Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    53s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 08:35

Errors

Reason
Machine shutdown

General

  • Target

    TrinityLoader.exe

  • Size

    140.0MB

  • MD5

    cc8a9290d4d7f1d36055993ef2c927a4

  • SHA1

    91549c9d8637b2034157244cb32811e41801777e

  • SHA256

    fe4eab5e0fc4d22b5b74399fe790851a488b8ef32d8b5a850b73aeb298f7d0df

  • SHA512

    3e6bca457b2bab14e60f0d0b5b32d9e7da47eee2ac8d99bc3145d94b6af8bf1ca80ebe4cf1182ba3e04c48ecfb5d8f4f86cfaba861092746cab6df6a630ad259

  • SSDEEP

    786432:e5FEf2qL+07t0WN3KPqiVUTyqj1+NnRUTEKsKgqTtLwSTRpf4P1wT1ixZrstS:eIfjLJ2TVUXKStTAxZrstS

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Detects Pyinstaller 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TrinityLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\TrinityLoader.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Roaming\bypassanticheat.exe
      "C:\Users\Admin\AppData\Roaming\bypassanticheat.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Roaming\bypassanticheat.exe
        "C:\Users\Admin\AppData\Roaming\bypassanticheat.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2440
    • C:\Users\Admin\AppData\Roaming\bypassanticheat2.exe
      "C:\Users\Admin\AppData\Roaming\bypassanticheat2.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1692
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1064
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          4⤵
          • Drops file in Windows directory
          PID:1616
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "ZUXVIREU"
        3⤵
        • Launches sc.exe
        PID:2872
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "ZUXVIREU" binpath= "C:\ProgramData\kqyroqwlucgu\acdfownevzxz.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:2336
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:2868
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "ZUXVIREU"
        3⤵
        • Launches sc.exe
        PID:1696
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2660
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
    1⤵
      PID:2016
    • C:\ProgramData\kqyroqwlucgu\acdfownevzxz.exe
      C:\ProgramData\kqyroqwlucgu\acdfownevzxz.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:112
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          3⤵
          • Drops file in Windows directory
          PID:932
      • C:\Windows\system32\conhost.exe
        C:\Windows\system32\conhost.exe
        2⤵
          PID:2596
        • C:\Windows\explorer.exe
          explorer.exe
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2636
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:1704
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x1
          1⤵
            PID:1664

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            67KB

            MD5

            753df6889fd7410a2e9fe333da83a429

            SHA1

            3c425f16e8267186061dd48ac1c77c122962456e

            SHA256

            b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

            SHA512

            9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            166a6212b80e97be24572773a21a9721

            SHA1

            8dadd1a9ebea75cb920823b50be9c6f7714d3b65

            SHA256

            2eda221fbb1ed4f7c6c00bcfcf37d74d17a4d7c506176805a8fb8961e1cbc085

            SHA512

            c47b9449fdacca88e184a320013ac42e0e9770d1c0d01a46d31bfe19c02804c9e2cce2fa70286bf70b1f5dfbeb4615844bd70814484f5dee0b6dd006af03b0f8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            121f8068b95ee62881dd1243c5007ca0

            SHA1

            e83adcf3c2604006580f73bf608328c1e834b48b

            SHA256

            3fdf91506c5f7fcaf120d854f7a353bc493b6983c98afb9015ed40005146cc75

            SHA512

            f76829c31555990cc253a76fc5503d251bccdfcdc9a0c7f235e94e4d0b11ced69ccc6cd1d8065cb298934d7740b566bf56e05398ef5d9f3bd72c99a8ef65bd63

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            f2793eaeeda84842243874d85aec734a

            SHA1

            80a521cf7d31aff1190152112c5742a03dde7b4f

            SHA256

            4ea6e687b50837a801c1b0e8ab450ecb5b22905b7beb1b466c16689c347bd682

            SHA512

            60ca8c66c90b8e65a7a3dbdba2eb1d6ec24159925badb9f8e60af117ba593e0981b5aa725e4bd989fd1f275abf488a59f602ba9825613c59063ceb51213889a2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            610fb3eaa6731b308f169ab4285ab612

