Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 18:51

General

  • Target

    f454430c6b89f6c5ed34ce7eca2ca2fd.exe

  • Size

    467KB

  • MD5

    f454430c6b89f6c5ed34ce7eca2ca2fd

  • SHA1

    e34e1cc63399b123a98fd3a2e351a650378b3eef

  • SHA256

    75148fbc43cce8fceee59d1ac0fb1f6eaa19532c20811c58eb900f3ea43f3b64

  • SHA512

    27f4d81e52f10c49224fbfbb9c1aac5bf564ad7c800a0676d89620ee22ed8438235fc141e8c85b5f5d6bb8952e6631088b4cdbc7fe2054de84b51b81eb8712d1

  • SSDEEP

    12288:jFdif2o8wE39uW8wESByvNv54B9f01ZmHByvNv5:5C2o8wDW8wQvr4B9f01ZmQvr

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 46 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f454430c6b89f6c5ed34ce7eca2ca2fd.exe
    "C:\Users\Admin\AppData\Local\Temp\f454430c6b89f6c5ed34ce7eca2ca2fd.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Windows\SysWOW64\Lbdolh32.exe
      C:\Windows\system32\Lbdolh32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4672
      • C:\Windows\SysWOW64\Lmiciaaj.exe
        C:\Windows\system32\Lmiciaaj.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1696
  • C:\Windows\SysWOW64\Mdckfk32.exe
    C:\Windows\system32\Mdckfk32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Windows\SysWOW64\Mdehlk32.exe
      C:\Windows\system32\Mdehlk32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2232
  • C:\Windows\SysWOW64\Nphhmj32.exe
    C:\Windows\system32\Nphhmj32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\SysWOW64\Nloiakho.exe
      C:\Windows\system32\Nloiakho.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2592
  • C:\Windows\SysWOW64\Odkjng32.exe
    C:\Windows\system32\Odkjng32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Windows\SysWOW64\Ojgbfocc.exe
      C:\Windows\system32\Ojgbfocc.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4932
  • C:\Windows\SysWOW64\Ofqpqo32.exe
    C:\Windows\system32\Ofqpqo32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\SysWOW64\Olkhmi32.exe
      C:\Windows\system32\Olkhmi32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\SysWOW64\Acqimo32.exe
        C:\Windows\system32\Acqimo32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3620
  • C:\Windows\SysWOW64\Odocigqg.exe
    C:\Windows\system32\Odocigqg.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3388
  • C:\Windows\SysWOW64\Oneklm32.exe
    C:\Windows\system32\Oneklm32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2168
  • C:\Windows\SysWOW64\Ocpgod32.exe
    C:\Windows\system32\Ocpgod32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1720
  • C:\Windows\SysWOW64\Njefqo32.exe
    C:\Windows\system32\Njefqo32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2956
  • C:\Windows\SysWOW64\Nngokoej.exe
    C:\Windows\system32\Nngokoej.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1056
  • C:\Windows\SysWOW64\Mgkjhe32.exe
    C:\Windows\system32\Mgkjhe32.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1744
  • C:\Windows\SysWOW64\Bapiabak.exe
    C:\Windows\system32\Bapiabak.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    PID:1832
    • C:\Windows\SysWOW64\Cfmajipb.exe
      C:\Windows\system32\Cfmajipb.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      PID:3092
  • C:\Windows\SysWOW64\Cfbkeh32.exe
    C:\Windows\system32\Cfbkeh32.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    PID:2860
    • C:\Windows\SysWOW64\Cnicfe32.exe
      C:\Windows\system32\Cnicfe32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:3312
  • C:\Windows\SysWOW64\Cajlhqjp.exe
    C:\Windows\system32\Cajlhqjp.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:4448
    • C:\Windows\SysWOW64\Cjbpaf32.exe
      C:\Windows\system32\Cjbpaf32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:3508
      • C:\Windows\SysWOW64\Calhnpgn.exe
        C:\Windows\system32\Calhnpgn.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:4052
        • C:\Windows\SysWOW64\Dfiafg32.exe
          C:\Windows\system32\Dfiafg32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          PID:4196
          • C:\Windows\SysWOW64\Danecp32.exe
            C:\Windows\system32\Danecp32.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            PID:4068
            • C:\Windows\SysWOW64\Dkifae32.exe
              C:\Windows\system32\Dkifae32.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              PID:4612
              • C:\Windows\SysWOW64\Daconoae.exe
                C:\Windows\system32\Daconoae.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Modifies registry class
                PID:3584
                • C:\Windows\SysWOW64\Dfpgffpm.exe
                  C:\Windows\system32\Dfpgffpm.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  PID:4452
  • C:\Windows\SysWOW64\Dogogcpo.exe
    C:\Windows\system32\Dogogcpo.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    PID:3400
    • C:\Windows\SysWOW64\Dhocqigp.exe
      C:\Windows\system32\Dhocqigp.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      PID:2972
  • C:\Windows\SysWOW64\Dmllipeg.exe
    C:\Windows\system32\Dmllipeg.exe
    1⤵
    • Executes dropped EXE
    PID:5140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5140 -s 416
      2⤵
      • Program crash
      PID:5252
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5140 -ip 5140
    1⤵
      PID:5204
    • C:\Windows\SysWOW64\Cjpckf32.exe
      C:\Windows\system32\Cjpckf32.exe
      1⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2548
    • C:\Windows\SysWOW64\Ceckcp32.exe
      C:\Windows\system32\Ceckcp32.exe
      1⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      PID:4696
    • C:\Windows\SysWOW64\Cnffqf32.exe
      C:\Windows\system32\Cnffqf32.exe
      1⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      PID:3056
    • C:\Windows\SysWOW64\Chmndlge.exe
      C:\Windows\system32\Chmndlge.exe
      1⤵
        PID:448
      • C:\Windows\SysWOW64\Cabfga32.exe
        C:\Windows\system32\Cabfga32.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Modifies registry class
        PID:3600
      • C:\Windows\SysWOW64\Bclhhnca.exe
        C:\Windows\system32\Bclhhnca.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        PID:2848
      • C:\Windows\SysWOW64\Bmbplc32.exe
        C:\Windows\system32\Bmbplc32.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        PID:5032
      • C:\Windows\SysWOW64\Balpgb32.exe
        C:\Windows\system32\Balpgb32.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        PID:1608
      • C:\Windows\SysWOW64\Bchomn32.exe
        C:\Windows\system32\Bchomn32.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        PID:4532
      • C:\Windows\SysWOW64\Bnkgeg32.exe
        C:\Windows\system32\Bnkgeg32.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:3304
      • C:\Windows\SysWOW64\Bcebhoii.exe
        C:\Windows\system32\Bcebhoii.exe
        1⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2484
      • C:\Windows\SysWOW64\Agoabn32.exe
        C:\Windows\system32\Agoabn32.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2088
      • C:\Windows\SysWOW64\Aadifclh.exe
        C:\Windows\system32\Aadifclh.exe
        1⤵
          PID:4252
        • C:\Windows\SysWOW64\Ajkaii32.exe
          C:\Windows\system32\Ajkaii32.exe
          1⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2236
        • C:\Windows\system32\BackgroundTransferHost.exe
          "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
          1⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          PID:448
        • C:\Windows\system32\backgroundTaskHost.exe
          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
          1⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4252

