Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    07/07/2020, 21:35

General

  • Target

    a934394936e2250fcdf2140235f1948fa86f49264a6d345289061b334c7037d9.exe

  • Size

    1.1MB

  • MD5

    05333106feec83fd58a6775c854a5e8b

  • SHA1

    ec22d9b2d02962b599314a4730b2d05954eb9b25

  • SHA256

    a934394936e2250fcdf2140235f1948fa86f49264a6d345289061b334c7037d9

  • SHA512

    d0b78e6a71093bc649a44c22da350169121b1d92efab3373c629f5af2837966e8f8e5da1724c53af6eb15f5454689d12bd1832a60d75cb99798e80d22d984d5a

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 956 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 61 IoCs
  • Loads dropped DLL 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops Chrome extension 16 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a934394936e2250fcdf2140235f1948fa86f49264a6d345289061b334c7037d9.exe
    "C:\Users\Admin\AppData\Local\Temp\a934394936e2250fcdf2140235f1948fa86f49264a6d345289061b334c7037d9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\y7.exe
      "C:\Users\Admin\AppData\Local\Temp\y7.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      PID:508
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe 001 install7 1
        3⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        • Suspicious use of SetThreadContext
        • Blacklisted process makes network request
        • Writes to the Master Boot Record (MBR)
        PID:3560
        • C:\Users\Admin\AppData\Roaming\1594157787823.exe
          "C:\Users\Admin\AppData\Roaming\1594157787823.exe" /sjson "C:\Users\Admin\AppData\Roaming\1594157787823.txt"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1356
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe"
          4⤵
            PID:2656
          • C:\Users\Admin\AppData\Roaming\1594157790511.exe
            "C:\Users\Admin\AppData\Roaming\1594157790511.exe" /sjson "C:\Users\Admin\AppData\Roaming\1594157790511.txt"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3480
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe"
            4⤵
              PID:3768
            • C:\Users\Admin\AppData\Roaming\1594157792182.exe
              "C:\Users\Admin\AppData\Roaming\1594157792182.exe" /sjson "C:\Users\Admin\AppData\Roaming\1594157792182.txt"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:3932
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              4⤵
                PID:2564
              • C:\Users\Admin\AppData\Roaming\1594157794198.exe
                "C:\Users\Admin\AppData\Roaming\1594157794198.exe" /sjson "C:\Users\Admin\AppData\Roaming\1594157794198.txt"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2548
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe 002 install7
              3⤵
              • Suspicious use of WriteProcessMemory
              • Drops Chrome extension
              PID:412
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c taskkill /f /im chrome.exe
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1004
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im chrome.exe
                  5⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1500
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe 003 install7
              3⤵
              • Suspicious use of SetThreadContext
              PID:584
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\system32\rundll32.exe"
                4⤵
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of FindShellTrayWindow
                PID:3780
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /c taskkill /f /im chrome.exe
                  5⤵
                    PID:1332
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im chrome.exe
                      6⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2836
                  • C:\Windows\SysWOW64\xcopy.exe
                    xcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\1594157797370\" /e
                    5⤵
                    • Enumerates system info in registry
                    PID:1176
                  • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                    "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --window-position=0,-5000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" http://www.interestvideo.com/video1.php
                    5⤵
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1084
                    • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                      "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\1594157797370 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\1594157797370\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\1594157797370 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=83.0.4103.106 --initial-client-data=0xbc,0xc0,0xc4,0x98,0xc8,0x7ffb557fbd28,0x7ffb557fbd38,0x7ffb557fbd48
                      6⤵
                        PID:3776
                      • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                        "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1412 /prefetch:2
                        6⤵
                          PID:640
                        • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                          "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=1932 /prefetch:8
                          6⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Modifies system certificate store
                          PID:1248
                        • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                          "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:1
                          6⤵
                            PID:3948
                          • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                            "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:1
                            6⤵
                              PID:496
                            • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                              "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                              6⤵
                                PID:3760
                              • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:1
                                6⤵
                                  PID:1004
                                • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=3876 /prefetch:8
                                  6⤵
                                    PID:3532
                                  • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:1
                                    6⤵
                                      PID:860
                                    • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:1
                                      6⤵
                                        PID:2872
                                      • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=4896 /prefetch:8
                                        6⤵
                                          PID:3048
                                        • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=4940 /prefetch:8
                                          6⤵
                                            PID:2136
                                          • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=2976 /prefetch:8
                                            6⤵
                                              PID:4040
                                            • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=5232 /prefetch:8
                                              6⤵
                                                PID:3048
                                              • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=audio --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=5376 /prefetch:8
                                                6⤵
                                                  PID:472
                                                • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=5388 /prefetch:8
                                                  6⤵
                                                    PID:4104
                                                  • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                                                    6⤵
                                                      PID:4172
                                                    • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=4980 /prefetch:8
                                                      6⤵
                                                        PID:4260
                                                      • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=5344 /prefetch:8
                                                        6⤵
                                                          PID:4304
                                                        • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=5500 /prefetch:8
                                                          6⤵
                                                            PID:4344
                                                          • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=4416 /prefetch:8
                                                            6⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4360
                                                          • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=5236 /prefetch:8
                                                            6⤵
                                                              PID:4420
                                                            • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                                                              6⤵
                                                                PID:4456
                                                              • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=4120 /prefetch:8
                                                                6⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4756
                                                              • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=5316 /prefetch:8
                                                                6⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4300
                                                              • C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1392,3199759817014046337,2224815867249875247,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Temp\1594157797370" --mojo-platform-channel-handle=3104 /prefetch:8
                                                                6⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4376
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\y7.exe"
                                                          3⤵
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:856
                                                          • C:\Windows\SysWOW64\PING.EXE
                                                            ping 127.0.0.1 -n 3
                                                            4⤵
                                                            • Runs ping.exe
                                                            PID:1580
                                                      • C:\Users\Admin\AppData\Local\Temp\pro-zipper.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\pro-zipper.exe" /S /UID=4100
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:4560
                                                        • C:\Users\Admin\AppData\Local\Temp\is-RQTNI.tmp\pro-zipper.tmp
                                                          "C:\Users\Admin\AppData\Local\Temp\is-RQTNI.tmp\pro-zipper.tmp" /SL5="$B0052,238692,154624,C:\Users\Admin\AppData\Local\Temp\pro-zipper.exe" /S /UID=4100
                                                          3⤵
                                                          • Loads dropped DLL
                                                          • Executes dropped EXE
                                                          PID:4588
                                                          • C:\Users\Admin\AppData\Local\Temp\is-2TP9C.tmp\aaaaaaa.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\is-2TP9C.tmp\aaaaaaa.exe" /S /UID=4100
                                                            4⤵
                                                            • Executes dropped EXE
                                                            PID:4684

