fb1f0b95411a6c1

      SHA512

      50b2af079170caa40fe1593e1f0d3cb0e40b16c9e8f7657337e8c526a43fca47432c04432eccdbcb0976470771e8d9ee740be9d27adf6e31777068acb05ca150

    • C:\Windows\rss\csrss.exe

      Filesize

      4.1MB

      MD5

      1d376613cf4eaa65ecfb1c8fc808cb56

      SHA1

      4145872c7772abd537e707d2217cd71010140bae

      SHA256

      fb5c5eb64b94fc54f3d3dc7e4aa3b814c471088b16dd3a9c95a9a5b7a3619336

      SHA512

      262d3c00e2f28c65b73814bb28787b8fd00461162edf58bb5a6d35dd0e91706becc0841898597b25d6985895cb1b1313581413517be00d5002e683c7a11ca88d

    • C:\Windows\windefender.exe

      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/412-212-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/412-218-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/412-209-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/860-36-0x00000000076B0000-0x0000000007754000-memory.dmp

      Filesize

      656KB

    • memory/860-44-0x0000000007880000-0x000000000788E000-memory.dmp

      Filesize

      56KB

    • memory/860-23-0x00000000067E0000-0x0000000006826000-memory.dmp

      Filesize

      280KB

    • memory/860-25-0x0000000070720000-0x000000007076C000-memory.dmp

      Filesize

      304KB

    • memory/860-24-0x0000000007650000-0x0000000007684000-memory.dmp

      Filesize

      208KB

    • memory/860-35-0x0000000007690000-0x00000000076AE000-memory.dmp

      Filesize

      120KB

    • memory/860-37-0x00000000744B0000-0x0000000074C61000-memory.dmp

      Filesize

      7.7MB

    • memory/860-21-0x0000000006220000-0x000000000623E000-memory.dmp

      Filesize

      120KB

    • memory/860-26-0x00000000708A0000-0x0000000070BF7000-memory.dmp

      Filesize

      3.3MB

    • memory/860-38-0x00000000744B0000-0x0000000074C61000-memory.dmp

      Filesize

      7.7MB

    • memory/860-40-0x00000000077D0000-0x00000000077EA000-memory.dmp

      Filesize

      104KB

    • memory/860-39-0x0000000007E10000-0x000000000848A000-memory.dmp

      Filesize

      6.5MB

    • memory/860-41-0x0000000007810000-0x000000000781A000-memory.dmp

      Filesize

      40KB

    • memory/860-42-0x00000000078D0000-0x0000000007966000-memory.dmp

      Filesize

      600KB

    • memory/860-43-0x0000000007840000-0x0000000007851000-memory.dmp

      Filesize

      68KB

    • memory/860-22-0x0000000006260000-0x00000000062AC000-memory.dmp

      Filesize

      304KB

    • memory/860-46-0x0000000007990000-0x00000000079AA000-memory.dmp

      Filesize

      104KB

    • memory/860-45-0x0000000007890000-0x00000000078A5000-memory.dmp

      Filesize

      84KB

    • memory/860-47-0x0000000007970000-0x0000000007978000-memory.dmp

      Filesize

      32KB

    • memory/860-50-0x00000000744B0000-0x0000000074C61000-memory.dmp

      Filesize

      7.7MB

    • memory/860-20-0x0000000005E40000-0x0000000006197000-memory.dmp

      Filesize

      3.3MB

    • memory/860-10-0x0000000005C40000-0x0000000005CA6000-memory.dmp

      Filesize

      408KB

    • memory/860-11-0x0000000005CB0000-0x0000000005D16000-memory.dmp

      Filesize

      408KB

    • memory/860-9-0x0000000005370000-0x0000000005392000-memory.dmp

      Filesize

      136KB

    • memory/860-7-0x00000000054A0000-0x0000000005ACA000-memory.dmp

      Filesize

      6.2MB

    • memory/860-8-0x00000000744B0000-0x0000000074C61000-memory.dmp

      Filesize

      7.7MB

    • memory/860-6-0x00000000744B0000-0x0000000074C61000-memory.dmp

      Filesize

      7.7MB

    • memory/860-5-0x0000000004D60000-0x0000000004D96000-memory.dmp

      Filesize

      216KB

    • memory/860-4-0x00000000744BE000-0x00000000744BF000-memory.dmp

      Filesize

      4KB

    • memory/952-106-0x0000000006010000-0x0000000006367000-memory.dmp

      Filesize

      3.3MB

