Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 11:58

General

  • Target

    10ff65f6e1cd534ba15eb6e44d9541b4.exe

  • Size

    66KB

  • MD5

    10ff65f6e1cd534ba15eb6e44d9541b4

  • SHA1

    d5088e7f947a0b0fd86d46b7f65d595115e39484

  • SHA256

    3dced41060e1f11558c6538ea4dfcbd6511000d03f23792a45f5f1f3ea5503a2

  • SHA512

    f63e3e9a4e50a6adc61706a639b2d91a7f35862ddc2cece5e168d49a29576fa181bfe021420a1ed3cca117f103b2e3c3621aba1afc8c3d0c39c37a6bb2ebee6a

  • SSDEEP

    1536:o7OE59Vyzrc8K3WgFtKhJP+tcrVOXKzaJThZfaKhQiSEKNJh:WV5998K3WQ8fjEXKgZfnhfxuh

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 10 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 19 IoCs
  • UPX packed file 42 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 9 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 4 IoCs
  • Drops file in Windows directory 49 IoCs
  • Modifies Control Panel 12 IoCs
  • Runs ping.exe 1 TTPs 32 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10ff65f6e1cd534ba15eb6e44d9541b4.exe
    "C:\Users\Admin\AppData\Local\Temp\10ff65f6e1cd534ba15eb6e44d9541b4.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
        PID:1704
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        2⤵
          PID:1616
        • C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"
          2⤵
            PID:2008
          • C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"
            2⤵
              PID:2100
            • C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"
              2⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2360
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                3⤵
                • Runs ping.exe
                PID:804
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                3⤵
                • Runs ping.exe
                PID:1660
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                3⤵
                • Runs ping.exe
                PID:1516
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                3⤵
                • Runs ping.exe
                PID:308
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                3⤵
                • Runs ping.exe
                PID:1724
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                3⤵
                • Runs ping.exe
                PID:2892
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              2⤵
              • Runs ping.exe
              PID:2744
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              2⤵
              • Runs ping.exe
              PID:1032
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              2⤵
              • Runs ping.exe
              PID:2580
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              2⤵
              • Runs ping.exe
              PID:988
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              2⤵
              • Runs ping.exe
              PID:2636
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              2⤵
              • Runs ping.exe
              PID:1328
          • C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"
            1⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2824
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              2⤵
                PID:1744
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                2⤵
                  PID:3028
                • C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe
                  "C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"
                  2⤵
                  • Drops file in Drivers directory
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Sets desktop wallpaper using registry
                  • Drops file in Windows directory
                  • Modifies Control Panel
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1652
                  • C:\Windows\SysWOW64\ping.exe
                    ping -a -l www.duniasex.com 65500
                    3⤵
                    • Runs ping.exe
                    PID:896
                  • C:\Windows\SysWOW64\ping.exe
                    ping -a -l www.rasasayang.com.my 65500
                    3⤵
                    • Runs ping.exe
                    PID:3024
                  • C:\Windows\SysWOW64\ping.exe
                    ping -a -l www.duniasex.com 65500
                    3⤵
                    • Runs ping.exe
                    PID:2812
                  • C:\Windows\SysWOW64\ping.exe
                    ping -a -l www.rasasayang.com.my 65500
                    3⤵
                    • Runs ping.exe
                    PID:2728
                  • C:\Windows\SysWOW64\ping.exe
                    ping -a -l www.duniasex.com 65500
                    3⤵
                    • Runs ping.exe
                    PID:1040
                  • C:\Windows\SysWOW64\ping.exe
                    ping -a -l www.rasasayang.com.my 65500
                    3⤵
                    • Runs ping.exe
                    PID:2264
                • C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe
                  "C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:1544
                • C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe
                  "C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:1804
                • C:\Windows\SysWOW64\ping.exe
                  ping -a -l www.duniasex.com 65500
                  2⤵
                  • Runs ping.exe
                  PID:1916
                • C:\Windows\SysWOW64\ping.exe
                  ping -a -l www.rasasayang.com.my 65500
                  2⤵
                  • Runs ping.exe
                  PID:2028
                • C:\Windows\SysWOW64\ping.exe
                  ping -a -l www.duniasex.com 65500
                  2⤵
                  • Runs ping.exe
                  PID:2240
                • C:\Windows\SysWOW64\ping.exe
                  ping -a -l www.rasasayang.com.my 65500
                  2⤵
                  • Runs ping.exe
                  PID:3032
                • C:\Windows\SysWOW64\ping.exe
                  ping -a -l www.duniasex.com 65500
                  2⤵
                  • Runs ping.exe
                  PID:836
                • C:\Windows\SysWOW64\ping.exe
                  ping -a -l www.rasasayang.com.my 65500
                  2⤵
                  • Runs ping.exe
                  PID:2416