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Aadifclh.exe

          Filesize

          4KB

          MD5

          805be308a91ed61b80ede4f71b722571

          SHA1

          7e88567f948ef7aad1c62474c1d81adbb7ee3ba0

          SHA256

          0c00ecf63c4c11233175b75c72de6b1488820939f3bf7a76449b65a094eb21d5

          SHA512

          b9ea707e9051a79cb2695cfdf16b049fcc73955f3a9fa6b1f01b7fb1d093c4e7ad9636fbdd16fe48127761640d5da5dc27f2b88652b8c552f86cf8c672fd8cc7

        • C:\Windows\SysWOW64\Acqimo32.exe

          Filesize

          53KB

          MD5

          91d6ba354b94c80f528ab90331c20812

          SHA1

          a52fc26164b96da1d97f32b37da3588016a8b0b1

          SHA256

          1784088089f6e7de9001647e9c9e6a4b97112f2feec881cfcbe83b0389af4632

          SHA512

          a57fba766b7b9f06561f76784c9de3fa88a26669136d5c7796662b5e5f34cf45913cc182982d23f32cdc27f3f3f81ba5c5e8147d18b7347316ba3cb241c6c865

        • C:\Windows\SysWOW64\Acqimo32.exe

          Filesize

          32KB

          MD5

          1157ef6b9d0227d5d72a50e878b82dd7

          SHA1

          f8edd00fe792739674a05a10e5676a141bab7ea7

          SHA256

          97ee2cf2a02f7efb44131f417bab148dd7c20be7e2127852c047d7ae54375561

          SHA512

          f361f0ed888800d4ea714fa3e8e00e32da9a4feb820bdc7a2707eec67d5db28109d12cc86bb0abefb58fc7b974f34864ad08deb0e4c7bab790aeeb320e51febc

        • C:\Windows\SysWOW64\Agoabn32.exe

          Filesize

          32KB

          MD5

          ad6d2567198796ddf63411960cf39b5f

          SHA1

          7ca31fe7b5bd043f6d2380820c72c9e35a2372b7

          SHA256

          e05b9ee16aa98068d8ec02d61bc629b31f698d760b9990f8551857c7fe5f4006

          SHA512

          aa54a2213eb5b05c5359aa9a9f4f784bf45127b9d1283ba3799043f867667eb93755fe4160e664d6e0b7bfac9479887b31b6308ab088ccce8c5cb0f2fde72500

