Resubmissions

14/06/2024, 17:55 UTC

240614-whnzas1ara 10

14/06/2024, 17:12 UTC

240614-vqvldazapd 10

14/06/2024, 17:11 UTC

240614-vp9c5stanq 10

12/06/2024, 23:53 UTC

240612-3xrgaswcpa 10

Analysis

  • max time kernel
    288s
  • max time network
    285s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 23:53 UTC

General

  • Target

    3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe

  • Size

    747KB

  • MD5

    3cd2595e3d20f8200d3ddf84b81932de

  • SHA1

    c05f5a5fd2e0da7be16621a5482541f3d492891c

  • SHA256

    3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c

  • SHA512

    fbc314a53bb2eeba48c0cf5793cc93b1f9361e62aa38de34c941d57bb677b0868e651ed46b783fef939c4b9659048b4a555c3e647201aae7ce1f9e9bf0731670

  • SSDEEP

    12288:H7nYP1+rSlwFON6zXeEt+f2VtTwfyfyp4P7r9r/+ppppppppppppppppppppppp0:HDYP1+rDOkKderNqS1qU

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

cix

Decoy

stephaniperold.com

sorairo12.com

palumasteknik.com

marketing4proptech.com

iwanttoheargod.com

structured-waters.com

sunvalleyvacations.net

sanketweb.com

tmasco.com

d-valentine.com

engmousavi.com

lithiumtolashes.com

texastramper.com

shoemall.store

beginningguitarbook.com

wonderlustnfairytales.com

bizinabox.store

kmacg.net

cashgold4cash.com

smtpguide.com

Signatures

  • 404 Keylogger

    Information stealer and keylogger first seen in 2019.

  • 404 Keylogger Main Executable 2 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe
      "C:\Users\Admin\AppData\Local\Temp\3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Users\Admin\AppData\Local\Temp\3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe
        "C:\Users\Admin\AppData\Local\Temp\3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe"
        3⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Users\Admin\Pinatype\Coseismic.scr
          "C:\Users\Admin\Pinatype\Coseismic.scr" /S
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4440
          • C:\Users\Admin\Pinatype\Coseismic.scr
            "C:\Users\Admin\Pinatype\Coseismic.scr" /S
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2748
        • C:\Users\Admin\Payment receipt.exe
          "C:\Users\Admin\Payment receipt.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2548
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 1472
            5⤵
            • Program crash
            PID:1732
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3388
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\Pinatype\Coseismic.scr"
        3⤵
          PID:1548
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2548 -ip 2548
      1⤵
        PID:2704

