Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/03/2025, 12:58 UTC

General

  • Target

    JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe

  • Size

    691KB

  • MD5

    8351bf08900b42321b4af3ffb1ef98a0

  • SHA1

    acb02fd072bd8859d75ffbaef1730dae59d79d30

  • SHA256

    026c7c0e6ab52292fc5f4f75c78737943ecc58df497b19d2de8756b468ca1b66

  • SHA512

    2daf95f1e9bb05f25a7e99610219c3514069e7ba71133a5f5fac6ad567f1ef68476601b4f9e486ad83fc6ca3669eebd326a6a0b04c9a4efacffb7f4236b263f4

  • SSDEEP

    12288:VzyInpIJAYJPwTcwySyiCXeUs8IwJJ3Scvfsi0ZSRq/LT+3:VzyInpqD5TiV9C0i0ZXLO

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    DbeN40ElF3Qt

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain
1
#KCMDDC2#-890

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8351bf08900b42321b4af3ffb1ef98a0.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5928
    • C:\Users\Admin\AppData\Local\Temp\sid.exe
      "C:\Users\Admin\AppData\Local\Temp\sid.exe"
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4744
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
        • Modifies firewall policy service
        • Modifies security service
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Checks BIOS information in registry
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:5356

Network

  • flag-us
    DNS
    tse1.mm.bing.net
    Remote address:
    8.8.8.8:53
    Request
    tse1.mm.bing.net
    IN A
    Response
    tse1.mm.bing.net
    IN CNAME
    mm-mm.bing.net.trafficmanager.net
    mm-mm.bing.net.trafficmanager.net
    IN CNAME
    ax-0001.ax-msedge.net
    ax-0001.ax-msedge.net
    IN A
    150.171.27.10
    ax-0001.ax-msedge.net
    IN A
    150.171.28.10
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239339388094_13CVUFFEVHOS666S0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239339388094_13CVUFFEVHOS666S0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 414304
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 0363DDB310504F6E82B97D12B6FF4AA1 Ref B: FRA31EDGE0809 Ref C: 2025-03-21T12:59:32Z
    date: Fri, 21 Mar 2025 12:59:31 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 435187
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 22E28281025E4900B7A396283FE0208C Ref B: FRA31EDGE0809 Ref C: 2025-03-21T12:59:32Z
    date: Fri, 21 Mar 2025 12:59:31 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239360432410_1ZT9L3WG863INPZDE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239360432410_1ZT9L3WG863INPZDE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 561325
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 097AA175512E48FBADE328B5CC0185AB Ref B: FRA31EDGE0809 Ref C: 2025-03-21T12:59:32Z
    date: Fri, 21 Mar 2025 12:59:31 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239356671167_19HPP7IIREEX4KA57&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239356671167_19HPP7IIREEX4KA57&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 606526
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: AA8A7498412047FDB39669744221D528 Ref B: FRA31EDGE0809 Ref C: 2025-03-21T12:59:32Z
    date: Fri, 21 Mar 2025 12:59:31 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239339388093_1MGPNJH4UKSBANRNK&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239339388093_1MGPNJH4UKSBANRNK&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 570218
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: A5BE00C0B63E4877BF87F89E5C88682C Ref B: FRA31EDGE0809 Ref C: 2025-03-21T12:59:32Z
    date: Fri, 21 Mar 2025 12:59:31 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239360432411_13QPWJ00JGY7I4CI1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    Remote address:
    150.171.27.10:443
    Request
    GET /th?id=OADD2.10239360432411_13QPWJ00JGY7I4CI1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 490098
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 895BF3D8BD8442E09194D3AC34B6A704 Ref B: FRA31EDGE0809 Ref C: 2025-03-21T12:59:32Z
    date: Fri, 21 Mar 2025 12:59:32 GMT
  • flag-us
    DNS
    c.pki.goog
    Remote address:
    8.8.8.8:53
    Request
    c.pki.goog
    IN A
    Response
    c.pki.goog
    IN CNAME
    pki-goog.l.google.com
    pki-goog.l.google.com
    IN A
    142.250.180.3
  • flag-gb
    GET
    http://c.pki.goog/r/r1.crl
    Remote address:
    142.250.180.3:80
    Request
    GET /r/r1.crl HTTP/1.1
    Cache-Control: max-age = 3000
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: c.pki.goog
    Response
    HTTP/1.1 304 Not Modified
    Date: Fri, 21 Mar 2025 12:29:32 GMT
    Expires: Fri, 21 Mar 2025 13:19:32 GMT
    Age: 1825
    Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
    Cache-Control: public, max-age=3000
    Vary: Accept-Encoding
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 150.171.27.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    15
    13
  • 150.171.27.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    15
    13
  • 150.171.27.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    15
    13
  • 150.171.27.10:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    6.9kB
    15
    13
  • 150.171.27.10:443
    https://tse1.mm.bing.net/th?id=OADD2.10239360432411_13QPWJ00JGY7I4CI1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
    tls, http2
    110.1kB
    3.2MB
    2319
    2315

