Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2025, 19:54 UTC

General

  • Target

    2025-02-02_f48605f506b20afc9f3bc5a77d0c373f_mafia.exe

  • Size

    11.1MB

  • MD5

    f48605f506b20afc9f3bc5a77d0c373f

  • SHA1

    e1bcbb011c3ed1496a13314bc72cf1700b2f7e96

  • SHA256

    06bd0dc28db9c7f463fd3c178a0eef882b4cdbff118d95389b1cafa8ab93e617

  • SHA512

    cd8cf10385f06585196dfc18e3a548972b2274aeb4404ce6b58aedc36139190cade4d2d35387bda48895551beb2d35d82ad13a3edf0d7870d592bca5725a4f19

  • SSDEEP

    196608:/yXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXn:aXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX3

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Tofsee family
  • Creates new service(s) 2 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-02_f48605f506b20afc9f3bc5a77d0c373f_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-02_f48605f506b20afc9f3bc5a77d0c373f_mafia.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3196
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vqfusmsn\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1564
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kpzuoaxz.exe" C:\Windows\SysWOW64\vqfusmsn\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2500
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create vqfusmsn binPath= "C:\Windows\SysWOW64\vqfusmsn\kpzuoaxz.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-02-02_f48605f506b20afc9f3bc5a77d0c373f_mafia.exe\"" type= own start= auto DisplayName= "wifi support"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:208
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description vqfusmsn "wifi internet conection"
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1992
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" start vqfusmsn
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:5068
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:4708
  • C:\Windows\SysWOW64\vqfusmsn\kpzuoaxz.exe
    C:\Windows\SysWOW64\vqfusmsn\kpzuoaxz.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-02-02_f48605f506b20afc9f3bc5a77d0c373f_mafia.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Sets service image path in registry
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:4388