      Network

      • flag-us
        DNS
        checkip.dyndns.org
        Payment receipt.exe
        Remote address:
        8.8.8.8:53
        Request
        checkip.dyndns.org
        IN A
      • flag-us
        DNS
        checkip.dyndns.org
        Payment receipt.exe
        Remote address:
        8.8.8.8:53
        Request
        checkip.dyndns.org
        IN A
      • flag-us
        DNS
        checkip.dyndns.org
        Payment receipt.exe
        Remote address:
        8.8.8.8:53
        Request
        checkip.dyndns.org
        IN A
      • flag-us
        DNS
        checkip.dyndns.org
        Payment receipt.exe
        Remote address:
        8.8.8.8:53
        Request
        checkip.dyndns.org
        IN A
      • flag-us
        DNS
        checkip.dyndns.org
        Payment receipt.exe
        Remote address:
        8.8.8.8:53
        Request
        checkip.dyndns.org
        IN A
      • flag-us
        DNS
        www.marketing4proptech.com
        Remote address:
        8.8.8.8:53
        Request
        www.marketing4proptech.com
        IN A
      • flag-us
        DNS
        www.marketing4proptech.com
        Remote address:
        8.8.8.8:53
        Request
        www.marketing4proptech.com
        IN A
      • flag-us
        DNS
        www.marketing4proptech.com
        Remote address:
        8.8.8.8:53
        Request
        www.marketing4proptech.com
        IN A
      • flag-us
        DNS
        www.marketing4proptech.com
        Remote address:
        8.8.8.8:53
        Request
        www.marketing4proptech.com
        IN A
      • flag-us
        DNS
        www.marketing4proptech.com
        Remote address:
        8.8.8.8:53
        Request
        www.marketing4proptech.com
        IN A
      • flag-us
        DNS
        www.salonluckyseven.biz
        Remote address:
        8.8.8.8:53
        Request
        www.salonluckyseven.biz
        IN A
      • flag-us
        DNS
        www.salonluckyseven.biz
        Remote address:
        8.8.8.8:53
        Request
        www.salonluckyseven.biz
        IN A
      • flag-us
        DNS
        www.salonluckyseven.biz
        Remote address:
        8.8.8.8:53
        Request
        www.salonluckyseven.biz
        IN A
      • flag-us
        DNS
        www.salonluckyseven.biz
        Remote address:
        8.8.8.8:53
        Request
        www.salonluckyseven.biz
        IN A
      • flag-us
        DNS
        www.salonluckyseven.biz
        Remote address:
        8.8.8.8:53
        Request
        www.salonluckyseven.biz
        IN A
      • flag-us
        DNS
        www.stephaniperold.com
        Remote address:
        8.8.8.8:53
        Request
        www.stephaniperold.com
        IN A
      • flag-us
        DNS
        www.stephaniperold.com
        Remote address:
        8.8.8.8:53
        Request
        www.stephaniperold.com
        IN A
      • flag-us
        DNS
        www.stephaniperold.com
        Remote address:
        8.8.8.8:53
        Request
        www.stephaniperold.com
        IN A
      • flag-us
        DNS
        www.stephaniperold.com
        Remote address:
        8.8.8.8:53
        Request
        www.stephaniperold.com
        IN A
      • flag-us
        DNS
        www.stephaniperold.com
        Remote address:
        8.8.8.8:53
        Request
        www.stephaniperold.com
        IN A
      • flag-us
        DNS
        www.cashgold4cash.com
        Remote address:
        8.8.8.8:53
        Request
        www.cashgold4cash.com
        IN A
      • flag-us
        DNS
        www.cashgold4cash.com
        Remote address:
        8.8.8.8:53
        Request
        www.cashgold4cash.com
        IN A
      • flag-us
        DNS
        www.cashgold4cash.com
        Remote address:
        8.8.8.8:53
        Request
        www.cashgold4cash.com
        IN A
      • flag-us
        DNS
        www.cashgold4cash.com
        Remote address:
        8.8.8.8:53
        Request
        www.cashgold4cash.com
        IN A
      • flag-us
        DNS
        www.cashgold4cash.com
        Remote address:
        8.8.8.8:53
        Request
        www.cashgold4cash.com
        IN A
      • flag-us
        DNS
        www.beginningguitarbook.com
        Remote address:
        8.8.8.8:53
        Request
        www.beginningguitarbook.com
        IN A
      • flag-us
        DNS
        www.beginningguitarbook.com
        Remote address:
        8.8.8.8:53
        Request
        www.beginningguitarbook.com
        IN A
      • flag-us
        DNS
        www.beginningguitarbook.com
        Remote address:
        8.8.8.8:53
        Request
        www.beginningguitarbook.com
        IN A
      • flag-us
        DNS
        www.beginningguitarbook.com
        Remote address:
        8.8.8.8:53
        Request
        www.beginningguitarbook.com
        IN A
      • flag-us
        DNS
        www.beginningguitarbook.com
        Remote address:
        8.8.8.8:53
        Request
        www.beginningguitarbook.com
        IN A
      • flag-us
        DNS
        www.wolvesretreats.com
        Remote address:
        8.8.8.8:53
        Request
        www.wolvesretreats.com
        IN A
      • flag-us
        DNS
        www.wolvesretreats.com
        Remote address:
        8.8.8.8:53
        Request
        www.wolvesretreats.com
        IN A
      • flag-us
        DNS
        www.wolvesretreats.com
        Remote address:
        8.8.8.8:53
        Request
        www.wolvesretreats.com
        IN A
      • flag-us
        DNS
        www.wolvesretreats.com
        Remote address:
        8.8.8.8:53
        Request
        www.wolvesretreats.com
        IN A
      • flag-us
