Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    163s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2024, 15:48 UTC

General

  • Target

    KBE2SLK.exe

  • Size

    925KB

  • MD5

    b8df5209815c9c44f9dd31838935c286

  • SHA1

    934328477b27fccb5b86be678d7ae1688c61c835

  • SHA256

    1cfef8d20f582d5eb10b652036293eed24d7672ec4ec89263bab65bd91a4f382

  • SHA512

    9239369837e275923af59e683d07efadb821119aa3038d1d0d263ef6413d2a1ac290d012e679b13cc2484a3a07efcf04f6a4fc497c12e3d756bfeb5b25e51bd1

  • SSDEEP

    12288:kelOqMds1R6CNROVZC7/U0PLyL2wJ/jtKUVnK8dB3KfncHsQjeZpYXkj3FGNij85:kelVT5NArC7/pzyLThfoaoZXF8COViW

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KBE2SLK.exe
    "C:\Users\Admin\AppData\Local\Temp\KBE2SLK.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1164

Network

  • flag-us
    DNS
    19.53.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.53.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    19.53.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.53.126.40.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    204.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    204.178.17.96.in-addr.arpa
    IN PTR
    Response
    204.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-204deploystaticakamaitechnologiescom
  • flag-us
    DNS
    204.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    204.178.17.96.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    9.228.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.228.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.228.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.228.82.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    43.58.199.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.58.199.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    43.58.199.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.58.199.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    195.233.44.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    195.233.44.23.in-addr.arpa
    IN PTR
    Response
    195.233.44.23.in-addr.arpa
    IN PTR
    a23-44-233-195deploystaticakamaitechnologiescom
  • flag-us
    DNS
    195.233.44.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    195.233.44.23.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    59.128.231.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    59.128.231.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    56.126.166.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.126.166.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    31.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    31.243.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    0.205.248.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.205.248.87.in-addr.arpa
    IN PTR
    Response
    0.205.248.87.in-addr.arpa
    IN PTR
    https-87-248-205-0lgwllnwnet
  • flag-us
    DNS
    0.205.248.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.205.248.87.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    2.136.104.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    2.136.104.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    146.78.124.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    146.78.124.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    23.173.189.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    23.173.189.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    tse1.mm.bing.net
    Remote address:
    8.8.8.8:53
    Request
    tse1.mm.bing.net
    IN A
    Response
    tse1.mm.bing.net
    IN CNAME
    mm-mm.bing.net.trafficmanager.net
    mm-mm.bing.net.trafficmanager.net
    IN CNAME
    dual-a-0001.a-msedge.net
    dual-a-0001.a-msedge.net
    IN A
    204.79.197.200
    dual-a-0001.a-msedge.net
    IN A
    13.107.21.200
  • flag-us
    DNS
    tse1.mm.bing.net
    Remote address:
    8.8.8.8:53
    Request
    tse1.mm.bing.net
    IN A
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301101_17QUECVB8G2ENL5IH&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301101_17QUECVB8G2ENL5IH&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 272652
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 74ECC8A9610E4597B1BF4978E1DB9FA7 Ref B: LON04EDGE0717 Ref C: 2024-01-02T15:52:55Z
    date: Tue, 02 Jan 2024 15:52:55 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301083_1PXGY6POAOL5LWW3H&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301083_1PXGY6POAOL5LWW3H&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 314827
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 2F8A4E69867F4CBFBD1F0DA98DF7C52C Ref B: LON04EDGE0717 Ref C: 2024-01-02T15:52:55Z
    date: Tue, 02 Jan 2024 15:52:55 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301652_1R39G8DVE3D1IPAHO&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301652_1R39G8DVE3D1IPAHO&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 483654
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 56D48032F9DA4C039FC4389236916980 Ref B: LON04EDGE0717 Ref C: 2024-01-02T15:52:55Z
    date: Tue, 02 Jan 2024 15:52:55 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301534_15LL3F24A66A7QZTI&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301534_15LL3F24A66A7QZTI&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301243_1NFMASG3SLY79TVLK&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301243_1NFMASG3SLY79TVLK&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301516_1PSF19EAOV9A2LZID&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301516_1PSF19EAOV9A2LZID&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
  • flag-us
    DNS
    200.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.197.79.204.in-addr.arpa
    IN PTR
    Response
    200.197.79.204.in-addr.arpa
    IN PTR
    a-0001a-msedgenet
  • 52.142.223.178:80
    104 B
    2
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.4kB
    8.3kB
    16
    14
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.4kB
    8.2kB
    15
    11
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.7kB
    8.2kB
    16
    13
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.5kB
    8.3kB
    16
    14
  • 204.79.197.200:443
    https://tse1.mm.bing.net/th?id=OADD2.10239317301516_1PSF19EAOV9A2LZID&pid=21.2&w=1080&h=1920&c=4
    tls, http2
    18.6kB
    455.7kB
    346
    337

