Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 02:49 UTC

General

  • Target

    b1a55c281d7222c9254e5cfbb6db241bf1c38189a5fff10faa323f39518063a6.exe

  • Size

    2.5MB

  • MD5

    696cd93127a61b0aaa93d5c45d2ca6f5

  • SHA1

    b5434473eed20cbd7611a4de443e6d724c63a3be

  • SHA256

    b1a55c281d7222c9254e5cfbb6db241bf1c38189a5fff10faa323f39518063a6

  • SHA512

    1609e0e835eae923416f491565e5e370cbe95a2de68df5ec4ace48010ae9766e2c53f1f8ffa3fcab2256abd4e25bb4e2150a1a1312bf964bce89c089d714cf75

  • SSDEEP

    49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxn:Mxx9NUFkQx753uWuCyyxn

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Detects executables packed with Themida 18 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1a55c281d7222c9254e5cfbb6db241bf1c38189a5fff10faa323f39518063a6.exe
    "C:\Users\Admin\AppData\Local\Temp\b1a55c281d7222c9254e5cfbb6db241bf1c38189a5fff10faa323f39518063a6.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1340
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4308
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:796
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2688
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:696

Network

  • flag-us
    DNS
    134.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    g.bing.com
    Remote address:
    8.8.8.8:53
    Request
    g.bing.com
    IN A
    Response
    g.bing.com
    IN CNAME
    g-bing-com.dual-a-0034.a-msedge.net
    g-bing-com.dual-a-0034.a-msedge.net
    IN CNAME
    dual-a-0034.a-msedge.net
    dual-a-0034.a-msedge.net
    IN A
    204.79.197.237
    dual-a-0034.a-msedge.net
    IN A
    13.107.21.237
  • flag-us
    GET
    https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De86XTHXaoRpWx0fzUpycodcTVUCUyADdupqReLJ5xSD-TP27LMG-8w6glhkK25DPrhZRPo6onhoSFVe1BQ3vvFn-GfslE8nIGEMao9ree8JziKAlYDzQKjoMXyWcMP1737RG0bjNkBNEGRdC_GZrlCAoUpjX_Fz2sDhy-VXFLyT2YUiOX0%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZnd3dy5taWNyb3NvZnQuY29tJTJmbWljcm9zb2Z0LTM2NSUyZm1pY3Jvc29mdC0zNjUtYmFzaWMtZmFxcyUzZk9DSUQlM2RjbW1sdWMyOWxxOQ%26rlid%3D44df85cb09d918cecee0e3a3a0cf4b2a&TIME=20240611T194453Z&CID=531098720&EID=531098720&tids=15000&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373&muid=57578D2216C305ECD49867D03367A2A2
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De86XTHXaoRpWx0fzUpycodcTVUCUyADdupqReLJ5xSD-TP27LMG-8w6glhkK25DPrhZRPo6onhoSFVe1BQ3vvFn-GfslE8nIGEMao9ree8JziKAlYDzQKjoMXyWcMP1737RG0bjNkBNEGRdC_GZrlCAoUpjX_Fz2sDhy-VXFLyT2YUiOX0%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZnd3dy5taWNyb3NvZnQuY29tJTJmbWljcm9zb2Z0LTM2NSUyZm1pY3Jvc29mdC0zNjUtYmFzaWMtZmFxcyUzZk9DSUQlM2RjbW1sdWMyOWxxOQ%26rlid%3D44df85cb09d918cecee0e3a3a0cf4b2a&TIME=20240611T194453Z&CID=531098720&EID=531098720&tids=15000&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373&muid=57578D2216C305ECD49867D03367A2A2 HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MUID=00D942035A386DAD1E62569F5B1F6CD1; domain=.bing.com; expires=Mon, 07-Jul-2025 02:50:03 GMT; path=/; SameSite=None; Secure; Priority=High;
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 5570BF3D7EFF4F39B002CEDD1612CA6B Ref B: LON04EDGE0606 Ref C: 2024-06-12T02:50:03Z
    date: Wed, 12 Jun 2024 02:50:02 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De86XTHXaoRpWx0fzUpycodcTVUCUyADdupqReLJ5xSD-TP27LMG-8w6glhkK25DPrhZRPo6onhoSFVe1BQ3vvFn-GfslE8nIGEMao9ree8JziKAlYDzQKjoMXyWcMP1737RG0bjNkBNEGRdC_GZrlCAoUpjX_Fz2sDhy-VXFLyT2YUiOX0%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZnd3dy5taWNyb3NvZnQuY29tJTJmbWljcm9zb2Z0LTM2NSUyZm1pY3Jvc29mdC0zNjUtYmFzaWMtZmFxcyUzZk9DSUQlM2RjbW1sdWMyOWxxOQ%26rlid%3D44df85cb09d918cecee0e3a3a0cf4b2a&TIME=20240611T194453Z&CID=531098720&EID=&tids=15000&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373&muid=57578D2216C305ECD49867D03367A2A2