    • memory/952-108-0x0000000070720000-0x000000007076C000-memory.dmp

      Filesize

      304KB

    • memory/952-109-0x0000000070970000-0x0000000070CC7000-memory.dmp

      Filesize

      3.3MB

    • memory/1388-88-0x00000000708C0000-0x0000000070C17000-memory.dmp

      Filesize

      3.3MB

    • memory/1388-87-0x0000000070720000-0x000000007076C000-memory.dmp

      Filesize

      304KB

    • memory/1680-72-0x0000000007590000-0x0000000007634000-memory.dmp

      Filesize

      656KB

    • memory/1680-74-0x0000000007910000-0x0000000007925000-memory.dmp

      Filesize

      84KB

    • memory/1680-63-0x00000000708C0000-0x0000000070C17000-memory.dmp

      Filesize

      3.3MB

    • memory/1680-73-0x00000000078C0000-0x00000000078D1000-memory.dmp

      Filesize

      68KB

    • memory/1680-60-0x0000000005F80000-0x00000000062D7000-memory.dmp

      Filesize

      3.3MB

    • memory/1680-62-0x0000000070720000-0x000000007076C000-memory.dmp

      Filesize

      304KB

    • memory/1784-159-0x00000000707C0000-0x0000000070B17000-memory.dmp

      Filesize

      3.3MB

    • memory/1784-170-0x0000000005560000-0x0000000005575000-memory.dmp

      Filesize

      84KB

    • memory/1784-169-0x0000000007190000-0x00000000071A1000-memory.dmp

      Filesize

      68KB

    • memory/1784-155-0x00000000057B0000-0x0000000005B07000-memory.dmp

      Filesize

      3.3MB

    • memory/1784-157-0x0000000005C20000-0x0000000005C6C000-memory.dmp

      Filesize

      304KB

    • memory/1784-158-0x0000000070640000-0x000000007068C000-memory.dmp

      Filesize

      304KB

    • memory/1784-168-0x0000000006E60000-0x0000000006F04000-memory.dmp

      Filesize

      656KB

    • memory/1960-183-0x0000000070640000-0x000000007068C000-memory.dmp

      Filesize

      304KB

    • memory/1960-181-0x00000000059F0000-0x0000000005D47000-memory.dmp

      Filesize

      3.3MB

    • memory/1960-184-0x0000000070830000-0x0000000070B87000-memory.dmp

      Filesize

      3.3MB

    • memory/2488-208-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/2488-206-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/3216-201-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-229-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-217-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-226-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-241-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-238-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-235-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-223-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-232-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-244-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-211-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-220-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3216-214-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/4024-136-0x0000000070720000-0x000000007076C000-memory.dmp

      Filesize

      304KB

    • memory/4024-137-0x0000000070910000-0x0000000070C67000-memory.dmp

      Filesize

      3.3MB

    • memory/4024-133-0x0000000006090000-0x00000000063E7000-memory.dmp

      Filesize

      3.3MB

    • memory/4552-2-0x0000000004A50000-0x000000000533B000-memory.dmp

      Filesize

      8.9MB

    • memory/4552-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4552-61-0x0000000004640000-0x0000000004A43000-memory.dmp

      Filesize

      4.0MB

    • memory/4552-194-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4552-171-0x0000000004A50000-0x000000000533B000-memory.dmp

      Filesize

      8.9MB

    • memory/4552-135-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/4552-1-0x0000000004640000-0x0000000004A43000-memory.dmp

      Filesize

      4.0MB

    • memory/4688-122-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.