            SHA1

            9f0dad39b99ab3956a64ffad48df1e6453aca38c

            SHA256

            5c3891fe9af5f30bab0fdb6ed480866616f0c0565774d89c73685b90e7f2ad08

            SHA512

            46ff2bd615bbb5004fe9463c69bbfd9404e7dd8096fda4dc08c58d30487a73ab91403efc5e6636ba97c49b5c6201174aba92eb3d651185650a71b6fc344815d4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            eb6f47da9fa71119bc522f444ecf6bd6

            SHA1

            b82989d16a5c3b847b1d54b2a82bbc16de2709f5

            SHA256

            110bbc596b070c6c8d9ad072f31bd2ce5a83a516df63255f0268ad06814e0365

            SHA512

            3fc0c22450d91c82deaff734c9182c16b015f97df6b10edcb067efa7dcf01b9ea084ed978dc1b0520015bd93787f6a2ec003f8ab2b1051ae5dbf3059181fe2ae

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            34f8f0847f070614ca2210ad0234b4af

            SHA1

            6a95a5e1b9291ac888215941a25598ba14b05864

            SHA256

            9c682d742950063ae26c5f30d6438ee2245856e0cf14021384731f486837602a

            SHA512

            ac79f4da36dc1a6e93d939231810c5751ea1f1c2c1a94ab7ce275cbeb6bd0a3efbb9ee2fe189e4f912af00880e4a25434e7ac749f7636ec802da114adc219c5f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            acd8b2015f96f64bf0b941c355b78d03

            SHA1

            50ba0ca05d0571861ea310284ffa222ffef5ffa7

            SHA256

            f5149d31f9c65fa00f53bdb3ab85bcd42b73751b14750c447859823de25925bf

            SHA512

            0648fd43eba83ec79d203923b7b714bc8705156946cdc32a2631564e2ae087d20015c299127b1203c3ba7369d7b95c43281b1ec1827e9c8901dcf361936eb2e0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            6677aa423da1512e0d4a62061ad05771

            SHA1

            7d11755dea91855d3d0cda2251e8020da67f75ea

            SHA256

            0eec9a7ce99324b4ec22615ee376791683cbc84fddba6deb11b2898def75e31b

            SHA512

            ac9fff5220830126cbadb1d0b51d7307474cc40a45e1799ae342489927cfae11604555e0bb1d994c18b5036c3ab0ebe6e7d295516343d09056532214c20c0072

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            c7f4d14d7ddcc68f961918af371a4afe

            SHA1

            de53ce5c447476cdaff49d2bc444a4123b2168a4

            SHA256

            04a5167acb56538eb97d4f3adc60b2030ed3d1305cd387fae79f32aaf7c316d7

            SHA512

            d477b08bcd0e573e7133890b1be146d10f1ed4787bee067de3637a0216d47339042caa7e8de418b06934df384cecc4f6b1751f8395315f510a49cd7465771b79

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            d1aad54db6c522c0f2a02e159fb159d1

            SHA1

            cf0da9a21bf5521e20ff62b8d5806942d58bc63b

            SHA256

            c210380bb7cd934c2805f087ec3a3aa33e69842931879a6cd00d3d5b2b4f8f67

            SHA512

            4b375aa47d829296948642034a12999695e9b7c94f689b809368d750bdff6e09361f48ef4b0c46764f6f55912b3fcef6ba6f4f222adf5cc67ec442f211598751

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            d67934fe1b55af70375e008e07e6438d

            SHA1

            81776b4b43b3f821fbc92f92242a16e9071e0b5d

            SHA256

            8e9de0a6bbdc0aff1455907f13fe61f0b63cf1947f3588a2d726e3b18bfd6dd4

            SHA512

            e4db146a27a10dd00a5ec1aa9f495eef240a0883d3ea9daf1e0bda3dd5268e2d4c58ecedc87b5c60dd786b742326bd635af42d07325b4f5c0be6699efde1b581

          • C:\Users\Admin\AppData\Local\Temp\TarBE09.tmp

            Filesize

            175KB

            MD5

            dd73cead4b93366cf3465c8cd32e2796

            SHA1

            74546226dfe9ceb8184651e920d1dbfb432b314e

            SHA256

            a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

            SHA512

            ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\python312.dll

            Filesize

            3.5MB

            MD5

            c324ccf3cd414d44d4172684a7bf7127

            SHA1

            7ec2bfda7a9ee44f42c82e98e20f0afd15b17052

            SHA256

            0c0a29b8e00ad99cdeb76ca93d8e9ff7ca60cb96b2ba157a0747841e54dfb2de

            SHA512

            a52cf45fd20914376c19a836017334b2195ca36c5ea9a1cf907a116c347cef6a4a73ddefec229fe2aec17a883d2cf85b7230eea2029e6631cdb5c66b1daa8286