        DNS
        www.wolvesretreats.com
        Remote address:
        8.8.8.8:53
        Request
        www.wolvesretreats.com
        IN A
      • flag-us
        DNS
        www.lstjs.com
        Remote address:
        8.8.8.8:53
        Request
        www.lstjs.com
        IN A
      • flag-us
        DNS
        www.lstjs.com
        Remote address:
        8.8.8.8:53
        Request
        www.lstjs.com
        IN A
      • flag-us
        DNS
        www.lstjs.com
        Remote address:
        8.8.8.8:53
        Request
        www.lstjs.com
        IN A
      • flag-us
        DNS
        www.lstjs.com
        Remote address:
        8.8.8.8:53
        Request
        www.lstjs.com
        IN A
      • flag-us
        DNS
        www.lstjs.com
        Remote address:
        8.8.8.8:53
        Request
        www.lstjs.com
        IN A
      • flag-us
        DNS
        www.sanketweb.com
        Remote address:
        8.8.8.8:53
        Request
        www.sanketweb.com
        IN A
      • flag-us
        DNS
        www.sanketweb.com
        Remote address:
        8.8.8.8:53
        Request
        www.sanketweb.com
        IN A
      • flag-us
        DNS
        www.sanketweb.com
        Remote address:
        8.8.8.8:53
        Request
        www.sanketweb.com
        IN A
      • flag-us
        DNS
        www.sanketweb.com
        Remote address:
        8.8.8.8:53
        Request
        www.sanketweb.com
        IN A
      • flag-us
        DNS
        www.sanketweb.com
        Remote address:
        8.8.8.8:53
        Request
        www.sanketweb.com
        IN A
      • flag-us
        DNS
        www.videostigers.com
        Remote address:
        8.8.8.8:53
        Request
        www.videostigers.com
        IN A
      • flag-us
        DNS
        www.videostigers.com
        Remote address:
        8.8.8.8:53
        Request
        www.videostigers.com
        IN A
      • flag-us
        DNS
        www.videostigers.com
        Remote address:
        8.8.8.8:53
        Request
        www.videostigers.com
        IN A
      • flag-us
        DNS
        www.videostigers.com
        Remote address:
        8.8.8.8:53
        Request
        www.videostigers.com
        IN A
      • flag-us
        DNS
        www.videostigers.com
        Remote address:
        8.8.8.8:53
        Request
        www.videostigers.com
        IN A
      • flag-us
        DNS
        www.sweeditalyphotography.com
        Remote address:
        8.8.8.8:53
        Request
        www.sweeditalyphotography.com
        IN A
      • flag-us
        DNS
        www.sweeditalyphotography.com
        Remote address:
        8.8.8.8:53
        Request
        www.sweeditalyphotography.com
        IN A
      • flag-us
        DNS
        www.sweeditalyphotography.com
        Remote address:
        8.8.8.8:53
        Request
        www.sweeditalyphotography.com
        IN A
      • flag-us
        DNS
        www.sweeditalyphotography.com
        Remote address:
        8.8.8.8:53
        Request
        www.sweeditalyphotography.com
        IN A
      • flag-us
        DNS
        www.sweeditalyphotography.com
        Remote address:
        8.8.8.8:53
        Request
        www.sweeditalyphotography.com
        IN A
      • flag-us
        DNS
        www.mushoku40dai.com
        Remote address:
        8.8.8.8:53
        Request
        www.mushoku40dai.com
        IN A
      • flag-us
        DNS
        www.mushoku40dai.com
        Remote address:
        8.8.8.8:53
        Request
        www.mushoku40dai.com
        IN A
      • flag-us
        DNS
        www.mushoku40dai.com
        Remote address:
        8.8.8.8:53
        Request
        www.mushoku40dai.com
        IN A
      • flag-us
        DNS
        www.mushoku40dai.com
        Remote address:
        8.8.8.8:53
        Request
        www.mushoku40dai.com
        IN A
      • flag-us
        DNS
        www.mushoku40dai.com
        Remote address:
        8.8.8.8:53
        Request
        www.mushoku40dai.com
        IN A
      • flag-us
        DNS
        www.mmbl365.net
        Remote address:
        8.8.8.8:53
        Request
        www.mmbl365.net
        IN A
      • flag-us
        DNS
        www.mmbl365.net
        Remote address:
        8.8.8.8:53
        Request
        www.mmbl365.net
        IN A
      • flag-us
        DNS
        www.mmbl365.net
        Remote address:
        8.8.8.8:53
        Request
        www.mmbl365.net
        IN A
      • flag-us
        DNS
        www.mmbl365.net
        Remote address:
        8.8.8.8:53
        Request
        www.mmbl365.net
        IN A
      • flag-us
        DNS
        www.mmbl365.net
        Remote address:
        8.8.8.8:53
        Request
        www.mmbl365.net
        IN A
      • flag-us
        DNS
        www.stakeblock.com
        Remote address:
        8.8.8.8:53
        Request
        www.stakeblock.com
        IN A
      • flag-us
        DNS
        www.stakeblock.com
        Remote address:
        8.8.8.8:53
        Request
        www.stakeblock.com
        IN A
      • flag-us
        DNS
        www.stakeblock.com
        Remote address:
        8.8.8.8:53
        Request
        www.stakeblock.com
        IN A
      • flag-us
        DNS
        www.stakeblock.com
        Remote address:
        8.8.8.8:53
        Request
        www.stakeblock.com
        IN A
      • flag-us
        DNS
        www.stakeblock.com
        Remote address:
        8.8.8.8:53
        Request
        www.stakeblock.com
        IN A
      No results found
      • 8.8.8.8:53
        checkip.dyndns.org
        dns
        Payment receipt.exe
        320 B
        5