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301101_17QUECVB8G2ENL5IH&pid=21.2&w=1920&h=1080&c=4

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301083_1PXGY6POAOL5LWW3H&pid=21.2&w=1920&h=1080&c=4

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301652_1R39G8DVE3D1IPAHO&pid=21.2&w=1080&h=1920&c=4

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301534_15LL3F24A66A7QZTI&pid=21.2&w=1080&h=1920&c=4

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301243_1NFMASG3SLY79TVLK&pid=21.2&w=1920&h=1080&c=4

    HTTP Response

    200

    HTTP Response

    200

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301516_1PSF19EAOV9A2LZID&pid=21.2&w=1080&h=1920&c=4
  • 8.8.8.8:53
    19.53.126.40.in-addr.arpa
    dns
    142 B
    157 B
    2
    1

    DNS Request

    19.53.126.40.in-addr.arpa

    DNS Request

    19.53.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    146 B
    144 B
    2
    1

    DNS Request

    95.221.229.192.in-addr.arpa

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    204.178.17.96.in-addr.arpa
    dns
    144 B
    137 B
    2
    1

    DNS Request

    204.178.17.96.in-addr.arpa

    DNS Request

    204.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    43.58.199.20.in-addr.arpa
    dns
    142 B
    157 B
    2
    1

    DNS Request

    43.58.199.20.in-addr.arpa

    DNS Request

    43.58.199.20.in-addr.arpa

  • 8.8.8.8:53
    9.228.82.20.in-addr.arpa
    dns
    140 B
    156 B
    2
    1

    DNS Request

    9.228.82.20.in-addr.arpa

    DNS Request

    9.228.82.20.in-addr.arpa

  • 8.8.8.8:53
    195.233.44.23.in-addr.arpa
    dns
    144 B
    137 B
    2
    1

    DNS Request

    195.233.44.23.in-addr.arpa

    DNS Request

    195.233.44.23.in-addr.arpa

  • 8.8.8.8:53
    59.128.231.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    59.128.231.4.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    140 B
    144 B
    2
    1

    DNS Request

    86.23.85.13.in-addr.arpa

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    56.126.166.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    56.126.166.20.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    292 B
    144 B
    4
    1

    DNS Request

    240.221.184.93.in-addr.arpa

    DNS Request

    240.221.184.93.in-addr.arpa

    DNS Request

    240.221.184.93.in-addr.arpa

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    31.243.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    31.243.111.52.in-addr.arpa

  • 8.8.8.8:53
    0.205.248.87.in-addr.arpa
    dns
    142 B
    116 B
    2
    1

    DNS Request

    0.205.248.87.in-addr.arpa

    DNS Request

    0.205.248.87.in-addr.arpa

  • 8.8.8.8:53
    2.136.104.51.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    2.136.104.51.in-addr.arpa

  • 8.8.8.8:53
    146.78.124.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    146.78.124.51.in-addr.arpa

  • 8.8.8.8:53
    23.173.189.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    23.173.189.20.in-addr.arpa

  • 8.8.8.8:53
    88.156.103.20.in-addr.arpa
    dns
    360 B
    158 B
    5
    1