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De86XTHXaoRpWx0fzUpycodcTVUCUyADdupqReLJ5xSD-TP27LMG-8w6glhkK25DPrhZRPo6onhoSFVe1BQ3vvFn-GfslE8nIGEMao9ree8JziKAlYDzQKjoMXyWcMP1737RG0bjNkBNEGRdC_GZrlCAoUpjX_Fz2sDhy-VXFLyT2YUiOX0%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZnd3dy5taWNyb3NvZnQuY29tJTJmbWljcm9zb2Z0LTM2NSUyZm1pY3Jvc29mdC0zNjUtYmFzaWMtZmFxcyUzZk9DSUQlM2RjbW1sdWMyOWxxOQ%26rlid%3D44df85cb09d918cecee0e3a3a0cf4b2a&TIME=20240611T194453Z&CID=531098720&EID=&tids=15000&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373&muid=57578D2216C305ECD49867D03367A2A2 HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=00D942035A386DAD1E62569F5B1F6CD1; _EDGE_S=SID=07E1FACCDD8C682905E4EE50DC266922
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MSPTC=1MS3AoP30txc95QciTUM9Qc3yypbzXaOAC2tNjnW1K4; domain=.bing.com; expires=Mon, 07-Jul-2025 02:50:04 GMT; path=/; Partitioned; secure; SameSite=None
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 626A94261F6B46DF958D2DD4A154848B Ref B: LON04EDGE0606 Ref C: 2024-06-12T02:50:04Z
    date: Wed, 12 Jun 2024 02:50:04 GMT
  • flag-us
    DNS
    55.36.223.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    55.36.223.20.in-addr.arpa
    IN PTR
    Response
  • flag-nl
    GET
    https://www.bing.com/aes/c.gif?RG=1aefeda892394909881c8881c0d58274&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240611T194453Z&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373
    Remote address:
    23.62.61.194:443
    Request
    GET /aes/c.gif?RG=1aefeda892394909881c8881c0d58274&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240611T194453Z&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373 HTTP/2.0
    host: www.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=00D942035A386DAD1E62569F5B1F6CD1
    Response
    HTTP/2.0 200
    cache-control: private,no-store
    pragma: no-cache
    vary: Origin
    p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: C6FA3607C87D43559E16CEC50739247D Ref B: DUS30EDGE0822 Ref C: 2024-06-12T02:50:04Z
    content-length: 0
    date: Wed, 12 Jun 2024 02:50:04 GMT
    set-cookie: _EDGE_S=SID=07E1FACCDD8C682905E4EE50DC266922; path=/; httponly; domain=bing.com
    set-cookie: MUIDB=00D942035A386DAD1E62569F5B1F6CD1; path=/; httponly; expires=Mon, 07-Jul-2025 02:50:04 GMT
    alt-svc: h3=":443"; ma=93600
    x-cdn-traceid: 0.be3d3e17.1718160604.101b13d5
  • flag-us
    DNS
    194.61.62.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    194.61.62.23.in-addr.arpa
    IN PTR
    Response
    194.61.62.23.in-addr.arpa
    IN PTR
    a23-62-61-194deploystaticakamaitechnologiescom
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
    Response
    73.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    31.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    31.243.111.52.in-addr.arpa
    IN PTR
    Response
  • 204.79.197.237:443
    https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De86XTHXaoRpWx0fzUpycodcTVUCUyADdupqReLJ5xSD-TP27LMG-8w6glhkK25DPrhZRPo6onhoSFVe1BQ3vvFn-GfslE8nIGEMao9ree8JziKAlYDzQKjoMXyWcMP1737RG0bjNkBNEGRdC_GZrlCAoUpjX_Fz2sDhy-VXFLyT2YUiOX0%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZnd3dy5taWNyb3NvZnQuY29tJTJmbWljcm9zb2Z0LTM2NSUyZm1pY3Jvc29mdC0zNjUtYmFzaWMtZmFxcyUzZk9DSUQlM2RjbW1sdWMyOWxxOQ%26rlid%3D44df85cb09d918cecee0e3a3a0cf4b2a&TIME=20240611T194453Z&CID=531098720&EID=&tids=15000&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373&muid=57578D2216C305ECD49867D03367A2A2
    tls, http2
    2.8kB
    9.6kB
    21
    18