Network

  • flag-us
    DNS
    g.bing.com
    Remote address:
    8.8.8.8:53
    Request
    g.bing.com
    IN A
    Response
    g.bing.com
    IN CNAME
    g-bing-com.ax-0001.ax-msedge.net
    g-bing-com.ax-0001.ax-msedge.net
    IN CNAME
    ax-0001.ax-msedge.net
    ax-0001.ax-msedge.net
    IN A
    150.171.27.10
    ax-0001.ax-msedge.net
    IN A
    150.171.28.10
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid=
    Remote address:
    150.171.27.10:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MUID=19B067E1D7A06D5206507266D6406C96; domain=.bing.com; expires=Fri, 27-Feb-2026 19:54:09 GMT; path=/; SameSite=None; Secure; Priority=High;
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: E19F2847316145DDA3B4E4624761E549 Ref B: LON04EDGE1215 Ref C: 2025-02-02T19:54:09Z
    date: Sun, 02 Feb 2025 19:54:08 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid=
    Remote address:
    150.171.27.10:443
    Request
    GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=19B067E1D7A06D5206507266D6406C96
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MSPTC=3nPyNXTneN4gjaD41JM9_ReG3ZpgBohpT-E8Gawg7ds; domain=.bing.com; expires=Fri, 27-Feb-2026 19:54:09 GMT; path=/; Partitioned; secure; SameSite=None
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 6FE8BB0F28844BFBB38A65EDBA39E4A9 Ref B: LON04EDGE1215 Ref C: 2025-02-02T19:54:09Z
    date: Sun, 02 Feb 2025 19:54:08 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid=
    Remote address:
    150.171.27.10:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=19B067E1D7A06D5206507266D6406C96; MSPTC=3nPyNXTneN4gjaD41JM9_ReG3ZpgBohpT-E8Gawg7ds
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: FC31E7C494844EEF9B56E7C45B3EDA46 Ref B: LON04EDGE1215 Ref C: 2025-02-02T19:54:09Z
    date: Sun, 02 Feb 2025 19:54:08 GMT
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    10.27.171.150.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    10.27.171.150.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    1.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    1.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    13.153.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.153.16.2.in-addr.arpa
    IN PTR
    Response
    13.153.16.2.in-addr.arpa
    IN PTR
    a2-16-153-13deploystaticakamaitechnologiescom
  • flag-us
    DNS
    57.169.31.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.169.31.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    microsoft.com
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    microsoft.com
    IN A
    Response
    microsoft.com
    IN A
    20.236.44.162
    microsoft.com
    IN A
    20.76.201.171
    microsoft.com
    IN A
    20.112.250.133
    microsoft.com
    IN A
    20.231.239.246
    microsoft.com
    IN A
    20.70.246.20
  • flag-us
    DNS
    microsoft.com
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    microsoft.com
    IN MX
    Response
    microsoft.com
    IN MX
    microsoft-commail protectionoutlook�
  • flag-us
    DNS
    microsoft-com.mail.protection.outlook.com
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    microsoft-com.mail.protection.outlook.com
    IN A
    Response
    microsoft-com.mail.protection.outlook.com
    IN A
    52.101.8.49
    microsoft-com.mail.protection.outlook.com
    IN A
    52.101.11.0
    microsoft-com.mail.protection.outlook.com
    IN A
    52.101.42.0
    microsoft-com.mail.protection.outlook.com
    IN A
    52.101.40.26
  • flag-us
    DNS
    162.44.236.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    162.44.236.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    yahoo.com
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    yahoo.com
    IN MX
    Response
    yahoo.com
    IN MX
    mta5am0yahoodnsnet
    yahoo.com
    IN MX
    mta6�.
    yahoo.com
    IN MX
    mta7�.
  • flag-us
    DNS
    mta5.am0.yahoodns.net
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    mta5.am0.yahoodns.net
    IN A
    Response
    mta5.am0.yahoodns.net
    IN A
    67.195.228.111
    mta5.am0.yahoodns.net
    IN A
    98.136.96.77
    mta5.am0.yahoodns.net
    IN A
    98.136.96.76
    mta5.am0.yahoodns.net
    IN A
    67.195.204.77
    mta5.am0.yahoodns.net
    IN A
    67.195.204.74
    mta5.am0.yahoodns.net
    IN A
    98.136.96.75
    mta5.am0.yahoodns.net
    IN A
    67.195.228.109
    mta5.am0.yahoodns.net
    IN A
    67.195.204.79
  • flag-us
    DNS
    56.163.245.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.163.245.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    181.129.81.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    181.129.81.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    google.com
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    google.com
    IN MX
    Response
    google.com
    IN MX
    smtp�
  • flag-us
    DNS
    smtp.google.com
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    smtp.google.com
    IN A
    Response
    smtp.google.com
    IN A
    74.125.206.27
    smtp.google.com
    IN A
    64.233.184.27
    smtp.google.com
    IN A
    142.251.168.26
    smtp.google.com
    IN A
    64.233.184.26
    smtp.google.com
    IN A
    142.251.168.27
  • flag-us
    DNS
    mail.ru
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    mail.ru
    IN MX
    Response
    mail.ru
    IN MX
    mxs�
  • flag-us
    DNS
    mxs.mail.ru
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    mxs.mail.ru
    IN A
    Response
    mxs.mail.ru
    IN A
    217.69.139.150
    mxs.mail.ru
    IN A
    94.100.180.31
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    43.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 150.171.27.10:443
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid=
    tls, http2
    2.0kB
    9.4kB
    21
    19

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1be0a4a5a0084a7da1f325bf1163fe03&localId=w:0E6DBFDF-A422-D12B-C993-83A8853F7845&deviceId=6966578605783440&anid=

    HTTP Response

    204
  • 20.236.44.162:80
    microsoft.com
    svchost.exe
    190 B
    92 B
    4
    2
  • 52.101.8.49:25
    microsoft-com.mail.protection.outlook.com
    svchost.exe
    260 B
    5
  • 43.231.4.7:443
    svchost.exe
    260 B
    5
  • 67.195.228.111:25
    mta5.am0.yahoodns.net
    svchost.exe
    260 B
    5
  • 74.125.206.27:25
    smtp.google.com
    svchost.exe
    260 B
    5
  • 43.231.4.7:443
    svchost.exe
    260 B
    5
  • 217.69.139.150:25
    mxs.mail.ru
    svchost.exe
    260 B
    5
  • 43.231.4.7:443
    svchost.exe
    260 B
    5
  • 8.8.8.8:53
    g.bing.com
    dns
    56 B
    148 B
    1
    1

    DNS Request

    g.bing.com

    DNS Response

    150.171.27.10
    150.171.28.10

  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    10.27.171.150.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    10.27.171.150.in-addr.arpa

  • 8.8.8.8:53
    1.31.126.40.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    1.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    13.153.16.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    13.153.16.2.in-addr.arpa

  • 8.8.8.8:53
    57.169.31.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    57.169.31.20.in-addr.arpa

  • 8.8.8.8:53
    microsoft.com
    dns
    svchost.exe
    59 B
    139 B
    1
    1

    DNS Request

    microsoft.com

    DNS Response

    20.236.44.162
    20.76.201.171
    20.112.250.133
    20.231.239.246
    20.70.246.20

  • 8.8.8.8:53
    microsoft.com
    dns
    svchost.exe
    59 B
    113 B
    1
    1

    DNS Request

    microsoft.com

  • 8.8.8.8:53
    microsoft-com.mail.protection.outlook.com
    dns
    svchost.exe
    87 B
    151 B
    1
    1

    DNS Request

    microsoft-com.mail.protection.outlook.com

    DNS Response

    52.101.8.49
    52.101.11.0
    52.101.42.0
    52.101.40.26

  • 8.8.8.8:53
    162.44.236.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    162.44.236.20.in-addr.arpa

  • 8.8.8.8:53
    yahoo.com
    dns
    svchost.exe
    55 B
    134 B
    1
    1

    DNS Request

    yahoo.com

  • 8.8.8.8:53
    mta5.am0.yahoodns.net
    dns
    svchost.exe
    67 B
    195 B
    1
    1

    DNS Request

    mta5.am0.yahoodns.net

    DNS Response

    67.195.228.111
    98.136.96.77
    98.136.96.76
    67.195.204.77
    67.195.204.74
    98.136.96.75
    67.195.228.109
    67.195.204.79

  • 8.8.8.8:53
    56.163.245.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    56.163.245.4.in-addr.arpa

  • 8.8.8.8:53
    181.129.81.91.in-addr.arpa
    dns
    72 B
    147 B
    1
    1

    DNS Request

    181.129.81.91.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    google.com
    dns
    svchost.exe
    56 B
    77 B
    1
    1

    DNS Request

    google.com

  • 8.8.8.8:53
    smtp.google.com
    dns
    svchost.exe
    61 B
    141 B
    1
    1

    DNS Request

    smtp.google.com

    DNS Response

    74.125.206.27
    64.233.184.27
    142.251.168.26
    64.233.184.26
    142.251.168.27

  • 8.8.8.8:53
    mail.ru
    dns
    svchost.exe
    53 B
    73 B
    1
    1

    DNS Request

    mail.ru

  • 8.8.8.8:53
    mxs.mail.ru
    dns
    svchost.exe
    57 B
    89 B
    1
    1

    DNS Request

    mxs.mail.ru

    DNS Response

    217.69.139.150
    94.100.180.31

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    43.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    43.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kpzuoaxz.exe

    Filesize

    13.4MB

    MD5

    662f5705e23d33807b11b5988f1d8c43

    SHA1

    4afada49161f2128fb961e2add04fa793c8525fd

    SHA256

    9c1397d56792ead6f2d4e338c2306bb4f07189e380ef131f15405bf463918ea7

    SHA512

    b8f606480e82b9a4e9ad6ef83dfed6b9f4d79dd7b689699186df16014554f82f20627da316485dd0b0447a213406490028e8bca2ef9a12e3baf3f5a6af8bdad0

  • memory/2244-9-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2244-16-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2244-8-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2244-10-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/3196-17-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/3196-3-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3196-2-0x0000000000570000-0x0000000000583000-memory.dmp

    Filesize

    76KB

  • memory/3196-19-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3196-18-0x0000000000570000-0x0000000000583000-memory.dmp

    Filesize

    76KB

  • memory/3196-1-0x0000000000670000-0x0000000000770000-memory.dmp

    Filesize

    1024KB

  • memory/4388-11-0x00000000004D0000-0x00000000004E5000-memory.dmp

    Filesize

    84KB

  • memory/4388-14-0x00000000004D0000-0x00000000004E5000-memory.dmp

    Filesize

    84KB

  • memory/4388-20-0x00000000004D0000-0x00000000004E5000-memory.dmp

    Filesize

    84KB

  • memory/4388-21-0x00000000004D0000-0x00000000004E5000-memory.dmp

    Filesize

    84KB

  • memory/4388-22-0x00000000004D0000-0x00000000004E5000-memory.dmp

    Filesize

    84KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.