        • C:\Windows\SysWOW64\Bcebhoii.exe

          Filesize

          2KB

          MD5

          40de02fbf7e5026d6418547f3b86e015

          SHA1

          af30f69c274786a598019e4deb7a7c3bb70878f7

          SHA256

          e595a6c1ae86460c79d5e64cd53224c329c9fe154ac54038807ab533301e2f3c

          SHA512

          8ab2c9130bed3e6614dec0eae572e09ef3ae158175d733b572b7e56f57e4a6843564fcdf1012cdb73f317f72eabc1f46f6ffceb5abc99be2c15424f075f6b47d

        • C:\Windows\SysWOW64\Bnkgeg32.exe

          Filesize

          4KB

          MD5

          24e1cb58fa96ea6b30c8fc7defbb60e7

          SHA1

          415fc2e139d2dac575f35df46379d202ca107d46

          SHA256

          c45cc8d9b9565d276cbc4e20c5b8715c17ed1fcc4226459fd97fdddf88c04e53

          SHA512

          c5d0b87c8c106da894abfdb1f3fca5080588b6e1a9b7230492912b9991b8460617ae744447e9b6eb6f050a3e0f0b03379af657f3e56494f526daebbc09a643b1

        • C:\Windows\SysWOW64\Lbdolh32.exe

          Filesize

          467KB

          MD5

          d2d97268627c8d59cb0a1b8ed4e96392

          SHA1

          a518cf43c54e755a850dab201662222b4ca4235b

          SHA256

          8b475b8c1c6f4d3160dad477fdda4bf26f7eac2c8f0ef6e6bc6fb851d3d6b4df

          SHA512

          71574865fcb07a9f2997d09f48cb0287829368433f4f33bc93f4340bab8f1dfbcf384edbbe783da2fb63c531ad6d20f34ec1fd47550097c3ee596b70bb2ec673

        • C:\Windows\SysWOW64\Lbdolh32.exe

          Filesize

          92KB

          MD5

          55d07919d871dafa1378bc2f865da7bf

          SHA1

          1f6d3c52a751ec9027e08dd329ffb13d734ab010

          SHA256

          ea0aaf20076dc61cb2e9553c2edd726f1a40755ed15c4937b9556d9003dfaf0e

          SHA512

          c54fa771bc77915fd813c663932777eab1ec0da2d6830831abfaf92e78f0475e6294c1e77e8cd1b09a1d33f0c06291deb3840c1b25a2647f8c1097063f9e74c5

        • C:\Windows\SysWOW64\Lmiciaaj.exe

          Filesize

          92KB

          MD5

          3f5835598e1e441a9972d0715c50b413

          SHA1

          c09e8ab6b92f064bf1d9c74bd714299b27df7d33

          SHA256

          c247aeb95f4fe9adc77186a263168691f35d86b7a7f89f49a54640faf274354b

          SHA512

          09e0d4c01b349bcd550cc7dc2a2f931398557a71d8b8b1864c958618c6ad7eac644e426be3ebad3c3c717accf4f2fcfc498565815f0226a84a30a6826d7c46e6

        • C:\Windows\SysWOW64\Olkhmi32.exe

          Filesize

          76KB

          MD5

          da0dba43d35aa0a4aab795f1cb544973

          SHA1

          0038c74691b26fe447ef12929643062c07abf990

          SHA256

          458344a6e350c0fefea4562696146b3060c3d0baf49fd7d8af43f7c8f48b97d2

          SHA512

          ca2c4c03eaabc49ad779ce67ba2c69fe3004dc40c0dc1d4ae07ccffca7ed1bb9c8dd09fbcb0af6fc974ccca2066dd5eb08d19ebb29eefdfc1cd25a5118e1bdf0

        • memory/448-375-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/448-241-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1012-56-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1056-47-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1608-192-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1696-16-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1720-96-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1744-40-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1832-220-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2088-160-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2124-127-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2168-104-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2232-32-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2236-144-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2484-172-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2548-365-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2548-275-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2592-63-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2848-208-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2860-371-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2860-256-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2956-71-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2972-334-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/2972-345-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3056-248-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3056-373-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3092-224-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3292-24-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3304-176-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3312-262-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3312-369-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3388-112-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3400-328-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3400-347-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3508-361-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3508-286-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3584-320-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3584-351-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3600-232-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3620-136-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/3744-80-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4052-292-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4052-359-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4068-355-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4068-304-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4196-298-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4196-357-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4252-155-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4448-363-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4448-280-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4452-322-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4452-349-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4532-184-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4572-120-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4612-310-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4612-353-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4672-12-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4696-367-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4696-268-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/4932-88-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/5032-200-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/5060-0-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/5140-343-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/5140-340-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB