Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/05/2024, 11:25 UTC

General

  • Target

    2df97860acc8e0dfa171a1917fbd401bc4a40c1ff91835ffbf29fa0947ccf91a.exe

  • Size

    4.1MB

  • MD5

    96651138dda5d7d4450bc7cb668d6bb4

  • SHA1

    7c1c455b06c425a89fb83cbb44b95f728a673e65

  • SHA256

    2df97860acc8e0dfa171a1917fbd401bc4a40c1ff91835ffbf29fa0947ccf91a

  • SHA512

    7dd7c8a69dd1b8783a973a8961f39cebd7cf92ca193cdde73f1fedda8682e44c81c9e5351383fda597936575814436ad24f65e879e8ce911bbee087d78b870fd

  • SSDEEP

    98304:VH+PiUxpnK5pcCD6RLXH4DRMjOnEmJ5mWZ44js55cU5wvI22:VH+PiSfw6Rz4ejOEAZ44S5J5ww22

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 19 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2df97860acc8e0dfa171a1917fbd401bc4a40c1ff91835ffbf29fa0947ccf91a.exe
    "C:\Users\Admin\AppData\Local\Temp\2df97860acc8e0dfa171a1917fbd401bc4a40c1ff91835ffbf29fa0947ccf91a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4344
    • C:\Users\Admin\AppData\Local\Temp\2df97860acc8e0dfa171a1917fbd401bc4a40c1ff91835ffbf29fa0947ccf91a.exe
      "C:\Users\Admin\AppData\Local\Temp\2df97860acc8e0dfa171a1917fbd401bc4a40c1ff91835ffbf29fa0947ccf91a.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3872
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3052
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:3204
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3116
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2596
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4412
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3340
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:1872
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4224
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2488
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3424
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:540
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:4892
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4296
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4476
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:1288
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:4052

    Network

    • flag-us
      DNS
      3c644c6c-8b70-4f30-abed-ee24b120b770.uuid.dumppage.org
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      3c644c6c-8b70-4f30-abed-ee24b120b770.uuid.dumppage.org
      IN TXT
      Response
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      stun.sipgate.net
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      stun.sipgate.net
      IN A
      Response
      stun.sipgate.net
      IN CNAME
      stun.sipgate.cloud
      stun.sipgate.cloud
      IN CNAME
      a6adcb4b9bf816abe.awsglobalaccelerator.com
      a6adcb4b9bf816abe.awsglobalaccelerator.com
      IN A
      15.197.250.192
      a6adcb4b9bf816abe.awsglobalaccelerator.com
      IN A
      3.33.249.248
    • flag-us
      DNS
      carsalessystem.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      carsalessystem.com
      IN A
      Response
      carsalessystem.com
      IN A
      104.21.94.82
      carsalessystem.com
      IN A
      172.67.221.71
    • flag-us
      DNS
      82.94.21.104.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      82.94.21.104.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      self.events.data.microsoft.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      self.events.data.microsoft.com
      IN A
      Response
      self.events.data.microsoft.com
      IN CNAME
      self-events-data.trafficmanager.net
      self-events-data.trafficmanager.net
      IN CNAME
      onedscolprdaus03.australiasoutheast.cloudapp.azure.com
      onedscolprdaus03.australiasoutheast.cloudapp.azure.com
      IN A
      104.46.162.227
    • flag-us
      DNS
      server12.dumppage.org
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      server12.dumppage.org
      IN A
      Response
      server12.dumppage.org
      IN A
      185.82.216.111
    • flag-us
      DNS
      233.133.159.162.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      233.133.159.162.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      nexusrules.officeapps.live.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      nexusrules.officeapps.live.com
      IN A
      Response
      nexusrules.officeapps.live.com
      IN CNAME
      prod.nexusrules.live.com.akadns.net
      prod.nexusrules.live.com.akadns.net
      IN A
      52.111.243.30
    • flag-us
      DNS
      227.162.46.104.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      227.162.46.104.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      cdn.discordapp.com
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      cdn.discordapp.com
      IN A
      Response
      cdn.discordapp.com
      IN A
      162.159.133.233
      cdn.discordapp.com
      IN A
      162.159.134.233
      cdn.discordapp.com
      IN A
      162.159.130.233
      cdn.discordapp.com
      IN A
      162.159.135.233
      cdn.discordapp.com
      IN A
      162.159.129.233
    • flag-us
      DNS
      192.250.197.15.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      192.250.197.15.in-addr.arpa
      IN PTR
      Response
      192.250.197.15.in-addr.arpa
      IN PTR
      a6adcb4b9bf816abeawsglobalacceleratorcom
    • flag-us
      DNS
      111.216.82.185.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      111.216.82.185.in-addr.arpa
      IN PTR
      Response
      111.216.82.185.in-addr.arpa
      IN PTR
      dedic-mariadebommarez-1201693hosted-by-itldccom
    • flag-us
      DNS
      30.243.111.52.in-addr.arpa
      csrss.exe
      Remote address:
      8.8.8.8:53
      Request
      30.243.111.52.in-addr.arpa
      IN PTR
      Response
    • 185.82.216.111:443
      server12.dumppage.org
      tls
      csrss.exe
      1.7kB
      5.0kB
      14
      14
    • 162.159.133.233:443
      cdn.discordapp.com
      tls
      csrss.exe
      1.6kB
      5.9kB
      16
      15
    • 104.21.94.82:443
      carsalessystem.com
      tls
      csrss.exe
      92.3kB
      2.2MB
      1576
      1674
    • 185.82.216.111:443
      server12.dumppage.org
      tls
      csrss.exe
      1.3kB
      4.6kB
      12
      12
    • 185.82.216.111:443
      server12.dumppage.org
      tls
      csrss.exe
      2.3kB
      4.6kB
      13
      13
    • 127.0.0.1:31465
      csrss.exe
    • 8.8.8.8:53
      3c644c6c-8b70-4f30-abed-ee24b120b770.uuid.dumppage.org
      dns
      csrss.exe
      232 B
      263 B
      3
      2

      DNS Request

      3c644c6c-8b70-4f30-abed-ee24b120b770.uuid.dumppage.org

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      stun.sipgate.net
      dns
      csrss.exe
      273 B
      617 B
      4
      4

      DNS Request

      stun.sipgate.net

      DNS Response

      15.197.250.192
      3.33.249.248

      DNS Request

      carsalessystem.com

      DNS Response

      104.21.94.82
      172.67.221.71

      DNS Request

      82.94.21.104.in-addr.arpa

      DNS Request

      self.events.data.microsoft.com

      DNS Response

      104.46.162.227

    • 8.8.8.8:53
      server12.dumppage.org
      dns
      csrss.exe
      290 B
      507 B
      4
      4

      DNS Request

      server12.dumppage.org

      DNS Response

      185.82.216.111

      DNS Request

      233.133.159.162.in-addr.arpa

      DNS Request

      nexusrules.officeapps.live.com

      DNS Response

      52.111.243.30

      DNS Request

      227.162.46.104.in-addr.arpa

    • 8.8.8.8:53
      cdn.discordapp.com
      dns
      csrss.exe
      282 B
      567 B
      4
      4

      DNS Request

      cdn.discordapp.com

      DNS Response

      162.159.133.233
      162.159.134.233
      162.159.130.233
      162.159.135.233
      162.159.129.233

      DNS Request

      192.250.197.15.in-addr.arpa

      DNS Request

      111.216.82.185.in-addr.arpa

      DNS Request

      30.243.111.52.in-addr.arpa

    • 15.197.250.192:3478
      stun.sipgate.net
      csrss.exe
      48 B
      124 B
      1
      1

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cubg3hcj.v0z.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d0c46cad6c0778401e21910bd6b56b70

      SHA1

      7be418951ea96326aca445b8dfe449b2bfa0dca6

      SHA256

      9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

      SHA512

      057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      eb1cf787f1fe1e28b744b5c3af808441

      SHA1

      cbd856e97c701da8b027f55317bd6022f039b86a

      SHA256

      2420a6513a20c6208f24af91aa831df8011406fe2404ae660609a1fcb4cfe5cf

      SHA512

      d741e5fda93bc1305ce6652c60e128682c60f66e39635c20140825cd8b3a42ecd08089cd93664af20835dd776d65f9831b5e9c5573c86d82af8befa7e908363a

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      b851a76d7ecf3f28868bb950b3060d66

      SHA1

      342414e919fb55b072e0ba0323362b43a18dc2cf

      SHA256

      aa2110d72d5f68d6deae8ed159845ad15a1b66d11250d875456684e67559b4ad

      SHA512

      47b105cea024b17ace82b1cb73d89b517882e406faed8d6b3f62a33e012382cd71554befab617732ef2d52f29c2cc36d2cd6cb10c24b4a7464abc56ffe5a8f94

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      b70f8a942da09ca0af9338805ad24979

      SHA1

      0e125333e4bf423c51e99f157ed4b5f5e98874b9

      SHA256

      af6a20b600a20259202eca9f934f947bdbc33edac75041d00652261ca69c80b0

      SHA512

      c29bae774023688c84a1ceddce847553841b3cc63e706a1452cfd5663f787262ae6ca208b8ad0d71e3ddbb4528081b9ba463eabcfa1ed32f91b58f9c536eaa47

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      0d19b4cb0a4f7bc7265fcbbf6d83365d

      SHA1

      058d962e79b09679996d4617697427bc4ed32cc6

      SHA256

      14ea33f9787f566cafd7d3b1937f375f15a3010ac784c26ccb004311b2578385

      SHA512

      2c4966a5eacc1070af46e9663143244d60d7609f87a91360468e9d053f3fcc1214d430189e96ffefc010a4567ec9f8e7c4ab3355242b52ea87c9e29efc56fe96

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      44f9802a81b07f066d8afc4a9c741b6c

      SHA1

      51133d6b803c1dc1c578ba25d43f55a8b0f31cab

      SHA256

      a4105d757b6851c74daafa74defe4db49edc5ed931f82db5355aabf08c63f18b

      SHA512

      cb9b3bc29ea4577aacb78944db0415ef30c6b6c4603b65d2fea3a576746fdfde75ca6456c92ac86bc419b36c566ba90282b5258305a1c4b2053f44278b84c008

    • C:\Windows\rss\csrss.exe

      Filesize

      4.1MB

      MD5

      96651138dda5d7d4450bc7cb668d6bb4

      SHA1

      7c1c455b06c425a89fb83cbb44b95f728a673e65

      SHA256

      2df97860acc8e0dfa171a1917fbd401bc4a40c1ff91835ffbf29fa0947ccf91a

      SHA512

      7dd7c8a69dd1b8783a973a8961f39cebd7cf92ca193cdde73f1fedda8682e44c81c9e5351383fda597936575814436ad24f65e879e8ce911bbee087d78b870fd

    • C:\Windows\windefender.exe

      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/2488-163-0x00000000069B0000-0x00000000069FC000-memory.dmp

      Filesize

      304KB

    • memory/2488-164-0x00000000702E0000-0x000000007032C000-memory.dmp

      Filesize

      304KB

    • memory/2488-176-0x00000000067A0000-0x00000000067B5000-memory.dmp

      Filesize

      84KB

    • memory/2488-165-0x0000000070530000-0x0000000070887000-memory.dmp

      Filesize

      3.3MB

    • memory/2488-153-0x00000000063D0000-0x0000000006727000-memory.dmp

      Filesize

      3.3MB

    • memory/2488-174-0x0000000007BD0000-0x0000000007C74000-memory.dmp

      Filesize

      656KB

    • memory/2488-175-0x0000000006760000-0x0000000006771000-memory.dmp

      Filesize

      68KB

    • memory/2596-112-0x00000000705E0000-0x0000000070937000-memory.dmp

      Filesize

      3.3MB

    • memory/2596-111-0x0000000070460000-0x00000000704AC000-memory.dmp

      Filesize

      304KB

    • memory/2596-109-0x0000000005610000-0x0000000005967000-memory.dmp

      Filesize

      3.3MB

    • memory/3056-51-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/3056-1-0x0000000004150000-0x0000000004553000-memory.dmp

      Filesize

      4.0MB

    • memory/3056-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/3056-2-0x0000000004560000-0x0000000004E4B000-memory.dmp

      Filesize

      8.9MB

    • memory/3056-53-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/3056-54-0x0000000004560000-0x0000000004E4B000-memory.dmp