          • C:\Users\Admin\AppData\Roaming\bypassanticheat.exe

            Filesize

            2.8MB

            MD5

            374f2ba96ea2a32f781d4efa19f7ac82

            SHA1

            894c8169d5be84f2ef13025eb2014d59d1e202b8

            SHA256

            4102ddb1e4a161dfbc58e9baf200641449269b9ed8226dce9a2158a25391511d

            SHA512

            da46648316eec6a2678f447c201d114bb3e435cae53d0a4c400b00f5cc40b5de17592241f0b5a0fcae0e7085cdf06ef646b72029b7cfdfcc312c49a733c65674

          • C:\Users\Admin\AppData\Roaming\bypassanticheat.exe

            Filesize

            2.4MB

            MD5

            4113ca2303f0d2ca1832d89840f4325b

            SHA1

            a32834609df24cd904aef0c600b5a4235ac82b43

            SHA256

            c352b82ea37ef1f5d43fd48462fb1b6c2fff73ab65b6ddac3ae9e9e4a24f7def

            SHA512

            476a393cf08ee1feab24d921c5ac5898b4458da1ed925dccf47e7d449f9ba812a09b7085ddeb8377ccba7c17df94f110b97842dd0a346f4c5c40595e10ea679c

          • C:\Users\Admin\AppData\Roaming\bypassanticheat.exe

            Filesize

            3.8MB

            MD5

            6606c87f081f3f6306d376a7a6335fa5

            SHA1

            d28d78212897bbecd79a6856fc565f461f347f61

            SHA256

            342a7622c1f32f728d674d948a81db9f18257c9df8773502a9fa5e9d7cced581

            SHA512

            ff03258a866f9ddbaf412dce0b4aaa5b93063ccce827a03cab27c815560d129a1857de5d844138c96ea659c599eaf7b5e01d2d87fdcb6a6240cda1960e58d2eb

          • C:\Users\Admin\AppData\Roaming\bypassanticheat2.exe

            Filesize

            448KB

            MD5

            e3dd7dab92af79fdb623d04c33890830

            SHA1

            7c7ad27ea40694a9bf86b2726afe76bd5a495746

            SHA256

            975048519516206b5467fb33d894fd925d82b8768d35c582ebfafeba1db97646

            SHA512

            42635d593c8a6b2b48be4bbfbf581d58ef9c78764462139f31cbd113d9e982e1e244c66b5ef211106e6a8caaa4070b6199870d2f6a55a85274960d59e0c3f579

          • C:\Users\Admin\AppData\Roaming\bypassanticheat2.exe

            Filesize

            809KB

            MD5

            8a8ae345d84a24ce840a250689112e18

            SHA1

            2c31202a32593479669fedc4f333be6f908985dc

            SHA256

            bca0f89677f30e216224f4357f8c2d8181af7a2d61dd8edb44e00a47ea03bc4c

            SHA512

            aca1761064e03446d1ae967379e57b1298925e3c8cc3fa32f8f55c4a333e171ad9eaaa7015f697a042e84dd8dae2594cdec7eb7233d13eb6777068f5d0066263

          • \ProgramData\kqyroqwlucgu\acdfownevzxz.exe

            Filesize

            2.6MB

            MD5

            4bce7738ec0f0b1610a09597da99aa4b

            SHA1

            6dc841342371ed2428f6c9c895271add85c5d9f8

            SHA256

            ef6281ca217238d429b2298cba9123c6d15e62fcdc16ddd8e5e4b58c31314e04

            SHA512

            a11e1f7b1ffced240ef81d0da18a2860bd550754c525d559fe3256cab314b78119f7c08510299536c47c14d06708d3bff77050e0eb1106af8abca0423b8d1626