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239339388094_13CVUFFEVHOS666S0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239360432410_1ZT9L3WG863INPZDE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239356671167_19HPP7IIREEX4KA57&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239339388093_1MGPNJH4UKSBANRNK&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239360432411_13QPWJ00JGY7I4CI1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

    HTTP Response

    200
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 142.250.180.3:80
    http://c.pki.goog/r/r1.crl
    http
    384 B
    355 B
    4
    3

    HTTP Request

    GET http://c.pki.goog/r/r1.crl

    HTTP Response

    304
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 127.0.0.1:1604
    explorer.exe
  • 8.8.8.8:53
    tse1.mm.bing.net
    dns
    62 B
    170 B
    1
    1

    DNS Request

    tse1.mm.bing.net

    DNS Response

    150.171.27.10
    150.171.28.10

  • 8.8.8.8:53
    c.pki.goog
    dns
    56 B
    107 B
    1
    1

    DNS Request

    c.pki.goog

    DNS Response

    142.250.180.3

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sid.exe

    Filesize

    658KB

    MD5

    8dc642f2f3d912331638ccf2d45f8dcd

    SHA1

    5c157a1988c8147caaa53ddb326e8897cb982336

    SHA256

    c0700781739cc4089521a9fcefc76789a664824938201e8b9635c39e9335f366

    SHA512

    aade2c455c279f3f9f44784877fb10763f89973cd7389c0800252bb57f39158f1c85c4458d091d4de5d24803a92afc1537ebf5b3da6ae97acbd709b1cb7c8c06

  • memory/4744-10-0x0000000002220000-0x0000000002221000-memory.dmp

    Filesize

    4KB

  • memory/4744-14-0x0000000013140000-0x00000000131F6000-memory.dmp

    Filesize

    728KB

  • memory/5356-11-0x0000000013140000-0x00000000131F6000-memory.dmp

    Filesize

    728KB

  • memory/5356-12-0x0000000013140000-0x00000000131F6000-memory.dmp

    Filesize

    728KB

  • memory/5356-13-0x0000000013140000-0x00000000131F6000-memory.dmp

    Filesize

    728KB

  • memory/5356-15-0x0000000013140000-0x00000000131F6000-memory.dmp

    Filesize

    728KB

  • memory/5356-18-0x00000000028A0000-0x00000000028A1000-memory.dmp

    Filesize

    4KB

  • memory/5356-17-0x0000000013140000-0x00000000131F6000-memory.dmp

    Filesize

    728KB

  • memory/5356-16-0x0000000013140000-0x00000000131F6000-memory.dmp

    Filesize

    728KB

  • memory/5356-19-0x0000000013140000-0x00000000131F6000-memory.dmp

    Filesize

    728KB

  • memory/5928-9-0x0000000000400000-0x00000000004AFD05-memory.dmp

    Filesize

    703KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.