    DNS Request

    88.156.103.20.in-addr.arpa

    DNS Request

    88.156.103.20.in-addr.arpa

    DNS Request

    88.156.103.20.in-addr.arpa

    DNS Request

    88.156.103.20.in-addr.arpa

    DNS Request

    88.156.103.20.in-addr.arpa

  • 8.8.8.8:53
    tse1.mm.bing.net
    dns
    124 B
    173 B
    2
    1

    DNS Request

    tse1.mm.bing.net

    DNS Request

    tse1.mm.bing.net

    DNS Response

    204.79.197.200
    13.107.21.200

  • 8.8.8.8:53
    200.197.79.204.in-addr.arpa
    dns
    73 B
    106 B
    1
    1

    DNS Request

    200.197.79.204.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1164-0-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-1-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-2-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-3-0x0000000004840000-0x0000000004841000-memory.dmp

    Filesize

    4KB

  • memory/1164-4-0x0000000004810000-0x0000000004811000-memory.dmp

    Filesize

    4KB

  • memory/1164-5-0x0000000004830000-0x0000000004832000-memory.dmp

    Filesize

    8KB

  • memory/1164-6-0x0000000004820000-0x0000000004821000-memory.dmp

    Filesize

    4KB

  • memory/1164-8-0x0000000004920000-0x0000000004921000-memory.dmp

    Filesize

    4KB

  • memory/1164-7-0x00000000048D0000-0x00000000048D1000-memory.dmp

    Filesize

    4KB

  • memory/1164-9-0x00000000048E0000-0x00000000048E1000-memory.dmp

    Filesize

    4KB

  • memory/1164-10-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/1164-12-0x00000000048C0000-0x00000000048C1000-memory.dmp

    Filesize

    4KB

  • memory/1164-11-0x0000000004A40000-0x0000000004A42000-memory.dmp

    Filesize

    8KB

  • memory/1164-13-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

    Filesize

    4KB

  • memory/1164-15-0x0000000004980000-0x0000000004982000-memory.dmp

    Filesize

    8KB

  • memory/1164-14-0x00000000048B0000-0x00000000048B1000-memory.dmp

    Filesize

    4KB

  • memory/1164-16-0x0000000004970000-0x0000000004971000-memory.dmp

    Filesize

    4KB

  • memory/1164-17-0x00000000049D0000-0x00000000049D1000-memory.dmp

    Filesize

    4KB

  • memory/1164-18-0x0000000004870000-0x0000000004871000-memory.dmp

    Filesize

    4KB

  • memory/1164-20-0x00000000049E0000-0x00000000049E1000-memory.dmp

    Filesize

    4KB

  • memory/1164-21-0x0000000004880000-0x0000000004881000-memory.dmp

    Filesize

    4KB

  • memory/1164-19-0x00000000049C0000-0x00000000049C1000-memory.dmp

    Filesize

    4KB

  • memory/1164-22-0x0000000004930000-0x0000000004931000-memory.dmp

    Filesize

    4KB

  • memory/1164-23-0x00000000049F0000-0x00000000049F1000-memory.dmp

    Filesize

    4KB

  • memory/1164-25-0x00000000048A0000-0x00000000048A1000-memory.dmp

    Filesize

    4KB

  • memory/1164-24-0x0000000004890000-0x0000000004891000-memory.dmp

    Filesize

    4KB

  • memory/1164-26-0x0000000004950000-0x0000000004951000-memory.dmp

    Filesize

    4KB

  • memory/1164-27-0x0000000004940000-0x0000000004941000-memory.dmp

    Filesize

    4KB

  • memory/1164-28-0x0000000004960000-0x0000000004961000-memory.dmp

    Filesize

    4KB

  • memory/1164-29-0x0000000004990000-0x0000000004991000-memory.dmp

    Filesize

    4KB

  • memory/1164-30-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-31-0x0000000004910000-0x0000000004911000-memory.dmp

    Filesize

    4KB

  • memory/1164-32-0x0000000004900000-0x0000000004901000-memory.dmp

    Filesize

    4KB

  • memory/1164-33-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-34-0x0000000004A00000-0x0000000004A01000-memory.dmp

    Filesize

    4KB

  • memory/1164-35-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

    Filesize

    4KB

  • memory/1164-36-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-37-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-38-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-39-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-40-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-41-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-42-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-43-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-44-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-45-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-46-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-47-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.