          • \Users\Admin\AppData\Local\Temp\_MEI19882\python312.dll

            Filesize

            2.9MB

            MD5

            c4ece6977c3cf9d557a6a52889a53a8d

            SHA1

            e18e9388ff3f17c3d659fec93a958992371fc344

            SHA256

            3e77168aa5200b193832f8f92024e8566429e8d39b327881b32853688b3505d6

            SHA512

            e3601008a4e12ed136453f5ecfbbf79f527497f4d410dfa2914455be23d2f3472275cf9f431137d1a015ca575e86735a458993543651dd842a5250b46f224d45

          • \Users\Admin\AppData\Roaming\bypassanticheat.exe

            Filesize

            3.4MB

            MD5

            1b854bc6fd38b5c3e9543aa532dcb6ca

            SHA1

            c04a1a5f5eaf5d3a6f50da0bd758ea1af12b2b07

            SHA256

            dc1dbe7a316ab87ec0320c20d5336bce0af8ebd97263f18fa39fd75673f5b496

            SHA512

            c11493c736a83ee497db96d95d434d7deb2231b4e99c1d1cfacdc0191e66b562a47ea3ce3405a11db5ea2a216c84e7f8eb9223201223b7726a2c0fe5cc435ac9

          • \Users\Admin\AppData\Roaming\bypassanticheat.exe

            Filesize

            3.1MB

            MD5

            fc85be5615407d2de9077738ea275c99

            SHA1

            d8e0532a6da36be3e5252b7cd43995c2fcdc5def

            SHA256

            a3d340437849975a370fceadc790f2a1d8d044555997ada601c788d81f3742fc

            SHA512

            aab8cd44d11946e13971533b1179ef520693d4922074fcfbb393e22d7a2191cb893e6ca42b63b4bd889822709c029176ff037de8cc7c8ec13ce10891940ea681

          • \Users\Admin\AppData\Roaming\bypassanticheat2.exe

            Filesize

            768KB

            MD5

            6ad66a63d63cab3e473552e5561b0acb

            SHA1

            42b2a6c84643e1f59315f7aa049856d3f7ecc2b7

            SHA256

            5c846428348cd9e18dfc764066c27c26ab87a7d7785736b16b18d880530b0d7f

            SHA512

            ca76f76fa21fc854897178e13562905605423ac0e481310958d9c35c625ec04dc67a4f74f78e4199d13731f4f37c056f15ae717b77b4ecb312c64e9bfa5e8ff7

          • \Users\Admin\AppData\Roaming\bypassanticheat2.exe

            Filesize

            576KB

            MD5

            53da8e6f7553ef5459a0d5a9370062fb

            SHA1

            331d73bb1b23f986b4e2765f515f3f5b8c73848b

            SHA256

            b8021d8a3da14a4e4c027a0c2fdeb14c20530e5db3f3f0badde87d4f115e5883

            SHA512

            4e5c1a312c025673a33a009e0da1c25c78965a39b5a10e53b7f63870d1c1f8004f8f1b80b4ae47d0d9ea7390fa1f2205f61d564563dc709ce3699b7499714c66