      Filesize

      8.9MB

    • memory/3116-90-0x0000000070460000-0x00000000704AC000-memory.dmp

      Filesize

      304KB

    • memory/3116-91-0x00000000706B0000-0x0000000070A07000-memory.dmp

      Filesize

      3.3MB

    • memory/3340-136-0x0000000005520000-0x0000000005877000-memory.dmp

      Filesize

      3.3MB

    • memory/3340-138-0x0000000005EF0000-0x0000000005F3C000-memory.dmp

      Filesize

      304KB

    • memory/3340-139-0x00000000703C0000-0x000000007040C000-memory.dmp

      Filesize

      304KB

    • memory/3340-140-0x00000000705D0000-0x0000000070927000-memory.dmp

      Filesize

      3.3MB

    • memory/3340-151-0x0000000005990000-0x00000000059A5000-memory.dmp

      Filesize

      84KB

    • memory/3340-150-0x0000000005950000-0x0000000005961000-memory.dmp

      Filesize

      68KB

    • memory/3340-149-0x0000000006E70000-0x0000000006F14000-memory.dmp

      Filesize

      656KB

    • memory/3424-188-0x0000000070530000-0x0000000070887000-memory.dmp

      Filesize

      3.3MB

    • memory/3424-187-0x00000000702E0000-0x000000007032C000-memory.dmp

      Filesize

      304KB

    • memory/3872-64-0x0000000006290000-0x00000000062DC000-memory.dmp

      Filesize

      304KB

    • memory/3872-65-0x0000000070460000-0x00000000704AC000-memory.dmp

      Filesize

      304KB

    • memory/3872-66-0x00000000706B0000-0x0000000070A07000-memory.dmp

      Filesize

      3.3MB

    • memory/3872-75-0x0000000007450000-0x00000000074F4000-memory.dmp

      Filesize

      656KB

    • memory/3872-76-0x0000000007780000-0x0000000007791000-memory.dmp

      Filesize

      68KB

    • memory/3872-77-0x00000000077D0000-0x00000000077E5000-memory.dmp

      Filesize

      84KB

    • memory/3872-63-0x0000000005CF0000-0x0000000006047000-memory.dmp

      Filesize

      3.3MB

    • memory/4052-210-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4052-214-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4052-217-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4052-224-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4296-207-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4296-211-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4344-50-0x00000000740E0000-0x0000000074891000-memory.dmp

      Filesize

      7.7MB

    • memory/4344-5-0x0000000002740000-0x0000000002776000-memory.dmp

      Filesize

      216KB

    • memory/4344-44-0x00000000075C0000-0x00000000075CE000-memory.dmp

      Filesize

      56KB

    • memory/4344-25-0x0000000070350000-0x000000007039C000-memory.dmp

      Filesize

      304KB

    • memory/4344-23-0x00000000064C0000-0x0000000006506000-memory.dmp

      Filesize

      280KB

    • memory/4344-37-0x00000000073E0000-0x0000000007484000-memory.dmp

      Filesize

      656KB

    • memory/4344-36-0x00000000740E0000-0x0000000074891000-memory.dmp

      Filesize

      7.7MB

    • memory/4344-38-0x00000000740E0000-0x0000000074891000-memory.dmp

      Filesize

      7.7MB

    • memory/4344-40-0x0000000007510000-0x000000000752A000-memory.dmp

      Filesize

      104KB

    • memory/4344-39-0x0000000007B50000-0x00000000081CA000-memory.dmp

      Filesize

      6.5MB

    • memory/4344-41-0x0000000007550000-0x000000000755A000-memory.dmp

      Filesize

      40KB

    • memory/4344-22-0x0000000005FE0000-0x000000000602C000-memory.dmp

      Filesize

      304KB

    • memory/4344-21-0x0000000005F60000-0x0000000005F7E000-memory.dmp

      Filesize

      120KB

    • memory/4344-20-0x0000000005B80000-0x0000000005ED7000-memory.dmp

      Filesize

      3.3MB

    • memory/4344-11-0x00000000058B0000-0x0000000005916000-memory.dmp

      Filesize

      408KB

    • memory/4344-10-0x0000000005140000-0x00000000051A6000-memory.dmp

      Filesize

      408KB

    • memory/4344-9-0x00000000050A0000-0x00000000050C2000-memory.dmp

      Filesize

      136KB

    • memory/4344-35-0x00000000073C0000-0x00000000073DE000-memory.dmp

      Filesize

      120KB

    • memory/4344-6-0x00000000051D0000-0x00000000057FA000-memory.dmp

      Filesize

      6.2MB

    • memory/4344-7-0x00000000740E0000-0x0000000074891000-memory.dmp

      Filesize

      7.7MB

    • memory/4344-24-0x0000000007380000-0x00000000073B4000-memory.dmp

      Filesize

      208KB

    • memory/4344-42-0x0000000007610000-0x00000000076A6000-memory.dmp

      Filesize

      600KB

    • memory/4344-8-0x00000000740E0000-0x0000000074891000-memory.dmp

      Filesize

      7.7MB

    • memory/4344-45-0x00000000075D0000-0x00000000075E5000-memory.dmp

      Filesize

      84KB

    • memory/4344-4-0x00000000740EE000-0x00000000740EF000-memory.dmp

      Filesize

      4KB

    • memory/4344-43-0x0000000007580000-0x0000000007591000-memory.dmp

      Filesize

      68KB

    • memory/4344-47-0x00000000076B0000-0x00000000076B8000-memory.dmp

      Filesize

      32KB

    • memory/4344-26-0x00000000704D0000-0x0000000070827000-memory.dmp

      Filesize

      3.3MB

    • memory/4344-46-0x00000000076D0000-0x00000000076EA000-memory.dmp

      Filesize

      104KB

    • memory/4412-226-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-231-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-216-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-203-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-218-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-212-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-223-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-234-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-213-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-221-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-228-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-229-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/4412-220-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    • memory/5016-125-0x0000000000400000-0x0000000002364000-memory.dmp

      Filesize

      31.4MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.