              • C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"
                1⤵
                  PID:488
                • C:\Windows\SysWOW64\drivers\system32.exe
                  C:\Windows\system32\drivers\system32.exe
                  1⤵
                    PID:884
                  • C:\Windows\SysWOW64\drivers\Kazekage.exe
                    C:\Windows\system32\drivers\Kazekage.exe
                    1⤵
                      PID:3016
                    • C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe
                      "C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"
                      1⤵
                        PID:3024
                      • C:\Windows\SysWOW64\drivers\system32.exe
                        C:\Windows\system32\drivers\system32.exe
                        1⤵
                          PID:1792
                        • C:\Windows\SysWOW64\drivers\system32.exe
                          C:\Windows\system32\drivers\system32.exe
                          1⤵
                            PID:1632
                          • C:\Windows\SysWOW64\drivers\Kazekage.exe
                            C:\Windows\system32\drivers\Kazekage.exe
                            1⤵
                              PID:552
                            • C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe
                              "C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"
                              1⤵
                                PID:1296
                              • C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe
                                "C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"
                                1⤵
                                  PID:1628
                                • C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe
                                  "C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"
                                  1⤵
                                    PID:1948
                                  • C:\Windows\SysWOW64\drivers\system32.exe
                                    C:\Windows\system32\drivers\system32.exe
                                    1⤵
                                      PID:1756
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping -a -l www.duniasex.com 65500
                                        2⤵
                                        • Runs ping.exe
                                        PID:1932
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping -a -l www.rasasayang.com.my 65500
                                        2⤵
                                        • Runs ping.exe
                                        PID:628
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping -a -l www.duniasex.com 65500
                                        2⤵
                                        • Runs ping.exe
                                        PID:1860
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping -a -l www.rasasayang.com.my 65500
                                        2⤵
                                        • Runs ping.exe
                                        PID:2124
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping -a -l www.duniasex.com 65500
                                        2⤵
                                        • Runs ping.exe
                                        PID:1000
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping -a -l www.rasasayang.com.my 65500
                                        2⤵
                                        • Runs ping.exe
                                        PID:932
                                    • C:\Windows\SysWOW64\drivers\Kazekage.exe
                                      C:\Windows\system32\drivers\Kazekage.exe
                                      1⤵
                                        PID:1104
                                      • C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe
                                        "C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"
                                        1⤵
                                          PID:692
                                        • C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe
                                          "C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"
                                          1⤵
                                            PID:668
                                          • C:\Windows\SysWOW64\drivers\Kazekage.exe
                                            C:\Windows\system32\drivers\Kazekage.exe
                                            1⤵
                                              PID:2900
                                              • C:\Windows\SysWOW64\ping.exe
                                                ping -a -l www.duniasex.com 65500
                                                2⤵
                                                • Runs ping.exe
                                                PID:2980
                                              • C:\Windows\SysWOW64\ping.exe
                                                ping -a -l www.rasasayang.com.my 65500
                                                2⤵
                                                • Runs ping.exe
                                                PID:572
                                            • C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe
                                              "C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"
                                              1⤵
                                                PID:2892
                                              • C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe
                                                "C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"
                                                1⤵
                                                  PID:292
                                                • C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe
                                                  "C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:2652
                                                • C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe
                                                  "C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2136