                                                    Network

                                                    MITRE ATT&CK Enterprise v6

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • memory/412-12-0x0000000004D40000-0x0000000004FDC000-memory.dmp

                                                      Filesize

                                                      2.6MB

                                                    • memory/496-109-0x000010CE00040000-0x000010CE00041000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/496-150-0x000001F181E60000-0x000001F181E61000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/508-5-0x0000000010000000-0x00000000101C9000-memory.dmp

                                                      Filesize

                                                      1.8MB

                                                    • memory/584-16-0x00000000050A0000-0x000000000533C000-memory.dmp

                                                      Filesize

                                                      2.6MB

                                                    • memory/640-87-0x00007FFB6E660000-0x00007FFB6E661000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/640-106-0x000001A5B4410000-0x000001A5B4511000-memory.dmp

                                                      Filesize

                                                      1.0MB

                                                    • memory/860-237-0x000001852A830000-0x000001852A831000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/860-229-0x000036FF00040000-0x000036FF00041000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1004-202-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-178-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-192-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-191-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-190-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-189-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-188-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-187-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-186-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-185-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-184-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-183-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-182-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-181-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-180-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-179-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-193-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-177-0x000001C3B2030000-0x000001C3B2031000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1004-176-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-194-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-214-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-213-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-212-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-211-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-210-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-209-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-208-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-207-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-206-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-205-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-204-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-203-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-174-0x000000F800040000-0x000000F800041000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1004-201-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-200-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-199-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-198-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-197-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-196-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1004-195-0x000001C3AFFE0000-0x000001C3AFFE00F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/1084-238-0x0000029BBF430000-0x0000029BBF431000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2656-24-0x0000000010000000-0x0000000010057000-memory.dmp

                                                      Filesize

                                                      348KB

                                                    • memory/2872-236-0x000001D99B8F0000-0x000001D99B8F1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2872-235-0x0000196100040000-0x0000196100041000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2920-0-0x0000000003600000-0x0000000003601000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2920-450-0x0000000003600000-0x0000000003601000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3560-8-0x0000000010000000-0x00000000102AA000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/3560-9-0x0000000001020000-0x00000000012BC000-memory.dmp

                                                      Filesize

                                                      2.6MB

                                                    • memory/3760-175-0x000001F401F50000-0x000001F401F51000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3760-172-0x00000BEC00040000-0x00000BEC00041000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3780-42-0x0000000010000000-0x0000000010051000-memory.dmp

                                                      Filesize

                                                      324KB

                                                    • memory/3948-142-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-143-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-124-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-125-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-126-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-127-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-128-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-110-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-108-0x0000687400040000-0x0000687400041000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3948-129-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-122-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-148-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-147-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-146-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-121-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-145-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-144-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-120-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-119-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-118-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-137-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-117-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-141-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-140-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-139-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-138-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-115-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-130-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-116-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-114-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-123-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-111-0x000001C2D33E0000-0x000001C2D33E1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3948-112-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-113-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-255-0x0000022300040000-0x0000022300041000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3948-131-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-132-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-133-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-134-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-135-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/3948-136-0x000001C2D1490000-0x000001C2D14900F8-memory.dmp

                                                      Filesize

                                                      248B

                                                    • memory/4172-251-0x0000039700040000-0x0000039700041000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4172-252-0x00000279A2E30000-0x00000279A2E31000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4456-266-0x000002DC83900000-0x000002DC83901000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4456-265-0x00005CA700040000-0x00005CA700041000-memory.dmp

                                                      Filesize

                                                      4KB