    HTTP Request

    GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De86XTHXaoRpWx0fzUpycodcTVUCUyADdupqReLJ5xSD-TP27LMG-8w6glhkK25DPrhZRPo6onhoSFVe1BQ3vvFn-GfslE8nIGEMao9ree8JziKAlYDzQKjoMXyWcMP1737RG0bjNkBNEGRdC_GZrlCAoUpjX_Fz2sDhy-VXFLyT2YUiOX0%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZnd3dy5taWNyb3NvZnQuY29tJTJmbWljcm9zb2Z0LTM2NSUyZm1pY3Jvc29mdC0zNjUtYmFzaWMtZmFxcyUzZk9DSUQlM2RjbW1sdWMyOWxxOQ%26rlid%3D44df85cb09d918cecee0e3a3a0cf4b2a&TIME=20240611T194453Z&CID=531098720&EID=531098720&tids=15000&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373&muid=57578D2216C305ECD49867D03367A2A2

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De86XTHXaoRpWx0fzUpycodcTVUCUyADdupqReLJ5xSD-TP27LMG-8w6glhkK25DPrhZRPo6onhoSFVe1BQ3vvFn-GfslE8nIGEMao9ree8JziKAlYDzQKjoMXyWcMP1737RG0bjNkBNEGRdC_GZrlCAoUpjX_Fz2sDhy-VXFLyT2YUiOX0%26u%3DbWljcm9zb2Z0LWVkZ2UlM2FodHRwcyUzYSUyZiUyZnd3dy5taWNyb3NvZnQuY29tJTJmbWljcm9zb2Z0LTM2NSUyZm1pY3Jvc29mdC0zNjUtYmFzaWMtZmFxcyUzZk9DSUQlM2RjbW1sdWMyOWxxOQ%26rlid%3D44df85cb09d918cecee0e3a3a0cf4b2a&TIME=20240611T194453Z&CID=531098720&EID=&tids=15000&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373&muid=57578D2216C305ECD49867D03367A2A2

    HTTP Response

    204
  • 23.62.61.194:443
    https://www.bing.com/aes/c.gif?RG=1aefeda892394909881c8881c0d58274&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240611T194453Z&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373
    tls, http2
    1.5kB
    5.3kB
    17
    11

    HTTP Request

    GET https://www.bing.com/aes/c.gif?RG=1aefeda892394909881c8881c0d58274&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240611T194453Z&adUnitId=11730597&localId=w:57578D22-16C3-05EC-D498-67D03367A2A2&deviceId=6755470482742373

    HTTP Response

    200
  • 8.8.8.8:53
    134.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    134.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    g.bing.com
    dns
    56 B
    151 B
    1
    1

    DNS Request

    g.bing.com

    DNS Response

    204.79.197.237
    13.107.21.237

  • 8.8.8.8:53
    55.36.223.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    55.36.223.20.in-addr.arpa

  • 8.8.8.8:53
    194.61.62.23.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    194.61.62.23.in-addr.arpa

  • 8.8.8.8:53
    73.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    73.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    31.243.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    31.243.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    2.5MB

    MD5

    4e89ee3b9837d2952cce13a817f49ea7

    SHA1

    36711ba996a06fb5b8a8478b7c1401f9828f1d47

    SHA256

    84a4849ec7116e602734fdb983778fa487203bae18b3b47c0bbbcf835962796c

    SHA512

    8c999002b6b1f308bdca12cc990080c781345c3849c31371798b92581e8f272b1d5ef98a8c8f4e2374a9c28c35960277a04dea9b520494bd4ec8d88e4c73ae87

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    2.5MB

    MD5

    3b3b2a475df8a63d3bcf295a14c97277

    SHA1

    c59d11eff430d3f7468ddfd0b55dcde56cb68ff7

    SHA256

    30c56bc39d95bf8a0e3dc7d8af1f8f9fcd8c54cc23b08a2762a3bfc71717ee61

    SHA512

    0a033d04986961f389f33b1dac72ed056b55255e25825db0c78bc1de4088a25331824792fffed3f8c5ee2d7cda5884ffd4af41658733fd684865e542cf3766b9

  • C:\Windows\Resources\svchost.exe

    Filesize

    2.5MB

    MD5

    4434e485c9ae8e8e1f92be609df63c2a

    SHA1

    e1cf16bbc75283d4581100c8665418a287a29f4f

    SHA256

    a25bceecfb46da109ea5ae05b449fe58e3b5d8ec65cc6221fc34202e04c57a63

    SHA512

    7dd41bda94d0d7b7d9adeb0a6b41af6197f362673b4a0f393b3309253c8b77dc720ad641a615dcb394d948cac214a12c5a036b27442e0853fb55e3ccce44f1d2

  • memory/696-33-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/696-37-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/796-39-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/796-19-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/1340-1-0x0000000077E14000-0x0000000077E16000-memory.dmp

    Filesize

    8KB

  • memory/1340-41-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/1340-0-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2688-28-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2688-43-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/2688-48-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4308-10-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4308-42-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4308-44-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4308-53-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4308-61-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

  • memory/4308-63-0x0000000000400000-0x0000000000A0E000-memory.dmp

    Filesize

    6.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.