        DNS Request

        checkip.dyndns.org

        DNS Request

        checkip.dyndns.org

        DNS Request

        checkip.dyndns.org

        DNS Request

        checkip.dyndns.org

        DNS Request

        checkip.dyndns.org

      • 8.8.8.8:53
        www.marketing4proptech.com
        dns
        360 B
        5

        DNS Request

        www.marketing4proptech.com

        DNS Request

        www.marketing4proptech.com

        DNS Request

        www.marketing4proptech.com

        DNS Request

        www.marketing4proptech.com

        DNS Request

        www.marketing4proptech.com

      • 8.8.8.8:53
        www.salonluckyseven.biz
        dns
        345 B
        5

        DNS Request

        www.salonluckyseven.biz

        DNS Request

        www.salonluckyseven.biz

        DNS Request

        www.salonluckyseven.biz

        DNS Request

        www.salonluckyseven.biz

        DNS Request

        www.salonluckyseven.biz

      • 8.8.8.8:53
        www.stephaniperold.com
        dns
        340 B
        5

        DNS Request

        www.stephaniperold.com

        DNS Request

        www.stephaniperold.com

        DNS Request

        www.stephaniperold.com

        DNS Request

        www.stephaniperold.com

        DNS Request

        www.stephaniperold.com

      • 8.8.8.8:53
        www.cashgold4cash.com
        dns
        335 B
        5

        DNS Request

        www.cashgold4cash.com

        DNS Request

        www.cashgold4cash.com

        DNS Request

        www.cashgold4cash.com

        DNS Request

        www.cashgold4cash.com

        DNS Request

        www.cashgold4cash.com

      • 8.8.8.8:53
        www.beginningguitarbook.com
        dns
        365 B
        5

        DNS Request

        www.beginningguitarbook.com

        DNS Request

        www.beginningguitarbook.com

        DNS Request

        www.beginningguitarbook.com

        DNS Request

        www.beginningguitarbook.com

        DNS Request

        www.beginningguitarbook.com

      • 8.8.8.8:53
        www.wolvesretreats.com
        dns
        340 B
        5

        DNS Request

        www.wolvesretreats.com

        DNS Request

        www.wolvesretreats.com

        DNS Request

        www.wolvesretreats.com

        DNS Request

        www.wolvesretreats.com

        DNS Request

        www.wolvesretreats.com

      • 8.8.8.8:53
        www.lstjs.com
        dns
        295 B
        5

        DNS Request

        www.lstjs.com

        DNS Request

        www.lstjs.com

        DNS Request

        www.lstjs.com

        DNS Request

        www.lstjs.com

        DNS Request

        www.lstjs.com

      • 8.8.8.8:53
        www.sanketweb.com
        dns
        315 B
        5

        DNS Request

        www.sanketweb.com

        DNS Request

        www.sanketweb.com

        DNS Request

        www.sanketweb.com

        DNS Request

        www.sanketweb.com

        DNS Request

        www.sanketweb.com

      • 8.8.8.8:53
        www.videostigers.com
        dns
        330 B
        5

        DNS Request

        www.videostigers.com

        DNS Request

        www.videostigers.com

        DNS Request

        www.videostigers.com

        DNS Request

        www.videostigers.com

        DNS Request

        www.videostigers.com

      • 8.8.8.8:53
        www.sweeditalyphotography.com
        dns
        375 B
        5