          • memory/1064-740-0x00000000027F0000-0x0000000002870000-memory.dmp

            Filesize

            512KB

          • memory/1064-736-0x000000001B070000-0x000000001B352000-memory.dmp

            Filesize

            2.9MB

          • memory/1064-744-0x000007FEF4F10000-0x000007FEF58AD000-memory.dmp

            Filesize

            9.6MB

          • memory/1064-743-0x00000000027F0000-0x0000000002870000-memory.dmp

            Filesize

            512KB

          • memory/1064-742-0x000007FEF4F10000-0x000007FEF58AD000-memory.dmp

            Filesize

            9.6MB

          • memory/1064-739-0x00000000027F0000-0x0000000002870000-memory.dmp

            Filesize

            512KB

          • memory/1064-741-0x00000000027F0000-0x0000000002870000-memory.dmp

            Filesize

            512KB

          • memory/1064-738-0x0000000002420000-0x0000000002428000-memory.dmp

            Filesize

            32KB

          • memory/1064-737-0x000007FEF4F10000-0x000007FEF58AD000-memory.dmp

            Filesize

            9.6MB

          • memory/1296-31-0x00000000005F0000-0x0000000000611000-memory.dmp

            Filesize

            132KB

          • memory/1296-58-0x0000000001F80000-0x0000000001F96000-memory.dmp

            Filesize

            88KB

          • memory/1296-37-0x0000000000340000-0x0000000000347000-memory.dmp

            Filesize

            28KB

          • memory/1296-67-0x0000000002230000-0x0000000002249000-memory.dmp

            Filesize

            100KB

          • memory/1296-34-0x00000000033D0000-0x00000000034CE000-memory.dmp

            Filesize

            1016KB

          • memory/1296-25-0x00000000005D0000-0x00000000005E8000-memory.dmp

            Filesize

            96KB

          • memory/1296-22-0x0000000000370000-0x0000000000390000-memory.dmp

            Filesize

            128KB

          • memory/1296-19-0x0000000000160000-0x000000000016D000-memory.dmp

            Filesize

            52KB

          • memory/1296-16-0x0000000002F20000-0x0000000002FE1000-memory.dmp

            Filesize

            772KB

          • memory/1296-13-0x00000000001A0000-0x00000000001B2000-memory.dmp

            Filesize

            72KB

          • memory/1296-10-0x0000000004090000-0x0000000004D41000-memory.dmp

            Filesize

            12.7MB

          • memory/1296-7-0x0000000000390000-0x00000000003D0000-memory.dmp

            Filesize

            256KB

          • memory/1296-643-0x000000013F820000-0x000000014014C000-memory.dmp

            Filesize

            9.2MB

          • memory/1296-43-0x0000000001DD0000-0x0000000001DFA000-memory.dmp

            Filesize

            168KB

          • memory/1296-46-0x0000000000650000-0x0000000000697000-memory.dmp

            Filesize

            284KB

          • memory/1296-49-0x0000000001F10000-0x0000000001F36000-memory.dmp

            Filesize

            152KB

          • memory/1296-52-0x0000000001E60000-0x0000000001E76000-memory.dmp

            Filesize

            88KB

          • memory/1296-0-0x0000000180000000-0x0000000180A25000-memory.dmp

            Filesize

            10.1MB

          • memory/1296-55-0x0000000003960000-0x0000000003A15000-memory.dmp

            Filesize

            724KB

          • memory/1296-40-0x0000000000350000-0x000000000035A000-memory.dmp

            Filesize

            40KB

          • memory/1296-61-0x0000000002350000-0x00000000023D2000-memory.dmp

            Filesize

            520KB

          • memory/1296-64-0x0000000002280000-0x00000000022BE000-memory.dmp

            Filesize

            248KB

          • memory/1296-4-0x000000013F820000-0x000000014014C000-memory.dmp

            Filesize

            9.2MB

          • memory/1296-3-0x0000000000180000-0x0000000000193000-memory.dmp

            Filesize

            76KB

          • memory/1296-767-0x000000013F820000-0x000000014014C000-memory.dmp

            Filesize

            9.2MB

          • memory/1664-884-0x0000000002760000-0x0000000002761000-memory.dmp

            Filesize

            4KB

          • memory/1704-880-0x0000000002A40000-0x0000000002A41000-memory.dmp

            Filesize

            4KB

          • memory/2636-883-0x00000000007C0000-0x00000000007E0000-memory.dmp

            Filesize

            128KB

          • memory/2688-762-0x0000000000EE0000-0x0000000000F60000-memory.dmp

            Filesize

            512KB

          • memory/2688-761-0x000007FEF5040000-0x000007FEF59DD000-memory.dmp

            Filesize

            9.6MB

          • memory/2688-760-0x0000000000D90000-0x0000000000D98000-memory.dmp

            Filesize

            32KB

          • memory/2688-763-0x000007FEF5040000-0x000007FEF59DD000-memory.dmp

            Filesize

            9.6MB

          • memory/2688-764-0x0000000000EE0000-0x0000000000F60000-memory.dmp

            Filesize

            512KB

          • memory/2688-765-0x0000000000EE0000-0x0000000000F60000-memory.dmp

            Filesize

            512KB

          • memory/2688-766-0x0000000000EE0000-0x0000000000F60000-memory.dmp

            Filesize

            512KB

          • memory/2688-759-0x0000000019B00000-0x0000000019DE2000-memory.dmp

            Filesize

            2.9MB

          • memory/2688-768-0x000007FEF5040000-0x000007FEF59DD000-memory.dmp

            Filesize

            9.6MB