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe

                                                  Filesize

                                                  66KB

                                                  MD5

                                                  6da2d0d24c7760546de2ab2a3cf6b80e

                                                  SHA1

                                                  a96e6df09086c152d44c3ca687e3e8abcf622bb4

                                                  SHA256

                                                  07de90906f1791f3d56b5809c9cab0d6ee3f5f2bb4c88ee407c48cd27305e0ea

                                                  SHA512

                                                  ee54375e7e3d43bd252cf7df293e0f2b6ac3e2d09fe7478f8b218b68440264bd1deb89402fe853960f5b4819799f59861476b69484a623fd680b3dd800d87e9b

                                                • C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe

                                                  Filesize

                                                  66KB

                                                  MD5

                                                  a07d3e585b426055936688d471bd4110

                                                  SHA1

                                                  4b6d6b42093759e02e66068972a8c46822b0f109

                                                  SHA256

                                                  605880c651a8d1155aec85a5dd3e9812d4898e9501e19b4b0f0e697434166795

                                                  SHA512

                                                  69985a732d487500fb1c938f6b24e42e72e21c991681c5b8c67b7eafc17c02030f83a4f91115d93345d18dae825bacc2ecc9feca46150a835510e370b736b901

                                                • C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe

                                                  Filesize

                                                  66KB

                                                  MD5

                                                  fb6afc6959dab6fa1f51f7f9ee23d761

                                                  SHA1

                                                  d14eb789c83f32aa0403574c18af59be58558a5d

                                                  SHA256

                                                  f3a5fb91bcf08f1a3fbaafd3081b5a70d5f27188f3d8544993b12b2bdd89db0c

                                                  SHA512

                                                  bf921213b5dc4df2c55a389c3684e954aa582c74a9c0489fab68f2dc6e88932c4688acfc02f64c6c656f44ffe612eabc60713da9a130562961ae496cfb609a98

                                                • C:\Windows\Fonts\The Kazekage.jpg

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  d6b05020d4a0ec2a3a8b687099e335df

                                                  SHA1

                                                  df239d830ebcd1cde5c68c46a7b76dad49d415f4

                                                  SHA256

                                                  9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

                                                  SHA512

                                                  78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

                                                • C:\Windows\SysWOW64\5-1-2024.exe

                                                  Filesize

                                                  66KB

                                                  MD5

                                                  f6b711cf9b2fe4674e5b3d53c60c4c8b

                                                  SHA1

                                                  7928b2763d831d941e3734aa5f00e9c387354d82

                                                  SHA256

                                                  62bd9e8209b1278c9c109cf712364d4c31519bcd1c4f19e04d587d1459083cbd

                                                  SHA512

                                                  96fd8f0617e2fc1fef1d154e7020952910d83af8dafefb8db9323ef79b7fb04114a089b95fa78a29b48e75bd45495791312af3fa05d0904ad53d848f04cd7167

                                                • C:\Windows\SysWOW64\drivers\Kazekage.exe

                                                  Filesize

                                                  66KB

                                                  MD5

                                                  58b6492ef096481a9aad1b97088570f6

                                                  SHA1

                                                  f56801d52dd9cba90ad2a5c0cf0252df5bc96bab

                                                  SHA256

                                                  ac6330fe36746e7d471451cb29deacd942b28cad58a68af325bb564455292007

                                                  SHA512

                                                  bc565dabdc762342261d846f554f60a93c21d38be925a8dbfc08e13790f21c2533f83acf946718b825cd06640d7e13d07e39112c719d4865bb774d599e9cde7b

                                                • C:\Windows\SysWOW64\drivers\system32.exe

                                                  Filesize

                                                  66KB

                                                  MD5

                                                  770a7c9de1585a2c986a6ab391d597a8

                                                  SHA1

                                                  f9eb1d9cd9dd33adae9306f604548e73040ebdd6

                                                  SHA256

                                                  9653066635347c3a7c22396332eea610de5a08691b37d507fe3409670f50d071

                                                  SHA512

                                                  e3333c5b5ef827085b80f146d95040d01e50516adb76528c861bcced072085f1dc7c9689daedb6a60c7bb00a443af6aa721c444cc44cd16a196ca41b90cc57da

                                                • C:\Windows\system\msvbvm60.dll

                                                  Filesize

                                                  1.3MB

                                                  MD5

                                                  5343a19c618bc515ceb1695586c6c137

                                                  SHA1

                                                  4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                  SHA256

                                                  2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                  SHA512

                                                  708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                • memory/292-187-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/292-190-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/488-228-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/552-277-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/552-280-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/668-232-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/692-237-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/884-311-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/884-312-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1104-241-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1296-275-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1296-276-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1544-137-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1544-134-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1616-323-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1616-322-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1628-269-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1632-284-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1632-282-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1652-264-0x0000000002500000-0x000000000252A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1652-205-0x0000000002500000-0x000000000252A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1652-334-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1652-607-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1652-146-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1652-233-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1704-327-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1704-326-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-38-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-39-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-604-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-186-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-189-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-341-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-0-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-321-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1720-331-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1744-297-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1744-294-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-274-0x0000000002470000-0x000000000249A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-310-0x0000000002470000-0x000000000249A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-336-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-261-0x0000000002470000-0x000000000249A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-266-0x0000000002470000-0x000000000249A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-299-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-246-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-302-0x0000000002470000-0x000000000249A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-609-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1756-304-0x0000000002470000-0x000000000249A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1792-289-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1792-287-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1804-128-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1804-131-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1948-262-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/1948-263-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2008-318-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2100-315-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2136-79-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2136-82-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2360-95-0x00000000006A0000-0x00000000006CA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2360-605-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2360-332-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2360-40-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2360-77-0x00000000006A0000-0x00000000006CA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2360-193-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2360-85-0x00000000006A0000-0x00000000006CA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2652-181-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2652-178-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2824-333-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2824-93-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2824-606-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2824-206-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2892-195-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2892-197-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-234-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-608-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-335-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-265-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-229-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-207-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-238-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-272-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-273-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/2900-285-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/3016-307-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/3024-301-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/3024-303-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/3028-293-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/3028-290-0x0000000000400000-0x000000000042A000-memory.dmp

                                                  Filesize

                                                  168KB