        DNS Request

        www.sweeditalyphotography.com

        DNS Request

        www.sweeditalyphotography.com

        DNS Request

        www.sweeditalyphotography.com

        DNS Request

        www.sweeditalyphotography.com

        DNS Request

        www.sweeditalyphotography.com

      • 8.8.8.8:53
        www.mushoku40dai.com
        dns
        330 B
        5

        DNS Request

        www.mushoku40dai.com

        DNS Request

        www.mushoku40dai.com

        DNS Request

        www.mushoku40dai.com

        DNS Request

        www.mushoku40dai.com

        DNS Request

        www.mushoku40dai.com

      • 8.8.8.8:53
        www.mmbl365.net
        dns
        305 B
        5

        DNS Request

        www.mmbl365.net

        DNS Request

        www.mmbl365.net

        DNS Request

        www.mmbl365.net

        DNS Request

        www.mmbl365.net

        DNS Request

        www.mmbl365.net

      • 8.8.8.8:53
        www.stakeblock.com
        dns
        320 B
        5

        DNS Request

        www.stakeblock.com

        DNS Request

        www.stakeblock.com

        DNS Request

        www.stakeblock.com

        DNS Request

        www.stakeblock.com

        DNS Request

        www.stakeblock.com

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Payment receipt.exe

        Filesize

        98KB

        MD5

        f064015d967ac5fbedbe21c01689f388

        SHA1

        4f2044ea34938b045c5e62c389f3c62c44cb5392

        SHA256

        980563afc8a4af6029ef7266392765e4ed9cf23eb242078701b65f5d9078b0af

        SHA512

        2bf694bbada5bc84ec2e68b4b8e4a6c3b747c14e5e4f5aae0d25c5c94a44ed3df16b2384a966da9ce1d405441eb2727af22868204cca0a2b157a7ae0efedd67f

      • C:\Users\Admin\Pinatype\Coseismic.scr

        Filesize

        747KB

        MD5

        3cd2595e3d20f8200d3ddf84b81932de

        SHA1

        c05f5a5fd2e0da7be16621a5482541f3d492891c

        SHA256

        3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c

        SHA512

        fbc314a53bb2eeba48c0cf5793cc93b1f9361e62aa38de34c941d57bb677b0868e651ed46b783fef939c4b9659048b4a555c3e647201aae7ce1f9e9bf0731670

      • C:\Windows\win.ini

        Filesize

        123B

        MD5

        6bf517432f65eb7f0d18d574bf14124c

        SHA1

        5b9f37c1dd1318ebbec3bd2f07c109eb9d22c727

        SHA256

        6e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46

        SHA512

        7b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06

      • memory/2548-47-0x0000000000140000-0x000000000015E000-memory.dmp

        Filesize

        120KB

      • memory/2548-49-0x0000000004BE0000-0x0000000004C7C000-memory.dmp

        Filesize

        624KB

      • memory/2548-48-0x0000000005190000-0x0000000005734000-memory.dmp

        Filesize

        5.6MB

      • memory/2748-58-0x0000000002160000-0x000000000216A000-memory.dmp

        Filesize

        40KB

      • memory/2748-57-0x0000000000400000-0x00000000004BE000-memory.dmp

        Filesize

        760KB

      • memory/2748-60-0x0000000000400000-0x00000000004BE000-memory.dmp

        Filesize

        760KB

      • memory/3388-61-0x0000000000F50000-0x0000000000F77000-memory.dmp

        Filesize

        156KB

      • memory/3504-64-0x0000000008C50000-0x0000000008CF2000-memory.dmp

        Filesize

        648KB

      • memory/4508-11-0x0000000000690000-0x000000000069A000-memory.dmp

        Filesize

        40KB

      • memory/5016-4-0x0000000077261000-0x0000000077381000-memory.dmp

        Filesize

        1.1MB

      • memory/5016-3-0x0000000002A70000-0x0000000002A7A000-memory.dmp

        Filesize

        40KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.